Listen to a podcast, please open Podcast Republic app. Available on Google Play Store and Apple App Store.
Episode | Date |
---|---|
What Vibe Coding, MCP, and Slopsquatting Reveal About the Future of AI Development
|
May 05, 2025 |
The Impact of Politics on Cybersecurity: CVE’s and the Chris Krebs Executive Order
|
Apr 28, 2025 |
Centralizing Data and Enhancing Workflows: Inside PlexTrac’s New Capabilities
|
Apr 21, 2025 |
US Border Searches and Protesting in the Surveillance Age
|
Apr 14, 2025 |
The 23andMe Collapse, Signal Gate Fallout
|
Apr 07, 2025 |
Understanding Privacy Changes: eBay’s AI Policy and The Future of Data Privacy
|
Mar 31, 2025 |
From Spreadsheets to Solutions: How PlexTrac Enhances Security Workflows
|
Mar 24, 2025 |
Tackling Data Overload: Strategies for Effective Vulnerability Remediation
|
Mar 17, 2025 |
Trump Administration and the Russian Cyber Threat, Firefox Privacy Changes
|
Mar 10, 2025 |
Cybersecurity Impact of DOGE, Apple’s Stand Against Encryption Backdoors
|
Mar 03, 2025 |
Cybersecurity Insights with John Hammond: YouTube Legend and Security Researcher
|
Feb 24, 2025 |
UK’s Secret Apple Backdoor Request, AI Chatbots Used For Stalking
|
Feb 17, 2025 |
Careers in Cybersecurity: Myths and Realities with Kathleen Smith
|
Feb 10, 2025 |
Privacy Concerns with Digital Driver’s Licenses, The Rise of DeepSeek AI
|
Feb 03, 2025 |
Gravy Analytics Breach, Subaru Starlink Vulnerability Exposed
|
Jan 27, 2025 |
Meta Ditches Fact-Checking for Community Notes, RedNote and the TikTok Ban
|
Jan 20, 2025 |
AI Privacy Policies: Unveiling the Secrets Behind ChatGPT, Gemini, and Claude
|
Jan 13, 2025 |
Reflecting on Y2K: Lessons for the Next Tech Crisis and AI Safety
|
Jan 06, 2025 |
2024 Year in Review: What We Got Right and Looking to 2025
|
Dec 30, 2024 |
Digital License Plate Vulnerabilities, How to Avoid New Text Message Scams
|
Dec 23, 2024 |
Hack-for-Hire Campaign Targeting Climate Activists, Government Hypocrisy on Encryption
|
Dec 16, 2024 |
Tanya Janca on Secure Coding, AI in Cybersecurity, and Her New Book
|
Dec 09, 2024 |
Australia Bans Social Media for Kids, Holiday Vishing Scams
|
Dec 02, 2024 |
Deepfake Fraud, Data Brokers Tracking Military Personnel
|
Nov 25, 2024 |
Why It’s Time to Leave Twitter
|
Nov 18, 2024 |
Advanced Persistent Teenagers, Okta Bug Allowed Logins Without a Correct Password
|
Nov 11, 2024 |
Fallout from the Change Healthcare Breach, Mortgage Wire Fraud What You Need To Know
|
Nov 04, 2024 |
Internet Archive Hacked, Introducing The AI Toilet Camera
|
Oct 28, 2024 |
Hacked Robot Vacuums, Secret Printer Tracking Dots
|
Oct 21, 2024 |
Emergency Satellite Messaging, Stagnation in User Cybersecurity Habits
|
Oct 14, 2024 |
Kia Security Flaw Exposed, NIST’s New Password Guidelines
|
Oct 07, 2024 |
Discord’s New End-to-End Encryption, LinkedIn Using Your Data for AI Training
|
Sep 30, 2024 |
Supply Chain Sabotage: The Exploding Pager Incident, Instagram’s New Teen Privacy Measures
|
Sep 23, 2024 |
The Rise of AI Voicemail Scams, Political Donation Privacy Concerns
|
Sep 16, 2024 |
Shocking SQL Injection in TSA App, Bitcoin ATM Scams Targeting Seniors
|
Sep 09, 2024 |
Telegram is NOT an Encrypted Messaging App, Must-See Documentaries
|
Sep 02, 2024 |
Google’s Monopoly: The Debate Heats Up, Amazon Alexa Privacy Tips
|
Aug 26, 2024 |
The Inefficiency of People-Search Removal Tools, Massive Data Breach Impacting U.S. Citizens
|
Aug 19, 2024 |
Exploring Cybersecurity Trends at Black Hat 2024 with Shourya Pratap Singh from SquareX
|
Aug 12, 2024 |
The Great CrowdStrike Crash, AI’s Role in Employee Smiles
|
Aug 05, 2024 |
How SquareX is Redefining Web Security: An In-Depth Discussion with Chief Architect Jeswin Mathai
|
Aug 01, 2024 |
Deepfakes, AI, and the Future of Cybersecurity: Insights from Dan DeCloss of PlexTrac
|
Jul 29, 2024 |
Massive AT&T Data Breach Impact, Meta’s Privacy Policy Updates
|
Jul 22, 2024 |
Authy Breach: What It Means for You, RockYou 2024 Password Leak
|
Jul 15, 2024 |
Critical SSH Vulnerability, Facial Recognition Flaws, How to Safely Dispose of Old Devices
|
Jul 08, 2024 |
The U.S. Bans Kaspersky Antivirus, WordPress Plugin Supply Chain Attacks
|
Jul 01, 2024 |
Exploring Cutting-Edge Browser Security with Vivek Ramachandran – Founder of SquareX
|
Jun 27, 2024 |
Social Media Warning Labels, Should You Store Passwords in Your Web Browser?
|
Jun 24, 2024 |
Citizen Lab vs. NSO Group, Apple AI and Privacy
|
Jun 17, 2024 |
Ticketmaster Data Breach and Rising Work from Home Scams
|
Jun 10, 2024 |
Sober in Cyber: Creating Alcohol-Free Networking in Cybersecurity with Jen VanAntwerp
|
Jun 03, 2024 |
Microsoft’s Copilot+ Recall Feature, Slack’s AI Training Controversy
|
May 27, 2024 |
New Tracker Warning Features on iPhones & Androids, 2024 Verizon Data Breach Investigations Report
|
May 20, 2024 |
Live at RSA: AI Hype, Enhanced Security, and the Future of Cybersecurity Tools
|
May 13, 2024 |
FCC Fines Wireless Carriers $200 million, Google’s Fight Against Malicious Apps
|
May 06, 2024 |
Privacy Challenges in Relationships, Phishing Down but Vulnerabilities Up?
