273 episodes

Hosted by cybersecurity and privacy professionals Tom Eston and Scott Wright, Shared Security is a weekly show that explores the trust you put in people and technology. We bring you news, tips, advice, and interviews with cybersecurity and privacy experts to help you live more secure and private in our connected world.

The Shared Security Sho‪w‬ Tom Eston and Scott Wright

    • Tech News
    • 4.5 • 24 Ratings

Hosted by cybersecurity and privacy professionals Tom Eston and Scott Wright, Shared Security is a weekly show that explores the trust you put in people and technology. We bring you news, tips, advice, and interviews with cybersecurity and privacy experts to help you live more secure and private in our connected world.

    Card Skimmers Powered by Chip Cards, Silver Sparrow Mac Malware, Accellion Zero-Days

    Card Skimmers Powered by Chip Cards, Silver Sparrow Mac Malware, Accellion Zero-Days

    This week co-host Kevin Johnson joins Tom Eston to discuss new card skimmers found in the wild, the Accellion zero-days, and a new type of Mac malware called "Silver Sparrow".

    • 19 min
    Clubhouse App and Your Privacy

    Clubhouse App and Your Privacy

    This month Scott and Tom discuss the Clubhouse app and the related privacy concerns.

    • 26 min
    Apple’s Safe Browsing Request Proxy, BEC Attacks, LastPass Updates

    Apple’s Safe Browsing Request Proxy, BEC Attacks, LastPass Updates

    In episode 161: Apple will start to proxy Safe Browsing requests to hide IP addresses from Google, Business Email Compromise attacks are on the rise, and what's changing with the free version of LastPass.

    • 15 min
    Florida Water Supply Hack, Android App Hijack, US Capitol Riot Phone Tracking

    Florida Water Supply Hack, Android App Hijack, US Capitol Riot Phone Tracking

    In episode 160: An attacker tried to poison a Florida city's water supply, a popular Android app was hacked to display malicious ads, and how smartphone location data was used to track the US Capitol rioters.

    • 21 min
    Dangerous Social Media Algorithms, A Moral Imperative for AI Powered Weapons?

    Dangerous Social Media Algorithms, A Moral Imperative for AI Powered Weapons?

    In episode 159: Will algorithms be the death of social media and why the US government thinks it has a moral imperative to build AI powered weapons.

    • 23 min
    Cybersecurity Researchers Targeted, Three iOS Zero-Days, Google FLoC

    Cybersecurity Researchers Targeted, Three iOS Zero-Days, Google FLoC

    In episode 158: Cybersecurity researchers targeted by North Korean hackers, Apple patches three iOS zero-day exploits, and details on Google's Federated Learning of Cohorts (FLoC) which may one day replace third-party cookie tracking.

    • 7 min

Customer Reviews

4.5 out of 5
24 Ratings

24 Ratings

JoshCrist ,

Entertaining, insightful and actionable! 👏👏👏

Whether you’re well established as someone who can translate creative energy into the impact you want to have on the cyber security industry, or just getting started as a catalyst for change - this is a must-listen podcast for you! Tom and Scott do an incredible job leading conversations that cover a huge breadth of topics related to the ins and outs of building a thriving career in data security, and life you can be proud of - from leaders who’ve actually walked the path. Highly recommend listening and subscribing!

JRSpoon ,

Insubscripe

Please my grand child it hit and having ng night mares

HelloandNo ,

Awesome and helpful!

Love this show. Always keeps me interested and always look forward to new episodes. Can’t recommend it enough.

-Tabby from Your New Best Friends podcast

Top Podcasts In Tech News

Listeners Also Subscribed To