Apple Finally Adopts RCS, AI Powered Scams Targeting the Elderly
Tom Eston | | AI, AI-Powered, android, Apple, Cyber Security, Cybersecurity, Data Privacy, Digital Privacy, Elderly, Episodes, Fraud, google, imessage, Information Security, Infosec, MMS, Podcast, Podcasts, Privacy, RCS, Rich Communication Services, Scams, security, Seniors, SMS, social engineering, technology, Voice Cloning, Weekly Edition
In this episode, Tom shows off AI generated images of a “Lonely and Sad Security Awareness Manager in a Dog Pound” and the humorous outcomes. The conversation shifts to Apple’s upcoming support for Rich Communication Services (RCS) and the potential security implications. Lastly, Tom and Kevin reflect on reports of ... Read More
Paying Big Tech for Privacy, New Privacy Policy Study, Biden’s Executive Order on AI
Tom Eston | | AI, Biden, Big Tech, Cyber Security, Cybersecurity, Data Privacy, Digital Privacy, Episodes, Excutive Order, facebook, GDPR, Information Security, Infosec, Instagram, Meta, NordVPN, Pay for Privacy, Pay or OK, Pay-or-Ads, Podcast, Podcasts, Privacy, Privacy Policies, Privacy Policy, regulation, security, technology, Weekly Edition
In this week’s episode of the Shared Security Podcast, hosts Tom Eston, Scott Wright and Kevin Johnson tackle a number of topics related to AI, privacy and security. They begin with an amusing discussion about their respective roles on the podcast, before shifting to big tech’s use of user data ... Read More
SEC vs. SolarWinds CISO, Classiscam Scam-as-a-Service
Tom Eston | | Chief Information Secuirty Officer, CISO, Classiscam, Cyber Security, Cybersecurity, Data Privacy, Digital Privacy, Episodes, Fraud, Information Security, Infosec, Podcast, Podcasts, Privacy, Scam-as-a-Service, Scams, SEC, security, SolarWinds, technology, Weekly Edition
In this episode, we discuss the SEC’s charges against SolarWinds’ CISO for misleading investors about a major cyberattack. Plus don’t miss our discussion about the shady world of “Classiscam Scam-as-a-Service,” a very popular cyber criminal service that creates fake user accounts, posts fraudulent reviews, and boosts the reputation of dishonest ... Read More
Okta Hacked Again, Quishing Is The New Phishing, Google Play Protect Real-Time Scanning
Tom Eston | | android, Cyber Security, Cybersecurity, Data breach, Data Privacy, Digital Privacy, Episodes, Fraud, google, Google Play, Google Play Protect, hacked, Information Security, Infosec, Okta, Phishing, Podcast, Podcasts, Privacy, QR code, QR Codes, quishing, Real-time App Analysis, Scams, scanning, security, technology, Weekly Edition
In this episode, we explore the recent Okta breach where hackers obtained sensitive customer data via unauthorized access to the Okta support system. Next, we discuss the emerging threat of “quishing,” a combination of voice calls and phishing that preys on unsuspecting victims. Finally, we discuss Google Play Protect’s new ... Read More
How to Opt Out of CPNI Data Sharing
Tom Eston | | ATT, CPNI, CPNI Data Sharing, CPNI Opt Out, Cybersecurity, Data Privacy, Digital Privacy, Episodes, fcc, Federal Communications Commission, government, Information Security, Infosec, Internet, Internet Provider, Mobile, mobile phone, Mobile Provider, Phone Call, Phone Calls, Podcast, Privacy, regulation, security, smartphone, T-Mobile, technology, telecommunications, telephone, verizon, Weekly Edition
Did you know that your mobile phone provider can give data like phone numbers you’ve called and received, the time and date of those calls, and even your location data to their parent companies, affiliates, and agents? In this episode we show you how to opt out so you can ... Read More
Special Guest Jayson E. Street, Phantom Hacker Scams, 23andMe User Data For Sale
