The Changing Role of the CISO with Ryan Davis, Chief Information Security Officer at NS1
The FBI’s Qakbot Takedown, QR Code Phishing Attacks, Dox Anyone in America for $15
SaaS Attacks: Compromising an Organization without Touching the Network
Back to School Cybersecurity, Phishing Pitfalls and Strategies, X’s (Twitter) Blocking Overhaul
Business Email Compromise Scams Revisited
The Current and Future State of Email Security with Andy Yen, CEO of Proton
Common Sense Advice for Hacker Summer Camp, AI Chatbot Attacks, What’s a Flipper Zero?
Your Digital Immortality is Coming, Apple and Google Are Data Gatekeepers, Satellite Security Risks Revealed
Microsoft Lost Its Keys, Voice Cloning Scams, The Biden-Harris Cybersecurity Labeling Program
First Ban on Selling Location Data, Prohibiting Password Managers, Real-Time Crime Center Concerns
Meta’s Threads and Your Privacy, Airline Reservation Scams, IDOR Srikes Back
MOVEit Cyberattack, The Problem with Password Rotations, Military Alert on Free Smartwatches
Security Podcasting, Hacking Stories, and The State of Firmware Security with Paul Asadoorian
The FTC’s Complaint Against Ring, Detecting Malware Infected Apps, America’s Most Cybersecure Companies
How to Break Into a Cybersecurity Career – Phillip Wylie
Netflix Cracks Down on Password Sharing, AI Legal Research Gone Wrong, Fake Identities and Surveillance Firms
Meta’s $1.3 Billion Fine, AI Hoax Hysteria, Montana’s TikTok Ban
Google Now Supports Passkeys, Risky New Top Level Domains, Twitter’s Encryption Dilemma
Private Tweets Exposed, Unauthorized Tracking Collaboration, AI Risks and Regulation
Juice Jacking Debunked, Photographer vs. AI Dataset, Google Authenticator Risks
Building a Healthy Security Culture: Insights from Kai Roer
Arkansas Social Media Consent Law, Android Malware Invasion, New Method of Keyless Car Theft
Genesis Market Crackdown, Life360 App Misuse, Tesla Customer Privacy Concerns
Clearview AI Facial Recognition Fallout, Hacked and Helpless, Is AI Armageddon Upon Us?
The TikTok CEO Testimony, ChatGPT’s Privacy Risks, Inaudible Ultrasound Attacks
Samsung Chipset Zero-Day Vulnerabilities, AI-Assisted Social Engineering, ATM Fraud with a Twist
Exploring the Role of Empathy in Cybersecurity with Andra Zaharia
Biden’s National Cybersecurity Strategy, BetterHelp’s FTC Fine, Chick-fil-A Data Breach
The LastPass Attack Gets Worse, What is Gamification, Signal’s Encryption Standoff
Twitter’s Paywall 2FA, Mental Health Data for Sale, Meta’s Verified Program
Reddit Hacked, Preventing Accidental Location Sharing, Developer Hacks His Own Company
Layoffs, Recruiting, and The Year Ahead for Cybersecurity Job Seekers
Password Managers Under Attack, Shady Reward Apps on Google Play, Meta Account Center 2FA Bypass
U.S. ‘No Fly List’ Leaks, AI-Powered Phishing, Wi-Fi Used to See Humans Through Walls
Social Zombies Revisited: Your Friends Want to Eat Your Brains
Meta’s EU Ad Practices Ruled Illegal, Twitter API Data Breach, Vulnerabilities in Major Car Brands
LastPass Password Vaults Stolen, Pig Butchering Scams, Okta Source Code Theft
How to Stop Online Tracking: 3 New Ways
The Year in Review and 2023 Predictions
Apple to Allow Third-Party App Stores, Lensa AI App Privacy Risks, Real-Life Invisibility Cloak
ChatGPT Goes Viral, More Trouble for LastPass, Apple’s New Data Protections
SASE: Is it Just Another Cybersecurity Buzzword?
