Exploring the bonds shared between people and technology
…
continue reading
Tom Eston Scott Wright Kevin Johnson Podcasts
Shared Security is your premier cybersecurity and privacy podcast where we explore the bonds shared between people and technology. Join industry experts Tom Eston, Scott Wright, and Kevin Johnson as they deliver the latest news, actionable tips, expert guidance, and insightful interviews with top cybersecurity and privacy specialists. Stay informed and take control of your online security and privacy in today's interconnected world. Tune in every week to discover invaluable insights, strateg ...
…
continue reading

1
Situational Awareness & Family Safety: Staying Alert in Today’s World with Andy Murphy
30:55
30:55
Play later
Play later
Lists
Like
Liked
30:55Join the Shared Security Podcast for a critical discussion about situational awareness with special guest, Andy Murphy, host of the Secure Family Podcast. In a world where mass shootings and violence in public places are alarming realities, staying alert to your surroundings has never been more important. Andy shares his expertise on personal and f…
…
continue reading

1
Situational Awareness & Family Safety: Staying Alert in Today’s World with Andy Murphy
30:56
30:56
Play later
Play later
Lists
Like
Liked
30:56Join the Shared Security Podcast for a critical discussion about situational awareness with special guest, Andy Murphy, host of the Secure Family Podcast. In a world where mass shootings and violence in public places are alarming realities, staying alert to your surroundings has never been more important. Andy shares his expertise on personal and f…
…
continue reading

1
Best of Shared Security (2020) History Repeats Itself: Cybersecurity Challenges that Still Haunt Us
5:29
5:29
Play later
Play later
Lists
Like
Liked
5:29In this “best of” episode of the Shared Security Podcast, we revisit a discussion from September 2020 that’s just as relevant today as it was then. First, we cover how ransomware attacks forced several school districts—including Hartford, CT and Toledo, OH—to delay or shut down classes on the very first day of school. Then we dive into Google Chrom…
…
continue reading

1
Best of Shared Security (2020) History Repeats Itself: Cybersecurity Challenges that Still Haunt Us
5:29
5:29
Play later
Play later
Lists
Like
Liked
5:29In this “best of” episode of the Shared Security Podcast, we revisit a discussion from September 2020 that’s just as relevant today as it was then. First, we cover how ransomware attacks forced several school districts—including Hartford, CT and Toledo, OH—to delay or shut down classes on the very first day of school. Then we dive into Google Chrom…
…
continue reading

1
Salesforce Under Fire: The Salesloft Drift Supply-Chain Breach
17:20
17:20
Play later
Play later
Lists
Like
Liked
17:20In this episode, we discuss a recent significant cyber attack where Palo Alto Networks experienced a data breach through their Salesforce environment due to a compromised SalesLoft drift integration. Throughout the discussion, we highlight why Salesforce, a crucial CRM platform for many businesses, is becoming a prime target for supply chain attack…
…
continue reading

1
Salesforce Under Fire: The Salesloft Drift Supply-Chain Breach
17:20
17:20
Play later
Play later
Lists
Like
Liked
17:20In this episode, we discuss a recent significant cyber attack where Palo Alto Networks experienced a data breach through their Salesforce environment due to a compromised SalesLoft drift integration. Throughout the discussion, we highlight why Salesforce, a crucial CRM platform for many businesses, is becoming a prime target for supply chain attack…
…
continue reading
In this episode, we discuss if the convenience of modern technology compromises our privacy. Inspired by a thought-provoking Reddit post, we explore how everyday actions like saving passwords, enabling location tracking, and using cloud backups put our personal data at risk. Learn about the trade-offs between convenience and privacy, and get tips o…
…
continue reading
In this episode, we discuss if the convenience of modern technology compromises our privacy. Inspired by a thought-provoking Reddit post, we explore how everyday actions like saving passwords, enabling location tracking, and using cloud backups put our personal data at risk. Learn about the trade-offs between convenience and privacy, and get tips o…
…
continue reading

