Shared Security cover art

All Episodes

Shared Security — 447 episodes

#
Title
1

Passwords Are Still Failing Us (World Password Day 2026)

2

Fake Party Invites and the Rise of Social Phishing Attacks

3

New York's 3D Printing Crackdown: Security or Surveillance?

4

Project Glasswing: When AI Becomes the Ultimate Hacker—and Defender

5

The Dark Web Explained with John Hammond

6

Meta & YouTube Found Negligent: A Turning Point for Big Tech?

7

The Hidden Tracking Risk Inside Your Tires

8

The Real State of Offensive Security: AI, Penetration Testing & The Road Ahead with Andrew Wilson

9

The Privacy Problem With Meta's Ray-Ban Smart Glasses

10

TikTok Says No to End-to-End Encryption: Here's Why That's a Big Deal

11

Claude Code Security: The AI Shockwave Hitting Cybersecurity

12

TikTok's New U.S. Deal and Privacy Policy: What Users Don't Understand

13

Ring's Search Party 'Dystopia' Debate & Claude Zero-Click RCE Vulnerability

14

OpenClaw & Moltbook: AI Agents and Cybersecurity Risks

15

Why Gen Z is Ditching Smartphones for Dumbphones

16

AirDrop Security in iOS 26.2: Time Limits, Codes & Privacy Best Practices

17

Ring's Facial Recognition Feature: Convenience or Privacy Nightmare?

18

Your Google Searches Aren't Private? PA Court's Surprising Ruling

19

AI and the End of the Traditional Entry-Level Tech Job

20

2025 Predictions: Hits, Misses & What We Learned

21

Why Networking Is Your Secret Weapon in Cybersecurity Job Hunting

22

The Hidden Threat in Your Holiday Emails: Tracking Pixels and Privacy Concerns

23

Seeing Is Not Believing: How to Spot AI-Generated Video

24

So You Want to Be a CISO? With vCISO and Security Justice Alum Chris Clymer

25

AI Agent Does the Hacking: First Documented AI-Orchestrated Cyber Espionage

26

OWASP Top 10 for 2025: What's New and Why It Matters

27

Meet NEO 1X: The Robot That Does Chores and Spies on You?

28

OpenAI's ChatGPT Atlas: What It Means for Cybersecurity and Privacy

29

It's Always DNS: Lessons from the AWS Outage

30

Is Sora 2 the Future of Video? AI, Copyright, and Privacy Issues

31

Age Verification Laws: A Privacy Disaster in the Making

32

Are Phishing Simulations Still Worth It in 2025?

33

Milestone Episode 400: Reflecting on 16 Years of Shared Security

34

Situational Awareness & Family Safety: Staying Alert in Today's World with Andy Murphy

35

Best of Shared Security (2020) History Repeats Itself: Cybersecurity Challenges that Still Haunt Us

36

Salesforce Under Fire: The Salesloft Drift Supply-Chain Breach

37

Convenience vs. Privacy: Can We Have Both?

38

Public Wi-Fi Myths: Why You're Probably Safer Than You Think

39

The Tea App Hack: How a "Safe" Space Leaked 13,000 ID Photos & 1.1M Messages

40

Random Smishing Text Scams: Why "Do I Know You?" Texts Are Dangerous

41

Leaked, Patched, and Still Hacked: The SharePoint Zero-Day Crisis

42

Doorbells, Dystopia, and Digital Rights: The Ring Surveillance Debate

43

Passwords and the Elderly: Why Writing Them Down Might Be OK

44

The Google Workspace Security Gap: Why Traditional Tools Fall Short

45

Autonomous Hacking? This Startup May Have Just Changed Penetration Testing Forever

46

Cybersecurity Talent Shortage: Myth, Mismatch, or Reality?

47

Kids Online Safety Act (KOSA): Protecting Kids or Censorship?

48

Cities of the Future or Hacker's Paradise? The Cybersecurity Risks of Smart Cities

49

Do You Really Need a REAL ID to Fly in the US? Breaking Down the Myths

50

Invasion of Privacy: The Hidden Camera Dilemma

51

When AI Fights Back: Threats, Ethics, and Safety Concerns

52

Mark Zuckerberg's Vision: AI Companions and the Loneliness Epidemic

53

Facebook Flaws and Privacy Laws: A Journey into Early Social Media Security from 2009

54

What Vibe Coding, MCP, and Slopsquatting Reveal About the Future of AI Development

55

The Impact of Politics on Cybersecurity: CVE's and the Chris Krebs Executive Order

