
Meet NEO 1X: The Robot That Does Chores and Spies on You?

OpenAI’s ChatGPT Atlas: What It Means for Cybersecurity and Privacy

It’s Always DNS: Lessons from the AWS Outage

Is Sora 2 the Future of Video? AI, Copyright, and Privacy Issues

Age Verification Laws: A Privacy Disaster in the Making

Are Phishing Simulations Still Worth It?

Milestone Episode 400: Reflecting on 16 Years of Shared Security

Situational Awareness & Family Safety: Staying Alert in Today’s World with Andy Murphy

Best of Shared Security (2020) History Repeats Itself: Cybersecurity Challenges that Still Haunt Us

Salesforce Under Fire: The Salesloft Drift Supply-Chain Breach

Convenience vs. Privacy: Can We Have Both?

Public Wi-Fi Myths: Why You’re Probably Safer Than You Think

The Tea App Hack: How a “Safe” Space Leaked 13,000 ID Photos & 1.1M Messages

Random Smishing Text Scams: Why “Do I Know You?” Texts Are Dangerous

Leaked, Patched, and Still Hacked: The SharePoint Zero-Day Crisis

Doorbells, Dystopia, and Digital Rights: The Ring Surveillance Debate

Passwords and the Elderly: Why Writing Them Down Might Be OK

The Google Workspace Security Gap: Why Traditional Tools Fall Short

Autonomous Hacking? This Startup May Have Just Changed Penetration Testing Forever

Cybersecurity Talent Shortage: Myth, Mismatch, or Reality?

Kids Online Safety Act (KOSA): Protecting Kids or Censorship?

Cities of the Future or Hacker’s Paradise? The Cybersecurity Risks of Smart Cities

Do You Really Need a REAL ID to Fly in the US? Breaking Down the Myths

Invasion of Privacy: The Hidden Camera Dilemma

When AI Fights Back: Threats, Ethics, and Safety Concerns

Mark Zuckerberg’s Vision: AI Companions and the Loneliness Epidemic

Facebook Flaws and Privacy Laws: A Journey into Early Social Media Security from 2009

What Vibe Coding, MCP, and Slopsquatting Reveal About the Future of AI Development

The Impact of Politics on Cybersecurity: CVE’s and the Chris Krebs Executive Order

Centralizing Data and Enhancing Workflows: Inside PlexTrac’s New Capabilities

US Border Searches and Protesting in the Surveillance Age

The 23andMe Collapse, Signal Gate Fallout

Understanding Privacy Changes: eBay’s AI Policy and The Future of Data Privacy

From Spreadsheets to Solutions: How PlexTrac Enhances Security Workflows

Tackling Data Overload: Strategies for Effective Vulnerability Remediation

Trump Administration and the Russian Cyber Threat, Firefox Privacy Changes

Cybersecurity Impact of DOGE, Apple’s Stand Against Encryption Backdoors

Cybersecurity Insights with John Hammond: YouTube Legend and Security Researcher

UK’s Secret Apple Backdoor Request, AI Chatbots Used For Stalking

Careers in Cybersecurity: Myths and Realities with Kathleen Smith

Privacy Concerns with Digital Driver’s Licenses, The Rise of DeepSeek AI

Gravy Analytics Breach, Subaru Starlink Vulnerability Exposed

Meta Ditches Fact-Checking for Community Notes, RedNote and the TikTok Ban

AI Privacy Policies: Unveiling the Secrets Behind ChatGPT, Gemini, and Claude

Reflecting on Y2K: Lessons for the Next Tech Crisis and AI Safety

2024 Year in Review: What We Got Right and Looking to 2025

Digital License Plate Vulnerabilities, How to Avoid New Text Message Scams

Hack-for-Hire Campaign Targeting Climate Activists, Government Hypocrisy on Encryption

Tanya Janca on Secure Coding, AI in Cybersecurity, and Her New Book

Australia Bans Social Media for Kids, Holiday Vishing Scams

Deepfake Fraud, Data Brokers Tracking Military Personnel

Why It’s Time to Leave Twitter

Advanced Persistent Teenagers, Okta Bug Allowed Logins Without a Correct Password

Fallout from the Change Healthcare Breach, Mortgage Wire Fraud What You Need To Know

