449 episodes

Shared Security is your premier cybersecurity and privacy podcast where we explore the bonds shared between people and technology. Join industry experts Tom Eston, Scott Wright, and Kevin Johnson as they deliver the latest news, actionable tips, expert guidance, and insightful interviews with top cybersecurity and privacy specialists. Stay informed and take control of your online security and privacy in today's interconnected world. Tune in every week to discover invaluable insights, strategies, and tools to live confidently and safeguard your digital life.

Shared Security Tom Eston, Scott Wright, Kevin Johnson

    • News
    • 4.5 • 28 Ratings

Shared Security is your premier cybersecurity and privacy podcast where we explore the bonds shared between people and technology. Join industry experts Tom Eston, Scott Wright, and Kevin Johnson as they deliver the latest news, actionable tips, expert guidance, and insightful interviews with top cybersecurity and privacy specialists. Stay informed and take control of your online security and privacy in today's interconnected world. Tune in every week to discover invaluable insights, strategies, and tools to live confidently and safeguard your digital life.

    Linux Backdoor Infection Scare, Massive Social Security Number Heist

    Linux Backdoor Infection Scare, Massive Social Security Number Heist

    In episode 325, Tom and Kevin discuss a significant backdoor threat that nearly compromised Linux systems globally, stemming from an infiltration into an open-source project called XZ Utils by attackers who gained commit access and inserted a backdoor. The episode further delves into a cybersecurity incident where hackers stole 340,000 social security numbers from a government consulting firm, emphasizing the implications and broader concerns related to data security in government contractors and the inefficacy of response mechanisms. Additionally, the hosts explore the negative influences of marketing in the cybersecurity industry, particularly following significant security breaches.

    • 17 min
    Massive AT&T Data Leak, The Danger of Thread Hijacking

    Massive AT&T Data Leak, The Danger of Thread Hijacking

    Episode 324 features discussions on a significant AT&T data breach affecting 73 million customers and a sophisticated thread jacking attack targeting a journalist. Co-host Scott Wright joins the discussion, highlighting how millions of AT&T customer account passcodes, along with personal information, were compromised due to a leak discovered by a security researcher and reported by TechCrunch. The episode also details the thread jacking phishing attack, emphasizing the importance of recognizing unexpected email threads and the potential dangers of malicious attachments. The episode concludes with a brief discussion on the upcoming solar eclipse, stressing the importance of using ISO-certified glasses for viewing.

    • 17 min
    New Hotel Lock Vulnerabilities, Glassdoor Anonymity Issues

    New Hotel Lock Vulnerabilities, Glassdoor Anonymity Issues

    In episode 323, the hosts discuss two prominent topics. The first segment discusses a significant vulnerability discovered in hotel locks, branded as 'Unsaflok,' affecting 3 million doors across 131 countries. The vulnerability allows attackers to create master keys from a regular key, granted access to all doors in a hotel. The co-hosts also discuss the vulnerability's relation to legacy systems and the implications for hotel security. The second segment shifts focus to Glassdoor, revealing that the popular company review site can no longer guarantee anonymity due to changes following its acquisition of Fishbowl, raising concerns about privacy and the potential misuse of personal data. Additionally, the hosts cover the importance of maintaining security in physical and information security systems and the challenges businesses face when upgrading these systems.

    • 23 min
    Alyssa Miller: Charting the Course Through InfoSec and Aviation

    Alyssa Miller: Charting the Course Through InfoSec and Aviation

    In this episode, special guest Alyssa Miller joins the hosts for an insightful and entertaining conversation covering a broad range of topics from social engineering anecdotes involving Kevin Johnson to Alyssa's journey in aviation and being a pilot. They discuss the challenges within the cybersecurity industry, including the transition to cloud computing and the neglect of on-prem data centers. Alyssa also shares a personal story about encountering workplace discrimination, offering advice based on her experiences. Additionally, the discussion touches on upcoming conference talks Alyssa is giving, which link her passion for aviation with lessons for the cybersecurity field. The episode touches on critical InfoSec challenges for 2024, humorously dismissing the hype around generative AI and quantum computing as the main issues.

    • 40 min
    The TikTok Ban Bill, Your Car is Spying on You, Signal’s Username Update

    The TikTok Ban Bill, Your Car is Spying on You, Signal’s Username Update

    In episode 321, the hosts discuss how connected cars are sharing driving data with insurance companies, potentially leading to increased rates for drivers. They also talk about the anti-TikTok bill passed by the House, which could force ByteDance to sell TikTok or face a ban in app stores. The episode also covers a significant update to Signal, allowing users to use usernames instead of phone numbers, enhancing privacy. Insights into privacy policies, the importance of understanding consent, and the broader implications of data collection and sharing among different entities are also discussed.

    • 24 min
    Who’s to Blame for Hacked Social Media Accounts, Spoofed Online Meeting Requests and Malware

    Who’s to Blame for Hacked Social Media Accounts, Spoofed Online Meeting Requests and Malware

    In episode 320, Tom and Scott discuss the contentious issue of who is accountable when Facebook or Instagram accounts are hacked, discussing potential failings on both the user's and Meta's part. They explore the possibility of inadequate security measures on these platforms and the implications of Meta potentially profiting from fraudulent ads. The episode also covers a Wired article regarding 41 state attorney generals in the U.S. urging Meta to enhance their security to manage the rising complaints of account theft. Furthermore, the 'Aware Much' segment highlights a new threat involving spoofed Zoom, Google, and Skype meeting requests that spread remote access Trojans (RATs), discussing the sophistication of these phishing attacks and malware's ability to compromise systems. The conversation touches on the effectiveness of two-factor authentication (2FA), the challenge of identifying malicious URLs, and the role of government in pressuring companies like Meta to improve security practices.

    • 20 min

Customer Reviews

4.5 out of 5
28 Ratings

28 Ratings

KWGraves ,

Highly Recommend

I appreciate the sound advice given on current security events as well as other comments! I follow this podcast this every Monday.

obacker19 ,

Entertaining, insightful and actionable! 👏👏👏

Whether you’re well established as someone who can translate creative energy into the impact you want to have on the cyber security industry, or just getting started as a catalyst for change - this is a must-listen podcast for you! Tom and Scott do an incredible job leading conversations that cover a huge breadth of topics related to the ins and outs of building a thriving career in data security, and life you can be proud of - from leaders who’ve actually walked the path. Highly recommend listening and subscribing!

Tony-Stark-0 ,

30% ads 50% useless chatter

Only a tiny fraction of the show is valuable, and that too going over news articles. A lot of wasted time. But that’s just me.

Top Podcasts In News

Serial
Serial Productions & The New York Times
The Daily
The New York Times
Up First
NPR
The Tucker Carlson Podcast
Tucker Carlson Network
The Ben Shapiro Show
The Daily Wire
The Megyn Kelly Show
SiriusXM

You Might Also Like

Hacking Humans
N2K Networks
Smashing Security
Graham Cluley & Carole Theriault
Malicious Life
Malicious Life
Defense in Depth
David Spark
CyberWire Daily
N2K Networks
Hacked
Hacked