300 episodes

Hosted by cybersecurity and privacy professionals Tom Eston, Scott Wright and Kevin Johnson, Shared Security is a weekly show that explores the trust you put in people and technology. We bring you news, tips, advice, and interviews with cybersecurity and privacy experts to help you live more secure and private in our connected world.

The Shared Security Show Tom Eston and Scott Wright

    • News
    • 4.6 • 24 Ratings

Hosted by cybersecurity and privacy professionals Tom Eston, Scott Wright and Kevin Johnson, Shared Security is a weekly show that explores the trust you put in people and technology. We bring you news, tips, advice, and interviews with cybersecurity and privacy experts to help you live more secure and private in our connected world.

    Tim Hortons Privacy Investigation, Social Engineering Kill-Chain, Hospitals Sending Facebook Your Data

    Tim Hortons Privacy Investigation, Social Engineering Kill-Chain, Hospitals Sending Facebook Your Data

    The Tim Hortons mobile app created a “a mass invasion of Canadians’ privacy" by conducting continuous location tracking without user consent even when the app was closed, what is a social engineering kill-chain and how can this help understand and prevent attacks, and new research shows 33 out of the top 100 hospitals in America are sending sensitive heath information to Facebook via the Meta Pixel ad tracking tool.

    • 25 min
    Bipartisan Digital-Privacy Bill, Delete Your Data Before Selling Your Car, Firefox Total Cookie Protection

    Bipartisan Digital-Privacy Bill, Delete Your Data Before Selling Your Car, Firefox Total Cookie Protection

    A new bipartisan privacy bill, the American Data Privacy and Protection Act, "could" be the first privacy legislation in the US not doomed to fail, a story about why you should delete your location and private data in your car's navigation system before selling it, and details on Firefox's new privacy feature called "Total Cookie Protection".

    • 23 min
    Hacking Ham Radio: Why It’s Still Relevant and How to Get Started

    Hacking Ham Radio: Why It’s Still Relevant and How to Get Started

    This week we discuss hacking ham radio with special guests Caitlin Johanson, Rick Osgood, and Larry Pesce. In this episode you'll learn what ham radio is, why its still relevant, why would attackers want to hack ham radio, all about packet radio and APRS (Automatic Packet Reporting System), and what equipment and licensing you need to get started in ham radio.

    • 29 min
    DuckDuckGo Browser Allows Microsoft Trackers, Stolen Verizon Employee Database, Attacking Powered Off iPhones

    DuckDuckGo Browser Allows Microsoft Trackers, Stolen Verizon Employee Database, Attacking Powered Off iPhones

    The DuckDuckGo mobile browser allows Microsoft trackers due to an agreement in their syndicated search content contract, a database of contact details for hundreds of Verizon employees was compromised after an employee was social engineered to give the attacker remote access to their corporate computer, and details about new research that shows that even when an iPhone running iOS 15 is turned off, its really not off and certain wireless features allow the phone to be located and possibly attacked.

    • 27 min
    The State of Application Security with Tanya Janca

    The State of Application Security with Tanya Janca

    Tanya Janca, founder of the We Hack Purple Academy, Director of Developer Relations and Community at Bright, and author of "Alice & Bob Learn Application Security" joins us to discuss the current state and future of Application Security. In this episode we discuss what Tanya's been up to, what's changed in AppSec over the last several years, have organizations actually moved to DevSecOps, and what the next big thing in AppSec might be.

    • 43 min
    Apple Mail Privacy Protection, Government Agencies Reveal Top Attack Vectors, Is Big Brother Watching You at Work?

    Apple Mail Privacy Protection, Government Agencies Reveal Top Attack Vectors, Is Big Brother Watching You at Work?

    What is Apple Mail Privacy Protection and how does it hide your IP address, so senders can’t link it to your online activity or determine your location, government authorities such as the FBI and NSA have released a list of top attack vectors used to gain initial access by attackers, and how more companies are deploying privacy invasive surveillance software to monitor their employees at work.

    • 26 min

Customer Reviews

4.6 out of 5
24 Ratings

24 Ratings

KWGraves ,

Highly Recommend

I appreciate the sound advice given on current security events as well as other comments! I follow this podcast this every Monday.

JoshCrist ,

Entertaining, insightful and actionable! 👏👏👏

Whether you’re well established as someone who can translate creative energy into the impact you want to have on the cyber security industry, or just getting started as a catalyst for change - this is a must-listen podcast for you! Tom and Scott do an incredible job leading conversations that cover a huge breadth of topics related to the ins and outs of building a thriving career in data security, and life you can be proud of - from leaders who’ve actually walked the path. Highly recommend listening and subscribing!

Tony-Stark-0 ,

30% ads 50% useless chatter

Only a tiny fraction of the show is valuable, and that too going over news articles. A lot of wasted time. But that’s just me.

Top Podcasts In News

The New York Times
The Daily Wire
NPR
Crooked Media
The Daily Wire
Serial Productions

You Might Also Like

Graham Cluley, Carole Theriault
CISO Series
CyberWire Inc.
ITWC
CyberWire, Inc.
Johannes B. Ullrich