Exploring the bonds shared between people and technology
…
continue reading
Tom Eston Scott Wright Kevin Johnson Podcasts
Shared Security is your premier cybersecurity and privacy podcast where we explore the bonds shared between people and technology. Join industry experts Tom Eston, Scott Wright, and Kevin Johnson as they deliver the latest news, actionable tips, expert guidance, and insightful interviews with top cybersecurity and privacy specialists. Stay informed and take control of your online security and privacy in today's interconnected world. Tune in every week to discover invaluable insights, strateg ...
…
continue reading

1
Public Wi-Fi Myths: Why You’re Probably Safer Than You Think
17:40
17:40
Play later
Play later
Lists
Like
Liked
17:40Public Wi-Fi has a bad reputation — but in 2025, the “you’ll get hacked instantly” fear is largely outdated. In this episode, Tom and Kevin dig into real research and modern protections that make most public Wi-Fi connections reasonably safe. We’ll explore why HTTPS, device security, and updated standards have drastically reduced the risks, what th…
…
continue reading

1
Public Wi-Fi Myths: Why You’re Probably Safer Than You Think
17:41
17:41
Play later
Play later
Lists
Like
Liked
17:41Public Wi-Fi has a bad reputation — but in 2025, the “you’ll get hacked instantly” fear is largely outdated. In this episode, Tom and Kevin dig into real research and modern protections that make most public Wi-Fi connections reasonably safe. We’ll explore why HTTPS, device security, and updated standards have drastically reduced the risks, what th…
…
continue reading

1
The Tea App Hack: How a “Safe” Space Leaked 13,000 ID Photos & 1.1M Messages
14:50
14:50
Play later
Play later
Lists
Like
Liked
14:50In this episode we’re discussing the alarming breach of the Tea app, a platform intended for women to share dating experiences. The hack resulted in the exposure of over 13,000 government ID photos, 72,000 user images, and over a million private messages due to poor security practices. We’ll discuss the role of sloppy coding, an exposed database, a…
…
continue reading

1
The Tea App Hack: How a “Safe” Space Leaked 13,000 ID Photos & 1.1M Messages
14:50
14:50
Play later
Play later
Lists
Like
Liked
14:50In this episode we're discussing the alarming breach of the Tea app, a platform intended for women to share dating experiences. The hack resulted in the exposure of over 13,000 government ID photos, 72,000 user images, and over a million private messages due to poor security practices. We'll discuss the role of sloppy coding, an exposed database, a…
…
continue reading

1
Random Smishing Text Scams: Why “Do I Know You?” Texts Are Dangerous
4:11
4:11
Play later
Play later
Lists
Like
Liked
4:11In this episode, we discuss a rising scam involving random smishing text messages. Learn how these messages work, why they’re effective, and what you can do to protect yourself. Discover the dangers of replying to vague text messages from unknown numbers and get practical tips on how to block and report spam texts. Stay safe by not engaging with th…
…
continue reading

1
Random Smishing Text Scams: Why “Do I Know You?” Texts Are Dangerous
4:12
4:12
Play later
Play later
Lists
Like
Liked
4:12In this episode, we discuss a rising scam involving random smishing text messages. Learn how these messages work, why they're effective, and what you can do to protect yourself. Discover the dangers of replying to vague text messages from unknown numbers and get practical tips on how to block and report spam texts. Stay safe by not engaging with th…
…
continue reading

1
Leaked, Patched, and Still Hacked: The SharePoint Zero-Day Crisis
15:48
15:48
Play later
Play later
Lists
Like
Liked
15:48This week we explore the recent Microsoft SharePoint vulnerability that has led to widespread exploitation by ransomware gangs and Chinese State-sponsored hackers. We also cover the confirmed compromise of multiple US agencies, including the Department of Homeland Security, in a large-scale cyber espionage campaign. Kevin Johnson joins to discuss t…
…
continue reading

1
Leaked, Patched, and Still Hacked: The SharePoint Zero-Day Crisis
15:48
15:48
Play later
Play later
Lists
Like
Liked
15:48This week we explore the recent Microsoft SharePoint vulnerability that has led to widespread exploitation by ransomware gangs and Chinese State-sponsored hackers. We also cover the confirmed compromise of multiple US agencies, including the Department of Homeland Security, in a large-scale cyber espionage campaign. Kevin Johnson joins to discuss t…
…
continue reading