56

Centralizing Data and Enhancing Workflows: Inside PlexTrac's New Capabilities

57

US Border Searches and Protesting in the Surveillance Age

58

The 23andMe Collapse, Signal Gate Fallout

59

Understanding Privacy Changes: eBay's AI Policy & The Future of Data Privacy

60

From Spreadsheets to Solutions: How PlexTrac Enhances Security Workflows

61

Tackling Data Overload: Strategies for Effective Vulnerability Remediation

62

Trump Administration and the Russian Cyber Threat, Firefox Privacy Changes

63

Cybersecurity Impact of DOGE, Apple's Stand Against Encryption Backdoors

64

Cybersecurity Insights with John Hammond: YouTube Legend and Security Researcher

65

UK's Secret Apple Backdoor Request, AI Chatbots Used For Stalking

66

Careers in Cybersecurity: Myths and Realities with Kathleen Smith

67

Privacy Concerns with Digital Driver's Licenses, The Rise of DeepSeek AI

68

Gravy Analytics Breach, Subaru Starlink Vulnerability Exposed

69

Meta Ditches Fact-Checking for Community Notes, RedNote and the TikTok Ban

70

AI Privacy Policies: Unveiling the Secrets Behind ChatGPT, Gemini, and Claude

71

Reflecting on Y2K: Lessons for the Next Tech Crisis and AI Safety

72

2024 Year in Review: What We Got Right and Looking to 2025

73

Digital License Plate Vulnerabilities, How to Avoid New Text Message Scams

74

Hack-for-Hire Campaign Targeting Climate Activists, Government Hypocrisy on Encryption

75

The Future of Secure Development: Insights from Tanya Janca

76

Australia Bans Social Media for Kids, Holiday Vishing Scams

77

Deepfake Fraud, Data Brokers Tracking Military Personnel

78

Why It's Time to Leave Twitter

79

Advanced Persistent Teenagers, Okta Bug Allowed Logins Without a Correct Password

80

Fallout from the Change Healthcare Breach, Mortgage Wire Fraud: What You Need To Know

81

Internet Archive Hacked, Introducing The AI Toilet Camera

82

Hacked Robot Vacuums, Secret Printer Tracking Dots

83

Emergency Satellite Messaging, Stagnation in User Cybersecurity Habits

84

Kia Security Flaw Exposed, NIST's New Password Guidelines

85

Discord's New End-to-End Encryption for Audio & Video, LinkedIn Using Your Data for AI Training

86

Supply Chain Sabotage: The Exploding Pager Incident, Instagram's New Teen Privacy Measures

87

The Rise of AI Voicemail Scams, Political Donation Privacy Concerns

88

Shocking SQL Injection in TSA App, Bitcoin ATM Scams Targeting Seniors

89

Telegram is NOT an Encrypted Messaging App!

90

Google's Monopoly: The Debate Heats Up, Amazon Alexa Privacy Tips

91

The Inefficiency of People-Search Removal Tools, Massive Data Breach Impacting U.S. Citizens

92

Exploring Cybersecurity Trends at Black Hat and DEF CON 2024 with Shourya Pratap Singh from SquareX

93

The Great CrowdStrike Crash, AI's Role in Employee Smiles

94

How SquareX is Redefining Web Security: An In-Depth Discussion with Chief Architect Jeswin Mathai

95

Deepfakes, AI, and the Future of Cybersecurity: Insights from Dan DeCloss of PlexTrac

96

Massive AT&T Data Breach Impact, Meta's Privacy Policy Updates

97

Authy Breach: What It Means for You, RockYou 2024 Password Leak

98

Critical SSH Vulnerability, Facial Recognition Flaws, How to Safely Dispose of Old Devices

99

The U.S. Bans Kaspersky Antivirus, WordPress Plugin Supply Chain Attacks

100

Exploring Cutting-Edge Browser Security with Vivek Ramachandran - Founder of SquareX

101

Social Media Warning Labels, Should You Store Passwords in Your Web Browser?

102

Citizen Lab vs. NSO Group, Apple AI and Privacy

103

Ticketmaster Data Breach and Rising Work from Home Scams

104

Sober in Cyber: Creating Alcohol-Free Networking in Cybersecurity

105

Microsoft's Copilot+ Recall Feature, Slack's AI Training Controversy

106

New Tracker Warning Features on iPhones & Androids, 2024 Verizon Data Breach Investigations Report

107

Live at RSA: AI Hype, Enhanced Security, and the Future of Cybersecurity Tools

108

FCC Fines Wireless Carriers $200 million, Google's Fight Against Malicious Apps

109

Navigating Privacy in Relationships, Phishing Down but Vulnerabilities Up?