Internet Archive Hacked, Introducing The AI Toilet Camera

Hacked Robot Vacuums, Secret Printer Tracking Dots

Emergency Satellite Messaging, Stagnation in User Cybersecurity Habits

Kia Security Flaw Exposed, NIST’s New Password Guidelines

Discord’s New End-to-End Encryption, LinkedIn Using Your Data for AI Training

Supply Chain Sabotage: The Exploding Pager Incident, Instagram’s New Teen Privacy Measures

The Rise of AI Voicemail Scams, Political Donation Privacy Concerns

Shocking SQL Injection in TSA App, Bitcoin ATM Scams Targeting Seniors

Telegram is NOT an Encrypted Messaging App, Must-See Documentaries

Google’s Monopoly: The Debate Heats Up, Amazon Alexa Privacy Tips

The Inefficiency of People-Search Removal Tools, Massive Data Breach Impacting U.S. Citizens

Exploring Cybersecurity Trends at Black Hat 2024 with Shourya Pratap Singh from SquareX

The Great CrowdStrike Crash, AI’s Role in Employee Smiles

How SquareX is Redefining Web Security: An In-Depth Discussion with Chief Architect Jeswin Mathai

Deepfakes, AI, and the Future of Cybersecurity: Insights from Dan DeCloss of PlexTrac

Massive AT&T Data Breach Impact, Meta’s Privacy Policy Updates

Authy Breach: What It Means for You, RockYou 2024 Password Leak

Critical SSH Vulnerability, Facial Recognition Flaws, How to Safely Dispose of Old Devices

The U.S. Bans Kaspersky Antivirus, WordPress Plugin Supply Chain Attacks

Exploring Cutting-Edge Browser Security with Vivek Ramachandran – Founder of SquareX

Social Media Warning Labels, Should You Store Passwords in Your Web Browser?

Citizen Lab vs. NSO Group, Apple AI and Privacy

Ticketmaster Data Breach and Rising Work from Home Scams

Sober in Cyber: Creating Alcohol-Free Networking in Cybersecurity with Jen VanAntwerp

Microsoft’s Copilot+ Recall Feature, Slack’s AI Training Controversy

New Tracker Warning Features on iPhones & Androids, 2024 Verizon Data Breach Investigations Report

Live at RSA: AI Hype, Enhanced Security, and the Future of Cybersecurity Tools

FCC Fines Wireless Carriers $200 million, Google’s Fight Against Malicious Apps

Privacy Challenges in Relationships, Phishing Down but Vulnerabilities Up?

Navigating Security Awareness in the Tech Industry with Erin Gallagher

Linux Backdoor Infection Scare, Massive Social Security Number Heist

Massive AT&T Data Leak, The Danger of Thread Hijacking

New Hotel Lock Vulnerabilities, Glassdoor Anonymity Issues

Alyssa Miller: Charting the Course Through InfoSec and Aviation

The TikTok Ban Bill, Your Car is Spying on You, Signal’s Username Update

Who’s to Blame for Hacked Social Media Accounts, Spoofed Online Meeting Requests and Malware

Don’t Trust Your AI Girlfriend or Boyfriend, Exposing US Government Data Collection

‘Get to Know Me’ Privacy Risks, Pros and Cons of Publicly Sharing Ring Doorbell Footage

25.6 Million Dollar Deepfake Scam, Exploring Canada’s Flipper Zero Ban

Jason Haddix on Bug Bounties and Cybersecurity Career Growth

The Problem of Victim Blaming in Cybersecurity: Empathy, Responsibility & Ethical Practices

Secure Your iPhone: Exploring Stolen Device Protection

The World of Scambaiting, Preventing Social Media Account Takeovers, Network Wrenches Hacked

Ohio’s New Social Media Law, Meta’s Link History Feature, 175 Million Passcode Guesses

Most Advanced iPhone Exploit Ever, Google’s $5 Billion Settlement, Apple’s Journal App

The Three Keys to Success in Cybersecurity

The Year in Review and 2024 Predictions

Password Security for the Elderly: Tips and Best Practices

iOS 17 NameDrop Debunking, Real World QR Code Attacks, Impact of Ransomware on Hospitals

Application Security Trends & Challenges with Tanya Janca

Apple Finally Adopts RCS, AI Powered Scams Targeting the Elderly

Paying Big Tech for Privacy, New Privacy Policy Study, Biden’s Executive Order on AI

