Tom Eston, Author at Security Boulevard
How to Protect Yourself from Gift Card Scams

How to Protect Yourself from Gift Card Scams

In our July monthly show we discuss gift card scams! What are the different scams that are out there, how do they work, and details on how to protect yourself from becoming a victim. ** Links mentioned on the show ** 8 Gift Card SCAMS you can SPOT and EASILY ... Read More
Pegasus Spyware is Back, Twitter Hacker Arrested, 16 Year Old Printer Bug

Pegasus Spyware is Back, Twitter Hacker Arrested, 16 Year Old Printer Bug

Pegasus spyware and NSO Group are back in the news because of a data leak of 50,000 phone numbers, another “hacker” was arrested for the great Twitter hack of 2020, and how a 16 year old printer vulnerability is affecting millions of HP, Samsung, and Xerox printers. ** Links mentioned ... Read More
Popular Myths about VPNs

Popular Myths about VPNs

In this sponsored episode from our friends at ClearVPN, Artem Risukhin Content Marketing Manager at ClearVPN, joins co-host Tom Eston to discuss the most popular myths about VPNs. Be sure to watch the YouTube edition for a demo of ClearVPN and don’t forget to use discount code “SHAREDSECURITY” to take ... Read More
Targeted Dream Incubation, TikTok Data Sharing with China, Chrome and Firefox Updates

Targeted Dream Incubation, TikTok Data Sharing, Chrome and Firefox Updates

Is dream hacking the next big privacy concern or just a new marketing gimmick? Some people may be surprised that TikTok shares data with China, and details on Google Chrome adding HTTPS-first mode and Firefox and easing its blocking of Facebook login buttons. ** Links mentioned on the show ** ... Read More
Kaseya Ransomware Attack, PrintNightmare Zero-day, Kaspersky Password Manager Vulnerability

Kaseya Ransomware Attack, PrintNightmare Zero-day, Kaspersky Password Manager Vulnerability

Details on the Kaseya supply-chain and REvil ransomware attack, a new zero-day exploit called “PrintNightmare” affects all Windows versions before June, and how randomly generated passwords in a popular password manager were not so random. ** Links mentioned on the show ** REvil Used 0-Day in Kaseya Ransomware Attack, Demands ... Read More
LinkedIn Data Leak, Western Digital NAS Attacks, STIR/SHAKEN Deadline

LinkedIn Data Leak, Western Digital NAS Attacks, STIR/SHAKEN Deadline

Was there another LinkedIn “data leak” or is this just the same data anyone with a LinkedIn account can access? Western Digital Network-Attached Storage (NAS) devices under attack, and details on the STIR/SHAKEN deadline which is supposed to help stop robocalls. ** Links mentioned on the show ** New LinkedIn ... Read More

Asset Discovery with Chris Kirsch Co-Founder at Rumble

Chris Kirsch co-founder and chief revenue officer at Rumble joins us in our June monthly show to talk about how Rumble is solving the problem of asset discovery. You also get to see a demo of Rumble in action and learn about the many talents that Chris has like pickpocketing! ... Read More
Off Limits Critical Infrastructure, Ransomware on Repeat, Cyber Safe Drinking Water

Off Limits Critical Infrastructure, Ransomware on Repeat, Cyber Safe Drinking Water

What does it really mean when Biden tells Putin critical US infrastructure is “off limits”, details on a recent survey which shows ransomware payments create repeat attacks, and how cyber safe is your drinking water? ** Links mentioned on the show ** Biden Tells Putin Critical Infrastructure Sectors ‘Off Limits’ ... Read More
TikTok Collecting Biometric Data, Peloton Bike+ Vulnerability, Nextdoor App Concerns

TikTok Collecting Biometric Data, Peloton Bike+ Vulnerability, Nextdoor App Concerns

TikTok can now collect biometric data from user content, researchers find a vulnerability in Peloton bikes, and why some people think that Nextdoor might be the next big social network. ** Links mentioned on the show ** TikTok Can Now Collect Biometric Data https://www.schneier.com/blog/archives/2021/06/tiktok-can-now-collect-biometric-data.html McAfee discovers vulnerability in Peloton Bike+ ... Read More
ANOM FBI Global Crime Sting, Colonial Pipeline Updates, Password Leak Research

ANOM FBI Global Crime Sting, Colonial Pipeline Updates, Password Leak Research

Details about the “ANOM” global crime sting where the FBI created a fake encrypted mobile phone for criminals that promised secure communications, new details about how the Colonial Pipeline ransomware attack started, and some really bad security research about stolen user credentials. ** Links mentioned on the show ** Only ... Read More