Episodes
Jason Haddix on Bug Bounties and Cybersecurity Career Growth
Tom Eston | | Arcanum Information Security, Bug Bounties, bug bounty, career, career growth, Cyber Security, Cybersecurity, cybersecurity career, Data Privacy, Digital Privacy, Episodes, Information Security, Infosec, Jason Haddix, jobs, mentors, Mentorship, Podcast, Podcasts, Privacy, security, technology, Weekly Edition
In episode 316, we have the pleasure to chat with Jason Haddix, a prominent influencer in the cybersecurity community. With an intriguing career path, from being a ‘computer kid’, venturing into the ...
The Problem of Victim Blaming in Cybersecurity: Empathy, Responsibility & Ethical Practices
Tom Eston | | 23andMe, Andra Zaharia, Cyber Empathy Podcast, Cyber Security, Cybersecurity, Data breach, Data Privacy, Digital Privacy, DNA, empathy, Episodes, Ethics, Information Security, Infosec, Pentest Tools, Podcast, Podcasts, Privacy, responsibility, security, technology, Victim Blaming, We Think We Know Podcast, Weekly Edition
In this episode of the Shared Security Podcast, we discuss the concerning issue of victim-blaming in cybersecurity with special guest, Andra Zaharia, host of the Cyber Empathy and We Think We Know ...
Secure Your iPhone: Exploring Stolen Device Protection
Tom Eston | | Apple iPhone, Cyber Security, Cybersecurity, Data Privacy, Digital Privacy, Episodes, Fraud, Information Security, Infosec, ios, iOS 17.3, mobile device, mobile phone, Podcast, Podcasts, Privacy, security, smartphone, smartphones, Stolen Device Protection, Stolen iPhone, Stolen Phone, technology, theft, Thief, Weekly Edition
In this episode, host Tom Eston provides a detailed explanation of the ‘Stolen Device Protection’ for iPhones – a new security feature by Apple. This feature triggers enhanced security factors such as ...
The World of Scambaiting, Preventing Social Media Account Takeovers, Network Wrenches Hacked
Tom Eston | | account takeover, account takeovers, Bosch Rexroth Handheld Nutrunner, Cyber Security, Cybersecurity, Data Privacy, Digital Privacy, Episodes, Fraud, Information Security, Infosec, Internet of things, iot, Kitboga, Malware, Phishing, Podcast, Podcasts, Privacy, Rachel Tobac, Ransomware, Scam Baiting, Scambaiting, Scammer Payback, scammers, Scams, security, social engineering, social media, technology, Twitter, Weekly Edition, X
In Episode 313, hosts Tom and Scott discuss the world of scambaiting, discussing what it is, the tactics used, and its effectiveness in stopping scammers. They talk about popular channels like Scammer ...
Ohio’s New Social Media Law, Meta’s Link History Feature, 175 Million Passcode Guesses
Tom Eston | | Apple, brute-force attack, children, Cyber Security, Cybersecurity, Data Privacy, Digital Privacy, Episodes, facebook, Information Security, Infosec, Instagram, iPhone, Link History, Meta, Ohio, Ohio Social Media Law, Ottawa, passcode, Passcodes, Podcast, Podcasts, Privacy, security, social media, technology, Teenagers, Weekly Edition
In episode 312, Tom and Scott discuss the implications of a new law in Ohio that may require parental consent for children under 16 using social media, including the pros and cons ...
Most Advanced iPhone Exploit Ever, Google’s $5 Billion Settlement, Apple’s Journal App
Tom Eston | | api, Apple, Cyber Security, Cybersecurity, Data Privacy, Digital Privacy, Episodes, Exploit, google, Google Privacy Lawsuit, Information Security, Infosec, ios, iPhone, iPhone Exploit, Journal, Journaling, Mobile, Mobile App, New Year, Podcast, Podcasts, Privacy, security, technology, Weekly Edition
In this episode, we discuss the most sophisticated iPhone exploit ever, Google’s agreement to settle a $5 billion lawsuit about tracking users in ‘incognito’ mode, and a new iOS app, Journal. The ...
The Three Keys to Success in Cybersecurity
Tom Eston | | career, Careers, communication, Communication Skills, Continuous Learning, Cyber Security, Cybersecurity, Cybersecurity Careers, Cybersecurity Industry, Data Privacy, Digital Privacy, education, empathy, Episodes, future, Information Security, Infosec, Key Lessons, Learning, Podcast, Podcasts, Privacy, security, speaking, Teaching, Teaching Others, technology, Weekly Edition
In this episode, host Tom Eston shares the three key lessons he’s learned over his 18-year career in cybersecurity: effective communication, continuous learning, and empathy. He talks about the importance of understanding ...
The Year in Review and 2024 Predictions
Tom Eston | | 2023, 2024, AI, Barbie movie, Cyber Security, Cybersecurity, Data Privacy, Digital Privacy, Episodes, Happy New Year, Information Security, Infosec, legislation, MA, Mergers and Aquisitions, New Year, Phishing, Podcast, Podcasts, predictions, Privacy, Ransomware, security, technology, TikTok, TikTok Ban, Twitter, Weekly Edition, X
In our last episode of the year, we replay our predictions for 2023 reviewing what we got right and what we didn’t. We cover various topics, such as Twitter’s influence, the future ...
Password Security for the Elderly: Tips and Best Practices
Tom Eston | | Apple, Cyber Security, Cybersecurity, Data Privacy, death, Digital Legacy, Digital Privacy, Elderly, Episodes, Information Security, Infosec, ios, legacy, Notebook, Password, passwords, Podcast, Podcasts, Privacy, security, Senior Citizen, Seniors, technology, Weekly Edition, Writting
In episode 308, we discuss the often overlooked topic of password management for the elderly. Addressing the commonly held belief that writing down passwords is a bad idea, we discuss the nuances ...
iOS 17 NameDrop Debunking, Real World QR Code Attacks, Impact of Ransomware on Hospitals
Tom Eston | | AI, Apple, Contact Information, Critical Infrastructure, Cyber Security, Cybersecurity, Data Privacy, Digital Privacy, Emergency Room, Episodes, Fraud, healthcare provider, Information Security, Infosec, iOS 17, law enforcement, Misinformation, NameDrop, Phishing, Physical Attacks, Podcast, Podcasts, Privacy, QR Code Scam, QR Codes, quishing, ransomware attack, security, security tips, social media, technology, Vulnerabilities, Weekly Edition
In episode 307, Tom and Scott debunk misinformation circulating about the iOS 17 NameDrop feature by law enforcement and others on social media. Next, they discuss the potential risks of QR code ...