Shared Security Podcast
Exploring the bonds shared between people and technology
Tanya Janca on Secure Coding, AI in Cybersecurity, and Her New Book
Tom Eston | | Application Security, AppSec, Cyber Security, cyber threat, Cybersecurity, Data Privacy, developers, Development, DevSecOps, Digital Privacy, Episodes, Information Security, Infosec, owasp, Podcast, Podcasts, Privacy, sdlc, secure code, Secure Coding, security, She Hacks Purple, Tanya Janca, technology, Weekly Edition
Join us for an insightful episode of the Shared Security Podcast as Tanya Janca returns for her fifth appearance. Discover the latest on her new book about secure coding, exciting updates in ...
Australia Bans Social Media for Kids, Holiday Vishing Scams
Tom Eston | | Australia, ban, Banned, black friday, cyber monday, Cyber Security, cyber threat, Cybersecurity, Data Privacy, Digital Privacy, Episodes, government, holiday, holidays, Information Security, Infosec, kids, Law, Parental Control, Parents, Phishing, Podcast, Podcasts, Privacy, Scams, security, social engineering, social media, social networking, technology, Thanksgiving, vishing, Weekly Edition
In this episode, we discuss Australia’s new legislation banning social media for users under 16 and its potential impact. Our hosts also explore the issue of vishing (voicemail phishing), why it’s escalating, ...
Deepfake Fraud, Data Brokers Tracking Military Personnel
Tom Eston | | biometrics, Cyber Security, cyber threat, Cybersecurity, Data Brokers, Data Privacy, deepfake, deepfakes, Digital Privacy, Episodes, Fraud, Germany, Information Security, Infosec, Location, location data, military, pirates, Podcast, Podcasts, Privacy, Privateers, Scams, security, Strava, surveillance, technology, Weekly Edition
In Episode 356, Tom and Kevin discuss the increasing role of deepfake technology in bypassing biometric checks, accounting for 24 percent of fraud attempts. The show covers identity fraud issues and explores ...
Why It’s Time to Leave Twitter
Tom Eston | | bluesky, Cyber Security, cyber threat, Cybersecurity, Data Privacy, Digital Privacy, election, Elon Musk, Episodes, facebook, fediverse, Information Security, Infosec, Leaving Twitter, mastodon, Meta, Podcast, Podcasts, Politics, Privacy, security, social media, social network, social networking, technology, Threads, Tweets, Twitter, Weekly Edition, X
In episode 355, Tom discusses his decision to deactivate his Twitter accounts due to privacy concerns with Twitter’s new AI policy and changes in the blocking features. He outlines the steps for ...
Advanced Persistent Teenagers, Okta Bug Allowed Logins Without a Correct Password
Tom Eston | | APT, Cyber Security, cyber threat, Cybersecurity, Data breach, Data Privacy, Digital Privacy, election, Episodes, Hacking, Information Security, Infosec, Okta, Podcast, Podcasts, Privacy, security, technology, Teen, Teenager, Teenagers, vulnerability, Weekly Edition
In episode 354, we discuss the emergence of the term ‘Advanced Persistent Teenagers’ (APT) as a “new” cybersecurity threat. Recorded just before the election, the hosts humorously predict election outcomes while exploring ...
Fallout from the Change Healthcare Breach, Mortgage Wire Fraud What You Need To Know
Tom Eston | | Change Healthcare, Cyber Security, cyber threat, Cybersecurity, Data breach, Data Privacy, Digital Privacy, Episodes, Fraud, Hacking, Health, healthcare, Home, Home Buying, Information Security, Infosec, mortgage, Mortgage Wire Fraud, Podcast, Podcasts, Privacy, Ransomware, real estate, Scams, security, technology, Weekly Edition, wire fraud
In episode 353, we discuss the February 2024 ransomware attack on Change Healthcare, resulting in the largest data breach of protected health information in history. Notifications have been sent to 100 million ...
Internet Archive Hacked, Introducing The AI Toilet Camera
Tom Eston | | AI, AI Toilet Camera, camera, Cyber Security, cyber threat, Cybersecurity, Data breach, Data Privacy, Digital Privacy, Episodes, Hacking, Health, healthcare, Information Security, Infosec, Internet Archive, non-profit, Podcast, Podcasts, Poop, Privacy, security, surveillance, technology, Throne, Toilet Camera, Way Back Machine, Weekly Edition
In this episode, we discuss the significant data breach at the Internet Archive, affecting 33 million users. We also examine the introduction of an AI-integrated toilet camera by Throne, designed for health ...
Hacked Robot Vacuums, Secret Printer Tracking Dots
Tom Eston | | credential stuffing, Cyber Security, cyber threat, Cybersecurity, Data Privacy, Digital Privacy, Ecovac, Episodes, government, hacked, Hacking, Information Security, Infosec, Internet of things, iot, passwords, Podcast, Podcasts, printer, Printer Tracking Dots, printers, Privacy, Reality Winner, robot, Robot Vacuum, robots, security, surveillance, technology, tracking, Tracking Dots, Vacuum, Weekly Edition
In episode 351, hosts Tom and Scott explore an unusual incident where robot vacuums were hacked to shout obscenities, exposing significant IoT security issues. The discussion includes the mechanics of the Bluetooth ...
Emergency Satellite Messaging, Stagnation in User Cybersecurity Habits
Tom Eston | | Amateur Radio, android, Apple, Baofeng, Cyber Security, cyber threat, Cybersecurity, cybersecurity awareness, Data Privacy, Digital Privacy, disaster, Episodes, facebook, HAM Radio, hurricane, Information Security, Infosec, ios, linkedin, password manager, passwords, Podcast, Podcasts, Privacy, Radio, satellite, Satellite Communication, Satellites, security, Security Awareness, social media, SpaceX, Starlink, technology, TMobile, Weekly Edition
In the milestone 350th episode of the Shared Security Podcast, the hosts reflect on 15 years of podcasting, and the podcast’s evolution from its beginnings in 2009. They discuss the impact of ...
Kia Security Flaw Exposed, NIST’s New Password Guidelines
Tom Eston | | Authentication, biometrics, cars, Connected Cars, Cyber Security, cyber threat, Cybersecurity, Data Privacy, Digital Privacy, Episodes, Hacking, Information Security, Infosec, Kia, MFA, Multi-Factor Authentication, NIST, Password, password complexity, Password Guidelines, Password Policy, Password reset, Password Resets, passwords, Podcast, Podcasts, Privacy, security, technology, web application, web application vulnerability, Weekly Edition
In this episode, the hosts discuss a significant vulnerability found in Kia’s web portal that allows remote control of various car features via their app, potentially enabling unauthorized unlocking and tracking. The ...