The Shared Security Podcast

1 Likes     1 Followers     1 Subscribers

Sign up / Log in to like, follow, recommend and subscribe!

Recommendations


Episodes

Date Title & Description Contributors
2024-12-30

  2024 Year in Review: What We Got Right and Looking to 2025

In the final episode of the Shared Security Podcast for 2024, join us as we recap our predictions for the year, discuss what we got right and wrong, and highlight our top episodes on YouTube. We also extend a heartfelt thank you to our Patreon supporte...
  Tom Eston, Scott Wright, Kevin Johnson author
2024-12-23

  Digital License Plate Vulnerabilities, How to Avoid New Text Message Scams

In this episode Tom, Scott, and Kevin discuss the vulnerabilities of digital license plates and the potential for hackers to exploit them. They explain what digital license plates are and how they work. The ‘Aware Much?’ segment covers the topic of sus...
  Tom Eston, Scott Wright, Kevin Johnson author
2024-12-16

  Hack-for-Hire Campaign Targeting Climate Activists, Government Hypocrisy on Encryption

In Episode 359 of the Shared Security Podcast, the team examines a shocking hack-for-hire operation alleged to target over 500 climate activists and journalists, potentially involving corporate sponsorship by ExxonMobil. They explore the intricate laye...
  Tom Eston, Scott Wright, Kevin Johnson author
2024-12-09

  Tanya Janca on Secure Coding, AI in Cybersecurity, and Her New Book

Join us for an insightful episode of the Shared Security Podcast as Tanya Janca returns for her fifth appearance. Discover the latest on her new book about secure coding, exciting updates in Application Security, and the use of AI in security. Learn ho...
  Tom Eston, Scott Wright, Tanya Janca author
2024-12-02

  Australia Bans Social Media for Kids, Holiday Vishing Scams

In this episode, we discuss Australia’s new legislation banning social media for users under 16 and its potential impact. Our hosts also explore the issue of vishing (voicemail phishing), why it’s escalating, particularly during the holiday season, and...
  Tom Eston, Kevin Johnson author
2024-11-25

  Deepfake Fraud, Data Brokers Tracking Military Personnel

In Episode 356, Tom and Kevin discuss the increasing role of deepfake technology in bypassing biometric checks, accounting for 24 percent of fraud attempts. The show covers identity fraud issues and explores the controversial practices of data brokers ...
  Tom Eston, Kevin Johnson author
2024-11-18

  Why It’s Time to Leave Twitter

In episode 355, Tom discusses his decision to deactivate his Twitter accounts due to privacy concerns with Twitter’s new AI policy and changes in the blocking features. He outlines the steps for leaving Twitter, including how to archive and delete twee...
  Tom Eston author
2024-11-11

  Advanced Persistent Teenagers, Okta Bug Allowed Logins Without a Correct Password

In episode 354, we discuss the emergence of the term ‘Advanced Persistent Teenagers’ (APT) as a “new” cybersecurity threat. Recorded just before the election, the hosts humorously predict election outcomes while exploring the rise of teenage hackers re...
  Tom Eston, Kevin Johnson author
2024-11-04

  Fallout from the Change Healthcare Breach, Mortgage Wire Fraud What You Need To Know

In episode 353, we discuss the February 2024 ransomware attack on Change Healthcare, resulting in the largest data breach of protected health information in history. Notifications have been sent to 100 million Americans, including hosts Tom and Kevin. ...
  Tom Eston, Scott Wright, Kevin Johnson author
2024-10-28

  Internet Archive Hacked, Introducing The AI Toilet Camera

In this episode, we discuss the significant data breach at the Internet Archive, affecting 33 million users. We also examine the introduction of an AI-integrated toilet camera by Throne, designed for health monitoring by analyzing bodily waste, and the...
  Tom Eston, Kevin Johnson author