110

Navigating Security Awareness in the Tech Industry with Erin Gallagher

111

Linux Backdoor Infection Scare, Massive Social Security Number Heist

112

Massive AT&T Data Leak & The Danger of Thread Hijacking

113

New Hotel Lock Vulnerabilities, Glassdoor Anonymity Issues

114

Alyssa Miller: Charting the Course Through InfoSec and Aviation

115

The TikTok Ban Bill, Your Car is Spying on You, Signal's Username Update

116

Who's to Blame for Hacked Social Media Accounts, Spoofed Online Meeting Requests and MalwareWho's to Blame for Hacked Social Media Accounts, Spoofed Online Meeting Requests and Malware

117

Don't Trust Your AI Girlfriend or Boyfriend, Exposing US Government Data Collection

118

'Get to Know Me' Privacy Risks, Pros and Cons of Publicly Sharing Ring Doorbell Footage

119

25.6 Million Dollar Deepfake Scam and Canada's Flipper Zero Ban

120

Jason Haddix on Bug Bounties and Cybersecurity Career Growth

121

The Problem of Victim Blaming in Cybersecurity: Empathy, Responsibility & Ethical Practices

122

Secure Your iPhone: Exploring Stolen Device Protection

123

The World of Scambaiting, Preventing Social Media Account Takeovers, Network Wrenches Hacked

124

Ohio's New Social Media Law, Meta's Link History Feature, 175 Million Passcode Guesses

125

Most Advanced iPhone Exploit Ever, Google's $5 Billion Settlement, Apple's Journal App

126

The Three Keys to Success in Cybersecurity

127

The Year in Review and 2024 Predictions

128

Password Security for the Elderly: Tips and Best Practices

129

iOS 17 NameDrop Debunking, Real World QR Code Attacks, Impact of Ransomware on Hospitals

130

Application Security Trends & Challenges with Tanya Janca

131

Apple Finally Adopts RCS, AI Powered Scams Targeting the Elderly

132

Paying Big Tech for Privacy, New Privacy Policy Study, Biden's Executive Order on AI

133

SEC vs. SolarWinds CISO, Classiscam Scam-as-a-Service

134

Okta Hacked Again, Quishing Is The New Phishing, Google Play Protect Real-Time Scanning

135

How to Opt Out of CPNI Data Sharing

136

Special Guest Jayson E. Street, Phantom Hacker Scams, 23andMe User Data For Sale

137

Educating the Next Cybersecurity Generation with Tib3rius

138

Your Car is a Privacy Nightmare, Password Creation Best Practices, Sony Hacked Again

139

Is My Boss Spying on Me, Instagram Painting Scam, Kia and Hyundai TikTok Challenge

140

Content Creation, Mental Health in Cyber, The MGM Ransomware Attack

141

The Changing Role of the CISO with Ryan Davis, Chief Information Security Officer at NS1

142

FBI's Qakbot Takedown, QR Code Phishing Attacks, Dox Anyone in America for $15

143

SaaS Attacks: Compromising an Organization without Touching the Network

144

Back to School Cybersecurity, Phishing Pitfalls and Strategies, X's (Twitter) Blocking Overhaul

145

Business Email Compromise Scams Revisited

146

The Current And Future State of Email Security with Andy Yen, CEO of Proton

147

Common Sense Advice for Hacker Summer Camp, AI Chatbot Attacks, What's a Flipper Zero?

148

Your Digital Immortality is Coming, Apple and Google Are Data Gatekeepers, Satellite Security Risks Revealed

149

Microsoft Lost Its Keys, Voice Cloning Scams, The Biden-Harris Cybersecurity Labeling Program

150

First Ban on Selling Location Data, Prohibiting Password Managers, Real-Time Crime Center Concerns

151

Meta's Threads and Your Privacy, Airline Reservation Scams, IDOR Srikes Back

152

MOVEit Cyberattack, The Problem with Password Rotations, Military Alert on Free Smartwatches

153

Security Podcasting, Hacking Stories, and Firmware Security with Paul Asadoorian

154

The FTC's Complaint Against Ring, Detecting Malware Infected Apps, America's Most Cybersecure Companies

155

How to Break Into a Cybersecurity Career – Phillip Wylie

156

Netflix Cracks Down on Password Sharing, AI Legal Research Gone Wrong, Fake Identities and Surveillance Firms

157

Meta's $1.3 Billion Fine, AI Hoax Hysteria, Montana's TikTok Ban

158

Google Now Supports Passkeys, Risky New Top Level Domains, Twitter's Encryption Dilemma

159

Private Tweets Exposed, Unauthorized Tracking Collaboration, AI Risks and Regulation

160

Juice Jacking Debunked, Photographer vs. AI Dataset, Google Authenticator Risks

161

Building a Healthy Security Culture: Insights from Kai Roer

162

Arkansas Social Media Consent Law, Android Malware Invasion, New Method of Keyless Car Theft

163

Genesis Market Crackdown, Life360 App Misuse, Tesla Customer Privacy Concerns

164

Clearview AI Facial Recognition Fallout, Hacked and Helpless, Is AI Armageddon Upon Us?