SEC vs. SolarWinds CISO, Classiscam Scam-as-a-Service

Okta Hacked Again, Quishing Is The New Phishing, Google Play Protect Real-Time Scanning

How to Opt Out of CPNI Data Sharing

Special Guest Jayson E. Street, Phantom Hacker Scams, 23andMe User Data For Sale

Educating the Next Cybersecurity Generation with Tib3rius

Your Car is a Privacy Nightmare, Password Creation Best Practices, Sony Hacked Again

Is My Boss Spying on Me, Instagram Painting Scam, Kia and Hyundai TikTok Challenge

Content Creation, Mental Health in Cyber, The MGM Ransomware Attack

The Changing Role of the CISO with Ryan Davis, Chief Information Security Officer at NS1

The FBI’s Qakbot Takedown, QR Code Phishing Attacks, Dox Anyone in America for $15

SaaS Attacks: Compromising an Organization without Touching the Network

Back to School Cybersecurity, Phishing Pitfalls and Strategies, X’s (Twitter) Blocking Overhaul

Business Email Compromise Scams Revisited

The Current and Future State of Email Security with Andy Yen, CEO of Proton

Common Sense Advice for Hacker Summer Camp, AI Chatbot Attacks, What’s a Flipper Zero?

Your Digital Immortality is Coming, Apple and Google Are Data Gatekeepers, Satellite Security Risks Revealed

Microsoft Lost Its Keys, Voice Cloning Scams, The Biden-Harris Cybersecurity Labeling Program

First Ban on Selling Location Data, Prohibiting Password Managers, Real-Time Crime Center Concerns

Meta’s Threads and Your Privacy, Airline Reservation Scams, IDOR Srikes Back

MOVEit Cyberattack, The Problem with Password Rotations, Military Alert on Free Smartwatches

Security Podcasting, Hacking Stories, and The State of Firmware Security with Paul Asadoorian

The FTC’s Complaint Against Ring, Detecting Malware Infected Apps, America’s Most Cybersecure Companies

How to Break Into a Cybersecurity Career – Phillip Wylie

Netflix Cracks Down on Password Sharing, AI Legal Research Gone Wrong, Fake Identities and Surveillance Firms

Meta’s $1.3 Billion Fine, AI Hoax Hysteria, Montana’s TikTok Ban

Google Now Supports Passkeys, Risky New Top Level Domains, Twitter’s Encryption Dilemma

Private Tweets Exposed, Unauthorized Tracking Collaboration, AI Risks and Regulation

Juice Jacking Debunked, Photographer vs. AI Dataset, Google Authenticator Risks

Building a Healthy Security Culture: Insights from Kai Roer

Arkansas Social Media Consent Law, Android Malware Invasion, New Method of Keyless Car Theft

Genesis Market Crackdown, Life360 App Misuse, Tesla Customer Privacy Concerns

Clearview AI Facial Recognition Fallout, Hacked and Helpless, Is AI Armageddon Upon Us?

The TikTok CEO Testimony, ChatGPT’s Privacy Risks, Inaudible Ultrasound Attacks

Samsung Chipset Zero-Day Vulnerabilities, AI-Assisted Social Engineering, ATM Fraud with a Twist

Exploring the Role of Empathy in Cybersecurity with Andra Zaharia

Biden’s National Cybersecurity Strategy, BetterHelp’s FTC Fine, Chick-fil-A Data Breach

The LastPass Attack Gets Worse, What is Gamification, Signal’s Encryption Standoff

Twitter’s Paywall 2FA, Mental Health Data for Sale, Meta’s Verified Program

Reddit Hacked, Preventing Accidental Location Sharing, Developer Hacks His Own Company

Layoffs, Recruiting, and The Year Ahead for Cybersecurity Job Seekers

Password Managers Under Attack, Shady Reward Apps on Google Play, Meta Account Center 2FA Bypass

U.S. ‘No Fly List’ Leaks, AI-Powered Phishing, Wi-Fi Used to See Humans Through Walls

Social Zombies Revisited: Your Friends Want to Eat Your Brains

Meta’s EU Ad Practices Ruled Illegal, Twitter API Data Breach, Vulnerabilities in Major Car Brands

LastPass Password Vaults Stolen, Pig Butchering Scams, Okta Source Code Theft

How to Stop Online Tracking: 3 New Ways

The Year in Review and 2023 Predictions

Apple to Allow Third-Party App Stores, Lensa AI App Privacy Risks, Real-Life Invisibility Cloak

ChatGPT Goes Viral, More Trouble for LastPass, Apple’s New Data Protections

SASE: Is it Just Another Cybersecurity Buzzword?