|
Apr 29, 2024 |
Navigating Security Awareness in the Tech Industry with Erin Gallagher
|
Apr 22, 2024 |
Linux Backdoor Infection Scare, Massive Social Security Number Heist
|
Apr 15, 2024 |
Massive AT&T Data Leak, The Danger of Thread Hijacking
|
Apr 08, 2024 |
New Hotel Lock Vulnerabilities, Glassdoor Anonymity Issues
|
Apr 01, 2024 |
Alyssa Miller: Charting the Course Through InfoSec and Aviation
|
Mar 25, 2024 |
The TikTok Ban Bill, Your Car is Spying on You, Signal’s Username Update
|
Mar 18, 2024 |
Who’s to Blame for Hacked Social Media Accounts, Spoofed Online Meeting Requests and Malware
|
Mar 11, 2024 |
Don’t Trust Your AI Girlfriend or Boyfriend, Exposing US Government Data Collection
|
Mar 04, 2024 |
‘Get to Know Me’ Privacy Risks, Pros and Cons of Publicly Sharing Ring Doorbell Footage
|
Feb 26, 2024 |
25.6 Million Dollar Deepfake Scam, Exploring Canada’s Flipper Zero Ban
|
Feb 19, 2024 |
Jason Haddix on Bug Bounties and Cybersecurity Career Growth
|
Feb 12, 2024 |
The Problem of Victim Blaming in Cybersecurity: Empathy, Responsibility & Ethical Practices
|
Feb 05, 2024 |
Secure Your iPhone: Exploring Stolen Device Protection
|
Jan 29, 2024 |
The World of Scambaiting, Preventing Social Media Account Takeovers, Network Wrenches Hacked
|
Jan 22, 2024 |
Ohio’s New Social Media Law, Meta’s Link History Feature, 175 Million Passcode Guesses
|
Jan 15, 2024 |
Most Advanced iPhone Exploit Ever, Google’s $5 Billion Settlement, Apple’s Journal App
|
Jan 08, 2024 |
The Three Keys to Success in Cybersecurity
|
Jan 01, 2024 |
The Year in Review and 2024 Predictions
|
Dec 25, 2023 |
Password Security for the Elderly: Tips and Best Practices
|
Dec 18, 2023 |
iOS 17 NameDrop Debunking, Real World QR Code Attacks, Impact of Ransomware on Hospitals
|
Dec 11, 2023 |
Application Security Trends & Challenges with Tanya Janca
|
Dec 04, 2023 |
Apple Finally Adopts RCS, AI Powered Scams Targeting the Elderly
|
Nov 27, 2023 |
Paying Big Tech for Privacy, New Privacy Policy Study, Biden’s Executive Order on AI
|
Nov 20, 2023 |
SEC vs. SolarWinds CISO, Classiscam Scam-as-a-Service
|
Nov 13, 2023 |
Okta Hacked Again, Quishing Is The New Phishing, Google Play Protect Real-Time Scanning
|
Nov 06, 2023 |
How to Opt Out of CPNI Data Sharing
|
Oct 30, 2023 |
Special Guest Jayson E. Street, Phantom Hacker Scams, 23andMe User Data For Sale
|
Oct 23, 2023 |
Educating the Next Cybersecurity Generation with Tib3rius
|
Oct 16, 2023 |
Your Car is a Privacy Nightmare, Password Creation Best Practices, Sony Hacked Again
|
Oct 09, 2023 |
Is My Boss Spying on Me, Instagram Painting Scam, Kia and Hyundai TikTok Challenge
|
Oct 02, 2023 |
Content Creation, Mental Health in Cyber, The MGM Ransomware Attack
|
Sep 25, 2023 |
The Changing Role of the CISO with Ryan Davis, Chief Information Security Officer at NS1
|
Sep 18, 2023 |
The FBI’s Qakbot Takedown, QR Code Phishing Attacks, Dox Anyone in America for $15
|
Sep 11, 2023 |
SaaS Attacks: Compromising an Organization without Touching the Network
|
Sep 04, 2023 |
Back to School Cybersecurity, Phishing Pitfalls and Strategies, X’s (Twitter) Blocking Overhaul
|
Aug 28, 2023 |
Business Email Compromise Scams Revisited
|
Aug 21, 2023 |
The Current and Future State of Email Security with Andy Yen, CEO of Proton
|
Aug 14, 2023 |
Common Sense Advice for Hacker Summer Camp, AI Chatbot Attacks, What’s a Flipper Zero?
|
Aug 07, 2023 |
Your Digital Immortality is Coming, Apple and Google Are Data Gatekeepers, Satellite Security Risks Revealed
|
Jul 31, 2023 |
Microsoft Lost Its Keys, Voice Cloning Scams, The Biden-Harris Cybersecurity Labeling Program
|
Jul 24, 2023 |
First Ban on Selling Location Data, Prohibiting Password Managers, Real-Time Crime Center Concerns
|
Jul 17, 2023 |
Meta’s Threads and Your Privacy, Airline Reservation Scams, IDOR Srikes Back
|
Jul 10, 2023 |
MOVEit Cyberattack, The Problem with Password Rotations, Military Alert on Free Smartwatches
|
Jul 03, 2023 |
Security Podcasting, Hacking Stories, and The State of Firmware Security with Paul Asadoorian
|
Jun 26, 2023 |
The FTC’s Complaint Against Ring, Detecting Malware Infected Apps, America’s Most Cybersecure Companies
|
Jun 19, 2023 |
How to Break Into a Cybersecurity Career – Phillip Wylie
|
Jun 12, 2023 |
Netflix Cracks Down on Password Sharing, AI Legal Research Gone Wrong, Fake Identities and Surveillance Firms
|
Jun 05, 2023 |
Meta’s $1.3 Billion Fine, AI Hoax Hysteria, Montana’s TikTok Ban
|
May 29, 2023 |
Google Now Supports Passkeys, Risky New Top Level Domains, Twitter’s Encryption Dilemma
|
May 22, 2023 |
Private Tweets Exposed, Unauthorized Tracking Collaboration, AI Risks and Regulation
|
May 15, 2023 |
Juice Jacking Debunked, Photographer vs. AI Dataset, Google Authenticator Risks
|
May 08, 2023 |
Building a Healthy Security Culture: Insights from Kai Roer
|
May 01, 2023 |
Arkansas Social Media Consent Law, Android Malware Invasion, New Method of Keyless Car Theft
|
Apr 24, 2023 |
Genesis Market Crackdown, Life360 App Misuse, Tesla Customer Privacy Concerns
|
Apr 17, 2023 |
Clearview AI Facial Recognition Fallout, Hacked and Helpless, Is AI Armageddon Upon Us?
|
Apr 10, 2023 |
The TikTok CEO Testimony, ChatGPT’s Privacy Risks, Inaudible Ultrasound Attacks
|
Apr 03, 2023 |
Samsung Chipset Zero-Day Vulnerabilities, AI-Assisted Social Engineering, ATM Fraud with a Twist
|
Mar 27, 2023 |
Exploring the Role of Empathy in Cybersecurity with Andra Zaharia
|
Mar 20, 2023 |
Biden’s National Cybersecurity Strategy, BetterHelp’s FTC Fine, Chick-fil-A Data Breach
|
Mar 13, 2023 |
The LastPass Attack Gets Worse, What is Gamification, Signal’s Encryption Standoff
|
Mar 06, 2023 |
Twitter’s Paywall 2FA, Mental Health Data for Sale, Meta’s Verified Program
|
Feb 27, 2023 |
Reddit Hacked, Preventing Accidental Location Sharing, Developer Hacks His Own Company
|
Feb 20, 2023 |
Layoffs, Recruiting, and The Year Ahead for Cybersecurity Job Seekers
|
Feb 13, 2023 |
Password Managers Under Attack, Shady Reward Apps on Google Play, Meta Account Center 2FA Bypass
|
Feb 06, 2023 |
U.S. ‘No Fly List’ Leaks, AI-Powered Phishing, Wi-Fi Used to See Humans Through Walls
|
Jan 30, 2023 |
Social Zombies Revisited: Your Friends Want to Eat Your Brains
|
Jan 23, 2023 |
Meta’s EU Ad Practices Ruled Illegal, Twitter API Data Breach, Vulnerabilities in Major Car Brands
|
Jan 16, 2023 |
LastPass Password Vaults Stolen, Pig Butchering Scams, Okta Source Code Theft
|
Jan 09, 2023 |
How to Stop Online Tracking: 3 New Ways
|
Jan 02, 2023 |
The Year in Review and 2023 Predictions
|
Dec 26, 2022 |
Apple to Allow Third-Party App Stores, Lensa AI App Privacy Risks, Real-Life Invisibility Cloak
|
Dec 19, 2022 |
ChatGPT Goes Viral, More Trouble for LastPass, Apple’s New Data Protections
|
Dec 12, 2022 |
SASE: Is it Just Another Cybersecurity Buzzword?