165

The TikTok CEO Testimony, ChatGPT's Privacy Risks, Inaudible Ultrasound Attacks

166

Samsung Chipset Zero-Day Vulnerabilities, AI-Assisted Social Engineering, ATM Fraud with a Twist

167

Exploring the Role of Empathy in Cybersecurity with Andra Zaharia

168

Biden's National Cybersecurity Strategy, BetterHelp's FTC Fine, Chick-fil-A Data Breach

169

The LastPass Attack Gets Worse, What is Gamification, Signal's Encryption Standoff

170

Twitter's Paywall 2FA, Mental Health Data for Sale, Meta's Verified Program

171

Reddit Hacked, Preventing Accidental Location Sharing, Developer Hacks His Own Company

172

Layoffs, Recruiting, and The Year Ahead for Cybersecurity Job Seekers

173

Password Managers Under Attack, Shady Reward Apps on Google Play, Meta Account Center 2FA Bypass

174

U.S. 'No Fly List' Leaks, AI-Powered Phishing, Wi-Fi Used to See Humans Through Walls

175

Social Zombies Revisited: Your Friends Want to Eat Your Brains

176

Meta's EU Ad Practices Ruled Illegal, Twitter API Data Breach, Vulnerabilities in Major Car Brands

177

LastPass Password Vaults Stolen, Pig Butchering Scams, Okta Source Code Theft

178

How to Stop Online Tracking: 3 New Ways

179

The Year in Review and 2023 Predictions

180

Apple to Allow Third-Party App Stores, Lensa AI App Privacy Risks, Real-Life Invisibility Cloak

181

ChatGPT Goes Viral, More Trouble for LastPass, Apple's New Data Protections

182

SASE: Is it Just Another Cybersecurity Buzzword?

183

Is Social Media at a Tipping Point, The TikTok Invisible Challenge, San Francisco Police Can Use Killer Robots

184

How to Break Into a Cybersecurity Career - Rob Fuller (Mubix)

185

The Rise of Mastodon, Twitter in Trouble, Largest Privacy Settlement in US History

186

How to Break Into a Cybersecurity Career – Digital Forensics and Incident Response (DFIR)

187

Cybersecurity's Role in Combating Midterm Election Disinformation

188

CISO Liability Risk and Jail Time, (ISC)2 Bylaw Vote and the Value of Cybersecurity Certifications

189

Attack of the Wi-Fi Spy Drones, How to Destroy Your Old Electronics, Signal Removes SMS Support

190

Uber Breach Guilty Verdict, Mandatory Password Expiration, Fake Executive Profiles on LinkedIn

191

Hackers Need 5 Hours or Less to Break In, SMS Phishing Tactics, Strange Ways Employees Expose Data

192

What are Passkeys, PowerPoint Mouseover Attack, 2K Games Helpdesk Hacked

193

Uber Hacked by 18 Year Old, Morgan Stanley Hard Drives Got Auctioned, Deleting Your Data off of Social Networks is Hard

194

Facebook Doesn't Know Where Your Data Is, New Hire Spearmishing Attack, Smart Thermostat Lock Out

195

TikTok Denies Data Breach, Los Angeles School District Ransomware Attack, Fingerprint Scanners in School Bathrooms

196

LastPass Data Breach, ETHERLED: Air-Gapped Systems Attack, Twitter Whistleblower Complaint

197

Janet Jackson Can Crash Laptops, Credential Phishing Attacks Skyrocket, A Phone Carrier That Doesn't Track You

198

Multi-Factor Authentication Fatigue Attack, Signal Account Twilio Hack, Facebook and Instagram In-App Browser

199

The Importance of Faraday Technology with Aaron Zar from SLNT

200

Why are Phone Numbers Used for Identification, Hacker Summer Camp Advice, Samsung Repair Mode

201

Twitter Data Breach, 15 Minutes to Exploit Zero-Day Vulnerabilities, Resilient Deepfake Traits

202

Robert Kerbeck Author of Ruse: Lying the American Dream from Hollywood to Wall Street

203

Apple Previews Lockdown Mode, Another Marriott Data Breach, Smart Contact Lenses

204

Could TikTok Be Removed From App Stores, HackerOne Employee Caught Stealing Vulnerability Reports, California Gun Owner Data Breach

205

Period Tracking Apps and Your Privacy, Vendor Impersonation Attacks, LockBit Ransomware Bug Bounty Program

206

Tim Hortons Privacy Investigation, Social Engineering Kill-Chain, Hospitals Sending Facebook Your Data

207

Bipartisan Digital-Privacy Bill, Delete Your Data Before Selling Your Car, Firefox Total Cookie Protection

208

Hacking Ham Radio: Why It's Still Relevant and How to Get Started

209

DuckDuckGo Browser Allows Microsoft Trackers, Stolen Verizon Employee Database, Attacking Powered Off iPhones

210

The State of Application Security with Tanya Janca

211

Apple Mail Privacy Protection, Government Agencies Reveal Top Attack Vectors, Is Big Brother Watching You at Work?

