Tom Eston, Scott Wright, Kevin JohnsonTechnology, News
Tom Eston, Scott Wright, Kevin JohnsonTechnology, News
Tom Eston, Scott Wright, Kevin JohnsonTechnology, News
Tom Eston, Scott Wright, Kevin JohnsonTechnology, News

About

Shared Security is your premier cybersecurity and privacy podcast where we explore the bonds shared between people and technology. Join industry experts Tom Eston, Scott Wright, and Kevin Johnson as they deliver the latest news, actionable tips, expert guidance, and insightful interviews with top cybersecurity and privacy specialists. Stay informed and take control of your online security and privacy in today’s interconnected world. Tune in every week to discover invaluable insights, strategies, and tools to live confidently and safeguard your digital life.

  • New Hotel Lock Vulnerabilities, Glassdoor Anonymity Issues
    A new hotel lock vulnerability emerges and why you may not remain anonymous on Glassdoor.
  • Alyssa Miller: Charting the Course Through InfoSec and Aviation
    Alyssa Miller joins us this week to discuss her aviation and InfoSec career journey.
  • The TikTok Ban Bill, Your Car is Spying on You, Signal’s Username Update
    Why is the US government trying to ban TikTok? Plus, how car insurance companies are tracking you, and the details about the new username privacy feature in the Signal messaging app.
  • Who’s to Blame for Hacked Social Media Accounts, Spoofed Online Meeting Requests and Malware
    The Blame Game: Who's Responsible for Hacked Social Media Accounts? Plus, a new threat involving spoofed Zoom, Google, and Skype meeting requests that spread remote access Trojans (RATs)
  • Don’t Trust Your AI Girlfriend or Boyfriend, Exposing US Government Data Collection
    Why you should never trust an AI girlfriend or boyfriend and the “shocking” details on how the US government collects data about you.
  • ‘Get to Know Me’ Privacy Risks, Pros and Cons of Publicly Sharing Ring Doorbell Footage
    The privacy risks of the new “get to know me” trend on social media, and Ring's decision to discontinue its 'Request for assistance' feature on its Neighbors app which initially allowed police to publicly request doorbell footage without a warrant.
  • 25.6 Million Dollar Deepfake Scam, Exploring Canada’s Flipper Zero Ban
    This week we discuss a reported deepfake scam that allegedly led to the theft of 25.6 million from a multinational company and Canada's attempt to ban the Flipper Zero device, believing it plays a role in auto thefts.
  • Jason Haddix on Bug Bounties and Cybersecurity Career Growth
    Our interview with cybersecurity influencer Jason Haddix where we discuss the state of bug bounty and cybersecurity career growth. Plus, don’t miss Jason’s origin story!
  • The Problem of Victim Blaming in Cybersecurity: Empathy, Responsibility & Ethical Practices
    Why do we continue to blame the victims for the cause of a data breach? In this episode, learn what we as an industry can do about it with special guest Andra Zaharia.
  • Secure Your iPhone: Exploring Stolen Device Protection
    Host Tom Eston explores the new iPhone “Stolen Device Protection” feature to prevent your personal data from being compromised if a thief steals your iPhone.
  • The World of Scambaiting, Preventing Social Media Account Takeovers, Network Wrenches Hacked
    What is Scambaiting and is it an effective tool to stop scammers? How to protect your social media accounts from being taken over, and what could happen when a network connected wrench gets hacked?
  • Ohio’s New Social Media Law, Meta’s Link History Feature, 175 Million Passcode Guesses
    A new law in Ohio aims to stop kids under the age of 16 from using social media without parental consent, details on Meta’s new link history feature, and a judge in Ottawa says three smartphones from a alleged pedophile must be returned because 175 mil...
  • Most Advanced iPhone Exploit Ever, Google’s $5 Billion Settlement, Apple’s Journal App
    In this episode, we discuss the most sophisticated iPhone exploit ever, Google’s agreement to settle a $5 billion lawsuit about tracking users in ‘incognito’ mode, and a new iOS app, Journal. The iPhone exploit, known as Operation Triangulation,
  • The Three Keys to Success in Cybersecurity
    I share my insights into how to be successful in cybersecurity from the lessons I've learned over the past 18 years of being in the industry.
  • The Year in Review and 2024 Predictions
    What did we correctly predict for cybersecurity in 2023? What do we predict for 2024?
  • Password Security for the Elderly: Tips and Best Practices
    Should the elderly write down passwords? Find out in this week's episode!
  • iOS 17 NameDrop Debunking, Real World QR Code Attacks, Impact of Ransomware on Hospitals
    The truth about the risk of the Apple iOS 17 NameDrop feature, a real-world QR attack, and a recent incident of a ransomware attack on a major hospital system.
  • Application Security Trends & Challenges with Tanya Janca
    Tanya Janca joins us to discuss recent Application Security trends and challenges, plus what she's been up to at Semgrep.
  • Apple Finally Adopts RCS, AI Powered Scams Targeting the Elderly
    Apple finally adopts RSC, Are AI powered scams targeting the elderly or is it just social engineering?
  • Paying Big Tech for Privacy, New Privacy Policy Study, Biden’s Executive Order on AI
    Should you pay big tech for your privacy? The NordVPN privacy policy study, and details on Biden's executive order on AI