|
Dec 05, 2022 |
Is Social Media at a Tipping Point, The TikTok Invisible Challenge, San Francisco Police Can Use Killer Robots
|
Dec 05, 2022 |
How to Break Into a Cybersecurity Career – Rob Fuller (Mubix)
|
Nov 28, 2022 |
The Rise of Mastodon, Twitter in Trouble, Largest Privacy Settlement in US History
|
Nov 21, 2022 |
How to Break Into a Cybersecurity Career – Digital Forensics and Incident Response (DFIR)
|
Nov 14, 2022 |
Cybersecurity’s Role in Combating Midterm Election Disinformation
|
Nov 07, 2022 |
CISO Liability Risk and Jail Time, (ISC)2 Bylaw Vote and the Value of Cybersecurity Certifications
|
Oct 31, 2022 |
Attack of the Wi-Fi Spy Drones, How to Destroy Your Old Electronics, Signal Removes SMS Support
|
Oct 24, 2022 |
Uber Breach Guilty Verdict, Mandatory Password Expiration, Fake Executive Profiles on LinkedIn
|
Oct 17, 2022 |
Hackers Need 5 Hours or Less to Break In, SMS Phishing Tactics, Strange Ways Employees Expose Data
|
Oct 10, 2022 |
What are Passkeys, PowerPoint Mouseover Attack, 2K Games Support Hacked
|
Oct 03, 2022 |
Uber Hacked by 18 Year Old, Morgan Stanley Hard Drives Got Auctioned, Deleting Your Data is Hard
|
Sep 26, 2022 |
Facebook Doesn’t Know Where Your Data Is, New Hire Spearmishing Attack, Smart Thermostat Lock Out
|
Sep 19, 2022 |
TikTok Denies Data Breach, Los Angeles School District Ransomware Attack, Fingerprint Scanners in School Bathrooms
|
Sep 12, 2022 |
LastPass Data Breach, ETHERLED: Air-Gapped Systems Attack, Twitter Whistleblower Complaint
|
Sep 05, 2022 |
Janet Jackson Can Crash Laptops, Credential Phishing Attacks Skyrocket, A Phone Carrier That Doesn’t Track You
|
Aug 29, 2022 |
Multi-Factor Authentication Fatigue Attack, Signal Account Twilio Hack, Facebook and Instagram In-App Browser
|
Aug 22, 2022 |
The Importance of Faraday Technology with Aaron Zar from SLNT
|
Aug 15, 2022 |
Phone Numbers Used for Identification, Hacker Summer Camp Advice, Samsung Repair Mode
|
Aug 08, 2022 |
Twitter Data Breach, 15 Minutes to Exploit Zero-Day Vulnerabilities, Resilient Deepfake Traits
|
Aug 01, 2022 |
Robert Kerbeck Author of RUSE: Lying the American Dream from Hollywood to Wall Street
|
Jul 25, 2022 |
Apple Previews Lockdown Mode, Another Marriott Data Breach, Smart Contact Lenses
|
Jul 18, 2022 |
Could TikTok Be Removed From App Stores, HackerOne Employee Caught Stealing Vulnerability Reports, California Gun Owner Data Breach
|
Jul 11, 2022 |
Period Tracking Apps and Your Privacy, Vendor Impersonation Attacks, LockBit Ransomware Bug Bounty Program
|
Jul 04, 2022 |
Tim Hortons Privacy Investigation, Social Engineering Kill-Chain, Hospitals Sending Facebook Your Data
|
Jun 27, 2022 |
Bipartisan Digital-Privacy Bill, Delete Your Data Before Selling Your Car, Firefox Total Cookie Protection
|
Jun 20, 2022 |
Hacking Ham Radio: Why It’s Still Relevant and How to Get Started
|
Jun 13, 2022 |
DuckDuckGo Browser Allows Microsoft Trackers, Stolen Verizon Employee Database, Attacking Powered Off iPhones
|
Jun 06, 2022 |
The State of Application Security with Tanya Janca
|
May 30, 2022 |
Apple Mail Privacy Protection, Government Agencies Reveal Top Attack Vectors, Is Big Brother Watching You at Work?
|
May 23, 2022 |
FBI Warrantless Searches, Passwordless Sign-Ins, Keylogging Web Forms
|
May 16, 2022 |
Cybersecurity for Startups with Josh Feinblum from Stavvy
|
May 09, 2022 |
Elon Musk Buys Twitter, Forgotten BIOS Updates, T-Shirt Outwits Facial Recognition
|
May 02, 2022 |
Rehumanizing Cybersecurity with Lianne Potter
|
Apr 25, 2022 |
Dumbphone Sales are Soaring, John Oliver Blackmails Congress, Cicada Chinese APT Group
|
Apr 18, 2022 |
Truths and Myths of Privacy, Fake Shopping Apps, Borat RAT Malware
|
Apr 11, 2022 |
Google Android vs Apple iOS: Which is Better for Privacy and Cybersecurity?
|
Apr 04, 2022 |
LAPSUS$ Hacks Okta, Browser-in-the Browser Phishing Attack, Popular Software Package Updated to Wipe Russian Systems
|
Mar 28, 2022 |
Top 3 Location Tracking Apps: Do They Sell Your Data?
|
Mar 21, 2022 |
Amazon Echos Hack Themselves, Fraud Is Flourishing on Zelle, Samsung Galaxy Source Code Stolen
|
Mar 14, 2022 |
Russia Gets Hacked, Microsoft 365 Credential Stuffing, McDonald’s Ice Cream Machine Hackers
|
Mar 07, 2022 |
TikTok Circumvents Privacy Protections, Russian Sanction Attacks, Apple AirTag Anti-Stalking Measures
|
Feb 28, 2022 |
MoviePass Tracking Your Eyeballs, Shipment Delivery Scams, SIM Swappers Arrested
|
Feb 21, 2022 |
EARN IT Act is Back, Romance Scams, Like and Subscribe Ransomware
|
Feb 14, 2022 |
Graphics Card Web Tracking, Fake Job Ad Scams, Hacker Takes Down North Korea’s Internet
|
Feb 07, 2022 |
Ukraine Invasion Hacktivists, Insta360 ONE X2 Vulnerabilities, Google Location Tracking Lawsuits
|
Jan 31, 2022 |
Pandemic Surveillance in Canada, Malware-Filled USB Sticks are Back, Kill Switches in New Cars
|
Jan 24, 2022 |
Digital Wellbeing with Kelly Finnerty from Startpage
|
Jan 19, 2022 |
Norton 360 Cryptominer, Fake QR Codes on Parking Meters, Facebook Account Deactivation
|
Jan 17, 2022 |
Phone Scam Targets Psychologists, All My Apes Gone, Supply Chain Skimmer Attack
|
Jan 10, 2022 |
LastPass Master Passwords, New Cars and Your Privacy, Amazon Alexa Lethal Challenge
|
Jan 03, 2022 |
Web3 and the Decentralized Internet
|
Dec 31, 2021 |
The Year in Review and 2022 Predictions
|
Dec 27, 2021 |
Log4j Vulnerability, Apple AirTags Used by Thieves, FBI’s Encrypted Messaging App Document
|
Dec 20, 2021 |
Life360 Selling Location Data, NSO Group Spyware Hacks Government Employees, Homecoming Queen Contest Hacked
|
Dec 13, 2021 |
Business Email Compromise Scams
|
Dec 09, 2021 |
Is TikTok Listening to You, Apple Warns Activists, UK Government Website Shows Porn
|
Dec 06, 2021 |
How to Break Into a Cybersecurity Career – Part 3 with Scott Wright
|
Nov 29, 2021 |
FBI Email System Compromised, Ransomware Negotiation, Privacy Crushing Gifts
|
Nov 22, 2021 |
Robinhood Data Breach, 600 Hours of Dallas Police Helicopter Footage Leaked
|
Nov 15, 2021 |
Facebook Dumps Face Recognition, Social Engineering Bots, US Sanctions NSO Group
|
Nov 08, 2021 |
Interview with Dana Mantilia and the Role of the CISO
|
Nov 05, 2021 |
Federal Data Agency for Social Media, Squirrelwaffle Malspam, Ransomware Hits U.S. Candymaker
|
Nov 01, 2021 |
Missouri Governor and F12 Hacking, Global Ransomware Meeting, Fake Government Websites
|
Oct 25, 2021 |
Killware Clickbait, 1Password Password Sharing Feature, Android Phone Snooping
|
Oct 18, 2021 |
Security Champions Framework, The Great Facebook Outage, Twitch Data Breach
|
Oct 11, 2021 |
Apple AirTag Good Samaritan Attack, iCloud+, Amazon Astro Dog and Ring Camera Drone
|
Oct 04, 2021 |
Multi-Factor Authentication and Authenticator Apps
|
Oct 02, 2021 |
No Password Microsoft Accounts, Facebook Smart Glasses, Security.txt Internet Standard
|
Sep 27, 2021 |
iMessage Zero-Click Exploit, Leaked Guntrader Firearms Data, 60 Million Fitness Tracking Records Exposed
|
Sep 20, 2021 |
ProtonMail IP Address Logging Controversy, Fake Bot Disinformation, Correctional Facility Robot Overlords
|
Sep 13, 2021 |
Election Security and the Packet Capture Controversy with Special Guest Rafal Los
|
Sep 06, 2021 |
What Happens to Your Social Media Accounts After You Die?