212

FBI Warrantless Searches, Passwordless Sign-Ins, Keylogging Web Forms

213

Cybersecurity for Startups with Josh Feinblum from Stavvy

214

Elon Musk Buys Twitter, Forgotten BIOS Updates, T-Shirt Outwits Facial Recognition

215

Rehumanizing Cybersecurity with Lianne Potter

216

Dumbphone Sales are Soaring, John Oliver Blackmails Congress, Cicada Chinese APT Group

217

Truths and Myths of Privacy, Fake Shopping Apps, Borat RAT Malware

218

Google Android vs Apple iOS: Which is Better for Privacy and Cybersecurity?

219

LAPSUS$ Hacks Okta, Browser-in-the Browser Phishing Attack, Popular Software Package Updated to Wipe Russian Systems

220

Top 3 Location Tracking Apps: Do They Sell Your Data?

221

Amazon Echos Hack Themselves, Fraud Is Flourishing on Zelle, Samsung Galaxy Source Code Stolen

222

Russia Gets Hacked, Microsoft 365 Credential Stuffing, McDonald's Ice Cream Machine Hackers

223

TikTok Circumvents Privacy Protections, Russian Sanction Attacks, Apple AirTag Anti-Stalking Measures

224

MoviePass Tracking Your Eyeballs, Shipment Delivery Scams, SIM Swappers Arrested

225

EARN IT Act is Back, Romance Scams, Like and Subscribe Ransomware

226

Graphics Card Web Tracking, Fake Job Ad Scams, Hacker Takes Down North Korea's Internet

227

Ukraine Invasion Hacktivists, Insta360 ONE X2 Vulnerabilities, Google Location Tracking Lawsuits

228

Pandemic Surveillance in Canada, Malware-Filled USB Sticks are Back, Kill Switches in New Cars

229

Digital Wellbeing with Kelly Finnerty from Startpage

230

Norton 360 Cryptominer, Fake QR Codes on Parking Meters, Facebook Account Deactivation

231

Phone Scam Targets Psychologists, All My Apes Gone, Supply Chain Skimmer Attack

232

LastPass Master Passwords, New Cars and Your Privacy, Amazon Alexa Lethal Challenge

233

Web3 and the Decentralized Internet

234

The Year in Review and 2022 Predictions

235

Log4j Vulnerability, Apple AirTags Used by Thieves, FBI's Encrypted Messaging App Document

236

Life360 Selling Location Data, NSO Group Spyware Hacks Government Employees, Homecoming Queen Contest Hacked

237

Business Email Compromise Scams

238

Is TikTok Listening to You, Apple Warns Activists, UK Government Website Shows Porn

239

How to Break Into a Cybersecurity Career - Part 3 Scott Wright

240

FBI Email System Compromised, Ransomware Negotiation, Privacy Crushing Gifts

241

Robinhood Data Breach, 600 Hours of Dallas Police Helicopter Footage Leaked

242

Facebook Dumps Face Recognition, Social Engineering Bots, US Sanctions NSO Group

243

Interview with Dana Mantilia and the Role of the CISO

244

Federal Data Agency for Social Media, Squirrelwaffle Malspam, Ransomware Hits U.S. Candymaker

245

Missouri Governor and F12 Hacking, Global Ransomware Meeting, Fake Government Websites

246

Killware Clickbait, 1Password Password Sharing Feature, Android Phone Snooping

247

Security Champions Framework, The Great Facebook Outage, Twitch Data Breach

248

AirTag Good Samaritan Attack, iCloud+, Amazon Astro Dog and Ring Camera Drone

249

Multi-Factor Authentication and Authenticator Apps

250

No Password Microsoft Accounts, Facebook Smart Glasses, Security.txt Internet Standard

251

iMessage Zero-Click Exploit, Leaked Guntrader Firearms Data, 60 Million Fitness Tracking Records Exposed

252

ProtonMail IP Address Logging Controversy, Fake Bot Disinformation, Correctional Facility Robot Overlords

253

Election Security and the Packet Capture Controversy with Special Guest Rafal Los

254

What Happens to Your Social Media Accounts After You Die?

255

T-Mobile Hacker Identified, China's New Privacy Law, Tesla Bot Announcement

256

T-Mobile Data Breach, Tinder Identity Verification, Magnetic Stripe Phase Out

257

Largest Cyptocurrency Hack in History, $10k For Stolen Network Access, Your Identity and the Metaverse

258

CISA JCDC Announcement, Apple's Child Abuse Image Scanning, Amazon Pays You for Your Biometric Data

259

Reboot Your Smartphone, FBI's Top Targeted Vulnerabilities, Flirty Account Dupes Defense Contractors

260

How to Protect Yourself from Gift Card Scams

261

Pegasus Spyware is Back, Twitter Hacker Arrested, 16 Year Old Printer Bug

262

Popular Myths about VPNs

263

Targeted Dream Incubation, TikTok Data Sharing, Chrome and Firefox Updates

264

Kaseya Ransomware Attack, PrintNightmare Zero-day, Kaspersky Password Manager Vulnerability