Is Social Media at a Tipping Point, The TikTok Invisible Challenge, San Francisco Police Can Use Killer Robots

How to Break Into a Cybersecurity Career – Rob Fuller (Mubix)

The Rise of Mastodon, Twitter in Trouble, Largest Privacy Settlement in US History

How to Break Into a Cybersecurity Career – Digital Forensics and Incident Response (DFIR)

Cybersecurity’s Role in Combating Midterm Election Disinformation

CISO Liability Risk and Jail Time, (ISC)2 Bylaw Vote and the Value of Cybersecurity Certifications

Attack of the Wi-Fi Spy Drones, How to Destroy Your Old Electronics, Signal Removes SMS Support

Uber Breach Guilty Verdict, Mandatory Password Expiration, Fake Executive Profiles on LinkedIn

Hackers Need 5 Hours or Less to Break In, SMS Phishing Tactics, Strange Ways Employees Expose Data

What are Passkeys, PowerPoint Mouseover Attack, 2K Games Support Hacked

Uber Hacked by 18 Year Old, Morgan Stanley Hard Drives Got Auctioned, Deleting Your Data is Hard

Facebook Doesn’t Know Where Your Data Is, New Hire Spearmishing Attack, Smart Thermostat Lock Out

TikTok Denies Data Breach, Los Angeles School District Ransomware Attack, Fingerprint Scanners in School Bathrooms

LastPass Data Breach, ETHERLED: Air-Gapped Systems Attack, Twitter Whistleblower Complaint

Janet Jackson Can Crash Laptops, Credential Phishing Attacks Skyrocket, A Phone Carrier That Doesn’t Track You

Multi-Factor Authentication Fatigue Attack, Signal Account Twilio Hack, Facebook and Instagram In-App Browser

The Importance of Faraday Technology with Aaron Zar from SLNT

Phone Numbers Used for Identification, Hacker Summer Camp Advice, Samsung Repair Mode

Twitter Data Breach, 15 Minutes to Exploit Zero-Day Vulnerabilities, Resilient Deepfake Traits

Robert Kerbeck Author of RUSE: Lying the American Dream from Hollywood to Wall Street

Apple Previews Lockdown Mode, Another Marriott Data Breach, Smart Contact Lenses

Could TikTok Be Removed From App Stores, HackerOne Employee Caught Stealing Vulnerability Reports, California Gun Owner Data Breach

Period Tracking Apps and Your Privacy, Vendor Impersonation Attacks, LockBit Ransomware Bug Bounty Program

Tim Hortons Privacy Investigation, Social Engineering Kill-Chain, Hospitals Sending Facebook Your Data

Bipartisan Digital-Privacy Bill, Delete Your Data Before Selling Your Car, Firefox Total Cookie Protection

Hacking Ham Radio: Why It’s Still Relevant and How to Get Started

DuckDuckGo Browser Allows Microsoft Trackers, Stolen Verizon Employee Database, Attacking Powered Off iPhones

The State of Application Security with Tanya Janca

Apple Mail Privacy Protection, Government Agencies Reveal Top Attack Vectors, Is Big Brother Watching You at Work?

FBI Warrantless Searches, Passwordless Sign-Ins, Keylogging Web Forms

Cybersecurity for Startups with Josh Feinblum from Stavvy

Elon Musk Buys Twitter, Forgotten BIOS Updates, T-Shirt Outwits Facial Recognition

Rehumanizing Cybersecurity with Lianne Potter

Dumbphone Sales are Soaring, John Oliver Blackmails Congress, Cicada Chinese APT Group

Truths and Myths of Privacy, Fake Shopping Apps, Borat RAT Malware

Google Android vs Apple iOS: Which is Better for Privacy and Cybersecurity?

LAPSUS$ Hacks Okta, Browser-in-the Browser Phishing Attack, Popular Software Package Updated to Wipe Russian Systems

Top 3 Location Tracking Apps: Do They Sell Your Data?

