Alyssa Miller: Charting the Course Through InfoSec and Aviation
Tom Eston | | Alyssa Miller, aviation, Business, career, CISO, Cloud, Cloud Security, conference, Cyber Security, Cybersecurity, Cybersecurity Industry, Data Privacy, Digital Privacy, Episodes, hacker, HR, Information Security, Infosec, jobs, Pilot, Podcast, Podcasts, Privacy, recruiting, security, technology, Weekly Edition
In this episode, special guest Alyssa Miller joins the hosts for an insightful and entertaining conversation covering a broad range of topics from social engineering anecdotes involving Kevin Johnson to Alyssa’s journey ...
The TikTok Ban Bill, Your Car is Spying on You, Signal’s Username Update
Tom Eston | | Cyber Security, Cybersecurity, Data Privacy, Digital Privacy, Episodes, Federal Privacy Law, Information Security, Infosec, insurance, Insurance Companies, messaging, phone numbers, Podcast, Podcasts, Privacy, secure messaging, security, signal, surveillance, technology, TikTok, TikTok Ban, tracking, US government, usernames, Weekly Edition
In episode 321, the hosts discuss how connected cars are sharing driving data with insurance companies, potentially leading to increased rates for drivers. They also talk about the anti-TikTok bill passed by ...
Who’s to Blame for Hacked Social Media Accounts, Spoofed Online Meeting Requests and Malware
Tom Eston | | account hacking, Cyber Security, Cybersecurity, Data Privacy, Digital Privacy, Episodes, facebook, google, hacked, Hacking, Information Security, Infosec, Instagram, Malware, Meeting Invite, Meta, Microsoft Teams, online, Podcast, Podcasts, Privacy, rat, RATs, remote-access Trojan, security, social media, Spoofed Online Meetings, spoofing, Teams, technology, Weekly Edition, Zoom
In episode 320, Tom and Scott discuss the contentious issue of who is accountable when Facebook or Instagram accounts are hacked, discussing potential failings on both the user’s and Meta’s part. They ...
Don’t Trust Your AI Girlfriend or Boyfriend, Exposing US Government Data Collection
Tom Eston | | AI, AI Boyfriend, AI Chat Bot, AI Companion, AI Girlfriend, Chat Bot, Cyber Security, Cybersecurity, data, Data Brokers, Data Collection, Data Privacy, Digital Privacy, Episodes, Information Security, Infosec, Podcast, Podcasts, Privacy, security, surveillance, technology, Trust, US government, Weekly Edition
In Episode 319, Tom and Kevin discuss the potential data privacy risks associated with having an AI ‘girlfriend’ or ‘boyfriend’ and why one should refrain from sharing their personal data with such ...
‘Get to Know Me’ Privacy Risks, Pros and Cons of Publicly Sharing Ring Doorbell Footage
Tom Eston | | amazon, Camera Footage, Cyber Security, Cybersecurity, Data Privacy, Digital Privacy, Doorbell Camera, Episodes, Get to know me, Information Security, Infosec, Instagram, Neighbors, Neighbors App, Podcast, Podcasts, police, Privacy, Ring, Ring Doorbell, security, social media, social network, technology, Warrant, Weekly Edition
In episode 318, we discuss the trending ‘get to know me’ posts on social media platforms like Instagram and the potential risks of sharing personal information publicly, particularly in light of potential ...
25.6 Million Dollar Deepfake Scam, Exploring Canada’s Flipper Zero Ban
Tom Eston | | AGI, AI, canada, Canadian Government, Car Thefts, cars, Cyber Security, Cybersecurity, Data Privacy, deepfake, deepfakes, Digital Privacy, Episodes, Flipper Zero, Information Security, Infosec, Podcast, Podcasts, Privacy, scam, Scams, security, Stolen Cars, technology, Thefts, Weekly Edition
In episode 317, Tom and Kevin discuss a reported deepfake scam that allegedly led to the theft of 25.6 million from a multinational company and Canada’s attempt to ban the Flipper Zero ...
Jason Haddix on Bug Bounties and Cybersecurity Career Growth
Tom Eston | | Arcanum Information Security, Bug Bounties, bug bounty, career, career growth, Cyber Security, Cybersecurity, cybersecurity career, Data Privacy, Digital Privacy, Episodes, Information Security, Infosec, Jason Haddix, jobs, mentors, Mentorship, Podcast, Podcasts, Privacy, security, technology, Weekly Edition
In episode 316, we have the pleasure to chat with Jason Haddix, a prominent influencer in the cybersecurity community. With an intriguing career path, from being a ‘computer kid’, venturing into the ...
The Problem of Victim Blaming in Cybersecurity: Empathy, Responsibility & Ethical Practices
Tom Eston | | 23andMe, Andra Zaharia, Cyber Empathy Podcast, Cyber Security, Cybersecurity, Data breach, Data Privacy, Digital Privacy, DNA, empathy, Episodes, Ethics, Information Security, Infosec, Pentest Tools, Podcast, Podcasts, Privacy, responsibility, security, technology, Victim Blaming, We Think We Know Podcast, Weekly Edition
In this episode of the Shared Security Podcast, we discuss the concerning issue of victim-blaming in cybersecurity with special guest, Andra Zaharia, host of the Cyber Empathy and We Think We Know ...
Secure Your iPhone: Exploring Stolen Device Protection
Tom Eston | | Apple iPhone, Cyber Security, Cybersecurity, Data Privacy, Digital Privacy, Episodes, Fraud, Information Security, Infosec, ios, iOS 17.3, mobile device, mobile phone, Podcast, Podcasts, Privacy, security, smartphone, smartphones, Stolen Device Protection, Stolen iPhone, Stolen Phone, technology, theft, Thief, Weekly Edition
In this episode, host Tom Eston provides a detailed explanation of the ‘Stolen Device Protection’ for iPhones – a new security feature by Apple. This feature triggers enhanced security factors such as ...
The World of Scambaiting, Preventing Social Media Account Takeovers, Network Wrenches Hacked
Tom Eston | | account takeover, account takeovers, Bosch Rexroth Handheld Nutrunner, Cyber Security, Cybersecurity, Data Privacy, Digital Privacy, Episodes, Fraud, Information Security, Infosec, Internet of things, iot, Kitboga, Malware, Phishing, Podcast, Podcasts, Privacy, Rachel Tobac, Ransomware, Scam Baiting, Scambaiting, Scammer Payback, scammers, Scams, security, social engineering, social media, technology, Twitter, Weekly Edition, X
In Episode 313, hosts Tom and Scott discuss the world of scambaiting, discussing what it is, the tactics used, and its effectiveness in stopping scammers. They talk about popular channels like Scammer ...