Alyssa Miller: Charting the Course Through InfoSec and Aviation
In this episode, special guest Alyssa Miller joins the hosts for an insightful and entertaining...
40:34
Alyssa Miller: Charting the Course Through InfoSec and Aviation
In this episode, special guest Alyssa Miller joins the hosts for an insightful and entertaining...
40:34
The TikTok Ban Bill, Your Car is Spying on You, Signal’s Username Update
In episode 321, the hosts discuss how connected cars are sharing driving data with insurance...
24:53
Who’s to Blame for Hacked Social Media Accounts, Spoofed Online Meeting Requests and Malware
In episode 320, Tom and Scott discuss the contentious issue of who is accountable when Facebook...
20:56
Don’t Trust Your AI Girlfriend or Boyfriend, Exposing US Government Data Collection
In Episode 319, Tom and Kevin discuss the potential data privacy risks associated with having an...
25:36
‘Get to Know Me’ Privacy Risks, Pros and Cons of Publicly Sharing Ring Doorbell Footage
In episode 318, we discuss the trending ‘get to know me’ posts on social media platforms like...
24:58
25.6 Million Dollar Deepfake Scam, Exploring Canada’s Flipper Zero Ban
In episode 317, the Tom and Kevin discuss a reported deepfake scam that allegedly led to the...
29:20
Jason Haddix on Bug Bounties and Cybersecurity Career Growth
In episode 316, we have the pleasure to chat with Jason Haddix, a prominent influencer in the...
31:43
The Problem of Victim Blaming in Cybersecurity: Empathy, Responsibility & Ethical Practices
In this episode of the Shared Security Podcast, we discuss the concerning issue of victim-blaming...
29:57
Secure Your iPhone: Exploring Stolen Device Protection
In this episode, host Tom Eston provides a detailed explanation of the ‘Stolen Device Protection’...
05:40
The World of Scambaiting, Preventing Social Media Account Takeovers, Network Wrenches Hacked
In Episode 313, hosts Tom and Scott discuss the world of scambaiting, discussing what it is, the...
19:31
Ohio’s New Social Media Law, Meta’s Link History Feature, 175 Million Passcode Guesses
In episode 312, Tom and Scott discuss the implications of a new law in Ohio that may require...
17:28
Most Advanced iPhone Exploit Ever, Google’s $5 Billion Settlement, Apple’s Journal App
In this episode, we discuss the most sophisticated iPhone exploit ever, Google’s agreement to...
24:10
The Three Keys to Success in Cybersecurity
In this episode, host Tom Eston shares the three key lessons he’s learned over his 18-year career...
06:41
The Year in Review and 2024 Predictions
In our last episode of the year, we replay our predictions for 2023 reviewing what we got right...
20:23
Password Security for the Elderly: Tips and Best Practices
In episode 308, we discuss the often overlooked topic of password management for the elderly....
18:04
iOS 17 NameDrop Debunking, Real World QR Code Attacks, Impact of Ransomware on Hospitals
In episode 307, Tom and Scott debunk misinformation circulating about the iOS 17 NameDrop feature...
16:30
Application Security Trends & Challenges with Tanya Janca
In this episode, noteworthy guest Tanya Janca returns to discuss her recent ventures and her...
27:03
Apple Finally Adopts RCS, AI Powered Scams Targeting the Elderly
In this episode, Tom shows off AI generated images of a “Lonely and Sad Security Awareness...
26:57
Paying Big Tech for Privacy, New Privacy Policy Study, Biden’s Executive Order on AI
In this week’s episode of the Shared Security Podcast, hosts Tom Eston, Scott Wright and Kevin...
24:09
SEC vs. SolarWinds CISO, Classiscam Scam-as-a-Service
In this episode, we discuss the SEC’s charges against SolarWinds’ CISO for misleading investors...
22:22
MAJ 3.28: On fait chanter l’IA
Episodio
ep0.15.12 ポッドキャスト2024年調査を読み
Episodio
Ep87:透過ai賦能,協助企業導入ai,不
Episodio
找出社會企業的穩定商模一 ft. 木酢
Episodio