Microsoft Lost Its Keys, Voice Cloning Scams, The Biden-Harris Cybersecurity Labeling Program

Microsoft Lost Its Keys, Voice Cloning Scams, The Biden-Harris Cybersecurity Labeling Program

In this episode, we discuss the recent Microsoft security breach where China-backed hackers gained access to numerous email inboxes, including those of several federal government agencies, using a stolen Microsoft signing key ...
🙂

Scam Intercepters – some thoughts

Despite no longer being paid to provide consultancy to the IT security industry, I couldn’t resist catching up with an interesting BBC initiative called Scam Interceptors. Having been appalled in the past ...

Amazon Echo Recording Controversy, New Mobile Phone Scam, Hotels Leaking Data

This is your Shared Security Weekly Blaze for April 15th 2019 with your host, Tom Eston. In this week’s episode: Amazon Echo’s recording controversy, a new mobile phone scam, and hotels leaking ...

Midterm Election Security, Gait Recognition Surveillance Technology, Caller ID Authentication – WB42

This is your Shared Security Weekly Blaze for November 12, 2018 with your host, Tom Eston. In this week’s episode: Midterm Election Security, Gait Recognition Surveillance Technology and Caller ID Authentication Silent ...
Social-Engineer Newsletter Vol 08 – Issue 110

Social-Engineer Newsletter Vol 08 – Issue 110

Vol 08 Issue 110 November 2018 In This Issue Hi, This Is Your Bank Calling. Social-Engineer News Upcoming classes As a member of the newsletter you have the option to OPT-IN for ...

Mobile Phone Call Scams, Pegasus Mobile Spyware, Newegg Data Breach – WB35

This is the Shared Security Weekly Blaze for September 24, 2018 sponsored by Security Perspectives – Your Source for Tailored Security Awareness Training and Assessment Solutions and Silent Pocket. This episode was ...
Facebook

The Shared Security Weekly Blaze – Polar Fitness App Location Data Exposed, Blocking Scam Phone Calls, Samba TV Privacy Controversy

This is the Shared Security Weekly Blaze for July 16th, 2018 sponsored by Security Perspectives – Your Source for Tailored Security Awareness Training and Assessment Solutions and Silent Pocket. This episode was ...
Your Phone’s Betrayal

Your Phone’s Betrayal

Look at your phone and ask yourself, do you rely on that tiny device for your business dealings? Your important family notifications? Your link to the outside world? If the answer to ...