Private Tweets Exposed, Unauthorized Tracking Collaboration, AI Risks and Regulation
Tom Eston | | AI, AI Regulation, AI Risks, AirTags, Apple, Artificial Intelligence, Cyber Security, Cybersecurity, Data Privacy, Digital Privacy, Episodes, google, Information Security, Infosec, Podcast, Podcasts, Privacy, security, technology, Twitter, Twitter Circles, US government, Weekly Edition, White House
In this episode we discuss a recent Twitter security incident that caused private tweets sent to Twitter Circles to become visible to unintended recipients. Next, we discuss the collaboration between Apple and Google to develop a specification for detecting and alerting users of unauthorized tracking using devices like AirTags. Finally, ... Read More
Juice Jacking Debunked, Photographer vs. AI Dataset, Google Authenticator Risks
Tom Eston | | AI, Cloud Sync, copyright, Cyber Security, Cybersecurity, Data Privacy, data protection, Datasets, Digital Privacy, Episodes, FBI, Google Authenticator, Information Security, Infosec, Juice jacking, Photography, Podcast, Podcasts, Privacy, Public Charging Stations, security, technology, two factor authentication, Weekly Edition
In this episode we debunk the fearmongering surrounding “juice jacking,” a cyber attack where attackers steal data from devices that are charging via USB ports. Next, we dive into a case where a photographer tried to get his photos removed from an AI dataset, only to receive an invoice instead ... Read More
Building a Healthy Security Culture: Insights from Kai Roer
Tom Eston | | Awareness, Cyber Security, Cybersecurity, Data Privacy, Digital Privacy, Episodes, Information Security, Infosec, Kai Roer, Podcast, Podcasts, Praxis Security Labs, Privacy, security, Security Awareness, Security Culture, Security Culture Coach, Security Program, technology, Weekly Edition
In this episode we speak with Kai Roer, a renowned author, security culture coach, and CEO of Praxis Security Labs. Kai shares his career journey in cybersecurity and emphasizes the importance of building a strong security culture within organizations. He identifies the biggest impediments to a good security culture and ... Read More
Arkansas Social Media Consent Law, Android Malware Invasion, New Method of Keyless Car Theft
Tom Eston | | ad fraud, android, Arkansas, Auto Industry, Car manufacturers, Car theft, Child protection, crime, Cyber Security, cyberbullying, Cybersecurity, Data Privacy, Digital Privacy, Episodes, facebook, Google Play Store, Information Security, Infosec, Keyless Entry, malicious apps, Malware, Minors, mobile devices, online safety, Parental consent, Podcast, Podcasts, Privacy, security, social media, technology, Tekya, Vulnerabilities, Weekly Edition
Is Arkansas taking the right step to protect children online? A new law passed in the state makes it illegal for minors to use social media without their parent or guardian’s consent. Over 60 Android apps on the Google Play Store with more than 100 million downloads have been infiltrated ... Read More
Genesis Market Crackdown, Life360 App Misuse, Tesla Customer Privacy Concerns
Tom Eston | | customer privacy, Cyber Security, Cybersecurity, Data Privacy, Digital Privacy, Episodes, Family Safety, FBI, Genesis, Genesis Market, Information Security, Infosec, law enforcement, Life360, Podcast, Podcasts, Privacy, security, technology, Tesla, Videos, Weekly Edition
Law enforcement agencies across 17 countries have cracked down on Genesis Market, one of the largest criminal marketplaces, resulting in the arrests of 120 people globally. Popular family safety app, Life360, has been used by sex traffickers to monitor and control their victims, highlighting the increasing use of GPS technology ... Read More
Clearview AI Facial Recognition Fallout, Hacked and Helpless, Is AI Armageddon Upon Us?