265

LinkedIn Data Leak, Western Digital NAS Attacks, STIR/SHAKEN Deadline

266

Asset Discovery with Chris Kirsch Co-Founder at Rumble

267

Off Limits Critical Infrastructure, Ransomware on Repeat, Cyber Safe Drinking Water

268

TikTok Collecting Biometric Data, Peloton Bike+ Vulnerability, Nextdoor App Concerns

269

ANOM FBI Global Crime Sting, Colonial Pipeline Updates, Password Leak Research

270

Amazon Sidewalk, NFTs and Cybersecurity, Norton 360 Cryptocurrency Mining

271

Biden's Cybersecurity Executive Order, Apple's AirTag, Cyber Insurance

272

How Gamification is Changing Cybersecurity

273

Colonial Pipeline Updates, DarkSide Goes Dark, Cybersecurity Best Practices

274

The Colonial Pipeline Ransomware Attack

275

World Password Day, Tesla Hacking via Drone, Ipsos Screenwise Panel

276

Remembering Dan Kaminsky, Apple Airdrop Vulnerability

277

3 Ways to Keep Your Cryptocurrency Safe

278

Instagram Anti-Abuse Tool, Apple Advertiser Restrictions, Terrible Passwords

279

Data Breaches vs. Data Leaks, FBI Exchange Server Controversy

280

Best of Episode: Interview with Jayson E Street

281

Best of Episode: Interview with Rachel Tobac

282

SMS Two-Factor Authentication, New Internet Hygiene Model

283

Top 3 Privacy Tips for Travel

284

Facebook and Apple Privacy Debate, Phishing Test Gone Wrong

285

Encryption Backdoor Debate, Microsoft Exchange Attacks, Airline Supplier Data Breach

286

The Deepfake Dilemma, Microsoft Exchange Zero-Days, Data Breaches and IT Spending

287

Card Skimmers Powered by Chip Cards, Silver Sparrow Mac Malware, Accellion Data Breaches

288

Clubhouse App and Your Privacy

289

Apple's Safe Browsing Request Proxy, BEC Attacks, LastPass Updates

290

Water Supply Hack, Android App Hijack, Capitol Riot Phone Tracking

291

Dangerous Social Media Algorithms, A Moral Imperative for AI Powered Weapons?

292

Cybersecurity Researchers Targeted, Three iOS Zero-Days, Google FLoC

293

Tanya Janca CEO and Founder We Hack Purple

294

Parler's Return, Pelosi's Stolen Laptop, Vaccination Passports

295

The Capital Riot: First Amendment and Deplatforming, Cybersecurity Lessons Learned

296

How to Break Into a Cybersecurity Career - Part 2 Rafal Los

297

How to Break Into a Cybersecurity Career - Part 1

298

Top 3 Cybersecurity Tips

299

The Year in Review and 2021 Predictions

300

SolarWinds/SUNBURST Backdoor, Third-Party and Supply Chain Security

301

FireEye Hacked, Foxconn Ransomware Attack, Apple's New Privacy Features

302

iPhone Zero-Click Exploit, BEC Auto-Forward Scams, COVID-19 Vaccine Cold Chain Attacks

303

Holiday Shopping Scams and Tips to Stay Safe

304

Amazon Sidewalk, Federal IoT Security Law, Facebook Messenger Bug

305

CISA Director Chris Krebs Fired, Common Sense and Section 230

306

Stolen Source Code, Apple Zero-Days, Biden's Privacy and Cybersecurity Policies

307

Privacy Mindset: Europe vs. United States

308

Government Rumor Control, US Hospital Ransomware Threat, Russian Hackers Charged

309

Targeted Attacks Part 3 - The Exploit

310

Voter Privacy and the US Election

311

TrickBot Takedown, VPN Flaws, Zoom End-to-End Encryption

312

The Social Dilemma

313

More Hospital Ransomware Attacks, FBI's Disinformation Warning, Android 11 Privacy Features

314

Targeted Attacks Part 2 - Pretexting and Attack Development

315

Death by Ransomware, Strava Flyby, iOS 14 Privacy Improvements

316

StartPage.com - The World's Most Private Search Engine

317

Schools Under Cyberattack, Chrome Ad Blocking Update, US Election Interference

318

NSA Data Collection Ruling, Browsing History Identification, Ambulance Chasing

319

Targeted Attacks Part 1 - OSINT and Reconnaissance

320

Uber CISO Charged, Facebook Data Portability, Malicious iOS SDK

321

Audio Recordings Used to Copy Keys, Carnival Ransomware Attack, Social Media Profile Data Exposed

322

Amazon Echo Exploit, Privacy Shield, Capital One Data Breach Update

323

Twitter Hack Lessons Learned, TikTok Ban, Rite Aid Facial Recognition Cameras

324

How Big Tech Collects Your Private Data and How to Delete It

325

Chinese Hacking Campaign Exposed, BadPower Fast Charger Attack, Instacart Data Leak

326

Privacy Settings for Amazon Echo and Google Home

327

The Big Twitter Hack, Critical Windows DNS Server Update, Email Impersonation Attacks

328

F5 BIG-IP Exploit, WiFi Router Security Updates, Password Reuse

329

TikTok Privacy Concerns, macOS Ransomware, Bad Passwords

330

EARN IT Act, Facial Recognition Fail, Can I Be Phished?

