Privacy Challenges in Relationships, Phishing Down but Vulnerabilities Up?
The Shared Security Show
by Tom Eston, Kevin Johnson, Scott Wright
5d ago
In episode 327 Tom, Scott, and Kevin discuss the findings from Mandiant’s M-Trends 2024 report, highlighting a significant rise in traditional vulnerability exploitation by attackers while observing a decline in phishing. Despite phishing’s decreased prevalence, it remains the second most popular method for gaining initial network access. Discussions include the impact of high-profile vulnerabilities and the potential reasons behind the shift in cyberattack tactics. The episode also explores the challenges of maintaining online privacy within relationships, especially when one partner prioriti ..read more
Visit website
Navigating Security Awareness in the Tech Industry with Erin Gallagher
The Shared Security Show
by Tom Eston, Erin Gallagher, Scott Wright
1w ago
In this episode Erin Gallagher, cybersecurity awareness lead at Fastly, discusses her journey into the field of security awareness and her unique approach to enhancing cybersecurity within tech companies. Erin shares her unconventional path from a communication major to leading security awareness programs at IBM and a large insurance company, before joining Fastly. She highlights the challenges and strategies of tailoring security training to diverse roles within tech companies, emphasizing the importance of role-based training over traditional methods like phishing simulations. Erin also tack ..read more
Visit website
Linux Backdoor Infection Scare, Massive Social Security Number Heist
The Shared Security Show
by Tom Eston, Kevin Johnson
2w ago
In episode 325, Tom and Kevin discuss a significant backdoor threat that nearly compromised Linux systems globally, stemming from an infiltration into an open-source project called XZ Utils by attackers who gained commit access and inserted a backdoor. The episode further delves into a cybersecurity incident where hackers stole 340,000 social security numbers from a government consulting firm, emphasizing the implications and broader concerns related to data security in government contractors and the inefficacy of response mechanisms. Additionally, the hosts explore the negative influences of ..read more
Visit website
Massive AT&T Data Leak, The Danger of Thread Hijacking
The Shared Security Show
by Tom Eston, Scott Wright
3w ago
Episode 324 features discussions on a significant AT&T data breach affecting 73 million customers and a sophisticated thread jacking attack targeting a journalist. Co-host Scott Wright joins the discussion, highlighting how millions of AT&T customer account passcodes, along with personal information, were compromised due to a leak discovered by a security researcher and reported by TechCrunch. The episode also details the thread jacking phishing attack, emphasizing the importance of recognizing unexpected email threads and the potential dangers of malicious attachments. The episode con ..read more
Visit website
New Hotel Lock Vulnerabilities, Glassdoor Anonymity Issues
The Shared Security Show
by Tom Eston, Kevin Johnson, Scott Wright
1M ago
In episode 323, the hosts discuss two prominent topics. The first segment discusses a significant vulnerability discovered in hotel locks, branded as ‘Unsaflok,’ affecting 3 million doors across 131 countries. The vulnerability allows attackers to create master keys from a regular key, granted access to all doors in a hotel. The co-hosts also discuss the vulnerability’s relation to legacy systems and the implications for hotel security. The second segment shifts focus to Glassdoor, revealing that the popular company review site can no longer guarantee anonymity due to changes following its acq ..read more
Visit website
Alyssa Miller: Charting the Course Through InfoSec and Aviation
The Shared Security Show
by Tom Eston, Kevin Johnson, Scott Wright, Alyssa Miller
1M ago
In this episode, special guest Alyssa Miller joins the hosts for an insightful and entertaining conversation covering a broad range of topics from social engineering anecdotes involving Kevin Johnson to Alyssa’s journey in aviation and being a pilot. They discuss the challenges within the cybersecurity industry, including the transition to cloud computing and the neglect of on-prem data centers. Alyssa also shares a personal story about encountering workplace discrimination, offering advice based on her experiences. Additionally, the discussion touches on upcoming conference talks Alyssa is gi ..read more
Visit website
The TikTok Ban Bill, Your Car is Spying on You, Signal’s Username Update
The Shared Security Show
by Tom Eston, Kevin Johnson, Scott Wright
1M ago
In episode 321, the hosts discuss how connected cars are sharing driving data with insurance companies, potentially leading to increased rates for drivers. They also talk about the anti-TikTok bill passed by the House, which could force ByteDance to sell TikTok or face a ban in app stores. The episode also covers a significant update to Signal, allowing users to use usernames instead of phone numbers, enhancing privacy. Insights into privacy policies, the importance of understanding consent, and the broader implications of data collection and sharing among different entities are also discussed ..read more
Visit website
Who’s to Blame for Hacked Social Media Accounts, Spoofed Online Meeting Requests and Malware
The Shared Security Show
by Tom Eston, Scott Wright
1M ago
In episode 320, Tom and Scott discuss the contentious issue of who is accountable when Facebook or Instagram accounts are hacked, discussing potential failings on both the user’s and Meta’s part. They explore the possibility of inadequate security measures on these platforms and the implications of Meta potentially profiting from fraudulent ads. The episode also covers a Wired article regarding 41 state attorney generals in the U.S. urging Meta to enhance their security to manage the rising complaints of account theft. Furthermore, the ‘Aware Much’ segment highlights a new threat involving spo ..read more
Visit website
Don’t Trust Your AI Girlfriend or Boyfriend, Exposing US Government Data Collection
The Shared Security Show
by Tom Eston, Kevin Johnson
2M ago
In Episode 319, Tom and Kevin discuss the potential data privacy risks associated with having an AI ‘girlfriend’ or ‘boyfriend’ and why one should refrain from sharing their personal data with such AIs. They engage in a humorous conversation about the unusual advertisements these AI companions attract, while expressing concerns over their deceptive and sensitive data gathering. The episode also explores the controversial issue of the U.S. government collecting vast amounts of consumer data. Allegedly, the government acquires data from various sources including cell phones, social media, and in ..read more
Visit website
‘Get to Know Me’ Privacy Risks, Pros and Cons of Publicly Sharing Ring Doorbell Footage
The Shared Security Show
by Tom Eston, Kevin Johnson
2M ago
In episode 318, we discuss the trending ‘get to know me’ posts on social media platforms like Instagram and the potential risks of sharing personal information publicly, particularly in light of potential misuse for password resetting. We recount a similar trend observed years ago when social media was in its infancy. The second topic covers Ring’s decision to discontinue its ‘Request for assistance’ feature on its Neighbors app which initially allowed police to publicly request doorbell footage without a warrant. We explore various viewpoints on this topic, including the need for warrants, pr ..read more
Visit website

Follow The Shared Security Show on FeedSpot

Continue with Google
Continue with Apple
OR