What is The Shared Security Podcast?
What are the hot topics taking place in the world of Cybersecurity? How does this affect your business and personal life? Cybersecurity- or known as Infosec – involves understanding the vulnerability of information, the potential people and other threats that could impact it, and the strength of the entities we trust to hold or process our information. We should be concerned about Confidentiality, Integrity and Availability of our information.
How does new technology affect your privacy? What are the privacy concerns and shortcomings with the latest technology? Some people may say “Privacy is dead…” But does this mean we should no longer worry about protecting our personal information? If so, then presumably these people don’t need passwords for their online accounts, and they don’t need bathroom doors… Seriously, privacy is a complex matter of trust that involves how others collect, use and disclose information you share with them. You should always try to understand privacy implications when dealing with a new entity or device.
The Internet of Things (IoT)
When we connect everything we use to the Internet what are the risks and what should you be aware of from a business and consumer perspective? Increasingly, devices are becoming “Smart”, which means they can gather information, process it and communicate with other entities. With each new connection, there is potential vulnerability. You should understand the information security and privacy risks when you add a new Smart device to your life.
Mobile Devices and Apps
Mobile devices and applications are part of our daily lives. What risk does this technology pose and what do we need to know for the future? We all want to be able to communicate easily with each other, and with our Smart devices. All of our communications are now focusing around our smartphones and tablets. So the trust we put in our mobile devices affects nearly every part of our lives.
Social Media and Social Networks
What are the dangers and threats of Social Networks and how we use them? How do advancements in Social Media technologies affect you? Social Networks are based on users trusting each other, and the site. But they also represent big money for advertisers and site owners, as well as malicious attackers. So, you need to understand how using these services affects your information security and privacy.
In episode 114 for March 30th 2020: Co-host Tom Eston is joined with frequent guest Kevin Johnson to discuss how to stay more secure when working from home. If you find yourself working from home because of COVID-19 this is one episode you don’t want to miss! ** Show notes and links mentioned on the Read more about Staying Secure When Working From Home[…]
In episode 98 of our monthly show co-host Scott Wright shows us a demo of Click Armor which is a gamified cybersecurity awareness platform, Tom presents the results of our listener survey, and we have a discussion about the privacy concerns with geofence warrants. ** Show notes and links mentioned on the show ** Take Read more about Click Armor Demo, Podcast Survey Results, Google Geofence Warrants[…]
In episode 113 for March 23rd 2020: Israel passes an emergency law to use mobile data to track people infected with COVID-19, the latest coronavirus cyber-attacks to be aware of, and how governments world-wide could be putting backdoors into secure messaging apps. ** Show notes and links mentioned on the show ** Israel passes emergency Read more about COVID-19 Mass Surveillance, New Coronavirus Cyber-Attacks, Encryption Backdoors[…]
In episode 112 for March 16th 2020: The cybersecurity impact of COVID-19, who’s hacking the hackers, and details on a data leak of the secret sharing app Whisper. ** Show notes and links mentioned on the show ** Resilient in Times of Disruption https://www.rsa.com/en-us/blog/2020-03/resilient-in-times-of-disruption COVID-19 coronavirus outbreak and a security conference tries to play it Read more about COVID-19 Cybersecurity Impact, Hacking the Hackers, Whisper App Data Leak[…]
In episode 111 for March 9th 2020: A new report shows that attacks on Internet of Things devices are on the rise, the FCC fines major mobile carriers for selling users’ location data, and details on what happens when 3 million HTTPS certificates need to be revoked because of coding error. ** Show notes and Read more about IoT Device Attacks, FCC Fines Mobile Carriers, Let’s Encrypt Certificate Bug[…]
In episode 110: Tyler Hudak, Incident Response Practice Lead at TrustedSec, joins us to talk about what you should do (and more importantly what you shouldn’t do) if you find out you’ve been hacked! ** Show notes and links mentioned on the show ** Take our podcast listener survey and be entered to win a Read more about You’ve Been Hacked! Now What?[…]
Ring Mandates Two-Factor Authentication, License Plate Reader Data Sharing, RSA Conference Coronavirus Fears
In episode 109 for February 24th 2020: Kevin Johnson joins us to discuss how Ring made two-factor authentication mandatory following recent hacking incidents, California police have been caught illegally sharing license plate reader data, and details on IBM and other companies pulling out of the RSA conference due to coronavirus fears. ** Show notes and Read more about Ring Mandates Two-Factor Authentication, License Plate Reader Data Sharing, RSA Conference Coronavirus Fears[…]
In episode 97 of our monthly show we discuss how Chinese hackers caused the Equifax data breach, new coronavirus phishing attacks to be aware of, and how to stay (almost) anonymous online. ** Show notes and links mentioned on the show ** U.S. Charges 4 Chinese Military Officers in 2017 Equifax Hack https://krebsonsecurity.com/2020/02/u-s-charges-4-chinese-military-officers-in-2017-equifax-hack/ Phishers impersonate Read more about Chinese Hackers, Coronavirus Phishing Attacks, How to Stay (Almost) Anonymous Online[…]
In episode 108 for February 17th 2020: The US charges four Chinese military hackers in the Equifax data breach, how Israel’s entire voter registry was exposed, and details on the encryption provider that was secretly owned by the CIA for the last fifty years. ** Show notes and links mentioned on the show ** U.S. Read more about Equifax Hacked by China, Israeli Voter Registry Exposed, How the CIA Owned Encryption[…]
In episode 107 for February 10th 2020: preventing tax identity theft and other tax scams, the FTC taking a stand against companies that support robocallers, and details on the incident where videos from Google Photos were being sent to strangers. ** Show notes and links mentioned on the show ** Preventing Tax Identity Theft and Read more about Preventing Tax Identity Theft, FTC and Robocallers, Google Photos Incident[…]