331

Family Safety and Security with Andy Murphy from The Secure Dad Podcast

332

Largest DDoS Attack Ever, New Dropbox Features, North Korean Cyber-Attacks

333

5 Tips to Stay Private and Secure During a Protest

334

Minneapolis Police Website Hacked, Zoom Encryption, eBay Port Scanning

335

First Amendment Rights and Twitter, Encryption Backdoors

336

Episode 100 with Rachel Tobac and Kathleen Smith

337

Apple's Law Enforcement Backdoor Dispute, Signal PINs, EasyJet Data Breach

338

Thunderbolt Flaws, WordPress Plugin Vulnerabilities, Patriot Act Vote

339

GoDaddy Security Incident, Fake Downloaders, Firefox Lockwise

340

Workplace Surveillance, Apple and Google Contact Tracing Tech, Virtual Cybersecurity Conferences

341

The End of Passwords as We Know It

342

Contact Tracing Controversy, Fighting COVID-19 Criminal Activity

343

Zoom Hacked Accounts, North Korean Hackers, Facebook Senior Pictures

344

Contact Tracing Apps, Business Email Compromise Scams, SPAM Phone Calls

345

Another Marriott Data Breach, Zoom-Bombing, Economic Stimulus Scams

346

Staying Secure When Working From Home

347

Click Armor Demo, Podcast Survey Results, Google Geofence Warrants

348

COVID-19 Mass Surveillance, New Coronavirus Cyber-Attacks, Encryption Backdoors

349

COVID-19 Cybersecurity Impact, Hacking the Hackers, Whisper App Data Leak

350

IoT Device Attacks, FCC Fines Mobile Carriers, Let's Encrypt Certificate Bug

351

You've Been Hacked! Now What?

352

Ring Mandates Two-Factor Authentication, License Plate Reader Data Sharing, RSA Conference Coronavirus Fears

353

Chinese Hackers, Coronavirus Phishing Attacks, How to Stay (Almost) Anonymous Online

354

Equifax Hacked by China, Israeli Voter Registry Exposed, How the CIA Owned Encryption

355

Preventing Tax Identity Theft, FTC and Robocallers, Google Photos Incident

356

Off-Facebook Activity Tool, Ring App Third-Party Trackers, Wawa Credit Card Breach

357

Voting by Smartphone, Jeff Bezos Hacked, Microsoft Security Breach

358

Dark Web Fraud and Cybercrime with Emily Wilson

359

Critical Windows Vulnerability, Dating App Security Risk, Apple iOS Privacy Features

360

Iranian Cyber-Attacks, Ring Class-Action Lawsuit, Preventing Calendar SPAM

361

New California Data Privacy Law, Wyze Data Leak, ToTok Spy App

362

Top 10 Cybersecurity and Privacy Resolutions

363

Rebecca Herold "The Privacy Professor"

364

The Year in Review and 2020 Predictions

365

The Password Reuse Problem, US Government IoT Recommendations, Smart Lock Security Disaster

366

How You're Tracked Online, New Mass Surveillance Concerns, Malicious Android App Hijack

367

Top 25 Most Dangerous Vulnerabilities, Smart City Privacy, DuckDuckGo vs. Google

368

Phone and Voice Fraud, Twitter Account Purge, Adobe Magento Marketplace Data Breach

369

Disney+ Hacked Accounts, Black Friday Scams, Android Camera Exploits

370

Google's Health Record Storage Controversy, US Border Search Ruling, Zelle Scams

371

Facebook Data Leaks, Smart Speaker Laser Attack, BlueKeep in the Wild

372

WhatsApp's NSO Group Lawsuit, This Week in Data Breaches, Office 365 Voicemail Phishing

373

Firewalla Review, 15 Most Dangerous Apps for Kids, Rise of the Deepfake

374

Nord VPN Security Incident, Smart Speaker Phishing, Apple iOS 13 Privacy Features

375

Pitney Bowes Ransomware Attack, Samsung Galaxy S10 Fingerprint Bypass, Top Technology Fears

376

Hong Kong Protests, Instagram's Anti-Phishing Tool, Smart Device Fail

377

Microsoft OneDrive Personal Vault, Google's New Privacy and Security Controls, REAL ID Deadline

378

Amazon Smart Glasses, Webkey Social Engineering, Erase Your Old Hard Drives!

