This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
The ability to ask any question on just about any topic and have a very intelligent answer given has cybersecurity experts wondering if the infosec community is using it and, if so, for what; and, if so, how is it working for writing scripts and code or imitating phishing emails, for instance. The script to do that was written by ChatGPT.
A phone scam targeting psychologists reveals that even professionals can become victims, stolen multi-million-dollar NFT’s results in a “all my apes gone” plea for help, and details on a skimmer supply chain attack on more than 100 real estate websites. ** Links mentioned on the show ** The Phone Scam That Targets Psychologists [link] Thieves […].
The EARN IT Act is back for a second time which would pave the way for a new massive government surveillance system in the US, romance scams are on the rise so don’t fall for love in all the wrong places, and details about a new ransomware attack that wants you to like and subscribe, […].
Next, we dive into the world of airline reservation scams, exposing how […] The post Meta’s Threads and Your Privacy, Airline Reservation Scams, IDOR Srikes Back appeared first on Shared Security Podcast. The post Meta’s Threads and Your Privacy, Airline Reservation Scams, IDOR Srikes Back appeared first on Security Boulevard.
The post Graphics Card Web Tracking, Fake Job Ad Scams, Hacker Takes Down North Korea’s Internet appeared first on The Shared Security Show. The post Graphics Card Web Tracking, Fake Job Ad Scams, Hacker Takes Down North Korea’s Internet appeared first on Security Boulevard.
I seem to be doing most of that activity now on Mastodon , which appears to have absorbed most of the infosec refugees from Twitter, and in any case is proving to be a far more useful, civil and constructive place to post such things. com, which was fed by pig butchering scams.
I was reminded of this by Phil Cracknell who posted on linkedin that in his opinion the Kevin Costner, Whitney Houston classic, Bodyguard was the best infosec movie. When in haste we often make mistakes, fall for scams, or execute commands in production without checking them. Don’t believe me? Well read on.
In episode 346, we discuss new AI-driven voicemail scams that sound convincingly real and how to identify them. Join […] The post The Rise of AI Voicemail Scams, Political Donation Privacy Concerns appeared first on Shared Security Podcast.
Plus, we shed light on the alarming rise of Bitcoin ATM scams exploiting older adults, providing essential tips to protect your loved ones from these devious schemes. Tune in for unique insights […] The post Shocking SQL Injection in TSA App, Bitcoin ATM Scams Targeting Seniors appeared first on Shared Security Podcast.
SolarWinds CISO, Classiscam Scam-as-a-Service appeared first on Shared Security Podcast. The post SEC vs. SolarWinds CISO, Classiscam Scam-as-a-Service appeared first on Security Boulevard.
In the ‘Aware Much’ segment, the […] The post Ticketmaster Data Breach and Rising Work from Home Scams appeared first on Shared Security Podcast. The post Ticketmaster Data Breach and Rising Work from Home Scams appeared first on Security Boulevard. Additionally, they discuss Live Nation’s ongoing monopoly investigation.
In Episode 356, Tom and Kevin discuss the increasing role of deepfake technology in bypassing biometric checks, accounting for 24 percent of fraud attempts. The show covers identity fraud issues and explores the controversial practices of data brokers selling location data, including tracking US military personnel.
It requires some baseline industry knowledge, but it’s a great way to stay on top of InfoSec current events. Since 2007 (before podcasting in general had really taken off), Patrick Gray and his co-host Adam Boileau have covered a wide range of InfoSec topics with insight from fellow industry leaders. Malicious Life.
Lastly, Tom and Kevin reflect on reports of AI-powered voice cloning scams targeting […] The post Apple Finally Adopts RCS, AI Powered Scams Targeting the Elderly appeared first on Shared Security Podcast. The post Apple Finally Adopts RCS, AI Powered Scams Targeting the Elderly appeared first on Security Boulevard.
The truth is technology has grown at an exponential rate and so has cybercrime. Impersonation Scams. These range from simple to sophisticated scams to convince you they are genuine, in hopes that you feel comfortable sharing personal or financial information whether on the phone, via email, or text. What You Can Do. Rosa Rowles.
Our speakers discussed a range of hot cyber topics, including business email compromise (BEC) scams, cyber warfare, Zero Trust, burnout, and so much more. Paul Rapier, Vice President of Information Technology for the Detroit Pistons, led a discussion on best practices for InfoSec teams.
Norton 360, a popular antivirus product, has installed a cryptocurrency mining program on its customers’ computers, some cities in Texas have been hit with a phishing scam designed to get users to pay through fraudulent QR code stickers on public parking meters, and how Facebook is still collecting data about you even if you deactivate […].
All this plus how Apple and Facebook fell for a massive email scam. ** […]. This week we battle it out between the two mobile tech giants, Google Android vs Apple iOS, and discuss which one is better for your privacy and cybersecurity. Topics include: app stores and OS updates, ad tracking, and native text messaging.
Build security awareness training modules to educate your employees on how to spot phishing emails or business-related scams. Implement the right tools, processes, and technology – based on the needs of your organization. Conduct regular network penetration tests to identify flaws and vulnerabilities in your corporate networks.
There’s not many individual scams which can put “18 years and counting” on their resume. Of course, this was tied into a nonsensical scam about recovering lots of lost money should he be brought safely back. “Mark Ruffalo deepfake romance scam” What a sentence. spaaaaaaaaaace. What a world.
Next, they discuss the potential risks of QR code scams, detailing a real-life incident where a woman lost a significant amount of money due to a QR code scam. In episode 307, Tom and Scott debunk misinformation circulating about the iOS 17 NameDrop feature by law enforcement and others on social media.