Tom Eston | | 23andMe, credential stuffing, Cyber Security, Cybersecurity, Data breach, Data Privacy, data theft, Digital Privacy, DNA, DNA Data, Elderly, Elderly Scams, Episodes, FBI, Fraud, Information Security, Infosec, Jayson E Street, Jayson Street, Password, passwords, Phantom Hacker, Podcast, Podcasts, Privacy, Scams, Secure Yeti, security, Security Awareness, Senior Scams, Seniors, tech support scams, technology, weak passwords, Weekly Edition
In milestone episode 300, Jayson E. Street (a renowned hacker, helper, and human who has successfully robbed banks, hotels, government facilities, and Biochemical companies on five continents) joins us to share what he’s been up to recently and to talk about his new role at Secure Yeti. Next, we explore ... Read More
Educating the Next Cybersecurity Generation with Tib3rius
Tom Eston | | Application Security, AppSec, Bug Bounties, bug bounty, Burp Suite, career, Content Creation, Cyber Security, Cybersecurity, cybersecurity career, Data Privacy, Digital Privacy, Episodes, hacker, Hacking, Information Security, Infosec, penetration tester, Penetration Testing, pentesting, Podcast, Podcasts, Privacy, security, TCM Security, technology, Tib3rius, training, Veracode, Web App Hacking, Web Application Hacking, web applications, Web Apps, Weekly Edition
In this episode we explore the remarkable journey of Tib3rius, a web application hacking expert and content creator. In this engaging conversation, we discuss: Tib3rius’ passion for community education and content creation. What fuels his desire to empower the next generation of cybersecurity professionals? His expertise and enthusiasm for web ... Read More
Your Car is a Privacy Nightmare, Password Creation Best Practices, Sony Hacked Again
Tom Eston | | Automotive, Car Privacy, Car security, cars, clop, clop-ransomware, Cyber Security, Cybersecurity, Data breach, Data Broker, Data Brokers, Data Collection, Data Privacy, Digital Privacy, Episodes, Information Security, Infosec, Mozilla, Password, password complexity, Password Creation, passwords, Podcast, Podcasts, Privacy, Ransomware, research, security, Sony, surveillance, technology, Weekly Edition
In this episode, we discuss the Mozilla Foundation’s alarming report that reveals why cars are the top privacy concern. Modern vehicles, equipped with data-collecting tech, pose significant risks to consumers’ privacy, with data sharing even extending to law enforcement. Listen in to our discussion as we explore the urgent need ... Read More
Is My Boss Spying on Me, Instagram Painting Scam, Kia and Hyundai TikTok Challenge
Tom Eston | | AI, Car theft, Car Thefts, cars, Cyber Security, cybercriminals, Cybersecurity, Data Privacy, Digital Privacy, Episodes, Hyundai, Hyundai Challenge, Information Security, Infosec, Instagram, Kia, Kia and Hyundai Challenge, Kia Challenge, Painting Scam, Podcast, Podcasts, Privacy, scam, Scams, security, social media, surveillance, technology, TikTok, Viral, Weekly Edition, Workplace, Workplace Surveillance
In this episode, we explore the growing trend of AI surveillance in corporations, where cutting-edge technology is used to monitor employees, optimize productivity, and raise ethical concerns. Next, we uncover a disturbing Instagram scam that lures unsuspecting victims into a trap, highlighting the deceptive tactics employed by cyber criminals on ... Read More
Content Creation, Mental Health in Cyber, The MGM Ransomware Attack
Tom Eston | | Content Creation, Content Creator, Cyber Security, Cybersecurity, Data Privacy, Digital Privacy, Episodes, Information Security, Infosec, Matt Johansen, Mental Health, MGM, Orign Story, Podcast, Podcaster, podcasting, Podcasts, Privacy, Ransom, Ransomware, ransomware attack, security, Security Twits, Shmoocon, technology, Twitter, Vulnerable U, Weekly Edition, X, YouTube
In this episode Matt Johansen, Security Architect at Reddit and Vulnerable U newsletter and YouTube content creator, joins host Tom Eston to discuss Matt’s background as one of the original “Security Twits”, his career journey, his passion for mental health advocacy, the significance of the recent MGM ransomware attack, and ... Read More