|
Aug 31, 2021 |
T-Mobile Hacker Identified, China’s New Privacy Law, Tesla Bot Announcement
|
Aug 30, 2021 |
T-Mobile Data Breach, Tinder Identity Verification, Magnetic Stripe Phase Out
|
Aug 23, 2021 |
Largest Cryptocurrency Hack in History, $10k For Stolen Network Access, Your Identity and the Metaverse
|
Aug 16, 2021 |
CISA JCDC Announcement, Apple’s Child Abuse Image Scanning, Amazon Pays You for Your Biometric Data
|
Aug 09, 2021 |
Reboot Your Smartphone, FBI’s Top Targeted Vulnerabilities, Flirty Account Dupes Defense Contractors
|
Aug 02, 2021 |
How to Protect Yourself from Gift Card Scams
|
Jul 30, 2021 |
Pegasus Spyware is Back, Twitter Hacker Arrested, 16-Year-Old Printer Bug
|
Jul 26, 2021 |
Popular Myths about VPNs
|
Jul 21, 2021 |
Targeted Dream Incubation, TikTok Data Sharing, Chrome and Firefox Updates
|
Jul 19, 2021 |
Kaseya Ransomware Attack, PrintNightmare Zero-day, Kaspersky Password Manager Vulnerability
|
Jul 12, 2021 |
LinkedIn Data Leak, Western Digital NAS Attacks, STIR/SHAKEN Deadline
|
Jul 05, 2021 |
Asset Discovery with Chris Kirsch Co-Founder at Rumble
|
Jul 02, 2021 |
Off Limits Critical Infrastructure, Ransomware on Repeat, Cyber Safe Drinking Water
|
Jun 28, 2021 |
TikTok Collecting Biometric Data, Peloton Bike+ Vulnerability, Nextdoor App Concerns
|
Jun 21, 2021 |
ANOM FBI Global Crime Sting, Colonial Pipeline Updates, Password Leak Research
|
Jun 14, 2021 |
Amazon Sidewalk, NFTs and Cybersecurity, Norton 360 Cryptocurrency Mining
|
Jun 07, 2021 |
Biden’s Cybersecurity Executive Order, Apple’s AirTag, Cyber Insurance
|
May 31, 2021 |
How Gamification is Changing Cybersecurity
|
May 29, 2021 |
Colonial Pipeline Updates, DarkSide Goes Dark, Cybersecurity Best Practices
|
May 24, 2021 |
The Colonial Pipeline Ransomware Attack
|
May 17, 2021 |
World Password Day, Tesla Hacking via Drone, Ipsos Screenwise Panel
|
May 10, 2021 |
Remembering Dan Kaminsky, Apple AirDrop Vulnerability
|
May 03, 2021 |
3 Ways to Keep Your Cryptocurrency Safe
|
May 01, 2021 |
Instagram Anti-Abuse Tool, Apple Advertiser Restrictions, Terrible Passwords
|
Apr 26, 2021 |
Data Breaches vs. Data Leaks, FBI Exchange Server Controversy
|
Apr 19, 2021 |
Best of Episode: Interview with Jayson E. Street
|
Apr 12, 2021 |
Best of Episode: Interview with Rachel Tobac
|
Apr 05, 2021 |
SMS Two-Factor Authentication, New Internet Hygiene Model
|
Mar 31, 2021 |
Top 3 Privacy Tips for Travel
|
Mar 29, 2021 |
Facebook and Apple Privacy Debate, Employee Phishing Test Gone Wrong
|
Mar 22, 2021 |
Encryption Backdoor Debate, Microsoft Exchange Attacks, Airline Supplier Data Breach
|
Mar 15, 2021 |
The Deepfake Dilemma, Microsoft Exchange Zero-Days, IT Security Investments
|
Mar 08, 2021 |
Card Skimmers Powered by Chip Cards, Silver Sparrow Mac Malware, Accellion Zero-Days
|
Mar 01, 2021 |
Clubhouse App and Your Privacy
|
Feb 27, 2021 |
Apple’s Safe Browsing Request Proxy, BEC Attacks, LastPass Updates
|
Feb 22, 2021 |
Florida Water Supply Hack, Android App Hijack, US Capitol Riot Phone Tracking
|
Feb 15, 2021 |
Dangerous Social Media Algorithms, A Moral Imperative for AI Powered Weapons?
|
Feb 08, 2021 |
Cybersecurity Researchers Targeted, Three iOS Zero-Days, Google FLoC
|
Feb 01, 2021 |
Tanya Janca CEO and Founder We Hack Purple
|
Jan 28, 2021 |
Parler, Pelosi’s Stolen Laptop, Vaccination Passport Apps
|
Jan 25, 2021 |
The Capital Riot: First Amendment and Deplatforming, Cybersecurity Lessons Learned
|
Jan 18, 2021 |
How to Break Into a Cybersecurity Career – Part 2 with Rafal Los
|
Jan 11, 2021 |
How to Break Into a Cybersecurity Career – Part 1
|
Jan 04, 2021 |
Top 3 Cybersecurity Tips
|
Dec 28, 2020 |
The Year in Review and 2021 Predictions
|
Dec 23, 2020 |
SolarWinds/SUNBURST Backdoor, Third-Party and Supply Chain Security
|
Dec 21, 2020 |
FireEye Hacked, Foxconn Ransomware Attack, Apple’s New Privacy Features
|
Dec 14, 2020 |
iPhone Zero-Click Exploit, BEC Email Auto-Forward Scams, COVID-19 Vaccine Cold Chain Attacks
|
Dec 07, 2020 |
Holiday Shopping Scams and Tips to Stay Safe
|
Dec 01, 2020 |
Amazon Sidewalk, Federal IoT Security Law, Facebook Messenger Bug
|
Nov 30, 2020 |
CISA Director Chris Krebs Fired, Common Sense and Section 230
|
Nov 23, 2020 |
Stolen Source Code, Apple Zero-Days, Biden’s Privacy and Cybersecurity Policies
|
Nov 16, 2020 |
Privacy Mindset: Europe vs. United States
|
Nov 09, 2020 |
Government Rumor Control, US Hospital Ransomware Threat, Russian Hackers Charged
|
Nov 02, 2020 |
Targeted Attacks Part 3 – The Exploit
|
Oct 27, 2020 |
Voter Privacy and the US Election
|
Oct 26, 2020 |
TrickBot Takedown, VPN Flaws, Zoom End-to-End Encryption
|
Oct 19, 2020 |
The Social Dilemma
|
Oct 12, 2020 |
More Hospital Ransomware Attacks, FBI’s Disinformation Warning, Android 11 Privacy Features
|
Oct 05, 2020 |
Targeted Attacks Part 2 – Pretexting and Attack Development
|
Sep 29, 2020 |
Death by Ransomware, Strava Flyby, iOS 14 Privacy Improvements
|
Sep 28, 2020 |
StartPage.com – The World’s Most Private Search Engine
|
Sep 21, 2020 |
Schools Under Cyberattack, Chrome Ad Blocking Update, US Election Interference
|
Sep 14, 2020 |
NSA Data Collection Ruling, Browsing History Identification, Ambulance Chasing
|
Sep 07, 2020 |
Targeted Attacks Part 1 – OSINT and Reconnaissance
|
Sep 01, 2020 |
Uber CISO Charged, Facebook Data Portability, Malicious iOS SDK
|
Aug 31, 2020 |
Audio Recordings Used to Copy Keys, Carnival Ransomware Attack, Social Media Profile Data Exposed
|
Aug 24, 2020 |
Amazon Echo Exploit, Privacy Shield, Capital One Data Breach Update
|
Aug 17, 2020 |
Twitter Hack Lessons Learned, TikTok Ban, Rite Aid Facial Recognition Cameras
|
Aug 10, 2020 |
How Big Tech Collects Your Private Data and How to Delete It
|
Aug 03, 2020 |
Chinese Hacking Campaign Exposed, BadPower Fast Charger Attack, Instacart Data Leak
|
Jul 27, 2020 |
Privacy Settings for Amazon Echo and Google Home
|
Jul 24, 2020 |
The Big Twitter Hack, Critical Windows DNS Server Update, Email Impersonation Attacks
|
Jul 20, 2020 |
F5 BIG-IP Exploit, WiFi Router Security Updates, Password Reuse
|
Jul 13, 2020 |
TikTok Privacy Concerns, macOS Ransomware, Bad Passwords
|
Jul 06, 2020 |
EARN IT Act, Facial Recognition Fail, Can I Be Phished?
