Shared Security

Shared Security is your premier cybersecurity and privacy podcast where we explore the bonds shared between people and technology. Join industry experts Tom Eston, Scott Wright, and Kevin Johnson as they deliver the latest news, actionable tips, expert guidance, and insightful interviews with top cybersecurity and privacy specialists. Stay informed and take control of your online security and privacy in today's interconnected world. Tune in every week to discover invaluable insights, strategies, and tools to live confidently and safeguard your digital life.

https://sharedsecurity.net/

Eine durchschnittliche Folge dieses Podcasts dauert 23m. Bisher sind 454 Folge(n) erschienen. Dies ist ein wöchentlich erscheinender Podcast.

Gesamtlänge aller Episoden: 7 days 10 hours 15 minutes

subscribe
share






Who’s to Blame for Hacked Social Media Accounts, Spoofed Online Meeting Requests and Malware


The Blame Game: Who's Responsible for Hacked Social Media Accounts? Plus, a new threat involving spoofed Zoom, Google, and Skype meeting requests that spread remote access Trojans (RATs)


share








 March 11, 2024  20m
 
 

Don’t Trust Your AI Girlfriend or Boyfriend, Exposing US Government Data Collection


Why you should never trust an AI girlfriend or boyfriend and the “shocking” details on how the US government collects data about you.


share








 March 4, 2024  25m
 
 

‘Get to Know Me’ Privacy Risks, Pros and Cons of Publicly Sharing Ring Doorbell Footage


The privacy risks of the new “get to know me” trend on social media, and Ring's decision to discontinue its 'Request for assistance' feature on its Neighbors app which initially allowed police to publicly request doorbell footage without a warrant.


share








 February 26, 2024  24m
 
 

25.6 Million Dollar Deepfake Scam, Exploring Canada’s Flipper Zero Ban


This week we discuss a reported deepfake scam that allegedly led to the theft of 25.6 million from a multinational company and Canada's attempt to ban the Flipper Zero device, believing it plays a role in auto thefts.


share








 February 19, 2024  29m
 
 

Jason Haddix on Bug Bounties and Cybersecurity Career Growth


Our interview with cybersecurity influencer Jason Haddix where we discuss the state of bug bounty and cybersecurity career growth. Plus, don’t miss Jason’s origin story!


share








 February 12, 2024  31m
 
 

The Problem of Victim Blaming in Cybersecurity: Empathy, Responsibility & Ethical Practices


Why do we continue to blame the victims for the cause of a data breach? In this episode, learn what we as an industry can do about it with special guest Andra Zaharia.


share








 February 5, 2024  29m
 
 

Secure Your iPhone: Exploring Stolen Device Protection


Host Tom Eston explores the new iPhone “Stolen Device Protection” feature to prevent your personal data from being compromised if a thief steals your iPhone.


share








 January 29, 2024  5m
 
 

The World of Scambaiting, Preventing Social Media Account Takeovers, Network Wrenches Hacked


What is Scambaiting and is it an effective tool to stop scammers? How to protect your social media accounts from being taken over, and what could happen when a network connected wrench gets hacked?


share








 January 22, 2024  19m
 
 

Ohio’s New Social Media Law, Meta’s Link History Feature, 175 Million Passcode Guesses


A new law in Ohio aims to stop kids under the age of 16 from using social media without parental consent, details on Meta’s new link history feature, and a judge in Ottawa says three smartphones from a alleged pedophile must be returned because 175 mil...


share








 January 15, 2024  17m
 
 

Most Advanced iPhone Exploit Ever, Google’s $5 Billion Settlement, Apple’s Journal App


In this episode, we discuss the most sophisticated iPhone exploit ever, Google’s agreement to settle a $5 billion lawsuit about tracking users in ‘incognito’ mode, and a new iOS app, Journal. The iPhone exploit, known as Operation Triangulation,


share








 January 8, 2024  24m