The Tim Hortons mobile app created a “a mass invasion of Canadians’ privacy” by conducting continuous location tracking without user consent even when the app was closed, what is a social engineering kill-chain and how can this help understand and prevent attacks, and new research shows 33 out of the top 100 hospitals in America […]
The post Tim Hortons Privacy Investigation, Social Engineering Kill-Chain, Hospitals Sending Facebook Your Data appeared first on The Shared Security Show.
Is Social Media at a Tipping Point, The TikTok Invisible Challenge, San Francisco Police Can Use Killer Robots
How to Break Into a Cybersecurity Career – Rob Fuller (Mubix)
The Rise of Mastodon, Twitter in Trouble, Largest Privacy Settlement in US History
How to Break Into a Cybersecurity Career – Digital Forensics and Incident Response (DFIR)
Cybersecurity’s Role in Combating Midterm Election Disinformation
CISO Liability Risk and Jail Time, (ISC)2 Bylaw Vote and the Value of Cybersecurity Certifications
Attack of the Wi-Fi Spy Drones, How to Destroy Your Old Electronics, Signal Removes SMS Support
Uber Breach Guilty Verdict, Mandatory Password Expiration, Fake Executive Profiles on LinkedIn
Hackers Need 5 Hours or Less to Break In, SMS Phishing Tactics, Strange Ways Employees Expose Data
What are Passkeys, PowerPoint Mouseover Attack, 2K Games Support Hacked
Uber Hacked by 18 Year Old, Morgan Stanley Hard Drives Got Auctioned, Deleting Your Data is Hard
Facebook Doesn’t Know Where Your Data Is, New Hire Spearmishing Attack, Smart Thermostat Lock Out
TikTok Denies Data Breach, Los Angeles School District Ransomware Attack, Fingerprint Scanners in School Bathrooms
LastPass Data Breach, ETHERLED: Air-Gapped Systems Attack, Twitter Whistleblower Complaint
Janet Jackson Can Crash Laptops, Credential Phishing Attacks Skyrocket, A Phone Carrier That Doesn’t Track You
Multi-Factor Authentication Fatigue Attack, Signal Account Twilio Hack, Facebook and Instagram In-App Browser
The Importance of Faraday Technology with Aaron Zar from SLNT
Phone Numbers Used for Identification, Hacker Summer Camp Advice, Samsung Repair Mode
Twitter Data Breach, 15 Minutes to Exploit Zero-Day Vulnerabilities, Resilient Deepfake Traits
Robert Kerbeck Author of RUSE: Lying the American Dream from Hollywood to Wall Street
Create your
podcast in
minutes
It is Free
gm! crypto
Big Technology Podcast
Cyber Security Headlines
Techmeme Ride Home
The 404 Media Podcast