Is Social Media at a Tipping Point, The TikTok Invisible Challenge, San Francisco Police Can Use Killer Robots
How to Break Into a Cybersecurity Career – Rob Fuller (Mubix)
The Rise of Mastodon, Twitter in Trouble, Largest Privacy Settlement in US History
How to Break Into a Cybersecurity Career – Digital Forensics and Incident Response (DFIR)
Cybersecurity’s Role in Combating Midterm Election Disinformation
CISO Liability Risk and Jail Time, (ISC)2 Bylaw Vote and the Value of Cybersecurity Certifications
Attack of the Wi-Fi Spy Drones, How to Destroy Your Old Electronics, Signal Removes SMS Support
Uber Breach Guilty Verdict, Mandatory Password Expiration, Fake Executive Profiles on LinkedIn
Hackers Need 5 Hours or Less to Break In, SMS Phishing Tactics, Strange Ways Employees Expose Data
What are Passkeys, PowerPoint Mouseover Attack, 2K Games Support Hacked
Uber Hacked by 18 Year Old, Morgan Stanley Hard Drives Got Auctioned, Deleting Your Data is Hard
Facebook Doesn’t Know Where Your Data Is, New Hire Spearmishing Attack, Smart Thermostat Lock Out
TikTok Denies Data Breach, Los Angeles School District Ransomware Attack, Fingerprint Scanners in School Bathrooms
LastPass Data Breach, ETHERLED: Air-Gapped Systems Attack, Twitter Whistleblower Complaint
Janet Jackson Can Crash Laptops, Credential Phishing Attacks Skyrocket, A Phone Carrier That Doesn’t Track You
Multi-Factor Authentication Fatigue Attack, Signal Account Twilio Hack, Facebook and Instagram In-App Browser
The Importance of Faraday Technology with Aaron Zar from SLNT
Phone Numbers Used for Identification, Hacker Summer Camp Advice, Samsung Repair Mode
Twitter Data Breach, 15 Minutes to Exploit Zero-Day Vulnerabilities, Resilient Deepfake Traits
Robert Kerbeck Author of RUSE: Lying the American Dream from Hollywood to Wall Street
Apple Previews Lockdown Mode, Another Marriott Data Breach, Smart Contact Lenses
Could TikTok Be Removed From App Stores, HackerOne Employee Caught Stealing Vulnerability Reports, California Gun Owner Data Breach
Period Tracking Apps and Your Privacy, Vendor Impersonation Attacks, LockBit Ransomware Bug Bounty Program
Tim Hortons Privacy Investigation, Social Engineering Kill-Chain, Hospitals Sending Facebook Your Data
Bipartisan Digital-Privacy Bill, Delete Your Data Before Selling Your Car, Firefox Total Cookie Protection
Hacking Ham Radio: Why It’s Still Relevant and How to Get Started
DuckDuckGo Browser Allows Microsoft Trackers, Stolen Verizon Employee Database, Attacking Powered Off iPhones
The State of Application Security with Tanya Janca
Apple Mail Privacy Protection, Government Agencies Reveal Top Attack Vectors, Is Big Brother Watching You at Work?
FBI Warrantless Searches, Passwordless Sign-Ins, Keylogging Web Forms
Cybersecurity for Startups with Josh Feinblum from Stavvy
Elon Musk Buys Twitter, Forgotten BIOS Updates, T-Shirt Outwits Facial Recognition
Rehumanizing Cybersecurity with Lianne Potter
Dumbphone Sales are Soaring, John Oliver Blackmails Congress, Cicada Chinese APT Group
Truths and Myths of Privacy, Fake Shopping Apps, Borat RAT Malware
Google Android vs Apple iOS: Which is Better for Privacy and Cybersecurity?
LAPSUS$ Hacks Okta, Browser-in-the Browser Phishing Attack, Popular Software Package Updated to Wipe Russian Systems
Top 3 Location Tracking Apps: Do They Sell Your Data?