|
Jul 01, 2020 |
Family Safety and Security with Andy Murphy from The Secure Dad Podcast
|
Jun 29, 2020 |
Largest DDoS Attack Ever, New Dropbox Features, North Korean Cyber-Attacks
|
Jun 22, 2020 |
5 Tips to Stay Private and Secure During a Protest
|
Jun 15, 2020 |
Minneapolis Police Website Hacked, Zoom Encryption, eBay Port Scanning
|
Jun 08, 2020 |
First Amendment Rights and Twitter, Encryption Backdoors
|
Jun 01, 2020 |
Episode 100 with Rachel Tobac and Kathleen Smith
|
May 29, 2020 |
Apple’s Law Enforcement Backdoor Dispute, Signal PINs, EasyJet Data Breach
|
May 25, 2020 |
Thunderbolt Flaws, WordPress Plugin Vulnerabilities, Patriot Act Vote
|
May 18, 2020 |
GoDaddy Security Incident, Fake Downloaders, Firefox Lockwise
|
May 11, 2020 |
Workplace Surveillance, Apple and Google Contact Tracing Tech, Virtual Cybersecurity Conferences
|
May 04, 2020 |
The End of Passwords as We Know It
|
Apr 27, 2020 |
Contact Tracing Controversy, Fighting COVID-19 Criminal Activity
|
Apr 24, 2020 |
Zoom Hacked Accounts, North Korean Hackers, Facebook Senior Pictures
|
Apr 20, 2020 |
Contact Tracing Apps, Business Email Compromise Scams, SPAM Phone Calls
|
Apr 13, 2020 |
Another Marriott Data Breach, Zoom-Bombing, Economic Stimulus Scams
|
Apr 06, 2020 |
Staying Secure When Working From Home
|
Mar 30, 2020 |
Click Armor Demo, Podcast Survey Results, Google Geofence Warrants
|
Mar 25, 2020 |
COVID-19 Mass Surveillance, New Coronavirus Cyber-Attacks, Encryption Backdoors
|
Mar 23, 2020 |
COVID-19 Cybersecurity Impact, Hacking the Hackers, Whisper App Data Leak
|
Mar 16, 2020 |
IoT Device Attacks, FCC Fines Mobile Carriers, Let’s Encrypt Certificate Bug
|
Mar 09, 2020 |
You’ve Been Hacked! Now What?
|
Mar 02, 2020 |
Ring Mandates Two-Factor Authentication, License Plate Reader Data Sharing, RSA Conference Coronavirus Fears
|
Feb 24, 2020 |
Chinese Hackers, Coronavirus Phishing Attacks, How to Stay (Almost) Anonymous Online
|
Feb 21, 2020 |
Equifax Hacked by China, Israeli Voter Registry Exposed, How the CIA Owned Encryption
|
Feb 17, 2020 |
Preventing Tax Identity Theft, FTC and Robocallers, Google Photos Incident
|
Feb 10, 2020 |
Off-Facebook Activity Tool, Ring App Third-Party Trackers, Wawa Credit Card Breach
|
Feb 03, 2020 |
Voting by Smartphone, Jeff Bezos Hacked, Microsoft Security Breach
|
Jan 31, 2020 |
Dark Web Fraud and Cybercrime with Emily Wilson
|
Jan 27, 2020 |
Critical Windows Vulnerability, Dating App Security Risk, Apple iOS Privacy Features
|
Jan 20, 2020 |
Iranian Cyber-Attacks, Ring Class-Action Lawsuit, Preventing Calendar SPAM
|
Jan 13, 2020 |
New California Data Privacy Law, Wyze Data Leak, ToTok Spy App
|
Jan 06, 2020 |
Top 10 Cybersecurity and Privacy Resolutions
|
Dec 30, 2019 |
Rebecca Herold “The Privacy Professor”
|
Dec 27, 2019 |
The Year in Review and 2020 Predictions with Kevin Johnson
|
Dec 23, 2019 |
The Password Reuse Problem, US Government IoT Recommendations, Smart Lock Security Disaster
|
Dec 16, 2019 |
How You’re Tracked Online, New Mass Surveillance Concerns, Malicious Android App Hijack
|
Dec 09, 2019 |
Top 25 Most Dangerous Vulnerabilities, Smart City Privacy, DuckDuckGo vs. Google
|
Dec 06, 2019 |
Phone and Voice Fraud, Twitter Account Purge, Adobe Magento Marketplace Data Breach
|
Dec 02, 2019 |
Disney+ Hacked Accounts, Black Friday Scams, Android Camera Exploits
|
Nov 25, 2019 |
Google’s Health Record Storage Controversy, US Border Search Ruling, Zelle Scams
|
Nov 18, 2019 |
Facebook Data Leaks, Smart Speaker Laser Attack, BlueKeep in the Wild
|
Nov 11, 2019 |
WhatsApp’s NSO Group Lawsuit, This Week in Data Breaches, Office 365 Voicemail Phishing
|
Nov 04, 2019 |
Firewalla Review, 15 Most Dangerous Apps for Kids, Rise of the Deepfake
|
Nov 01, 2019 |
Nord VPN Security Incident, Smart Speaker Phishing, Apple iOS 13 Privacy Features
|
Oct 28, 2019 |
Pitney Bowes Ransomware Attack, Samsung Galaxy S10 Fingerprint Bypass, Top Technology Fears
|
Oct 21, 2019 |
Hong Kong Protests, Instagram’s Anti-Phishing Tool, Smart Device Fail
|
Oct 14, 2019 |
Microsoft OneDrive Personal Vault, Google’s New Privacy and Security Controls, REAL ID Deadline
|
Oct 07, 2019 |
Amazon Smart Glasses, Webkey Social Engineering, Erase Your Old Hard Drives!
|
Oct 01, 2019 |
DoorDash Data Breach, Voice Assistant Privacy Changes, Limiting Ad Tracking
|
Sep 30, 2019 |
Aaron Zar, Co-Founder and CEO of Silent Pocket
|
Sep 27, 2019 |
Apple iOS 13, Venmo Scams, Simjacking Attacks
|
Sep 23, 2019 |
End-to-End Encryption with Max Krohn from Keybase.io
|
Sep 16, 2019 |
New Firefox Privacy Protections, Apple iOS Zero-Days, Facebook User Phone Numbers Exposed
|
Sep 09, 2019 |
Android “Ghost Click” Apps, New Apple Siri Privacy Protections, Credit Card Spying
|
Sep 02, 2019 |
10 Year Anniversary Episode with Kevin Johnson and Jayson E. Street
|
Aug 29, 2019 |
New Facebook Privacy Controls, Apple iOS Patching Mistake, MoviePass Data Breach
|
Aug 26, 2019 |
Biometric Security Data Breach, Critical Windows Vulnerabilities, FBI Data Harvesting
|
Aug 19, 2019 |
BSides Las Vegas, iMessage Exploit, 5G and Stingray Surveillance
|
Aug 12, 2019 |
Capital One Data Breach, Equifax Settlement Payouts, Nextdoor App Scams
|
Aug 05, 2019 |
Medical Device Security with Special Guest John Nye
|
Jul 30, 2019 |
Equifax Settlement, Android Video File Exploit, Encryption Backdoors
|
Jul 29, 2019 |
FaceApp Privacy Panic, Facebook’s 5 Billion Dollar Fine, Amazon Brushing Scams
|
Jul 22, 2019 |
Zoom Zero-Day, GDPR Fines, Google Assistant Recordings
|
Jul 15, 2019 |
Amazon Alexa Recordings, Facebook Malware Campaign, Top 3 Tips to Stay Private on Vacation
|
Jul 08, 2019 |
US Cyber-Attack on Iran, Poor Government Cybersecurity, Malvertising Campaigns
|
Jul 01, 2019 |
The Home Security Episode – Locks, Doors, Cameras, and More!
