This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
Regulatory compliance and dataprivacy issues have long been an IT security nightmare. And since the EU’s General Data Protection Regulation (GDPR) took effect May 25, 2018, IT compliance issues have been at the forefront of corporate concerns. GDPR-style dataprivacy laws came to the U.S. Location Matters.
When it comes to Missouri Governor Mike Parson's explosive reaction to a reporter "hacking" the state's web application, there is an outpouring of public figures, InfoSec professionals, and other tech experts telling the governor what they think. Journalists responsibly sounding an alarm on dataprivacy is not criminal hacking.
EC-Council : The International Council of E-Commerce Consultants, or EC-Council, offers several certifications for different career paths but is best known for its white-hat hacking program. Among security personnel, infosec engineers (6.25%), infosec analysts (3.12%), and network security engineers (2.63%) saw the most significant hikes.
This week we discuss hacking ham radio with special guests Caitlin Johanson, Rick Osgood, and Larry Pesce. In this episode you’ll learn what ham radio is, why its still relevant, why would attackers want to hack ham radio, all about packet radio and APRS (Automatic Packet Reporting System), and what equipment and licensing you need […].
Still, the top response stood out clearlyprotecting dataprivacy. The thing is, secure communication goes beyond just protecting dataprivacy. The rise of these types of attacks marks a significant shift in the cyber threat landscape, where attackers are increasingly “logging in” rather than hacking in.
Finally, we discuss Google Play Protect’s new feature, “Real-time App Analysis,” which […] The post Okta Hacked Again, Quishing Is The New Phishing, Google Play Protect Real-Time Scanning appeared first on Shared Security Podcast.
The post Multi-Factor Authentication Fatigue Attack, Signal Account Twilio Hack, Facebook and Instagram In-App Browser appeared first on The Shared Security Show. The post Multi-Factor Authentication Fatigue Attack, Signal Account Twilio Hack, Facebook and Instagram In-App Browser appeared first on Security Boulevard.
Then they switch to the best practices to prevent social media account takeovers, highlighting […] The post The World of Scambaiting, Preventing Social Media Account Takeovers, Network Wrenches Hacked appeared first on Shared Security Podcast.
In episode 320, Tom and Scott discuss the contentious issue of who is accountable when Facebook or Instagram accounts are hacked, discussing potential failings on both the user’s and Meta’s part. The post Who’s to Blame for Hacked Social Media Accounts, Spoofed Online Meeting Requests and Malware appeared first on Security Boulevard.
Cybersecurity News) How to mitigate buffer overflow vulnerabilities (Infosec Institute) How to prevent buffer overflow attacks (TechTarget) VIDEOS What is a Buffer Overflow Attack? Financially motivated cyber intrusions, even those without any ties to state goals, harm national security.
The case of former Ubiquiti employee, Nickolas Sharp, who pled guilty to multiple […] The post Reddit Hacked, Preventing Accidental Location Sharing, Developer Hacks His Own Company appeared first on The Shared Security Show.
Frost's presentation on "Threats to National Security in Cyberspace" had a packed crowd at attention as she talked about known hacking groups, their methods, motivations, and relationship to greater geopolitical developments—including what's happening in Russia, Ukraine, and China.
In Episode 359 of the Shared Security Podcast, the team examines a shocking hack-for-hire operation alleged to target over 500 climate activists and journalists, potentially involving corporate sponsorship by ExxonMobil. They explore the intricate layers of this multifaceted campaign and the broader implications on security risk assessments.
Paul also shares with us some of his greatest hacking stories and don’t miss our lively […] The post Security Podcasting, Hacking Stories, and The State of Firmware Security with Paul Asadoorian appeared first on Shared Security Podcast. Paul’s been podcasting for more then 17 years!
Can you get hacked if you hide your computer?". Here are two of our favorites by Infosec blogger John Oppdenaker on Twitter: My password was hacked. As consumers and citizens become more aware of their online security and digital rights, they also have more concerns about their dataprivacy. Phishing season!
TikTok has denied reports that it was breached by a hacking group, after it claimed they have gained access to over 2 billion user records, the Los Angeles school district, the second-largest in the US, suffered a ransomware attack, and details on how one high school in Sydney Australia installed fingerprint scanners at the entrance […].
Unsurprisingly, the SolarWinds supply chain attack stars in the year’s worst hacks and breaches from both Wired and Ars Technica. The Ars piece also called out the “impressive” hacking of iPhones through Wi-Fi. DataPrivacy Day with a difference. The report is available to download free from the Cisco website.
Related Stories Spotlight: Is There A Cure For InfoSec’s Headcount Headache? The post Spotlight: When Ransomware Comes Calling appeared first on The. Read the whole entry. » » Click the icon below to listen. Episode 222: US Rep.