1
Public Wi-Fi Myths: Why You’re Probably Safer Than You Think
17:40
17:40
Play later
Play later
Lists
Like
Liked
17:40Public Wi-Fi has a bad reputation — but in 2025, the “you’ll get hacked instantly” fear is largely outdated. In this episode, Tom and Kevin dig into real research and modern protections that make most public Wi-Fi connections reasonably safe. We’ll explore why HTTPS, device security, and updated standards have drastically reduced the risks, what th…
…
continue reading

1
Public Wi-Fi Myths: Why You’re Probably Safer Than You Think
17:41
17:41
Play later
Play later
Lists
Like
Liked
17:41Public Wi-Fi has a bad reputation — but in 2025, the “you’ll get hacked instantly” fear is largely outdated. In this episode, Tom and Kevin dig into real research and modern protections that make most public Wi-Fi connections reasonably safe. We’ll explore why HTTPS, device security, and updated standards have drastically reduced the risks, what th…
…
continue reading

1
The Tea App Hack: How a “Safe” Space Leaked 13,000 ID Photos & 1.1M Messages
14:50
14:50
Play later
Play later
Lists
Like
Liked
14:50In this episode we’re discussing the alarming breach of the Tea app, a platform intended for women to share dating experiences. The hack resulted in the exposure of over 13,000 government ID photos, 72,000 user images, and over a million private messages due to poor security practices. We’ll discuss the role of sloppy coding, an exposed database, a…
…
continue reading

1
The Tea App Hack: How a “Safe” Space Leaked 13,000 ID Photos & 1.1M Messages
14:50
14:50
Play later
Play later
Lists
Like
Liked
14:50In this episode we're discussing the alarming breach of the Tea app, a platform intended for women to share dating experiences. The hack resulted in the exposure of over 13,000 government ID photos, 72,000 user images, and over a million private messages due to poor security practices. We'll discuss the role of sloppy coding, an exposed database, a…
…
continue reading

1
Random Smishing Text Scams: Why “Do I Know You?” Texts Are Dangerous
4:11
4:11
Play later
Play later
Lists
Like
Liked
4:11In this episode, we discuss a rising scam involving random smishing text messages. Learn how these messages work, why they’re effective, and what you can do to protect yourself. Discover the dangers of replying to vague text messages from unknown numbers and get practical tips on how to block and report spam texts. Stay safe by not engaging with th…
…
continue reading

1
Random Smishing Text Scams: Why “Do I Know You?” Texts Are Dangerous
4:12
4:12
Play later
Play later
Lists
Like
Liked
4:12In this episode, we discuss a rising scam involving random smishing text messages. Learn how these messages work, why they're effective, and what you can do to protect yourself. Discover the dangers of replying to vague text messages from unknown numbers and get practical tips on how to block and report spam texts. Stay safe by not engaging with th…
…
continue reading

1
Leaked, Patched, and Still Hacked: The SharePoint Zero-Day Crisis
15:48
15:48
Play later
Play later
Lists
Like
Liked
15:48This week we explore the recent Microsoft SharePoint vulnerability that has led to widespread exploitation by ransomware gangs and Chinese State-sponsored hackers. We also cover the confirmed compromise of multiple US agencies, including the Department of Homeland Security, in a large-scale cyber espionage campaign. Kevin Johnson joins to discuss t…
…
continue reading

1
Leaked, Patched, and Still Hacked: The SharePoint Zero-Day Crisis
15:48
15:48
Play later
Play later
Lists
Like
Liked
15:48This week we explore the recent Microsoft SharePoint vulnerability that has led to widespread exploitation by ransomware gangs and Chinese State-sponsored hackers. We also cover the confirmed compromise of multiple US agencies, including the Department of Homeland Security, in a large-scale cyber espionage campaign. Kevin Johnson joins to discuss t…
…
continue reading

1
Doorbells, Dystopia, and Digital Rights: The Ring Surveillance Debate
18:55
18:55
Play later
Play later
Lists
Like
Liked
18:55In this episode, we examine Amazon’s Ring doorbell camera amid rising privacy concerns and policy changes. The Electronic Frontier Foundation’s recent report criticizes Ring’s AI-first approach and the rollback of prior privacy reforms, describing it as ‘techno authoritarianism.’ We also discuss a recent scare among Ring users on May 28, related to…
…
continue reading