They talk about popular channels like Scammer Payback and Kitboga that show these scams in progress. In Episode 313, hosts Tom and Scott discuss the world of scambaiting, discussing what it is, the tactics used, and its effectiveness in stopping scammers.
Officials from the National Institute of Standards and Technology (NIST) this week teased future improvements to the agency’s recently introduced “Phish Scale” measurement system, which helps companies determine whether phishing emails are hard or easy for their employees to detect.
Threat intelligence solutions using AI/ ML technologies can prevent false positives and reduce alert fatigue – helping cybersecurity professionals focus on strategic priorities instead of spending all their time reacting to security alerts and potential incidents. Cyber Resilience planning puts focus on recovery readiness.
Social engineering, phishing scams, ransomware, DDoS attacks , and software vulnerabilities are just some of the threats facing overloaded security professionals with limited budgets. Bear in mind that SOAR requires a mix of technologies and tools that deliver the capabilities the infosec team requires.
Budgets are flowing, technology is addressing most needs, and senior level buy-in is present. Most attacks are known, or predictable based on data that the infosec industry collects and analyses. Breaches aren’t occurring because the right technology isn’t available. The reality is somewhat different.
As technology and security advance, countries will continue to devote resources toward cyber espionage and warfare. Unfortunately, with the benefits and efficiencies created by IoT technology comes additional risk that manufacturers and users need to remain vigilant about throughout the product life cycle. Ransomware The U.S.
In episode 353, we discuss the February 2024 ransomware attack on Change Healthcare, resulting in the largest data breach of protected health information in history. Notifications have been sent to 100 million Americans, including hosts Tom and Kevin.
In February 2024, ALPHV conducted an exit scam against its affiliates and disbanded, leaving them searching for new partners. Infosec teams may have a false sense of security when critical servers are equipped with EDR technology and redundant logging.
In this episode, we explore the recent Okta breach where hackers obtained sensitive customer data via unauthorized access to the Okta support system. Next, we discuss the emerging threat of “quishing,” a combination of voice calls and phishing that preys on unsuspecting victims.
But even with the push we’ve seen in the last year to crack down on negligent data security, technology and innovation continue to grow at a rate that makes it difficult for slow-moving bureaucratic processes to keep up. What’s more – the pandemic has forced many businesses and individuals’ daily tasks online.
When it comes to cyber risks, the most up-to-date cybersecurity technology or regimented program doesn’t make an organization immune to an attack. Cybersecurity programs that educate your entire team on general information security tactics – including recognizing and addressing phishing scams – are essential.
The confidentiality, integrity, and availability of it all -- you know, the classic CIA triad in infosec. Things like newer technologies like botching as well as biometrics. There's new technologies coming out. These might begin to solve problems with individual voting machines, but what about the larger problem?
The confidentiality, integrity, and availability of it all -- you know, the classic CIA triad in infosec. Things like newer technologies like botching as well as biometrics. There's new technologies coming out. These might begin to solve problems with individual voting machines, but what about the larger problem?
Episode 324 features discussions on a significant AT&T data breach affecting 73 million customers and a sophisticated thread jacking attack targeting a journalist.
The confidentiality, integrity, and availability of it all -- you know, the classic CIA triad in infosec. Things like newer technologies like botching as well as biometrics. There's new technologies coming out. These might begin to solve problems with individual voting machines, but what about the larger problem?
This week we discuss the top 3 location tracking apps in the Apple App Store and Google Play and which ones sell your data. Plus, details about recent fake Chick-fil-A and Olive Garden vouchers on Facebook. ** Links mentioned on the show ** #1 Phone Tracker by Number [link] [link] – Android [link] – iOS […].
In February 2024, ALPHV conducted an exit scam against its affiliates and disbanded, leaving them searching for new partners. Infosec teams may have a false sense of security when critical servers are equipped with EDR technology and redundant logging.
But wait, there’s more to this […] The post Microsoft Lost Its Keys, Voice Cloning Scams, The Biden-Harris Cybersecurity Labeling Program appeared first on Shared Security Podcast. The post Microsoft Lost Its Keys, Voice Cloning Scams, The Biden-Harris Cybersecurity Labeling Program appeared first on Security Boulevard.
The fraudulent email messages using the COVID-19 American Rescue Plan as bait target the infosec and technology sectors while employing subject lines ranging from “Joe Biden Rescue Plan Act” to “IRS Rescue Plan Form” to “President’s Rescue Plan Act.”
Over the past two decades, we have witnessed unprecedented changes in technology. Already a bestseller on the Taylor & Francis infosec and privacy list, the book offers a comprehensive business-oriented roadmap for building and leading practical privacy programmes. MORE How an email greeting policy can thwart phishing scams.
Scott and Tom explain why privacy isn’t dead, why should everyone should care about their privacy, and how you should respond to someone that says “I don’t care about privacy, I have nothing to hide!”. Plus, details on a new attack using fake shopping apps and how a new malware toolkit called “Borat RAT” is […].
AI Use Danger As with any emerging technology, many organizations should expect errors and growing pains as teams learn the nuances of applying the technology. Some attacks will be aided by technology, while others will be more strategic in nature as companies strengthen cyberdefense against older attacks.
This means learning from the successes and the failures and using those learnings to enhance security measures, standards, and technology. When it comes to ransomware, the most up-to-date cybersecurity technology or regimented program doesn’t make an organization immune to an attack. Your People are Your First Line of Defense.
We organize all of the trending information in your field so you don't have to. Join 28,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content