379

DoorDash Data Breach, Voice Assistant Privacy Changes, Limiting Ad Tracking

380

Aaron Zar, Co-Founder and CEO of Silent Pocket

381

Apple iOS 13, Venmo Scams, Simjacking Attacks

382

End-to-End Encryption with Max Krohn from Keybase.io

383

New Firefox Privacy Protections, Apple iOS Zero-Days, Facebook User Phone Numbers Exposed

384

Android "Ghost Click" Apps, New Apple Siri Privacy Protections, Credit Card Spying

385

10 Year Anniversary Episode with Kevin Johnson and Jayson E. Street

386

New Facebook Privacy Controls, Apple iOS Patching Mistake, MoviePass Data Breach

387

Biometric Security Data Breach, Critical Windows Vulnerabilities, FBI Data Harvesting

388

BSides Las Vegas, iMessage Exploit, 5G and Stingray Surveillance

389

Capital One Data Breach, Equifax Settlement Payouts, Nextdoor App Scams

390

Medical Device Security with Special Guest John Nye

391

Equifax Settlement, Android Video File Exploit, Encryption Backdoors

392

FaceApp Privacy Panic, Facebook's 5 Billion Dollar Fine, Amazon Brushing Scams

393

Zoom Zero-Day, GDPR Fines, Google Assistant Recordings

394

Amazon Alexa Recordings, Facebook Malware Campaign, Top 3 Tips to Stay Private on Vacation

395

US Cyber-Attack on Iran, Poor Government Cybersecurity, Malvertising Campaigns

396

The Home Security Episode - Locks, Doors, Cameras, and More!

397

Facebook's New Cryptocurrency, Firefox Zero Day, Smart TV Malware

398

US Customs and Border Protection Data Breach, Sign in with Apple, Leaked Facebook Emails

399

Quest Diagnostics Data Breach, Google's Network Outage, US Visa Applicants and Social Media Names

400

Ransomware Rampage, Mobile Phishing Attacks, iPhone App Ad Trackers

401

Equifax Downgraded, Huawei Ban, Google is Tracking Your Purchases

402

Remotely Killing Car Engines, Password Expiration Policies, Facial Recognition at Airports, InfoSec vs. Cybersecurity

403

Critical WhatsApp Vulnerability, Facial Recognition Ban, Wormable Flaw in Windows

404

Israel Cyber-Attack Bombing, New Google Privacy Settings, Traditional Mail Blackmail Scam

405

Newspaper Ransomware Attack, How Facebook Tracks You on Android, USB-Type-C Authentication - WB50

406

TheSharedSecurityPodcast_42.mp3

407

SocialMediaSecurityPodcast_41.mp3

408

SocialMediaSecurityPodcast_40.mp3

409

SocialMediaSecurityPodcast_39.mp3

410

SocialMediaSecurityPodcast_38.mp3

411

SocialMediaSecurityPodcast_37.mp3

412

SocialMediaSecurityPodcast_36.mp3

413

SocialMediaSecurityPodcast_35.mp3

414

SocialMediaSecurityPodcast_34.mp3

415

SocialMediaSecurityPodcast_33.mp3

416

SocialMediaSecurityPodcast_32.mp3

417

SocialMediaSecurityPodcast_31.mp3

418

SocialMediaSecurityPodcast_30.mp3

419

SocialMediaSecurityPodcast_29.mp3

420

SocialMediaSecurityPodcast_28.mp3

421

SocialMediaSecurityPodcast_27.mp3

422

SocialMediaSecurityPodcast_26.mp3

423

SocialMediaSecurityPodcast_25.mp3

424

SocialMediaSecurityPodcast_24.mp3

425

SocialMediaSecurityPodcast_23.mp3

426

SocialMediaSecurityPodcast_22.mp3

427

SocialMediaSecurityPodcast_21.mp3

428

SocialMediaSecurityPodcast_20.mp3

429

SocialMediaSecurityPodcast_19.mp3

430

SocialMediaSecurityPodcast_18.mp3

431

SocialMediaSecurityPodcast_17.mp3

432

SocialMediaSecurityPodcast_16.mp3

433

SocialMediaSecurityPodcast_15.mp3

434

SocialMediaSecurityPodcast_14.mp3

435

SocialMediaSecurityPodcast_13.mp3

436

SocialMediaSecurityPodcast_12.mp3

437

SocialMediaSecurity_Podcast_11.mp3

438

SocialMediaSecurityPodcast_10.mp3

439

SocialMediaSecurityPodcast_9.mp3

440

SocialMediaSecurityPodcast_8.mp3

441

SocialMediaSecurityPodcast_7.mp3

442

SocialMediaSecurityPodcast_6.mp3

443

SocialMediaSecurityPodcast_5.mp3

444

SocialMediaSecurityPodcast_4.mp3

445

SocialMediaSecurityPodcast_3.mp3

446

SocialMediaSecurityPodcast_2.mp3

447

SocialMediaSecurityPodcast_1.mp3