1
Doorbells, Dystopia, and Digital Rights: The Ring Surveillance Debate
18:55
18:55
Play later
Play later
Lists
Like
Liked
18:55In this episode, we examine Amazon’s Ring doorbell camera amid rising privacy concerns and policy changes. The Electronic Frontier Foundation’s recent report criticizes Ring’s AI-first approach and the rollback of prior privacy reforms, describing it as ‘techno authoritarianism.’ We also discuss a recent scare among Ring users on May 28, related to…
…
continue reading

1
Doorbells, Dystopia, and Digital Rights: The Ring Surveillance Debate
18:55
18:55
Play later
Play later
Lists
Like
Liked
18:55In this episode, we examine Amazon's Ring doorbell camera amid rising privacy concerns and policy changes. The Electronic Frontier Foundation's recent report criticizes Ring's AI-first approach and the rollback of prior privacy reforms, describing it as 'techno authoritarianism.' We also discuss a recent scare among Ring users on May 28, related to…
…
continue reading

1
Passwords and the Elderly: Why Writing Them Down Might Be OK
19:54
19:54
Play later
Play later
Lists
Like
Liked
19:54In this episode, join hosts Tom Eston, Scott Wright, and Kevin Johnson as they discuss the controversial topic of seniors writing down passwords. They discuss how threat modeling differs for the elderly, the practicality of using password managers, two-factor authentication, and future solutions like passkeys. The conversation includes humorous ane…
…
continue reading

1
Passwords and the Elderly: Why Writing Them Down Might Be OK
19:55
19:55
Play later
Play later
Lists
Like
Liked
19:55In this episode, join hosts Tom Eston, Scott Wright, and Kevin Johnson as they discuss the controversial topic of seniors writing down passwords. They discuss how threat modeling differs for the elderly, the practicality of using password managers, two-factor authentication, and future solutions like passkeys. The conversation includes humorous ane…
…
continue reading

1
The Google Workspace Security Gap: Why Traditional Tools Fall Short
16:14
16:14
Play later
Play later
Lists
Like
Liked
16:14In this episode, we discuss the often overlooked security issues within Google Workspace. Rajan Kapoor, Field CISO at Material Security, joins us to talk about how Material Security is redefining the protection of documents, email accounts, and data in Google Workspace. We explore the unique challenges Workspace presents compared to traditional too…
…
continue reading

1
The Google Workspace Security Gap: Why Traditional Tools Fall Short
16:15
16:15
Play later
Play later
Lists
Like
Liked
16:15In this episode, we discuss the often overlooked security issues within Google Workspace. Rajan Kapoor, Field CISO at Material Security, joins us to talk about how Material Security is redefining the protection of documents, email accounts, and data in Google Workspace. We explore the unique challenges Workspace presents compared to traditional too…
…
continue reading

1
Autonomous Hacking? This Startup May Have Just Changed Penetration Testing Forever
21:34
21:34
Play later
Play later
Lists
Like
Liked
21:34In this episode, we explore the revolutionary concept of autonomous penetration testing with a discussion into Cybersecurity startup XBOW’s recent breakthrough. XBOW claims to have topped HackerOne’s leaderboard using a fully autonomous AI agent, raising significant questions about the future of offensive security. Hosts discuss the potential of AI…
…
continue reading

1
Autonomous Hacking? This Startup May Have Just Changed Penetration Testing Forever
21:34
21:34
Play later
Play later
Lists
Like
Liked
21:34In this episode, we explore the revolutionary concept of autonomous penetration testing with a discussion into Cybersecurity startup XBOW’s recent breakthrough. XBOW claims to have topped HackerOne's leaderboard using a fully autonomous AI agent, raising significant questions about the future of offensive security. Hosts discuss the potential of AI…
…
continue reading

1
Cybersecurity Talent Shortage: Myth, Mismatch, or Reality?
28:02
28:02
Play later
Play later
Lists
Like
Liked
28:02Is there really a cybersecurity talent shortage, or are we just looking in all the wrong places? This week on the Shared Security Podcast, we tackle the buzz around the so-called cybersecurity skills gap. Host Tom Eston welcomes Katie Soper, Senior Consultant at Avetix Cyber and co-founder of the CyberVault Podcast, to discuss the challenges and mi…
…
continue reading