» Related Stories Introducing Securepairs.org: Fighting Infosec FUD for the Right to Repair Episode 153: Hacking Anesthesia Machines and Mayors say No to Ransoms Breathe Deeply: DHS warns of Flaw in Hospital Anesthesia Machines. Read the whole entry. »
Tanya Janca, founder of the We Hack Purple Academy, Director of Developer Relations and Community at Bright, and author of “Alice & Bob Learn Application Security” joins us to discuss the current state and future of Application Security. In this episode we discuss what Tanya’s been up to, what’s changed in AppSec over the last […].
Join us for an insightful episode of the Shared Security Podcast as Tanya Janca returns for her fifth appearance. Discover the latest on her new book about secure coding, exciting updates in Application Security, and the use of AI in security.
In this episode, we discuss the latest issues with data brokers, focusing on a breach at Gravy Analytics that leaked 30 million location data points online. We also explore a vulnerability in Subarus Starlink system that allows unrestricted access to vehicle controls and customer data using just a last name and license plate number.
Former Uber CSO Joe Sullivan was found guilty of obstructing a federal investigation in connection with the attempted cover-up of a 2016 hack at Uber, NIST and Microsoft say that mandatory password expiration is no longer needed but many organizations are still doing it, and how fake executive profiles are becoming a huge problem for […].
In episode 353, we discuss the February 2024 ransomware attack on Change Healthcare, resulting in the largest data breach of protected health information in history. Notifications have been sent to 100 million Americans, including hosts Tom and Kevin.
In episode 354, we discuss the emergence of the term ‘Advanced Persistent Teenagers’ (APT) as a “new” cybersecurity threat. Recorded just before the election, the hosts humorously predict election outcomes while exploring the rise of teenage hackers responsible for major breaches.
In this exciting episode of our podcast we have the pleasure of speaking with Phillip Wylie, a remarkable professional with a captivating career in cybersecurity. Join us as we discuss Phillip’s unique journey and uncover valuable insights on breaking into the cybersecurity field.
Phishing attacks continue to plague organizations across the globe with great success, but why? Cybercriminals are targeting the human element of organizations. Additionally, they are developing techniques to use an. The post The Business Value of the Social-Engineer Phishing Service appeared first on Security Boulevard.
The attacks on password managers and their users continue as Bitwarden and 1Password users have reported seeing paid ads for phishing sites in Google search results for the official login page of the password management vendors.
In episode 325, Tom and Kevin discuss a significant backdoor threat that nearly compromised Linux systems globally, stemming from an infiltration into an open-source project called XZ Utils by attackers who gained commit access and inserted a backdoor.
In this episode, the hosts discuss a significant vulnerability found in Kia’s web portal that allows remote control of various car features via their app, potentially enabling unauthorized unlocking and tracking. The conversation highlights the broader issue of web vulnerabilities in the automotive industry.
This week, we discuss a critical SQL injection vulnerability discovered in an app used by the TSA, raising ethical questions about responsible disclosure. Plus, we shed light on the alarming rise of Bitcoin ATM scams exploiting older adults, providing essential tips to protect your loved ones from these devious schemes.
In this episode Luke Jennings VP of Research & Development from Push Security joins us to discuss SaaS attacks and how its possible to compromise an organization without touching a single endpoint or network.
Listen to our discussion about this cutting-edge technology and its potential impact on our privacy. Join […] The post Your Digital Immortality is Coming, Apple and Google Are Data Gatekeepers, Satellite Security Risks Revealed appeared first on Shared Security Podcast. Have these tech companies gone too far?
The post Meta’s EU Ad Practices Ruled Illegal, Twitter API Data Breach, Vulnerabilities in Major Car Brands appeared first on The Shared Security Show. Facebook has been ordered to pay a fine of $414m by EU regulators who ruled that the company had broken EU law by forcing users to accept personalized ads.
This is a story about a massive corpus of data circulating widely within the hacking community and misattributed to a legitimate organisation. That organisation is Acxiom , and their business hinges on providing their customers with data on their customers. Welcome to my world. This made massive news headlines until. U.S.
We can expect to see a steep rise in US state-by-state dataprivacy requirements and movement toward a potential federal privacy law in 2022. In fact, by 2023, it’s expected that 65% of the world’s population will be covered by privacy laws. Infosec will dominate our lives in the tech space for the foreseeable future.
We explore these technological advancements alongside other unusual tech innovations, touching upon security […] The post Internet Archive Hacked, Introducing The AI Toilet Camera appeared first on Shared Security Podcast. The post Internet Archive Hacked, Introducing The AI Toilet Camera appeared first on Security Boulevard.
We organize all of the trending information in your field so you don't have to. Join 28,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content