Amazon Echos Hack Themselves, Fraud Is Flourishing on Zelle, Samsung Galaxy Source Code Stolen

Russia Gets Hacked, Microsoft 365 Credential Stuffing, McDonald’s Ice Cream Machine Hackers

TikTok Circumvents Privacy Protections, Russian Sanction Attacks, Apple AirTag Anti-Stalking Measures

MoviePass Tracking Your Eyeballs, Shipment Delivery Scams, SIM Swappers Arrested

EARN IT Act is Back, Romance Scams, Like and Subscribe Ransomware

Graphics Card Web Tracking, Fake Job Ad Scams, Hacker Takes Down North Korea’s Internet

Ukraine Invasion Hacktivists, Insta360 ONE X2 Vulnerabilities, Google Location Tracking Lawsuits

Pandemic Surveillance in Canada, Malware-Filled USB Sticks are Back, Kill Switches in New Cars

Digital Wellbeing with Kelly Finnerty from Startpage

Norton 360 Cryptominer, Fake QR Codes on Parking Meters, Facebook Account Deactivation

Phone Scam Targets Psychologists, All My Apes Gone, Supply Chain Skimmer Attack

LastPass Master Passwords, New Cars and Your Privacy, Amazon Alexa Lethal Challenge

Web3 and the Decentralized Internet

The Year in Review and 2022 Predictions

Log4j Vulnerability, Apple AirTags Used by Thieves, FBI’s Encrypted Messaging App Document

Life360 Selling Location Data, NSO Group Spyware Hacks Government Employees, Homecoming Queen Contest Hacked

Business Email Compromise Scams

Is TikTok Listening to You, Apple Warns Activists, UK Government Website Shows Porn

How to Break Into a Cybersecurity Career – Part 3 with Scott Wright

FBI Email System Compromised, Ransomware Negotiation, Privacy Crushing Gifts

Robinhood Data Breach, 600 Hours of Dallas Police Helicopter Footage Leaked

Facebook Dumps Face Recognition, Social Engineering Bots, US Sanctions NSO Group

Interview with Dana Mantilia and the Role of the CISO

Federal Data Agency for Social Media, Squirrelwaffle Malspam, Ransomware Hits U.S. Candymaker

Missouri Governor and F12 Hacking, Global Ransomware Meeting, Fake Government Websites

Killware Clickbait, 1Password Password Sharing Feature, Android Phone Snooping

Security Champions Framework, The Great Facebook Outage, Twitch Data Breach

Apple AirTag Good Samaritan Attack, iCloud+, Amazon Astro Dog and Ring Camera Drone

Multi-Factor Authentication and Authenticator Apps

No Password Microsoft Accounts, Facebook Smart Glasses, Security.txt Internet Standard

iMessage Zero-Click Exploit, Leaked Guntrader Firearms Data, 60 Million Fitness Tracking Records Exposed

ProtonMail IP Address Logging Controversy, Fake Bot Disinformation, Correctional Facility Robot Overlords

Election Security and the Packet Capture Controversy with Special Guest Rafal Los

What Happens to Your Social Media Accounts After You Die?

T-Mobile Hacker Identified, China’s New Privacy Law, Tesla Bot Announcement

T-Mobile Data Breach, Tinder Identity Verification, Magnetic Stripe Phase Out

Largest Cryptocurrency Hack in History, $10k For Stolen Network Access, Your Identity and the Metaverse

CISA JCDC Announcement, Apple’s Child Abuse Image Scanning, Amazon Pays You for Your Biometric Data

Reboot Your Smartphone, FBI’s Top Targeted Vulnerabilities, Flirty Account Dupes Defense Contractors

How to Protect Yourself from Gift Card Scams

Pegasus Spyware is Back, Twitter Hacker Arrested, 16-Year-Old Printer Bug

Popular Myths about VPNs

Targeted Dream Incubation, TikTok Data Sharing, Chrome and Firefox Updates

Kaseya Ransomware Attack, PrintNightmare Zero-day, Kaspersky Password Manager Vulnerability

LinkedIn Data Leak, Western Digital NAS Attacks, STIR/SHAKEN Deadline

Asset Discovery with Chris Kirsch Co-Founder at Rumble

Off Limits Critical Infrastructure, Ransomware on Repeat, Cyber Safe Drinking Water

TikTok Collecting Biometric Data, Peloton Bike+ Vulnerability, Nextdoor App Concerns

