Tom Eston, Scott Wright, Kevin JohnsonTechnology, News
Tom Eston, Scott Wright, Kevin JohnsonTechnology, News
Tom Eston, Scott Wright, Kevin JohnsonTechnology, News
Tom Eston, Scott Wright, Kevin JohnsonTechnology, News

About

Shared Security is your premier cybersecurity and privacy podcast where we explore the bonds shared between people and technology. Join industry experts Tom Eston, Scott Wright, and Kevin Johnson as they deliver the latest news, actionable tips, expert guidance, and insightful interviews with top cybersecurity and privacy specialists. Stay informed and take control of your online security and privacy in today’s interconnected world. Tune in every week to discover invaluable insights, strategies, and tools to live confidently and safeguard your digital life.

  • UK’s Secret Apple Backdoor Request, AI Chatbots Used For Stalking
    In this episode, Tom Eston and Scott Wright discuss the UK's attempt to force Apple to create a backdoor for iCloud backups, the potential global repercussions on privacy, and the alarming rise of AI tools being used in stalking cases.
  • Careers in Cybersecurity: Myths and Realities with Kathleen Smith
    In this episode, Tom Eston speaks with Kathleen Smith, CMO of ClearJobs.net, about the myths and realities of the cybersecurity job market, providing insights on hiring challenges, career advice, and the evolving field of cybersecurity.
  • Privacy Concerns with Digital Driver’s Licenses, The Rise of DeepSeek AI
    This episode discusses the privacy concerns surrounding digital driver's licenses, the implications of the new DeepSeek AI from China, and features a lively debate on the potential risks and benefits of these technologies.
  • Gravy Analytics Breach, Subaru Starlink Vulnerability Exposed
    In this episode we discuss the Gravy Analytics data breach and a vulnerability in Subaru's Starlink system that exposed vehicle controls and customer data.
  • Meta Ditches Fact-Checking for Community Notes, RedNote and the TikTok Ban
    This episode discusses Meta's shift from fact checking to community notes, the TikTok ban and the rise of alternative apps like RedNote, and the broader implications for misinformation, freedom of speech, and cybersecurity.
  • AI Privacy Policies: Unveiling the Secrets Behind ChatGPT, Gemini, and Claude
    We explore and compare the privacy policies of AI tools such as ChatGPT, Gemini, and Claude, emphasizing the importance of data security and ethical considerations in AI development.
  • Reflecting on Y2K: Lessons for the Next Tech Crisis and AI Safety
    Join us this week as we reminisce about Y2K, the panic, the preparations, and the lessons learned 25 years later!
  • 2024 Year in Review: What We Got Right and Looking to 2025
    The year in review and our 2025 predictions!
  • Digital License Plate Vulnerabilities, How to Avoid New Text Message Scams
    The Hidden Dangers of Digital License Plates and Misleading Texts!
  • Hack-for-Hire Campaign Targeting Climate Activists, Government Hypocrisy on Encryption
    A shocking hack-for-hire operation alleged to target over 500 climate activists and journalists, and why the US government now says its OK to use encryption.
  • Tanya Janca on Secure Coding, AI in Cybersecurity, and Her New Book
    Tanya Janca joins us on the show this week to speak about her new book “Alice and Bob Learn Secure Coding”.
  • Australia Bans Social Media for Kids, Holiday Vishing Scams
    Australia's new legislation banning social media for users under 16 and its potential impact. Plus the issue of vishing (voicemail phishing), why it's escalating, particularly during the holiday season, and how to protect yourself.
  • Deepfake Fraud, Data Brokers Tracking Military Personnel
    Tom and Kevin discuss the increasing role of deepfake technology in bypassing biometric checks, and the controversial practices of data brokers selling location data, including the tracking of US military personnel.
  • Why It’s Time to Leave Twitter
    Tom talks about why he’s leaving Twitter and if you plan on leaving, the steps you should take to archive, delete your tweets, and which social media platform to move to.
  • Advanced Persistent Teenagers, Okta Bug Allowed Logins Without a Correct Password
    We discuss the emergence of the term 'Advanced Persistent Teenagers' (APT) as a “new” cybersecurity threat and a notable Okta vulnerability that allowed someone to login without the correct password.
  • Fallout from the Change Healthcare Breach, Mortgage Wire Fraud What You Need To Know
    Notifications have finally been sent out for the February 2024 ransomware attack on Change Healthcare, resulting in the largest data breach of protected health information in history. Plus, Scott explains how mortgage wire fraud works and provides esse...
  • Internet Archive Hacked, Introducing The AI Toilet Camera
    Why was the Internet Archive was hacked and what could possibly go wrong with an AI powered toilet camera?
  • Hacked Robot Vacuums, Secret Printer Tracking Dots
    When robot vacuums go rouge and start yelling at you, and details on the world of secret printer tracking dots.
  • Emergency Satellite Messaging, Stagnation in User Cybersecurity Habits
    How new iPhones and Android devices can utilize satellite systems for communication during natural disasters, and why many people still neglect cybersecurity best practices.
  • Kia Security Flaw Exposed, NIST’s New Password Guidelines
    A significant vulnerability found in Kia's web portal that allows remote control of various car features via their app, and NIST's updated password guidelines, eliminating complexity rules and periodic resets.