Amazon Echos Hack Themselves, Fraud Is Flourishing on Zelle, Samsung Galaxy Source Code Stolen
Russia Gets Hacked, Microsoft 365 Credential Stuffing, McDonald’s Ice Cream Machine Hackers
TikTok Circumvents Privacy Protections, Russian Sanction Attacks, Apple AirTag Anti-Stalking Measures
MoviePass Tracking Your Eyeballs, Shipment Delivery Scams, SIM Swappers Arrested
EARN IT Act is Back, Romance Scams, Like and Subscribe Ransomware
Graphics Card Web Tracking, Fake Job Ad Scams, Hacker Takes Down North Korea’s Internet
Ukraine Invasion Hacktivists, Insta360 ONE X2 Vulnerabilities, Google Location Tracking Lawsuits
Pandemic Surveillance in Canada, Malware-Filled USB Sticks are Back, Kill Switches in New Cars
Digital Wellbeing with Kelly Finnerty from Startpage
Norton 360 Cryptominer, Fake QR Codes on Parking Meters, Facebook Account Deactivation
Phone Scam Targets Psychologists, All My Apes Gone, Supply Chain Skimmer Attack
LastPass Master Passwords, New Cars and Your Privacy, Amazon Alexa Lethal Challenge
Web3 and the Decentralized Internet
The Year in Review and 2022 Predictions
Log4j Vulnerability, Apple AirTags Used by Thieves, FBI’s Encrypted Messaging App Document
Life360 Selling Location Data, NSO Group Spyware Hacks Government Employees, Homecoming Queen Contest Hacked
Business Email Compromise Scams
Is TikTok Listening to You, Apple Warns Activists, UK Government Website Shows Porn
How to Break Into a Cybersecurity Career – Part 3 with Scott Wright
FBI Email System Compromised, Ransomware Negotiation, Privacy Crushing Gifts
Robinhood Data Breach, 600 Hours of Dallas Police Helicopter Footage Leaked
Facebook Dumps Face Recognition, Social Engineering Bots, US Sanctions NSO Group
Interview with Dana Mantilia and the Role of the CISO
Federal Data Agency for Social Media, Squirrelwaffle Malspam, Ransomware Hits U.S. Candymaker
Missouri Governor and F12 Hacking, Global Ransomware Meeting, Fake Government Websites
Killware Clickbait, 1Password Password Sharing Feature, Android Phone Snooping
Security Champions Framework, The Great Facebook Outage, Twitch Data Breach
Apple AirTag Good Samaritan Attack, iCloud+, Amazon Astro Dog and Ring Camera Drone
Multi-Factor Authentication and Authenticator Apps
No Password Microsoft Accounts, Facebook Smart Glasses, Security.txt Internet Standard
iMessage Zero-Click Exploit, Leaked Guntrader Firearms Data, 60 Million Fitness Tracking Records Exposed
ProtonMail IP Address Logging Controversy, Fake Bot Disinformation, Correctional Facility Robot Overlords
Election Security and the Packet Capture Controversy with Special Guest Rafal Los
What Happens to Your Social Media Accounts After You Die?
T-Mobile Hacker Identified, China’s New Privacy Law, Tesla Bot Announcement
T-Mobile Data Breach, Tinder Identity Verification, Magnetic Stripe Phase Out
Largest Cryptocurrency Hack in History, $10k For Stolen Network Access, Your Identity and the Metaverse
CISA JCDC Announcement, Apple’s Child Abuse Image Scanning, Amazon Pays You for Your Biometric Data
Reboot Your Smartphone, FBI’s Top Targeted Vulnerabilities, Flirty Account Dupes Defense Contractors
How to Protect Yourself from Gift Card Scams
Pegasus Spyware is Back, Twitter Hacker Arrested, 16-Year-Old Printer Bug
Popular Myths about VPNs
Targeted Dream Incubation, TikTok Data Sharing, Chrome and Firefox Updates
Kaseya Ransomware Attack, PrintNightmare Zero-day, Kaspersky Password Manager Vulnerability
LinkedIn Data Leak, Western Digital NAS Attacks, STIR/SHAKEN Deadline
Asset Discovery with Chris Kirsch Co-Founder at Rumble
Off Limits Critical Infrastructure, Ransomware on Repeat, Cyber Safe Drinking Water
TikTok Collecting Biometric Data, Peloton Bike+ Vulnerability, Nextdoor App Concerns
ANOM FBI Global Crime Sting, Colonial Pipeline Updates, Password Leak Research
Amazon Sidewalk, NFTs and Cybersecurity, Norton 360 Cryptocurrency Mining
Biden’s Cybersecurity Executive Order, Apple’s AirTag, Cyber Insurance
How Gamification is Changing Cybersecurity
Colonial Pipeline Updates, DarkSide Goes Dark, Cybersecurity Best Practices
The Colonial Pipeline Ransomware Attack
World Password Day, Tesla Hacking via Drone, Ipsos Screenwise Panel
Remembering Dan Kaminsky, Apple AirDrop Vulnerability
3 Ways to Keep Your Cryptocurrency Safe
Instagram Anti-Abuse Tool, Apple Advertiser Restrictions, Terrible Passwords
Data Breaches vs. Data Leaks, FBI Exchange Server Controversy
Best of Episode: Interview with Jayson E. Street
Best of Episode: Interview with Rachel Tobac
SMS Two-Factor Authentication, New Internet Hygiene Model
Top 3 Privacy Tips for Travel
Facebook and Apple Privacy Debate, Employee Phishing Test Gone Wrong
Encryption Backdoor Debate, Microsoft Exchange Attacks, Airline Supplier Data Breach
The Deepfake Dilemma, Microsoft Exchange Zero-Days, IT Security Investments
Card Skimmers Powered by Chip Cards, Silver Sparrow Mac Malware, Accellion Zero-Days
Clubhouse App and Your Privacy
Apple’s Safe Browsing Request Proxy, BEC Attacks, LastPass Updates
Florida Water Supply Hack, Android App Hijack, US Capitol Riot Phone Tracking
Dangerous Social Media Algorithms, A Moral Imperative for AI Powered Weapons?
