A podcast that brings you timely stories, news and tips for living securely in a connected world. Topics include Information Security, Privacy, Internet of Things (IoT), Mobile Devices, Applications and Social Media. Hosted by Scott Wright Cyber Security Auditor, Researcher and Coach, President of Security Perspectives Inc. and Tom Eston Ethical Hacker and Information Security Professional.
Date | Title & Description | Contributors |
---|---|---|
2024-12-30 | In the final episode of the Shared Security Podcast for 2024, join us as we recap our predictions for the year, discuss what we got right and wrong, and highlight our top episodes on YouTube. We also extend a heartfelt thank you to our Patreon supporte... |
|
2024-12-23 |
Digital License Plate Vulnerabilities, How to Avoid New Text Message Scams In this episode Tom, Scott, and Kevin discuss the vulnerabilities of digital license plates and the potential for hackers to exploit them. They explain what digital license plates are and how they work. The ‘Aware Much?’ segment covers the topic of sus... |
|
2024-12-16 |
Hack-for-Hire Campaign Targeting Climate Activists, Government Hypocrisy on Encryption In Episode 359 of the Shared Security Podcast, the team examines a shocking hack-for-hire operation alleged to target over 500 climate activists and journalists, potentially involving corporate sponsorship by ExxonMobil. They explore the intricate laye... |
|
2024-12-09 |
Tanya Janca on Secure Coding, AI in Cybersecurity, and Her New Book Join us for an insightful episode of the Shared Security Podcast as Tanya Janca returns for her fifth appearance. Discover the latest on her new book about secure coding, exciting updates in Application Security, and the use of AI in security. Learn ho... |
|
2024-12-02 | In this episode, we discuss Australia’s new legislation banning social media for users under 16 and its potential impact. Our hosts also explore the issue of vishing (voicemail phishing), why it’s escalating, particularly during the holiday season, and... |
|
2024-11-25 | In Episode 356, Tom and Kevin discuss the increasing role of deepfake technology in bypassing biometric checks, accounting for 24 percent of fraud attempts. The show covers identity fraud issues and explores the controversial practices of data brokers ... |
|
2024-11-18 | In episode 355, Tom discusses his decision to deactivate his Twitter accounts due to privacy concerns with Twitter’s new AI policy and changes in the blocking features. He outlines the steps for leaving Twitter, including how to archive and delete twee... |
|
2024-11-11 |
Advanced Persistent Teenagers, Okta Bug Allowed Logins Without a Correct Password In episode 354, we discuss the emergence of the term ‘Advanced Persistent Teenagers’ (APT) as a “new” cybersecurity threat. Recorded just before the election, the hosts humorously predict election outcomes while exploring the rise of teenage hackers re... |
|
2024-11-04 |
Fallout from the Change Healthcare Breach, Mortgage Wire Fraud What You Need To Know In episode 353, we discuss the February 2024 ransomware attack on Change Healthcare, resulting in the largest data breach of protected health information in history. Notifications have been sent to 100 million Americans, including hosts Tom and Kevin. ... |
|
2024-10-28 | In this episode, we discuss the significant data breach at the Internet Archive, affecting 33 million users. We also examine the introduction of an AI-integrated toilet camera by Throne, designed for health monitoring by analyzing bodily waste, and the... |
|