|
Jun 27, 2019 |
Facebook’s New Cryptocurrency, Firefox Zero Day, Smart TV Malware
|
Jun 24, 2019 |
US Customs and Border Protection Data Breach, Sign in with Apple, Leaked Facebook Emails
|
Jun 17, 2019 |
Quest Diagnostics Data Breach, Google’s Network Outage, US Visa Applicants and Social Media Names
|
Jun 10, 2019 |
Ransomware Rampage, Mobile Phishing Attacks, iPhone App Ad Trackers
|
Jun 03, 2019 |
Equifax Downgraded, Huawei Ban, Google is Tracking Your Purchases
|
May 27, 2019 |
Remotely Killing Car Engines, Password Expiration Policies, Facial Recognition at Airports, InfoSec vs. Cybersecurity
|
May 24, 2019 |
Critical WhatsApp Vulnerability, Facial Recognition Ban, Wormable Flaw in Windows
|
May 20, 2019 |
Israel Cyber-Attack Bombing, New Google Privacy Settings, Traditional Mail Blackmail Scam
|
May 13, 2019 |
The End of Password Expiration Policies, Seat-Back Camera’s on Airplanes, Unknown Data Breach
|
May 06, 2019 |
All about VPN’s with Gaya Polat from vpnMentor
|
Apr 29, 2019 |
The State of Cybersecurity Training and Certifications with Kevin Johnson
|
Apr 25, 2019 |
Microsoft Email Hacked, Instagram Nasty List Phishing Scam, Facebook Third-Party Data Deals
|
Apr 22, 2019 |
Amazon Echo Recording Controversy, New Mobile Phone Scam, Hotels Leaking Data
|
Apr 15, 2019 |
Facebook’s Bad Week, Stalkerware, Tax Season Scams
|
Apr 08, 2019 |
Apple Card, ASUS Live Update Backdoor, Statistics on Malware Attacks
|
Apr 01, 2019 |
Facebook Passwords Exposed, Android Q Privacy, Microsoft Office Targeted
|
Mar 25, 2019 |
Verifications.io Data Breach, Capsizing a Ship with a Cyberattack, World’s Most Dangerous Malware
|
Mar 25, 2019 |
Equifax and Marriott Data Breach Updates, Facial Recognition at the Airport, Citrix Password Spraying Attack
|
Mar 18, 2019 |
Google Chrome Zero-Day, Facebook Phone Number Privacy, NSA Phone Data Collection Program
|
Mar 11, 2019 |
Multi-Factor Authentication, New Attacks on 4G and 5G Mobile Networks
|
Mar 04, 2019 |
Google Nest’s Secret Microphone, Facebook Login Phishing, Password Manager Vulnerabilities
|
Feb 25, 2019 |
Preventing Illegal Robocalls, Webcam Spying, Dating App Account Hacking
|
Feb 18, 2019 |
Artificial Intelligence in Cybersecurity, Apple FaceTime Bug, Nest Camera Passwords
|
Feb 13, 2019 |
DNA Testing and the FBI, $198 Million Dollar Cryptocurrency Password, Password Checkup Chrome Extension
|
Feb 11, 2019 |
Massive Apple FaceTime Privacy Bug, Selling Your Privacy for Money, Insecure Smart Light Bulbs
|
Feb 04, 2019 |
The Lack of US Privacy Regulations, Nest Camera’s Hijacked
|
Jan 28, 2019 |
Ring Doorbell Privacy Concerns, Recent Password Breach News, Biometrics and Fifth Amendment Rights
|
Jan 21, 2019 |
US Government Shutdown, Privacy at CES 2019, Mobile Location Data Controversy
|
Jan 14, 2019 |
Cybersecurity Careers, Recruiting, and Volunteering with Kathleen Smith
|
Jan 09, 2019 |
Newspaper Ransomware Attack, How Facebook Tracks You on Android, USB-Type-C Authentication
|
Jan 07, 2019 |
Phishing Attack Targeting Two-Factor Authentication, Amazon Echo Eavesdropping, Netflix Email Scam – WB49
|
Dec 31, 2018 |
The Year in Review and 2019 Predictions with Special Guest Kevin Johnson
|
Dec 26, 2018 |
Healthcare Databases Exposed, Facebook’s Photo API Bug, Signal Speaks Out – WB48
|
Dec 24, 2018 |
Equifax Data Breach Details Released, More Google+ API Bugs, Supermicro Strikes Back – WB47
|
Dec 17, 2018 |
The Quora Data Breach, Facebook’s Private Emails, Google Location Tracking – WB46
|
Dec 10, 2018 |
Massive Marriott Data Breach, Secure Holiday Shopping Tips, Phishing Sites Using HTTPS – WB45
|
Dec 03, 2018 |
Special Guest Tanya Janca, DevOps and AppSec, Women in Cybersecurity – #82
|
Nov 30, 2018 |
Vehicle Infotainment Privacy, Instagram’s Accidental Password Exposure, Firefox Monitor – WB44
|
Nov 26, 2018 |
Harry Sverdlove, Edgewise Founder and CTO – Special Edition
|
Nov 23, 2018 |
USPS Informed Delivery Vulnerabilities, Holiday Credit Card Fraud, Huge SMS Database Leak – WB43
|
Nov 19, 2018 |
Midterm Election Security, Gait Recognition Surveillance Technology, Caller ID Authentication – WB42
|
Nov 12, 2018 |
Microsoft and Apple Security Updates, Signal’s Sealed Sender, Girl Scouts Data Breach – WB41
|
Nov 05, 2018 |
Fortnite Scams, Google Search Privacy, Bloomberg SuperMicro Controversy – #81
|
Oct 31, 2018 |
Spy Apps and Stalkerware with Special Guest Jeff Tang – WB40
|
Oct 29, 2018 |
Hotel Room Security and Privacy with Special Guest Patrick McNeil – WB39
|
Oct 22, 2018 |
Google+ Shutdown, Weapons Systems Vulnerabilities, Voice Phishing Scams – WB38
|
Oct 15, 2018 |
Chinese Spying, Facebook Shadow Contact Information, iPhone X FaceID Privacy – WB37
|
Oct 08, 2018 |
Facebook’s Fake Account Crackdown, Privacy Upgrade to HTTPS, New Security Features in Apple iOS 12 – WB36
|
Oct 01, 2018 |
Mobile Phone Call Scams, Pegasus Mobile Spyware, Newegg Data Breach – WB35
|
Sep 24, 2018 |
Malware-Less Email Attacks, Equifax Breach Updates, Vizio Class Action Lawsuit
|
Sep 17, 2018 |
Episode 80 – Special Guest Chris Hadnagy and Social Engineering The Science of Human Hacking
|
Sep 13, 2018 |
Five Eyes Security Alliance, Google and Your Offline Purchases, Privacy by Default in Firefox
|
Sep 10, 2018 |
US Federal Privacy Law, WhatsApp Google Drive Warning, Improved Security for Instagram
|
Sep 03, 2018 |
Election Hacking and Vulnerable Voting Machines
|
Aug 31, 2018 |
New TSA Body Scanners, Back to School Cybersecurity, Instagram Hacking
|
Aug 27, 2018 |
The Shared Security Weekly Blaze – ATM Cashout Attacks, Mobile Phone Voicemail Security, Google Location Tracking
|
Aug 20, 2018 |
The Shared Security Weekly Blaze – Facebook and your Financial Transactions, Smart Home Security, Critical HP Printer Vulnerabilities
|
Aug 13, 2018 |
The Shared Security Weekly Blaze – Quiet Skies TSA Surveillance Program, SIM Hijacking and the Reddit Data Breach, Sextortion Scams
|
Aug 06, 2018 |
The Shared Security Weekly Blaze – Bluetooth Vulnerabilities, Malicious Apps Removed from Twitter, Gmail Confidential Mode
|
Jul 30, 2018 |
The Shared Security Podcast Episode 78 – Summer Camp Facial Recognition, Dark Web Dangers
|