Cybersecurity Researchers Targeted, Three iOS Zero-Days, Google FLoC
Tanya Janca CEO and Founder We Hack Purple
Parler, Pelosi’s Stolen Laptop, Vaccination Passport Apps
The Capital Riot: First Amendment and Deplatforming, Cybersecurity Lessons Learned
How to Break Into a Cybersecurity Career – Part 2 with Rafal Los
How to Break Into a Cybersecurity Career – Part 1
Top 3 Cybersecurity Tips
The Year in Review and 2021 Predictions
SolarWinds/SUNBURST Backdoor, Third-Party and Supply Chain Security
FireEye Hacked, Foxconn Ransomware Attack, Apple’s New Privacy Features
iPhone Zero-Click Exploit, BEC Email Auto-Forward Scams, COVID-19 Vaccine Cold Chain Attacks
Holiday Shopping Scams and Tips to Stay Safe
Amazon Sidewalk, Federal IoT Security Law, Facebook Messenger Bug
CISA Director Chris Krebs Fired, Common Sense and Section 230
Stolen Source Code, Apple Zero-Days, Biden’s Privacy and Cybersecurity Policies
Privacy Mindset: Europe vs. United States
Government Rumor Control, US Hospital Ransomware Threat, Russian Hackers Charged
Targeted Attacks Part 3 – The Exploit
Voter Privacy and the US Election
TrickBot Takedown, VPN Flaws, Zoom End-to-End Encryption
The Social Dilemma
More Hospital Ransomware Attacks, FBI’s Disinformation Warning, Android 11 Privacy Features
Targeted Attacks Part 2 – Pretexting and Attack Development
Death by Ransomware, Strava Flyby, iOS 14 Privacy Improvements
StartPage.com – The World’s Most Private Search Engine
Schools Under Cyberattack, Chrome Ad Blocking Update, US Election Interference
NSA Data Collection Ruling, Browsing History Identification, Ambulance Chasing
Targeted Attacks Part 1 – OSINT and Reconnaissance
Uber CISO Charged, Facebook Data Portability, Malicious iOS SDK
Audio Recordings Used to Copy Keys, Carnival Ransomware Attack, Social Media Profile Data Exposed
Amazon Echo Exploit, Privacy Shield, Capital One Data Breach Update
Twitter Hack Lessons Learned, TikTok Ban, Rite Aid Facial Recognition Cameras
How Big Tech Collects Your Private Data and How to Delete It
Chinese Hacking Campaign Exposed, BadPower Fast Charger Attack, Instacart Data Leak
Privacy Settings for Amazon Echo and Google Home
The Big Twitter Hack, Critical Windows DNS Server Update, Email Impersonation Attacks
F5 BIG-IP Exploit, WiFi Router Security Updates, Password Reuse
TikTok Privacy Concerns, macOS Ransomware, Bad Passwords
EARN IT Act, Facial Recognition Fail, Can I Be Phished?
Family Safety and Security with Andy Murphy from The Secure Dad Podcast
Largest DDoS Attack Ever, New Dropbox Features, North Korean Cyber-Attacks
5 Tips to Stay Private and Secure During a Protest
Minneapolis Police Website Hacked, Zoom Encryption, eBay Port Scanning
First Amendment Rights and Twitter, Encryption Backdoors
Episode 100 with Rachel Tobac and Kathleen Smith
Apple’s Law Enforcement Backdoor Dispute, Signal PINs, EasyJet Data Breach
Thunderbolt Flaws, WordPress Plugin Vulnerabilities, Patriot Act Vote
GoDaddy Security Incident, Fake Downloaders, Firefox Lockwise
Workplace Surveillance, Apple and Google Contact Tracing Tech, Virtual Cybersecurity Conferences
The End of Passwords as We Know It
Contact Tracing Controversy, Fighting COVID-19 Criminal Activity
Zoom Hacked Accounts, North Korean Hackers, Facebook Senior Pictures
Contact Tracing Apps, Business Email Compromise Scams, SPAM Phone Calls
Another Marriott Data Breach, Zoom-Bombing, Economic Stimulus Scams
Staying Secure When Working From Home
Click Armor Demo, Podcast Survey Results, Google Geofence Warrants
COVID-19 Mass Surveillance, New Coronavirus Cyber-Attacks, Encryption Backdoors
COVID-19 Cybersecurity Impact, Hacking the Hackers, Whisper App Data Leak
IoT Device Attacks, FCC Fines Mobile Carriers, Let’s Encrypt Certificate Bug
You’ve Been Hacked! Now What?
