Alyssa Miller: Charting the Course Through InfoSec and Aviation

In this episode, special guest Alyssa Miller joins the hosts for an insightful and entertaining conversation covering a broad range of topics from social engineering anecdotes involving Kevin Johnson to Alyssa’s journey in aviation and being a pilot. They discuss the challenges within the cybersecurity industry, including the transition to ... Read More
How Your Car Shares Data with Insurers & TikTok Ban Impact

The TikTok Ban Bill, Your Car is Spying on You, Signal’s Username Update

In episode 321, the hosts discuss how connected cars are sharing driving data with insurance companies, potentially leading to increased rates for drivers. They also talk about the anti-TikTok bill passed by the House, which could force ByteDance to sell TikTok or face a ban in app stores. The episode ... Read More
Who's to Blame for Hacked Social Media Accounts?

Who’s to Blame for Hacked Social Media Accounts, Spoofed Online Meeting Requests and Malware

In episode 320, Tom and Scott discuss the contentious issue of who is accountable when Facebook or Instagram accounts are hacked, discussing potential failings on both the user’s and Meta’s part. They explore the possibility of inadequate security measures on these platforms and the implications of Meta potentially profiting from ... Read More
Privacy and AI Relationships: The Dangers of Trusting Your AI Girlfriend/Boyfriend

Don’t Trust Your AI Girlfriend or Boyfriend, Exposing US Government Data Collection

In Episode 319, Tom and Kevin discuss the potential data privacy risks associated with having an AI ‘girlfriend’ or ‘boyfriend’ and why one should refrain from sharing their personal data with such AIs. They engage in a humorous conversation about the unusual advertisements these AI companions attract, while expressing concerns ... Read More
Get to Know Me: The Social Media Trend and Its Privacy Risks

‘Get to Know Me’ Privacy Risks, Pros and Cons of Publicly Sharing Ring Doorbell Footage

In episode 318, we discuss the trending ‘get to know me’ posts on social media platforms like Instagram and the potential risks of sharing personal information publicly, particularly in light of potential misuse for password resetting. We recount a similar trend observed years ago when social media was in its ... Read More
25.6 Million Dollar Deepfake Scam, Exploring Canada's Flipper Zero Ban

25.6 Million Dollar Deepfake Scam, Exploring Canada’s Flipper Zero Ban

In episode 317, Tom and Kevin discuss a reported deepfake scam that allegedly led to the theft of 25.6 million from a multinational company and Canada’s attempt to ban the Flipper Zero device, believing it plays a role in auto thefts. They critique the Canadian government’s understanding of the device ... Read More

Jason Haddix on Bug Bounties and Cybersecurity Career Growth

In episode 316, we have the pleasure to chat with Jason Haddix, a prominent influencer in the cybersecurity community. With an intriguing career path, from being a ‘computer kid’, venturing into the nascent dark web, to becoming a respected figure in the Bug Bounty space, his journey is nothing short ... Read More
The Problem of Victim Blaming in Cybersecurity: Empathy, Responsibility & Ethical Practices

The Problem of Victim Blaming in Cybersecurity: Empathy, Responsibility & Ethical Practices

In this episode of the Shared Security Podcast, we discuss the concerning issue of victim-blaming in cybersecurity with special guest, Andra Zaharia, host of the Cyber Empathy and We Think We Know podcasts. Key topics include the societal issues within cybersecurity, the role of empathy in business and cybersecurity, leadership’s ... Read More
Protect Your iPhone from Theft: Stolen Device Protection Explained!

Secure Your iPhone: Exploring Stolen Device Protection

In this episode, host Tom Eston provides a detailed explanation of the ‘Stolen Device Protection’ for iPhones – a new security feature by Apple. This feature triggers enhanced security factors such as Face ID, Touch ID, and an hour-long security delay for critical actions when the phone is away from ... Read More

The World of Scambaiting, Preventing Social Media Account Takeovers, Network Wrenches Hacked

In Episode 313, hosts Tom and Scott discuss the world of scambaiting, discussing what it is, the tactics used, and its effectiveness in stopping scammers. They talk about popular channels like Scammer Payback and Kitboga that show these scams in progress. Then they switch to the best practices to prevent ... Read More