Shared Security Podcast

The Shared Security Podcast Episode 52 – Creepy New Social Network, Phishing Dangers, Ransomware


Listen Later

This is the 52nd episode of the Shared Security Podcast sponsored by Security Perspectives – Your Source for Tailored Security Awareness Training and Assessment Solutions. This episode was hosted by Tom Eston and Scott Wright. This episode was recorded March 9, 2016. Below are the show notes, commentary, links to articles and news mentioned in the podcast:

Unexpected implications arising from the Internet of Things

This was an interesting article about some of the “unexpected” security and privacy things that people don’t really think about.  For example, what are the ramifications of IoT technology that might be hacked to create fake sensor and video data for criminal activity?  What happens to the security budgets of organizations that need to address these new risks?  It’s an interesting time to be in this space.
-Tom

Peer-Seeking Webcam Reveals the Security Dangers of Internet Things

This is just one example but like other new IoT related technology data is being sent to multiple third-parties and peer networks are being created, all without your knowledge. What makes this webcam interesting is that disabling the peer sharing capability doesn’t actually disable anything.  How many other devices like this have the same issue?
-Tom

Follower: the “creepiest social network” that follows you in real life

Just when you thought the traditional social networks we use were sometimes creepy, here comes “Follower”.  Follower is a social network that allows you to have real people follow you around and take pictures of your activities all without you knowing where your “follower” is.  If you’re looking for a real-life stalker this might be the social network you’re looking for.
-Tom

Payroll data leaked for current, former Snapchat employees

Two recent breaches highlight the need for more eduction about targeting phishing attacks.  Both Snapchat and Seagate each fell victim to a very similar phishing attack targeting payroll information.  The attack was very simple and also very easy to spot if you know the signs of an attack like this.
-Tom

The Cerber Ransomware not only Encrypts Your Data But Also Speaks to You

Ransomware has been around for awhile but now we’re starting to see the next evolution of this type of malware…where it talks back to you. Give this article a read if you want to know more about how this malware works and what to do if your computer is infected with it.
-Tom

Please send any show feedback to feedback [aT] sharedsecurity.net or comment below. You can also call our voice mail box at 1-613-693-0997 if you have a question for our Q&A section on the next episode. Be sure to visit our website, follow us on Twitter and like us on Facebook. Thanks for listening!

The post The Shared Security Podcast Episode 52 – Creepy New Social Network, Phishing Dangers, Ransomware appeared first on Shared Security Podcast.

...more
View all episodesView all episodes
Download on the App Store

Shared Security PodcastBy Tom Eston, Scott Wright, Kevin Tackett

  • 4.5
  • 4.5
  • 4.5
  • 4.5
  • 4.5

4.5

28 ratings


More shows like Shared Security Podcast

View all
Hacked by Hacked

Hacked

187 Listeners

Security Now (Audio) by TWiT

Security Now (Audio)

2,005 Listeners

Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec by Jerry Bell and Andrew Kalat

Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec

372 Listeners

Risky Business by Patrick Gray

Risky Business

372 Listeners

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast) by Johannes B. Ullrich

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

652 Listeners

CyberWire Daily by N2K Networks

CyberWire Daily

1,019 Listeners

Smashing Security by Graham Cluley

Smashing Security

319 Listeners

Click Here by Recorded Future News

Click Here

417 Listeners

Darknet Diaries by Jack Rhysider

Darknet Diaries

8,063 Listeners

Cybersecurity Today by Jim Love

Cybersecurity Today

178 Listeners

Hacking Humans by N2K Networks

Hacking Humans

315 Listeners

CISO Series Podcast by David Spark, Mike Johnson, and Andy Ellis

CISO Series Podcast

188 Listeners

Defense in Depth by David Spark, Steve Zalewski, Geoff Belknap

Defense in Depth

73 Listeners

Cybersecurity Headlines by CISO Series

Cybersecurity Headlines

139 Listeners

The 404 Media Podcast by 404 Media

The 404 Media Podcast

389 Listeners