Exploring the bonds shared between people and technology
…
continue reading
Shared Security is your premier cybersecurity and privacy podcast where we explore the bonds shared between people and technology. Join industry experts Tom Eston, Scott Wright, and Kevin Johnson as they deliver the latest news, actionable tips, expert guidance, and insightful interviews with top cybersecurity and privacy specialists. Stay informed and take control of your online security and privacy in today's interconnected world. Tune in every week to discover invaluable insights, strateg ...
…
continue reading
1
Kia Security Flaw Exposed, NIST’s New Password Guidelines
22:29
22:29
Прослушать позже
Прослушать позже
Списки
Нравится
Нравится
22:29
In this episode, the hosts discuss a significant vulnerability found in Kia’s web portal that allows remote control of various car features via their app, potentially enabling unauthorized unlocking and tracking. The conversation highlights the broader issue of web vulnerabilities in the automotive industry. Also covered are NIST’s updated password…
…
continue reading
1
Kia Security Flaw Exposed, NIST's New Password Guidelines
22:29
22:29
Прослушать позже
Прослушать позже
Списки
Нравится
Нравится
22:29
In this episode, the hosts discuss a significant vulnerability found in Kia's web portal that allows remote control of various car features via their app, potentially enabling unauthorized unlocking and tracking. The conversation highlights the broader issue of web vulnerabilities in the automotive industry. Also covered are NIST's updated password…
…
continue reading
1
Discord’s New End-to-End Encryption, LinkedIn Using Your Data for AI Training
16:22
16:22
Прослушать позже
Прослушать позже
Списки
Нравится
Нравится
16:22
In episode 348, Tom and Scott discuss Discord’s new end-to-end encryption for audio and video calls, involving the DAVE Protocol, third-party vetting by Trail of Bits, and its impact on users. They also address LinkedIn’s controversial move to automatically opt users into using their data to train AI models without initial consent, suggestions for …
…
continue reading
1
Discord’s New End-to-End Encryption for Audio & Video, LinkedIn Using Your Data for AI Training
16:23
16:23
Прослушать позже
Прослушать позже
Списки
Нравится
Нравится
16:23
In episode 348 of the Shared Security Podcast, Tom and Scott discuss Discord's new end-to-end encryption for audio and video calls, involving the DAVE Protocol, third-party vetting by Trail of Bits, and its impact on users. They also address LinkedIn's controversial move to automatically opt users into using their data to train AI models without in…
…
continue reading
1
Supply Chain Sabotage: The Exploding Pager Incident, Instagram’s New Teen Privacy Measures
22:20
22:20
Прослушать позже
Прослушать позже
Списки
Нравится
Нравится
22:20
In Episode 347, we discuss the recent alarming incidents involving exploding pagers targeting Hezbollah operatives in Lebanon, which resulted in multiple casualties. We clarify why this is not a cyber attack and should not cause widespread panic about personal device safety. Additionally, we cover Instagram’s new policies to default teen accounts t…
…
continue reading
1
Supply Chain Sabotage: The Exploding Pager Incident, Instagram's New Teen Privacy Measures
22:20
22:20
Прослушать позже
Прослушать позже
Списки
Нравится
Нравится
22:20
In Episode 347, we discuss the recent alarming incidents involving exploding pagers targeting Hezbollah operatives in Lebanon, which resulted in multiple casualties. We clarify why this is not a cyber attack and should not cause widespread panic about personal device safety. Additionally, we cover Instagram's new policies to default teen accounts t…
…
continue reading
1
The Rise of AI Voicemail Scams, Political Donation Privacy Concerns
17:47
17:47
Прослушать позже
Прослушать позже
Списки
Нравится
Нравится
17:47
In episode 346, we discuss new AI-driven voicemail scams that sound convincingly real and how to identify them. We also explore recent research on the privacy concerns surrounding donations to political parties through their websites. Additionally, we celebrate the 15th anniversary of the podcast and share some reflections and fun facts about the j…
…
continue reading
1
The Rise of AI Voicemail Scams, Political Donation Privacy Concerns
17:47
17:47
Прослушать позже
Прослушать позже
Списки
Нравится
Нравится
17:47
In episode 346, we discuss new AI-driven voicemail scams that sound convincingly real and how to identify them. We also explore recent research on the privacy concerns surrounding donations to political parties through their websites. Additionally, we celebrate the 15th anniversary of the podcast and share some reflections and fun facts about the j…
