AI and the Evolution of Social Media
Bruce Schneier | | Artificial Intelligence, facebook, google, Internet and society, LLM, Privacy, social media, surveillance, Twitter, Uncategorized
Oh, how the mighty have fallen. A decade ago, social media was celebrated for sparking democratic uprisings in the Arab world and beyond. Now front pages are splashed with stories of social ...
Mastering X and Twitter Takedowns: How to Handle Brand Impersonations
Mitch Warren | | advertisement, brand impersonation, brand protection, Cybersecurity, delete, fake, Impersonation Takedown, page, post, profile, remove, social media, spoofing, takedown, Twitter, Twitter Impersonation, website takedown, X
Table of Contents Distinguishing brand impersonations in the world of X/Twitter can sometimes be perplexing. Unlike LinkedIn, which enforces more stringent measures against misrepresentation, X tends to take a more flexible stance ...
SEC X Account Hack is a Case of SIM Swapping
The bad actor who hacked into the X account of the Securities and Exchange Commission (SEC) earlier this month gained access through a SIM swapping attack on the agency’s phone linked to ...
Security Boulevard
The World of Scambaiting, Preventing Social Media Account Takeovers, Network Wrenches Hacked
Tom Eston | | account takeover, account takeovers, Bosch Rexroth Handheld Nutrunner, Cyber Security, Cybersecurity, Data Privacy, Digital Privacy, Episodes, Fraud, Information Security, Infosec, Internet of things, iot, Kitboga, Malware, Phishing, Podcast, Podcasts, Privacy, Rachel Tobac, Ransomware, Scam Baiting, Scambaiting, Scammer Payback, scammers, Scams, security, social engineering, social media, technology, Twitter, Weekly Edition, X
In Episode 313, hosts Tom and Scott discuss the world of scambaiting, discussing what it is, the tactics used, and its effectiveness in stopping scammers. They talk about popular channels like Scammer ...
The Year in Review and 2024 Predictions
Tom Eston | | 2023, 2024, AI, Barbie movie, Cyber Security, Cybersecurity, Data Privacy, Digital Privacy, Episodes, Happy New Year, Information Security, Infosec, legislation, MA, Mergers and Aquisitions, New Year, Phishing, Podcast, Podcasts, predictions, Privacy, Ransomware, security, technology, TikTok, TikTok Ban, Twitter, Weekly Edition, X
In our last episode of the year, we replay our predictions for 2023 reviewing what we got right and what we didn’t. We cover various topics, such as Twitter’s influence, the future ...
X/Twitter Under Investigation by EU in First DSA Move
Richi Jennings | | Digital Services Act, Elon Musk, elon musk twitter, eu, European Commission, European Governments, European legislation, European Security, European Union, European Union (EU), Margrethe Vestager, SB Blogwatch, Schrems, Stupidity of Twitter, Thierry Breton, Twitter, X
DSA VLOP Sinks In. Manipulation, deception, transparency: “We will make full use of our toolbox,” promises Europe ...
Security Boulevard
Elon’s CSAM FAIL: Twitter Fined by Australian Govt.
Richi Jennings | | Australia, Australian Government, Child Abuse, child exploitation, Child Online Safety, child porn, child pornography, Child protection, Child Safety, child security online, child sexual exploitation, childpornography, CSAM, Digital Trust and Safety, Elon Musk, elon musk twitter, eSafety Commission, grooming, Julie Inman Grant, Linda Yaccarino, SB Blogwatch, trust and safety, Twitter, X
Straya strikes back: Musk’s mob declines to answer questions, breaking law dunundah ...
Security Boulevard
Content Creation, Mental Health in Cyber, The MGM Ransomware Attack
Tom Eston | | Content Creation, Content Creator, Cyber Security, Cybersecurity, Data Privacy, Digital Privacy, Episodes, Information Security, Infosec, Matt Johansen, Mental Health, MGM, Orign Story, Podcast, Podcaster, podcasting, Podcasts, Privacy, Ransom, Ransomware, ransomware attack, security, Security Twits, Shmoocon, technology, Twitter, Vulnerable U, Weekly Edition, X, YouTube
In this episode Matt Johansen, Security Architect at Reddit and Vulnerable U newsletter and YouTube content creator, joins host Tom Eston to discuss Matt’s background as one of the original “Security Twits”, ...
Back to School Cybersecurity, Phishing Pitfalls and Strategies, X’s (Twitter) Blocking Overhaul
Tom Eston | | back to school, blocking, Blocking Content, Blocking People, Cyber Security, Cybersecurity, Data Privacy, Digital Privacy, education, Elon Musk, Episodes, Information Security, Infosec, Phishing, Phishing Prevention Tips, Podcast, Podcasts, Privacy, safety, school, security, students, Teachers, technology, tips, Twitter, Weekly Edition, X
In this episode, we discuss essential cybersecurity tips for students and educational institutions as they gear up for the school season. From software updates to strong passwords and cybersecurity education, we explore ...
Amid Switch to X, a Phishing Scam Targets Twitter Users
Jeffrey Burt | | business email compromise, cybersecruity, elon musk twitter, email security, Phishing, Twitter
Cybercriminals are trying to take advantage of the unsettled situation surrounding Elon Musk’s decision to remake Twitter into X ...
Security Boulevard