Ring Mandates Two-Factor Authentication, License Plate Reader Data Sharing, RSA Conference Coronavirus Fears
Chinese Hackers, Coronavirus Phishing Attacks, How to Stay (Almost) Anonymous Online
Equifax Hacked by China, Israeli Voter Registry Exposed, How the CIA Owned Encryption
Preventing Tax Identity Theft, FTC and Robocallers, Google Photos Incident
Off-Facebook Activity Tool, Ring App Third-Party Trackers, Wawa Credit Card Breach
Voting by Smartphone, Jeff Bezos Hacked, Microsoft Security Breach
Dark Web Fraud and Cybercrime with Emily Wilson
Critical Windows Vulnerability, Dating App Security Risk, Apple iOS Privacy Features
Iranian Cyber-Attacks, Ring Class-Action Lawsuit, Preventing Calendar SPAM
New California Data Privacy Law, Wyze Data Leak, ToTok Spy App
Top 10 Cybersecurity and Privacy Resolutions
Rebecca Herold “The Privacy Professor”
Top 10 Podcast Episodes from 2019
The Year in Review and 2020 Predictions with Kevin Johnson
The Password Reuse Problem, US Government IoT Recommendations, Smart Lock Security Disaster
How You’re Tracked Online, New Mass Surveillance Concerns, Malicious Android App Hijack
Top 25 Most Dangerous Vulnerabilities, Smart City Privacy, DuckDuckGo vs. Google
Phone and Voice Fraud, Twitter Account Purge, Adobe Magento Marketplace Data Breach
Disney+ Hacked Accounts, Black Friday Scams, Android Camera Exploits
Google’s Health Record Storage Controversy, US Border Search Ruling, Zelle Scams
Facebook Data Leaks, Smart Speaker Laser Attack, BlueKeep in the Wild
WhatsApp’s NSO Group Lawsuit, This Week in Data Breaches, Office 365 Voicemail Phishing
Firewalla Review, 15 Most Dangerous Apps for Kids, Rise of the Deepfake
Nord VPN Security Incident, Smart Speaker Phishing, Apple iOS 13 Privacy Features
Pitney Bowes Ransomware Attack, Samsung Galaxy S10 Fingerprint Bypass, Top Technology Fears
Hong Kong Protests, Instagram’s Anti-Phishing Tool, Smart Device Fail
Microsoft OneDrive Personal Vault, Google’s New Privacy and Security Controls, REAL ID Deadline
Amazon Smart Glasses, Webkey Social Engineering, Erase Your Old Hard Drives!
DoorDash Data Breach, Voice Assistant Privacy Changes, Limiting Ad Tracking
Aaron Zar, Co-Founder and CEO of Silent Pocket
Apple iOS 13, Venmo Scams, Simjacking Attacks
End-to-End Encryption with Max Krohn from Keybase.io
New Firefox Privacy Protections, Apple iOS Zero-Days, Facebook User Phone Numbers Exposed
Android “Ghost Click” Apps, New Apple Siri Privacy Protections, Credit Card Spying
10 Year Anniversary Episode with Kevin Johnson and Jayson E. Street
New Facebook Privacy Controls, Apple iOS Patching Mistake, MoviePass Data Breach
Biometric Security Data Breach, Critical Windows Vulnerabilities, FBI Data Harvesting
BSides Las Vegas, iMessage Exploit, 5G and Stingray Surveillance
Capital One Data Breach, Equifax Settlement Payouts, Nextdoor App Scams
Medical Device Security with Special Guest John Nye
Equifax Settlement, Android Video File Exploit, Encryption Backdoors
FaceApp Privacy Panic, Facebook’s 5 Billion Dollar Fine, Amazon Brushing Scams
Zoom Zero-Day, GDPR Fines, Google Assistant Recordings
Amazon Alexa Recordings, Facebook Malware Campaign, Top 3 Tips to Stay Private on Vacation
US Cyber-Attack on Iran, Poor Government Cybersecurity, Malvertising Campaigns
The Home Security Episode – Locks, Doors, Cameras, and More!
