technology

Do You Really Need a REAL ID to Fly in the US? Breaking Down the Myths
Tom Eston | | border crossing, Canadian Perspective, Cyber Security, cyber threat, Cybersecurity, Data Privacy, digital id, Digital Privacy, Enhanced Driver's License, Episodes, Federal Government, Flying, Google Wallet, government surveillance, Identity Surveillance, Information Security, Infosec, Interstate Travel, law enforcement, National ID Cards, passport, Personal Stories, Podcast, Podcasts, Political Discussion, Post 9/11, Privacy, REAL ID, Right To Travel, security, Security Concerns, technology, tsa, US Travel, Voter ID, Weekly Edition
Join us as we discuss the long-awaited implementation of the REAL ID Act in the U.S. We cover the essentials you need to fly, the potential benefits of using your passport, and ...

Growth Hacking 2.0: From Traditional SEO to AI-Powered Answer Engine Optimization
Deepak Gupta - Tech Entrepreneur, Cybersecurity Author | | AEO, AI (Artificial Intelligence), AI and B2B SaaS growth, future, Growth, SEO, Tech Success Strategies, technology
Growth hacking has evolved from viral loops and cold outreach to AI-powered Answer Engine Optimization (AEO). As Google launches AI search and businesses shift from traditional SEO to AEO, B2B SaaS must ...

Invasion of Privacy: The Hidden Camera Dilemma
Tom Eston | | Airbnb, Crime Junkies Podcast, Cyber Security, cyber threat, Cybersecurity, Data Privacy, Detecting Cameras, Digital Privacy, Episodes, Hidden Cameras, Information Security, Infosec, law enforcement, Legal Implications, Podcast, Podcasts, Privacy, security, surveillance, technology, voyeurism, Voyeurism Laws, Weekly Edition
Ever worried about hidden cameras in Airbnb rentals? You’re not alone! In this episode, we explore the unsettling rise of hidden cameras in personal spaces, the inadequacy of current laws, and practical ...
Emulating the Unyielding Scattered Spider
Ayelen Torello | | adversary emulation, financial, Malware, retail, scattered spider, technology, telecommunications
AttackIQ has released a new assessment template that contains a curated list of Tools and Malware samples associated with Scattered Spider to help defenders improve their security posture against this sophisticated and ...

The Evolution of Software Development: From Machine Code to AI Orchestration
Deepak Gupta - Tech Entrepreneur, Cybersecurity Author | | AI (Artificial Intelligence), AI assistant, developers, Development, future, software, technology
Major tech companies now generate 30% of code with AI. Explore the dramatic shift from manual coding to AI orchestration—and why the next 3 years will transform who can build software ...

When AI Fights Back: Threats, Ethics, and Safety Concerns
Tom Eston | | advanced ai, AI & Automation, AI Blackmail, AI Engineering, ai ethics, AI Ethics and Safety, AI Evolution, AI Future, AI in Daily Life, AI in Industry, AI in Technology, AI Podcast, AI Revolution, AI safety, AI Shutdown, AI testing, ai threats, AI Uprising, Anthropic, Artificial Intelligence, Claude, Cyber Security, cyber threat, Cybersecurity, Data Privacy, Digital Privacy, Episodes, Information Security, Infosec, LLM, machine learning, Podcast, Podcasts, Privacy, security, technology, Weekly Edition
In this episode, we explore an incident where Anthropic’s AI, Claude, didn’t just resist shutdown but allegedly blackmailed its engineers. Is this a glitch or the beginning of an AI uprising? Along ...
Response to CISA Advisory (AA25-141A): Russian GRU Targeting Western Logistics Entities and Technology Companies
Ayelen Torello | | adversary emulation, APT28, cisa, CISA Advisory, credential harvesting, Fancy Bear, government, GRU, Russia, spear-phishing, technology, transportation
AttackIQ has released a new assessment template in response to the CISA Advisory (AA25-141A) published on May 21, 2025. The CSA highlights a cyber espionage-oriented campaign carried out by cyber actors affiliated ...

Mark Zuckerberg’s Vision: AI Companions and the Loneliness Epidemic
Tom Eston | | 23andMe Bankruptcy, AI, AI Friends, AI Girlfriends, Canadian Government, Cyber Security, cyber threat, Cybersecurity, Data Privacy, Digital Privacy, Episodes, facebook, Information Security, Infosec, Loneliness Epidemic, Mark Zuckerberg, Meta, Meta AI, Podcast, Podcasts, Privacy, Privacy Concerns, security, Social Media Security, technology, US Civil War Book, Weekly Edition
In this episode, we explore Mark Zuckerberg’s bold claim that AI friends will replace human friendships, and discuss the potential implications of a world where technology mediates our connections. We also update ...

Deepfake 101: Understanding Digital Deception in Today’s World
Deepak Gupta - Tech Entrepreneur, Cybersecurity Author | | AI (Artificial Intelligence), deepfake, future, security, technology, threat protection
As AI makes perfect digital impersonations increasingly accessible, distinguishing reality from fiction becomes harder. This guide breaks down deepfake technology in simple terms and provides practical protection strategies anyone can implement ...

Facebook Flaws and Privacy Laws: A Journey into Early Social Media Security from 2009
Tom Eston | | 2009, cross-site scripting, Cyber Security, Cyber Security Podcast, cyber threat, Cybersecurity, Data Privacy, Digital Privacy, Early Social Media, Episodes, facebook, Information Security, Infosec, internet security, online safety, Podcast, Podcasts, Privacy, privacy laws, security, Social Media Awareness, Social Media Risks, Social Media Security, Tech Podcast, technology, Weekly Edition, XSS
Join hosts Tom Eston, Scott Wright, and Kevin Johnson in a special best-of episode of the Shared Security Podcast. Travel back to 2009 with the second-ever episode featuring discussions on early Facebook ...