Telegram is NOT an Encrypted Messaging App, Must-See Documentaries
Tom Eston | | arrest, Class Action Park, Cyber Security, Cybersecurity, Data Privacy, Digital Privacy, Documentary, E2E, EFF, encryption, end-to-end encryption, Episodes, france, Information Security, Infosec, LuLaRich, LuLaRoe, messaging, OSINT, Pavlov Durov, Podcast, Podcasts, Privacy, security, social media, technology, Telegram
In this episode, we explore the recent arrest of Telegram founder Pavel Durov in France and discuss the app’s encryption claims. Is Telegram truly an encrypted messaging app? Joining the conversation is co-host Kevin Johnson, bringing his trademark opinions. We also talk about some intriguing documentaries, including ‘LulaRich’ about the ... Read More
Google’s Monopoly: The Debate Heats Up, Amazon Alexa Privacy Tips
Tom Eston | | Alexa, amazon, black hat, Black Hat USA, Cyber Security, Cybersecurity, Data Privacy, DEF CON, Digital Privacy, Episodes, google, Information Security, Infosec, Justice, las vegas, Monopoly, Podcast, Podcasts, Privacy, privacy settings, security, technology, US Justice Department, USJD, Weekly Edition
This week, we discuss Google’s recent accusation by the U.S. Justice Department for being a monopoly and its implications for privacy and cybersecurity. We also cover essential privacy settings for Alexa smart speakers and their importance. Join the hosts, Tom, Kevin, and Scott, for an engaging conversation on these topics, ... Read More
The Inefficiency of People-Search Removal Tools, Massive Data Breach Impacting U.S. Citizens
Tom Eston | | Confidently, Consumer Reports, Cyber Security, Cybersecurity, Data breach, Data Privacy, DeleteMe, Digital Privacy, EasyOptOuts, Episodes, Hackers, idx, Information Security, Infosec, Kanary, Optery, People Search, People-Search Removal Tool, Podcast, Podcasts, Privacy, Privacy Law, privacy laws, ReputationDefender, security, social security number, ssn, technology, US Privacy Law, Weekly Edition
In episode 342, we discuss the effectiveness of people-search removal tools like DeleteMe and Reputation Defender, based on a study by Consumer Reports. We also cover how almost every American’s social security number has potentially been stolen by hackers and shared on the dark web. Scott and Tom talk about ... Read More
Exploring Cybersecurity Trends at Black Hat 2024 with Shourya Pratap Singh from SquareX
Tom Eston | | AI, Application Security, AppSec, browser, Cyber Security, Cybersecurity, Data Privacy, DEF CON, defcon, Digital Privacy, Episodes, Information Security, Infosec, Podcast, Podcasts, Privacy, Secure Web Gateway, security, Shourya Pratap Singh, Special Editions, SquareX, SWG, technology, Vivek Ramachandran, web browser, Web security, Weekly Edition
Join us for this special live edition of the Shared Security Podcast, recorded in scorching Las Vegas at Black Hat 2024. Host Tom Eston is joined by Shourya Pratap Singh, Principal Software Engineer at SquareX. They discuss highlights from Black Hat 2024, emerging themes in cybersecurity such as AI-based threats, ... Read More
The Great CrowdStrike Crash, AI’s Role in Employee Smiles
Tom Eston | | AI, antivirus, CrowdStrike, Cyber Security, Cybersecurity, Data Privacy, Digital Privacy, employee, Employee Monitoring, Episodes, Information Security, Infosec, IT, IT Outage, Japan, Microsoft, Mister Smile, Mr. Smile, outage, Podcast, Podcasts, Privacy, security, Smiles, technology, update, Weekly Edition, Windows, Workplace, Worldwide
In episode 341, we cover the unprecedented global IT outage caused by a CrowdStrike update crash, affecting 8.5 million Windows machines. We discuss whether it’s the largest outage in history and discuss the intricacies of internet accessibility and responses from key stakeholders like Microsoft. Also, in our Aware Much segment, ... Read More