Facebook’s New Cryptocurrency, Firefox Zero Day, Smart TV Malware
US Customs and Border Protection Data Breach, Sign in with Apple, Leaked Facebook Emails
Quest Diagnostics Data Breach, Google’s Network Outage, US Visa Applicants and Social Media Names
Ransomware Rampage, Mobile Phishing Attacks, iPhone App Ad Trackers
Equifax Downgraded, Huawei Ban, Google is Tracking Your Purchases
Remotely Killing Car Engines, Password Expiration Policies, Facial Recognition at Airports, InfoSec vs. Cybersecurity
Critical WhatsApp Vulnerability, Facial Recognition Ban, Wormable Flaw in Windows
Israel Cyber-Attack Bombing, New Google Privacy Settings, Traditional Mail Blackmail Scam
The End of Password Expiration Policies, Seat-Back Camera’s on Airplanes, Unknown Data Breach
All about VPN’s with Gaya Polat from vpnMentor
The State of Cybersecurity Training and Certifications with Kevin Johnson
Microsoft Email Hacked, Instagram Nasty List Phishing Scam, Facebook Third-Party Data Deals
Amazon Echo Recording Controversy, New Mobile Phone Scam, Hotels Leaking Data
Facebook’s Bad Week, Stalkerware, Tax Season Scams
Apple Card, ASUS Live Update Backdoor, Statistics on Malware Attacks
Facebook Passwords Exposed, Android Q Privacy, Microsoft Office Targeted
Verifications.io Data Breach, Capsizing a Ship with a Cyberattack, World’s Most Dangerous Malware
Equifax and Marriott Data Breach Updates, Facial Recognition at the Airport, Citrix Password Spraying Attack
Google Chrome Zero-Day, Facebook Phone Number Privacy, NSA Phone Data Collection Program
Multi-Factor Authentication, New Attacks on 4G and 5G Mobile Networks
Google Nest’s Secret Microphone, Facebook Login Phishing, Password Manager Vulnerabilities
Preventing Illegal Robocalls, Webcam Spying, Dating App Account Hacking
Artificial Intelligence in Cybersecurity, Apple FaceTime Bug, Nest Camera Passwords
DNA Testing and the FBI, $198 Million Dollar Cryptocurrency Password, Password Checkup Chrome Extension
Massive Apple FaceTime Privacy Bug, Selling Your Privacy for Money, Insecure Smart Light Bulbs
The Lack of US Privacy Regulations, Nest Camera’s Hijacked
Ring Doorbell Privacy Concerns, Recent Password Breach News, Biometrics and Fifth Amendment Rights
US Government Shutdown, Privacy at CES 2019, Mobile Location Data Controversy
Cybersecurity Careers, Recruiting, and Volunteering with Kathleen Smith
Newspaper Ransomware Attack, How Facebook Tracks You on Android, USB-Type-C Authentication
Phishing Attack Targeting Two-Factor Authentication, Amazon Echo Eavesdropping, Netflix Email Scam – WB49
The Year in Review and 2019 Predictions with Special Guest Kevin Johnson
Healthcare Databases Exposed, Facebook’s Photo API Bug, Signal Speaks Out – WB48
Equifax Data Breach Details Released, More Google+ API Bugs, Supermicro Strikes Back – WB47
The Quora Data Breach, Facebook’s Private Emails, Google Location Tracking – WB46
Massive Marriott Data Breach, Secure Holiday Shopping Tips, Phishing Sites Using HTTPS – WB45
Special Guest Tanya Janca, DevOps and AppSec, Women in Cybersecurity – #82
Vehicle Infotainment Privacy, Instagram’s Accidental Password Exposure, Firefox Monitor – WB44
Harry Sverdlove, Edgewise Founder and CTO – Special Edition
USPS Informed Delivery Vulnerabilities, Holiday Credit Card Fraud, Huge SMS Database Leak – WB43
Midterm Election Security, Gait Recognition Surveillance Technology, Caller ID Authentication – WB42
Microsoft and Apple Security Updates, Signal’s Sealed Sender, Girl Scouts Data Breach – WB41
Fortnite Scams, Google Search Privacy, Bloomberg SuperMicro Controversy – #81