Jul 26, 2018 |
The Shared Security Weekly Blaze – Lost and Stolen Devices, Instagram and SIM Hijacking, LabCorp Security Breach
|
Jul 23, 2018 |
The Shared Security Weekly Blaze – Polar Fitness App Location Data Exposed, Blocking Scam Phone Calls, Samba TV Privacy Controversy
|
Jul 16, 2018 |
The Shared Security Weekly Blaze – Mobile App Data Leaks, The California Privacy Act, Third-party Gmail Access
|
Jul 09, 2018 |
The Shared Security Weekly Blaze – New WPA3 Wireless Standard, Malicious Smartphone Batteries, Exactis Data Leak
|
Jul 02, 2018 |
The Shared Security Podcast Episode 77 – Personal Risk Assessments, Stingray Surveillance Devices
|
Jun 29, 2018 |
The Shared Security Weekly Blaze – MyLobot Malware, Updates on Third-Party Location Data Sharing, Fortnite Scam Websites
|
Jun 25, 2018 |
The Shared Security Weekly Blaze – Ultrasonic Hard Drive Attacks, Dangerous USB Devices, Email Fraudsters Arrested
|
Jun 18, 2018 |
The Shared Security Weekly Blaze – MyHeritage Data Breach, Facebook’s Data Sharing Partnership, Apple iOS 12 and macOS Updates
|
Jun 11, 2018 |
The Shared Security Weekly Blaze – Telegram Messenger in Russia, Amazon’s Facial Recognition Technology, Digital License Plates
|
Jun 04, 2018 |
The Shared Security Weekly Blaze – Real-time Location Tracking, VPNFilter Router Malware, Apple’s GDPR Updates
|
May 28, 2018 |
The Shared Security Weekly Blaze – Efail Vulnerabilities and PGP Encryption, Facebook’s App Investigation, Nest Password Notifications
|
May 21, 2018 |
The Shared Security Weekly Blaze – Recent Windows Vulnerabilities, Exposed Passwords, Credit Freeze Controversy
|
May 14, 2018 |
The Shared Security Podcast Episode 76 – Special Guest Kevin Johnson (@secureideas), Router Hacking, GDPR, NSA Metadata
|
May 10, 2018 |
The Shared Security Weekly Blaze – DNA Privacy, This Week’s Social Media Privacy News Roundup, Remote Car Hacking
|
May 07, 2018 |
The Shared Security Weekly Blaze – Child Identity Fraud, Tech Support Scams, Amazon Key In-Car Delivery
|
Apr 30, 2018 |
The Shared Security Weekly Blaze – Android’s Toxic Hellstew of Vulnerabilities, Facebook’s New Privacy Controls, Russian Router Hacking
|
Apr 23, 2018 |
The Shared Security Podcast Episode 75 – Cybersecurity Education with Gotham Sharma (@g0thamsharma) and Dr. Brian Krupp (@briankrupp)
|
Apr 19, 2018 |
The Shared Security Weekly Blaze – Facebook goes to Congress, More Data Breach Announcements, New Hope for Replacing Passwords
|
Apr 16, 2018 |
The Shared Security Weekly Blaze – The #DeleteFacebook Movement, Cloudflare’s New Privacy Focused DNS Service, Saks Fifth Avenue and Panera Data Breaches
|
Apr 09, 2018 |
The Shared Security Weekly Blaze – Facebook’s Privacy Firestorm, MyFitnessPal Data Breach, Ramifications of CLOUD and FOSTA
|
Apr 02, 2018 |
The Shared Security Podcast Episode 74 – Special Guest Rachel Tobac (@RachelTobac)
|
Mar 29, 2018 |
The Shared Security Weekly Blaze – Facebook and the Cambridge Analytica Controversy, Vulnerable VPNs, Siri Lock Screen Privacy
|
Mar 26, 2018 |
The Shared Security Weekly Blaze – The Insecure Internet of Things, Spectre Patch Updates, Android Malware
|
Mar 19, 2018 |
The Shared Security Weekly Blaze – Malicious Healthcare Workers, New Attacks on Mobile Networks, Facebook Messenger for Kids
|
Mar 12, 2018 |
The Shared Security Weekly Blaze – Facebook Face Recognition, Private Web Browsing, Credit Card Fraud
|
Mar 05, 2018 |
The Shared Security Weekly Blaze – AI Enabled Privacy Policies, New Android Updates, Hotel Room Inspections
|
Feb 26, 2018 |
The Shared Security Weekly Blaze – Instagram Social Stalking, Cryptojacking, Equifax Breach Updates
|
Feb 19, 2018 |
The Shared Security Podcast Episode 73 – Silent Pocket Faraday Laptop Sleeve Review, Password Managers, Smart Glasses
|
Feb 16, 2018 |
The Shared Security Weekly Blaze – Tax Season Scams, SIM Hijacking, Smart TV Privacy
|
Feb 12, 2018 |
The Shared Security Weekly Blaze – License Plate Tracking, Jackpotting ATMs, Strava Global Heatmap Controversy
|
Feb 05, 2018 |
The Shared Security Podcast Episode 72 – Mobile Phone Emergency SOS, Overview of Meltdown and Spectre
|
Jan 31, 2018 |
The Shared Security Weekly Blaze – Dark Caracal, Meltdown and Spectre Debacle, Amazon Go
|
Jan 29, 2018 |
The Shared Security Podcast Episode 71 – Special Guest Rebecca Herold “The Privacy Professor” (@PrivacyProf)
|
Jan 04, 2018 |
The Shared Security Podcast Episode 70 – Insider Threat Psychology with Special Guest Dr Helen Ofosu
|
Dec 14, 2017 |
The Shared Security Podcast Episode 69 – Amazon Key, KRACK and DUHK Attacks, New Devices to Steal a Car
|
Nov 07, 2017 |
The Shared Security Podcast Episode 68 – Special Guest Chris Hadnagy, Innocent Lives Foundation, Social Engineering
|
Oct 09, 2017 |
The Shared Security Podcast Episode 67 – SpamBot Exposed, Mobile App Tracking, Smart Lock Fail
|
Sep 11, 2017 |
The Shared Security Podcast Episode 66 – Ring Doorbell Camera Review, Traffic Apps, Amazon Echo
|
Aug 01, 2017 |
The Shared Security Podcast Episode 65 – Smart TV Hacks, New Privacy Concerns, Phishing for Selfies
|
Jul 07, 2017 |
The Shared Security Podcast Episode 64 – Ultrasonic Ads, Home Security Vulnerabilities, Printer Tracking Dots
|
Jun 09, 2017 |
The Shared Security Podcast Episode 63 – Special Guest Jayson E. Street, Misconceptions About VPNs
|
May 02, 2017 |
The Shared Security Podcast Episode 62 – CloudBleed, Wifi Risks, ATM Skimmers
|
Mar 09, 2017 |
The Shared Security Podcast Episode 61 – Home Device Hijacking, Used Device Security, Creepy Facebook Search Tool
|
Feb 21, 2017 |
The Shared Security Podcast Episode 60 – The Secure Messaging Episode: Signal, WhatsApp, Facebook Messenger
|
Feb 02, 2017 |
The Shared Security Podcast Episode 59 – Amazon Echo, Wifi Router Security, EFF Privacy Badger
|
Jan 13, 2017 |
The Shared Security Podcast Episode 58 – Snapchat Spectacles, Mobile Number Privacy, PoisonTap
|
Nov 30, 2016 |
The Shared Security Podcast Episode 57 – Dropbox and Yahoo Breach, IoT DDoS, LinkedIn Endorsements
|
Oct 19, 2016 |
The Shared Security Podcast Episode 56 – Chat Bots, Self-Driving Cars, Bitmoji Keyboards
|
Aug 30, 2016 |