How SquareX is Redefining Web Security: An In-Depth Discussion with Chief Architect Jeswin Mathai
Tom Eston | | AI, Application Security, AppSec, browser, Cyber Security, Cybersecurity, Data Privacy, defcon, Digital Privacy, Episodes, Information Security, Infosec, Jeswin Mathai, Podcast, Podcasts, Privacy, Secure Web Gateway, security, Special Editions, SquareX, SWG, technology, Vivek Ramachandran, web browser, Web security, Weekly Edition
In this episode, Tom Eston hosts Jeswin Mathai, Chief Architect at SquareX. This episode is part two of a series featuring SquareX, and Jeswin takes a deeper look into their cybersecurity solutions. Jeswin shares his extensive experience in the field and details how SquareX offers innovative protections at the browser ... Read More
Deepfakes, AI, and the Future of Cybersecurity: Insights from Dan DeCloss of PlexTrac
Tom Eston | | AI, Cyber Security, Cybersecurity, Dan DeCloss, Data Privacy, deepfakes, Digital Privacy, Episodes, future, Gen X, Gen Y, Gen Z, Information Security, Infosec, Offensive Security, penetration test, Penetration Testing, Pentest Reporting, PlexTrac, Podcast, Podcasts, Privacy, reporting, security, technology, Weekly Edition
In this episode, host Tom Eston welcomes Dan DeCloss, founder and CTO of PlexTrac. They exchange insights about their history at Veracode and explore Dan’s journey in cybersecurity. Dan shares his experience in penetration testing, the origins of PlexTrac, and the need to streamline reporting processes. The conversation also covers ... Read More
Massive AT&T Data Breach Impact, Meta’s Privacy Policy Updates
Tom Eston | | AI, ATT, Cyber Security, Cybersecurity, Data breach, Data Privacy, Digital Privacy, Episodes, facebook, GDPR, Information Security, Infosec, Instagram, Meta, Patreon, Podcast, Podcasts, Privacy, Privacy Policies, Privacy Policy, security, snowflake, technology, Weekly Edition
In episode 339, hosts Tom Eston and Scott Wright discuss the massive AT&T data breach affecting 110 million customers, which is larger than a previous breach from March affecting 73 million customers. They also talk about the importance of reading privacy policies on sites like Facebook and Instagram, as these ... Read More
Authy Breach: What It Means for You, RockYou 2024 Password Leak
Tom Eston | | 2fa, Authy, Cyber Security, Cybersecurity, Data breach, Data Privacy, Digital Privacy, Episodes, Information Security, Infosec, MFA, Multi-Factor Authentication, Password, password leak, password list, passwords, Phishing, Podcast, Podcasts, Privacy, RockYou, RockYou2024, security, SIM swapping, social engineering, technology, two factor authentication, Weekly Edition
In episode 338, we discuss the recent breach of the two-factor authentication provider Authy and its implications for users. We also explore a massive password list leak titled ‘Rock You 2024’ that has surfaced online. Find out why this file may not be as significant as it seems and the ... Read More
Critical SSH Vulnerability, Facial Recognition Flaws, How to Safely Dispose of Old Devices
Tom Eston | | arrest, Cyber Security, Cybersecurity, data, Data Privacy, Delete My Data, Detroit, Detroit Police, Digital Forensics, Digital Privacy, Episodes, Exploit, facial recognition, hard drive, HDD, Information Security, Infosec, Old Computer, Old PC, openssh, personal data, Podcast, Podcasts, Privacy, Qualys, RegreSSHion, Secure Wipe, security, SSH, technology, vulnerability, Weekly Edition, zero-day
In episode 337, we cover “broken” news about the new SSH vulnerability ‘regreSSHion‘ highlighting the vulnerability discovered in the OpenSSH protocol by Qualys and its implications. We then discuss the Detroit Police Department’s new guidelines on facial recognition technology following a lawsuit over a wrongful arrest due to misidentification, shedding ... Read More