Exploring the trust you put in people and technology
T
The Shared Security Show


1
Tim Hortons Privacy Investigation, Social Engineering Kill-Chain, Hospitals Sending Facebook Your Data
25:51
25:51
Play later
Play later
Lists
Like
Liked
25:51
The Tim Hortons mobile app created a “a mass invasion of Canadians’ privacy” by conducting continuous location tracking without user consent even when the app was closed, what is a social engineering kill-chain and how can this help understand and prevent attacks, and new research shows 33 out of the top 100 hospitals in America are sending sensiti…
T
The Shared Security Show


1
Tim Hortons Privacy Investigation, Social Engineering Kill-Chain, Hospitals Sending Facebook Your Data
25:52
25:52
Play later
Play later
Lists
Like
Liked
25:52
The Tim Hortons mobile app created a “a mass invasion of Canadians’ privacy" by conducting continuous location tracking without user consent even when the app was closed, what is a social engineering kill-chain and how can this help understand and prevent attacks, and new research shows 33 out of the top 100 hospitals in America are sending sensiti…
T
The Shared Security Show


1
Bipartisan Digital-Privacy Bill, Delete Your Data Before Selling Your Car, Firefox Total Cookie Protection
23:30
23:30
Play later
Play later
Lists
Like
Liked
23:30
A new bipartisan privacy bill, the American Data Privacy and Protection Act, “could” be the first privacy legislation in the US not doomed to fail, a story about why you should delete your location and private data in your car’s navigation system before selling it, and details on Firefox’s new privacy feature called “Total Cookie Protection”. ** Li…
T
The Shared Security Show


1
Hacking Ham Radio: Why It’s Still Relevant and How to Get Started
29:55
29:55
Play later
Play later
Lists
Like
Liked
29:55
This week we discuss hacking ham radio with special guests Caitlin Johanson, Rick Osgood, and Larry Pesce. In this episode you’ll learn what ham radio is, why its still relevant, why would attackers want to hack ham radio, all about packet radio and APRS (Automatic Packet Reporting System), and what equipment and licensing you need to get started i…
T
The Shared Security Show


1
Hacking Ham Radio: Why It's Still Relevant and How to Get Started
29:56
29:56
Play later
Play later
Lists
Like
Liked
29:56
This week we discuss hacking ham radio with special guests Caitlin Johanson, Rick Osgood, and Larry Pesce. In this episode you'll learn what ham radio is, why its still relevant, why would attackers want to hack ham radio, all about packet radio and APRS (Automatic Packet Reporting System), and what equipment and licensing you need to get started i…
T
The Shared Security Show


1
DuckDuckGo Browser Allows Microsoft Trackers, Stolen Verizon Employee Database, Attacking Powered Off iPhones
27:36
27:36
Play later
Play later
Lists
Like
Liked
27:36
The DuckDuckGo mobile browser allows Microsoft trackers due to an agreement in their syndicated search content contract, a database of contact details for hundreds of Verizon employees was compromised after an employee was social engineered to give the attacker remote access to their corporate computer, and details about new research that shows tha…
T
The Shared Security Show


1
The State of Application Security with Tanya Janca
43:31
43:31
Play later
Play later
Lists
Like
Liked
43:31
Tanya Janca, founder of the We Hack Purple Academy, Director of Developer Relations and Community at Bright, and author of “Alice & Bob Learn Application Security” joins us to discuss the current state and future of Application Security. In this episode we discuss what Tanya’s been up to, what’s changed in AppSec over the last several years, have o…
T
The Shared Security Show


1
The State of Application Security with Tanya Janca
43:32
43:32
Play later
Play later
Lists
Like
Liked
43:32
Tanya Janca, founder of the We Hack Purple Academy, Director of Developer Relations and Community at Bright, and author of "Alice & Bob Learn Application Security" joins us to discuss the current state and future of Application Security. In this episode we discuss what Tanya's been up to, what's changed in AppSec over the last several years, have o…
T
The Shared Security Show


1
Apple Mail Privacy Protection, Government Agencies Reveal Top Attack Vectors, Is Big Brother Watching You at Work?
26:50
26:50
Play later
Play later
Lists
Like
Liked
26:50
What is Apple Mail Privacy Protection and how does it hide your IP address, so senders can’t link it to your online activity or determine your location, government authorities such as the FBI and NSA have released a list of top attack vectors used to gain initial access by attackers, and how more companies are deploying privacy invasive surveillanc…
T
The Shared Security Show


1
Apple Mail Privacy Protection, Government Agencies Reveal Top Attack Vectors, Is Big Brother Watching You at Work?
26:51
26:51
Play later
Play later
Lists
Like
Liked
26:51
What is Apple Mail Privacy Protection and how does it hide your IP address, so senders can’t link it to your online activity or determine your location, government authorities such as the FBI and NSA have released a list of top attack vectors used to gain initial access by attackers, and how more companies are deploying privacy invasive surveillanc…
T
The Shared Security Show


1
FBI Warrantless Searches, Passwordless Sign-Ins, Keylogging Web Forms
25:59
25:59
Play later
Play later
Lists
Like
Liked
25:59
The FBI searched emails, texts and other electronic communications of 3.4 million U.S. residents without a warrant, Apple, Google, and Microsoft have announced they will support a new passwordless sign-in standard created by the FIDO Alliance and the World Wide Web Consortium, and details about how some websites are keylogging your data as you type…
T
The Shared Security Show


1
Cybersecurity for Startups with Josh Feinblum from Stavvy
27:00
27:00
Play later
Play later
Lists
Like
Liked
27:00
Josh Feinblum is the co-founder of Stavvy, a Boston-based fully integrated digital mortgage platform, where he leads product, engineering, people, and finance. He also serves as a venture partner at F-Prime Capital, where he evaluates and advises startups of all stages across multiple verticals. Josh talks to us about his journey through cybersecur…
T
The Shared Security Show


1
Elon Musk Buys Twitter, Forgotten BIOS Updates, T-Shirt Outwits Facial Recognition
27:36
27:36
Play later
Play later
Lists
Like
Liked
27:36
Elon Musk buys Twitter for $44 billion so what does this mean for the privacy and cybersecurity of the platform? More than 100 different Lenovo laptop computers contain firmware-level vulnerabilities which is a great reminder about making sure you update the BIOS on your computer. Plus, details about researchers who have created a t-shirt that rend…