Information Security
‘Get to Know Me’ Privacy Risks, Pros and Cons of Publicly Sharing Ring Doorbell Footage
Tom Eston | | amazon, Camera Footage, Cyber Security, Cybersecurity, Data Privacy, Digital Privacy, Doorbell Camera, Episodes, Get to know me, Information Security, Infosec, Instagram, Neighbors, Neighbors App, Podcast, Podcasts, police, Privacy, Ring, Ring Doorbell, security, social media, social network, technology, Warrant, Weekly Edition
In episode 318, we discuss the trending ‘get to know me’ posts on social media platforms like Instagram and the potential risks of sharing personal information publicly, particularly in light of potential ...
25.6 Million Dollar Deepfake Scam, Exploring Canada’s Flipper Zero Ban
Tom Eston | | AGI, AI, canada, Canadian Government, Car Thefts, cars, Cyber Security, Cybersecurity, Data Privacy, deepfake, deepfakes, Digital Privacy, Episodes, Flipper Zero, Information Security, Infosec, Podcast, Podcasts, Privacy, scam, Scams, security, Stolen Cars, technology, Thefts, Weekly Edition
In episode 317, Tom and Kevin discuss a reported deepfake scam that allegedly led to the theft of 25.6 million from a multinational company and Canada’s attempt to ban the Flipper Zero ...
Jason Haddix on Bug Bounties and Cybersecurity Career Growth
Tom Eston | | Arcanum Information Security, Bug Bounties, bug bounty, career, career growth, Cyber Security, Cybersecurity, cybersecurity career, Data Privacy, Digital Privacy, Episodes, Information Security, Infosec, Jason Haddix, jobs, mentors, Mentorship, Podcast, Podcasts, Privacy, security, technology, Weekly Edition
In episode 316, we have the pleasure to chat with Jason Haddix, a prominent influencer in the cybersecurity community. With an intriguing career path, from being a ‘computer kid’, venturing into the ...
The Problem of Victim Blaming in Cybersecurity: Empathy, Responsibility & Ethical Practices
Tom Eston | | 23andMe, Andra Zaharia, Cyber Empathy Podcast, Cyber Security, Cybersecurity, Data breach, Data Privacy, Digital Privacy, DNA, empathy, Episodes, Ethics, Information Security, Infosec, Pentest Tools, Podcast, Podcasts, Privacy, responsibility, security, technology, Victim Blaming, We Think We Know Podcast, Weekly Edition
In this episode of the Shared Security Podcast, we discuss the concerning issue of victim-blaming in cybersecurity with special guest, Andra Zaharia, host of the Cyber Empathy and We Think We Know ...
USENIX Security ’23 – Black-box Adversarial Example Attack Towards FCG Based Android Malware Detection Under Incomplete Feature Information
Marc Handelman | | Information Security, Infosecurity Education, Open Access Research, Security Architecture, Security Conferences, Security Research, USENIX, USENIX Security ’23
Author/Presenters: Heng Li, Zhang Cheng, Bang Wu, Liheng Yuan, Cuiying Gao, Wei Yuan, Xiapu Luo Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong ...
USENIX Security ’23 – Simone Aonzo, Yufei Han, Alessandro Mantovani, Davide Balzarotti – Humans vs. Machines in Malware Classification
Marc Handelman | | Information Security, Infosecurity Education, Open Access Research, Security Architecture, Security Conferences, Security Research, USENIX, USENIX Security ’23
Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access. Originating from the conference’s events situated at the Anaheim Marriott; and ...
USENIX Security ’23 – Yizheng Chen, Zhoujie Ding, David Wagner – # Continuous Learning for Android Malware Detection
Marc Handelman | | Information Security, Open Access Research, Security Conferences, Security Research, USENIX, USENIX Security ’23
Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access. Originating from the conference’s events situated at the Anaheim Marriott; and ...
Secure Your iPhone: Exploring Stolen Device Protection
Tom Eston | | Apple iPhone, Cyber Security, Cybersecurity, Data Privacy, Digital Privacy, Episodes, Fraud, Information Security, Infosec, ios, iOS 17.3, mobile device, mobile phone, Podcast, Podcasts, Privacy, security, smartphone, smartphones, Stolen Device Protection, Stolen iPhone, Stolen Phone, technology, theft, Thief, Weekly Edition
In this episode, host Tom Eston provides a detailed explanation of the ‘Stolen Device Protection’ for iPhones – a new security feature by Apple. This feature triggers enhanced security factors such as ...
USENIX Security ’23 – POLICYCOMP: Counterpart Comparison of Privacy Policies Uncovers Overbroad Personal Data Collection Practices
Marc Handelman | | Information Security, Infosecurity Education, Open Access Research, Security Conferences, Security Research, USENIX, USENIX Security ’23
Authors/Presenters: Lu Zhou, Chengyongxiao Wei, Tong Zhu, Guoxing Chen, Xiaokuan Zhang, Suguo Du, Hui Cao, Haojin Zhu Permalink ...
USENIX Security ’23 – Wenjun Qiu, David Lie, Lisa Austin – Calpric: Inclusive and Fine-grain Labeling of Privacy Policies with Crowdsourcing and Active Learning
Marc Handelman | | Information Security, Open Access Research, Security Conferences, Security Research, USENIX, USENIX Security ’23
Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access. Originating from the conference’s events situated at the Anaheim Marriott; and ...