The Shared Security Podcast Episode 55 – IoT Horror Stories, Biometrics, Staying Safe Online
|
Jul 16, 2016 |
The Shared Security Podcast Episode 54 – Facebook Ad Privacy, Password Breaches, Random USBs
|
Jun 03, 2016 |
The Shared Security Podcast Episode 53 – The VPN Episode, AI Gone Bad, Google Nest
|
May 16, 2016 |
The Shared Security Podcast Episode 52 – Creepy New Social Network, Phishing Dangers, Ransomware
|
Mar 18, 2016 |
The Shared Security Podcast Episode 51 – Online Behavioral Advertising in Canada, Toy Security, Dangerous Apps for Teens
|
Feb 19, 2016 |
The Shared Security Podcast Episode 50 – Facebook Quizzes, Pre-Crime, Wireless Home Security Systems
|
Jan 23, 2016 |
The Shared Security Podcast Episode 49 – Google Search Privacy, Smart TV Attacks, Internet Router Risks
|
Dec 17, 2015 |
The Shared Security Podcast Episode 48 – Password Manager Compromise, Fingerprint Insecurity, Quitting Social Media
|
Nov 24, 2015 |
The Shared Security Podcast Episode 47 – Celebrity Impersonations, Social Media and Kids, EU Safe Harbor
|
Oct 30, 2015 |
The Shared Security Podcast Episode 46 – Peeple App, Medical Devices Exposed, Instagram for Doctors
|
Oct 08, 2015 |
The Shared Security Podcast Episode 45 – Implantable Wearables, Spotify Privacy, Hacking Self-Driving Cars
|
Sep 25, 2015 |
The Shared Security Podcast Episode 44 – Facebook Data, Apple Watch, Android, Amazon Dash Buttons
|
Sep 03, 2015 |
The Shared Security Podcast Episode 43 – Car Hacking, IoT Risks, Facebook Scams, SmartTV Privacy
|
Aug 14, 2015 |
The Shared Security Podcast 42 – Car Theft, Risky Apps, Facebook Security Checkup
|
Jul 14, 2015 |
Social Media Security Podcast 41 – Podcast Updates, Internet of Things, TV Privacy
|
May 15, 2015 |
Social Media Security Podcast 40 – ThreatExchange, Echosec, Facebook Scams
|
Mar 16, 2015 |
Social Media Security Podcast 39 – Snapcash, Yik Yak, LinkedIn Security and Privacy Tips
|
Dec 12, 2014 |
Social Media Security Podcast 38 – Corporate Policy, Whisper Privacy Flaws, Snapchat Hack
|
Nov 05, 2014 |
Social Media Security Podcast 37 – Special Guest Kevin Johnson (@Secureideas), Managing Your Digital Footprint
|
Oct 02, 2014 |
Social Media Security Podcast 36 – Your Cats Metadata, Facebook Messenger, User Risk Awareness
|
Aug 26, 2014 |
Social Media Security Podcast 35 – Facebook News Feed Psychology, Complex Passwords, Dumb Criminals
|
Jul 24, 2014 |
Social Media Security Podcast 34 – Facebook Privacy, LinkedIn Scammers, Naughty Employees
|
Jul 01, 2014 |
Social Media Security Podcast 33 – Heartbleed, Hashtag Fail, Social Impersonation
|
May 22, 2014 |
Social Media Security Podcast 32 – The Privacy Paradox, Twitter Hacks, Facebook Home
|
May 02, 2013 |
Social Media Security Podcast 31 – New Facebook Graph Search, Fake Internet Girlfriends, Social Media and Your Business
|
Jan 30, 2013 |
Social Media Security Podcast 30 – The Password Episode
|
Sep 25, 2012 |
Social Media Security Podcast 29 – Fake Bieber, Facebook Social Engineering Tool, MySpace Who?
|
Aug 21, 2012 |
Social Media Security Podcast 28 – Facebook Timeline, US Privacy Questions, Twitter Acquisitions
|
Apr 19, 2012 |
Social Media Security Podcast 27 – Facebook Friend Unlock, The Anti-Facebook, Facebook Games
|
Nov 24, 2011 |
Social Media Security Podcast 26 – Google +, New Facebook Privacy Controls, FBPwn Tool
|
Sep 20, 2011 |
Social Media Security Podcast 25 – Facebook Security Updates, FaceNiff, Social Media Background Checks
|
Jul 12, 2011 |
Social Media Security Podcast 24 – Personal Social Media Accounts, Cree.py, ProfileSpy, App Privacy
|
Apr 15, 2011 |
Social Media Security Podcast 23 – Recent Changes to Facebook, Enterprise Social Media Tools, Spokeo
|
Mar 02, 2011 |
Social Media Security Podcast 22 – Skype Email, Taxonomy of Socnet Data, Facebook Graph API
|
Jan 27, 2011 |
Social Media Security Podcast 21 – Facebook Trolls, Cookie Monster, Gawker Breach
|
Dec 27, 2010 |
Social Media Security Podcast 20 – FireSheep, Privacy in the US, What NOT To Post On Facebook
|
Nov 08, 2010 |
Social Media Security Podcast 19 – New Changes to Facebook, Social Media Risk Survey, LinkedIn Scams
|
Nov 01, 2010 |
Social Media Security Podcast 18 – RFID and Facebook, Hacking Facebook Places, MySpace Privacy
|
Sep 10, 2010 |
Social Media Security Podcast 17 – ICanStalkU, QR Codes, Facebook directory via Torrent, LinkedIn CAPTCHA’s
|
Aug 15, 2010 |
Social Media Security Podcast 16 – Diaspora News, FTC and Twitter, Twitter XSS, Facebook App Permissions
|
Jul 05, 2010 |
Social Media Security Podcast 15 – Current Facebook Security Issues, New Privacy Tools, Likejacking, Formspring, Social Media at Work
|
Jun 19, 2010 |
Social Media Security Podcast 14 – Recent Facebook Hacks and Controversy, Diaspora, Swipely
|
May 21, 2010 |
Social Media Security Podcast 13 – Details on the recent changes to Facebook, Blippy CC issue, Bye bye Basic Auth
|
May 04, 2010 |
Social Media Security Podcast 12 – New Facebook Privacy Changes, Social Gaming Threats, Social Media in the Workplace
|
Apr 01, 2010 |
Social Media Security Podcast 11 – Google Buzz, Geostalking, Twitter’s Phishing Filter
|
Mar 20, 2010 |
Social Media Security Podcast 10 – Shmoocon, Geo-Location, Social Media Policies, CyberStalking
|
Feb 13, 2010 |
Social Media Security Podcast 9 – Defensio, Blippy.com, Relationships and Social Media
|
Jan 30, 2010 |
Social Media Security Podcast 8 – Would You Commit Social Media Suicide?
|
Jan 12, 2010 |
Social Media Security Podcast 7 – New Facebook Privacy Settings, Twitter Lists, FTC and Bloggers
|
Dec 23, 2009 |
Social Media Security Podcast 6 – Privacy, Photo Tagging, Facebook Police, What is Clickjacking
|
Dec 09, 2009 |
Social Media Security Podcast 5 – Google Reader, Privacy, Wave, ChromeOS and Foursquare
|
Nov 24, 2009 |
Social Media Security Podcast 4 – Death by Twitter, Open Source Intelligence, Policies, Google Wave
|
Nov 07, 2009 |
Social Media Security Podcast 3 – Phishing and Koobface, What is CSRF, Protected Tweets
|
Oct 25, 2009 |
Social Media Security Podcast 2 – Month of Facebook Bugs, What is XSS, Canadian Privacy Ruling
|
Sep 27, 2009 |
Social Media Security Podcast 1 – Zombies, Bad Facebook Apps, Twitter SPAM
|
Aug 25, 2009 |