Tom Eston | | AI, AI Development, ChatGPT, ClearviewAI, Cyber Security, Cybersecurity, Data Privacy, Digital Privacy, Episodes, facebook, facial recognition, Information Security, Infosec, mobile phone, Open Letter, Petition, Podcast, Podcasts, Privacy, security, SIM Hijacking, technology, Weekly Edition
Clearview AI provided police with 30 billion scraped images from Facebook, raising concerns over privacy and the potential misuse of facial recognition technology. A victim of a phone hack shares their story of how their credit card was stolen, highlighting the vulnerability of personal information and the chain of events ... Read More
The TikTok CEO Testimony, ChatGPT’s Privacy Risks, Inaudible Ultrasound Attacks
Tom Eston | | ChatGPT, Commerce Department, Congress, Congressional Hearing, Cyber Security, Cybersecurity, Data Privacy, data protection, Device Attacks, Digital Privacy, Episodes, Federal Privacy Law, Generational Gap, Government Authority, Information Security, Infosec, national security, Podcast, Podcasts, Privacy, Privacy Concern, Public Data Scraping, RESTRICT Act, Secure Equipment Act, security, security risks, Shou Zi Chew, tech industry, technology, TikTok CEO, Ultrasonic Waves, Weekly Edition
The CEO of TikTok was criticized by Congress for his “worthless” assurances regarding the app’s privacy and security. But what is the real motivation for Congress attempting to ban TikTok? Should we be concerned that AI language models like ChatGPT are a privacy nightmare? Not just for businesses but for ... Read More
Samsung Chipset Zero-Day Vulnerabilities, AI-Assisted Social Engineering, ATM Fraud with a Twist
Tom Eston | | AI Tools, ATM fraud, Chase Bank, Contactless Payment, Convenience vs Security, Cyber Security, Cybersecurity, Data Privacy, Digital Privacy, Episodes, Exynos Chipsets, Hidden Cameras, Information Security, Infosec, mobile device security, PIN Security, Podcast, Podcasts, Privacy, Remote Code Execution, ReSpeacher, Samsung Chipsets, security, Skimmer Technology, social engineering attacks, Tap-Enabled Debit Cards, Tavora, technology, Voice Cloning, Voice over LTE, Weekly Edition, WiFi Calling, zero-day vulnerabilities
In this episode we discuss Google’s discovery of 18 zero-day vulnerabilities in Samsung’s Exynos chipsets. We examine an AI-assisted social engineering campaign that combines emerging technologies with classic techniques. Finally, we look at a new method of ATM fraud where thieves use glue to disable card readers and trick customers ... Read More
Exploring the Role of Empathy in Cybersecurity with Andra Zaharia
Tom Eston | | Analogies, Andra Zaharia, Awareness, Bias, Content Creators, Cyber Empathy Podcast, Cybersecurity, cybersecurity professionals, Data Privacy, Digital Privacy, Digital Space, Emotional Maturity, empathy, Empowerment, Episodes, Generosity, Information Security, Infosec, Journalists, kindness, Personal Growth, Podcast, Privacy, Real Life Examples, security, Shared Security, Technical Concepts, technology, users, Victim Blaming, Weakest Link, Weekly Edition
On this episode, Tom Eston discusses empathy in cybersecurity with Andra Zaharia, host of the Cyber Empathy Podcast. We talk about finding her passion for contributing to the industry and the importance of empathy in cybersecurity. We cover how empathy relates to cybersecurity in the industry, the importance of being ... Read More
Biden’s National Cybersecurity Strategy, BetterHelp’s FTC Fine, Chick-fil-A Data Breach
Tom Eston | | BetterHelp, Biden, Chick-fil-A, credential stuffing attack, Cyber Security, Cybersecurity, Data Privacy, Digital Privacy, Episodes, FTC, Information Security, Infosec, Mental Health Platform, Milestone, National Cybersecurity Strategy, personal information, Podcast, Podcasts, Privacy, Privacy Policies, Reward Points, security, Software Companies, Subscribers, technology, Terms of Service, Weekly Edition, White House, YouTube
What you need to know about Biden’s new National Cybersecurity Strategy, which aims to provide a framework of what the current administration wants the US federal government, critical infrastructure organizations, and private companies to do to work together to improve national cybersecurity. BetterHelp, a direct-to-consumer mental health app, has been ... Read More