Telegram's Encryption Controversy Explained | Must Watch!

Telegram is NOT an Encrypted Messaging App, Must-See Documentaries

In this episode, we explore the recent arrest of Telegram founder Pavel Durov in France and discuss the app’s encryption claims. Is Telegram truly an encrypted messaging app? Joining the conversation is co-host Kevin Johnson, bringing his trademark opinions. We also talk about some intriguing documentaries, including ‘LulaRich’ about the ... Read More
Is Google a Monopoly? Breaking Down the Latest Accusations

Google’s Monopoly: The Debate Heats Up, Amazon Alexa Privacy Tips

This week, we discuss Google’s recent accusation by the U.S. Justice Department for being a monopoly and its implications for privacy and cybersecurity. We also cover essential privacy settings for Alexa smart speakers and their importance. Join the hosts, Tom, Kevin, and Scott, for an engaging conversation on these topics, ... Read More
🤔Are People-Search Removal Tools Effective?

The Inefficiency of People-Search Removal Tools, Massive Data Breach Impacting U.S. Citizens

In episode 342, we discuss the effectiveness of people-search removal tools like DeleteMe and Reputation Defender, based on a study by Consumer Reports. We also cover how almost every American’s social security number has potentially been stolen by hackers and shared on the dark web. Scott and Tom talk about ... Read More
Exclusive Insights on Cybersecurity: Black Hat & DEF CON Highlights with Shourya Pratap Singh

Exploring Cybersecurity Trends at Black Hat 2024 with Shourya Pratap Singh from SquareX

Join us for this special live edition of the Shared Security Podcast, recorded in scorching Las Vegas at Black Hat 2024. Host Tom Eston is joined by Shourya Pratap Singh, Principal Software Engineer at SquareX. They discuss highlights from Black Hat 2024, emerging themes in cybersecurity such as AI-based threats, ... Read More
The Great CrowdStrike Crash: Discussing the Largest IT Outage in History

The Great CrowdStrike Crash, AI’s Role in Employee Smiles

In episode 341, we cover the unprecedented global IT outage caused by a CrowdStrike update crash, affecting 8.5 million Windows machines. We discuss whether it’s the largest outage in history and discuss the intricacies of internet accessibility and responses from key stakeholders like Microsoft. Also, in our Aware Much segment, ... Read More
Revolutionizing Cyber Defense: An In-Depth Look at SquareX with Jeswin Mathai

How SquareX is Redefining Web Security: An In-Depth Discussion with Chief Architect Jeswin Mathai

In this episode, Tom Eston hosts Jeswin Mathai, Chief Architect at SquareX. This episode is part two of a series featuring SquareX, and Jeswin takes a deeper look into their cybersecurity solutions. Jeswin shares his extensive experience in the field and details how SquareX offers innovative protections at the browser ... Read More
Cybersecurity Trends 2024: AI, Deepfakes & More | Dan DeCloss from PlexTrac

Deepfakes, AI, and the Future of Cybersecurity: Insights from Dan DeCloss of PlexTrac

In this episode, host Tom Eston welcomes Dan DeCloss, founder and CTO of PlexTrac. They exchange insights about their history at Veracode and explore Dan’s journey in cybersecurity. Dan shares his experience in penetration testing, the origins of PlexTrac, and the need to streamline reporting processes. The conversation also covers ... Read More
AT&T Data Breach Hits 110 Million Customers: What You Need to Know

Massive AT&T Data Breach Impact, Meta’s Privacy Policy Updates

In episode 339, hosts Tom Eston and Scott Wright discuss the massive AT&T data breach affecting 110 million customers, which is larger than a previous breach from March affecting 73 million customers. They also talk about the importance of reading privacy policies on sites like Facebook and Instagram, as these ... Read More
Authy Breach Impact & RockYou 2024 Password Leak

Authy Breach: What It Means for You, RockYou 2024 Password Leak

In episode 338, we discuss the recent breach of the two-factor authentication provider Authy and its implications for users. We also explore a massive password list leak titled ‘Rock You 2024’ that has surfaced online. Find out why this file may not be as significant as it seems and the ... Read More
Facial Recognition Fail: How It Misidentified an Innocent Man

Critical SSH Vulnerability, Facial Recognition Flaws, How to Safely Dispose of Old Devices

In episode 337, we cover “broken” news about the new SSH vulnerability ‘regreSSHion‘ highlighting the vulnerability discovered in the OpenSSH protocol by Qualys and its implications. We then discuss the Detroit Police Department’s new guidelines on facial recognition technology following a lawsuit over a wrongful arrest due to misidentification, shedding ... Read More

Application Security Check Up