ANOM FBI Global Crime Sting, Colonial Pipeline Updates, Password Leak Research

Amazon Sidewalk, NFTs and Cybersecurity, Norton 360 Cryptocurrency Mining

Biden’s Cybersecurity Executive Order, Apple’s AirTag, Cyber Insurance

How Gamification is Changing Cybersecurity

Colonial Pipeline Updates, DarkSide Goes Dark, Cybersecurity Best Practices

The Colonial Pipeline Ransomware Attack

World Password Day, Tesla Hacking via Drone, Ipsos Screenwise Panel

Remembering Dan Kaminsky, Apple AirDrop Vulnerability

3 Ways to Keep Your Cryptocurrency Safe

Instagram Anti-Abuse Tool, Apple Advertiser Restrictions, Terrible Passwords

Data Breaches vs. Data Leaks, FBI Exchange Server Controversy

Best of Episode: Interview with Jayson E. Street

Best of Episode: Interview with Rachel Tobac

SMS Two-Factor Authentication, New Internet Hygiene Model

Top 3 Privacy Tips for Travel

Facebook and Apple Privacy Debate, Employee Phishing Test Gone Wrong

Encryption Backdoor Debate, Microsoft Exchange Attacks, Airline Supplier Data Breach

The Deepfake Dilemma, Microsoft Exchange Zero-Days, IT Security Investments

Card Skimmers Powered by Chip Cards, Silver Sparrow Mac Malware, Accellion Zero-Days

Clubhouse App and Your Privacy

Apple’s Safe Browsing Request Proxy, BEC Attacks, LastPass Updates

Florida Water Supply Hack, Android App Hijack, US Capitol Riot Phone Tracking

Dangerous Social Media Algorithms, A Moral Imperative for AI Powered Weapons?

Cybersecurity Researchers Targeted, Three iOS Zero-Days, Google FLoC

Tanya Janca CEO and Founder We Hack Purple

Parler, Pelosi’s Stolen Laptop, Vaccination Passport Apps

The Capital Riot: First Amendment and Deplatforming, Cybersecurity Lessons Learned

How to Break Into a Cybersecurity Career – Part 2 with Rafal Los

How to Break Into a Cybersecurity Career – Part 1

Top 3 Cybersecurity Tips

The Year in Review and 2021 Predictions

SolarWinds/SUNBURST Backdoor, Third-Party and Supply Chain Security

FireEye Hacked, Foxconn Ransomware Attack, Apple’s New Privacy Features

iPhone Zero-Click Exploit, BEC Email Auto-Forward Scams, COVID-19 Vaccine Cold Chain Attacks

Holiday Shopping Scams and Tips to Stay Safe

Amazon Sidewalk, Federal IoT Security Law, Facebook Messenger Bug

CISA Director Chris Krebs Fired, Common Sense and Section 230

Stolen Source Code, Apple Zero-Days, Biden’s Privacy and Cybersecurity Policies

Privacy Mindset: Europe vs. United States

Government Rumor Control, US Hospital Ransomware Threat, Russian Hackers Charged

Targeted Attacks Part 3 – The Exploit

Voter Privacy and the US Election

TrickBot Takedown, VPN Flaws, Zoom End-to-End Encryption

The Social Dilemma

More Hospital Ransomware Attacks, FBI’s Disinformation Warning, Android 11 Privacy Features

Targeted Attacks Part 2 – Pretexting and Attack Development

Death by Ransomware, Strava Flyby, iOS 14 Privacy Improvements

StartPage.com – The World’s Most Private Search Engine

Schools Under Cyberattack, Chrome Ad Blocking Update, US Election Interference

NSA Data Collection Ruling, Browsing History Identification, Ambulance Chasing

Targeted Attacks Part 1 – OSINT and Reconnaissance

Uber CISO Charged, Facebook Data Portability, Malicious iOS SDK

Audio Recordings Used to Copy Keys, Carnival Ransomware Attack, Social Media Profile Data Exposed

Amazon Echo Exploit, Privacy Shield, Capital One Data Breach Update

Twitter Hack Lessons Learned, TikTok Ban, Rite Aid Facial Recognition Cameras

How Big Tech Collects Your Private Data and How to Delete It

Chinese Hacking Campaign Exposed, BadPower Fast Charger Attack, Instacart Data Leak

Privacy Settings for Amazon Echo and Google Home