…
continue reading
1
Shocking SQL Injection in TSA App, Bitcoin ATM Scams Targeting Seniors
21:02
21:02
Прослушать позже
Прослушать позже
Списки
Нравится
Нравится
21:02
This week, we discuss a critical SQL injection vulnerability discovered in an app used by the TSA, raising ethical questions about responsible disclosure. Plus, we shed light on the alarming rise of Bitcoin ATM scams exploiting older adults, providing essential tips to protect your loved ones from these devious schemes. Tune in for unique insights …
…
continue reading
1
Shocking SQL Injection in TSA App, Bitcoin ATM Scams Targeting Seniors
21:02
21:02
Прослушать позже
Прослушать позже
Списки
Нравится
Нравится
21:02
This week, we discuss a critical SQL injection vulnerability discovered in an app used by the TSA, raising ethical questions about responsible disclosure. Plus, we shed light on the alarming rise of Bitcoin ATM scams exploiting older adults, providing essential tips to protect your loved ones from these devious schemes. Tune in for unique insights …
…
continue reading
1
Telegram is NOT an Encrypted Messaging App, Must-See Documentaries
22:21
22:21
Прослушать позже
Прослушать позже
Списки
Нравится
Нравится
22:21
In this episode, we explore the recent arrest of Telegram founder Pavel Durov in France and discuss the app’s encryption claims. Is Telegram truly an encrypted messaging app? Joining the conversation is co-host Kevin Johnson, bringing his trademark opinions. We also talk about some intriguing documentaries, including ‘LulaRich’ about the LuLaRoe le…
…
continue reading
1
Telegram is NOT an Encrypted Messaging App!
22:22
22:22
Прослушать позже
Прослушать позже
Списки
Нравится
Нравится
22:22
In this episode, we explore the recent arrest of Telegram founder Pavel Durov in France and discuss the app's encryption claims. Is Telegram truly an encrypted messaging app? Joining the conversation is co-host Kevin Johnson, bringing his trademark opinions. We also talk about some intriguing documentaries, including 'LulaRich' about the LuLaRoe le…
…
continue reading
1
Google’s Monopoly: The Debate Heats Up, Amazon Alexa Privacy Tips
24:57
24:57
Прослушать позже
Прослушать позже
Списки
Нравится
Нравится
24:57
This week, we discuss Google’s recent accusation by the U.S. Justice Department for being a monopoly and its implications for privacy and cybersecurity. We also cover essential privacy settings for Alexa smart speakers and their importance. Join the hosts, Tom, Kevin, and Scott, for an engaging conversation on these topics, along with a segment fro…
…
continue reading
1
Google’s Monopoly: The Debate Heats Up, Amazon Alexa Privacy Tips
24:58
24:58
Прослушать позже
Прослушать позже
Списки
Нравится
Нравится
24:58
This week, we discuss Google's recent accusation by the U.S. Justice Department for being a monopoly and its implications for privacy and cybersecurity. We also cover essential privacy settings for Alexa smart speakers and their importance. Join the hosts, Tom, Kevin, and Scott, for an engaging conversation on these topics, along with a segment fro…
…
continue reading
1
The Inefficiency of People-Search Removal Tools, Massive Data Breach Impacting U.S. Citizens
19:11
19:11
Прослушать позже
Прослушать позже
Списки
Нравится
Нравится
19:11
In episode 342, we discuss the effectiveness of people-search removal tools like DeleteMe and Reputation Defender, based on a study by Consumer Reports. We also cover how almost every American’s social security number has potentially been stolen by hackers and shared on the dark web. Scott and Tom talk about the importance of protecting your person…
…
continue reading
1
The Inefficiency of People-Search Removal Tools, Massive Data Breach Impacting U.S. Citizens
19:11
19:11
Прослушать позже
Прослушать позже
Списки
Нравится
Нравится
19:11
In episode 342, we discuss the effectiveness of people-search removal tools like DeleteMe and Reputation Defender, based on a study by Consumer Reports. We also cover how almost every American's social security number has potentially been stolen by hackers and shared on the dark web. Scott and Tom talk about the importance of protecting your person…
…
continue reading
Join us for this special live edition of the Shared Security Podcast, recorded in scorching Las Vegas at Black Hat 2024. Host Tom Eston is joined by Shourya Pratap Singh, Principal Software Engineer at SquareX. They discuss highlights from Black Hat 2024, emerging themes in cybersecurity such as AI-based threats, compliance, and cloud security. The…
…
continue reading