This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
The Tim Hortons mobile app created a “a mass invasion of Canadians’ privacy” by conducting continuous location tracking without user consent even when the app was closed, what is a socialengineering kill-chain and how can this help understand and prevent attacks, and new research shows 33 out of the top 100 hospitals in America […].
Socialengineering has become a larger threat to the healthcare industry in recent years. Clearly, we need to take notice of how socialengineering attacks are targeting our vital healthcare systems. So, what exactly is socialengineering? What is SocialEngineering? In one case, $3.1
In this episode, special guest Alyssa Miller joins the hosts for an insightful and entertaining conversation covering a broad range of topics from socialengineering anecdotes involving Kevin Johnson to Alyssa’s journey in aviation and being a pilot.
The post Shortage of InformationSecurity Professionals appeared first on Security Boulevard. In recent years, there has been an exponential increase in high-profile data breaches. As data breaches at corporations, educational institutions, and government agencies continue to grow, so does the need.
The post BSidesAugusta 2021 – Timothy De Block’s ‘SocialEngineering The Development Team For Better Security’ appeared first on Security Boulevard. Many thanks to BSidesAugusta for publishing their outstanding videos from the BSidesAugusta 2021 Conference on the organization’s YouTube channel.
The post DuckDuckGo Browser Allows Microsoft Trackers, Stolen Verizon Employee Database, Attacking Powered Off iPhones appeared first on The Shared Security Show.
Threat actors have dramatically escalated their attacks – targeting security controls like multi-factor authentication (MFA), conducting wily socialengineering attacks and extorting businesses large and small with ransomware. For more information, check out our on-demand webinar Your Zero Trust Roadmap. And I get it.
Each year, a select pool of experts from the cybersecurity community sets hours aside to review hundreds of entries received for the SC Trust and Excellence Awards. Prior to Mastercard, Abdullah was the chief informationsecurity officer at Xerox, where she established and led a corporate-wide information risk management program.
.–( BUSINESS WIRE )–Artificial intelligence (AI), machine learning (ML), and deep learning (DL) are often applied in cybersecurity, but their applications may not always work as intended. The paper explores those areas as well as malicious uses of ML and DL, specifically in socialengineering and phishing.
5G is among the technologies that researchers predict will have a big impact on the security landscape in the next decade. Researchers often provides the cybersecurity community with a helpful snapshot on a particular issue. AI could impact more than just socialengineering. Photo by Mario Tama/Getty Images).
Ill also share guidance for newly certified OSCP professionals on how to continue their cybersecurity journey with purpose and direction. Conversations with those whove already moved beyond PEN-200 can help you set clear goals, avoid common pitfalls, and stay aligned with the rapidly evolving demands of the offensive security industry.
Needless to say, in 2021 cybersecurity was front and center for individuals, enterprises, and governments alike. Data breaches and cybersecurity threats were at an all-time high this past year. So let’s take a look at the big challenges, priorities, and trends we saw in cybersecurity over the past year.
The year 2016 will be remembered for some big moments in the world of cybersecurity: the largest known distributed denial of service (DDoS) attack, a phishing attack on a United States presidential candidate’s campaign, and ransomware attacks on major healthcare organizations are just a few. For a preview, read on.
While being “classic” and “timeless” might work in other industries, informationsecurity (Infosec) must constantly guard against resting on laurels when it comes to strategies and solutions. Cybercrime also has elements where automated remediation is unavailable, such as socialengineering attacks.
In this special episode of the Shared Security Podcast, join Tom Eston and Dan DeCloss, CTO and founder of PlexTrac, as they discuss the challenges of data overload in vulnerability remediation.
The post DEF CON 29 Red Team Village – Russ Hanneman’s ‘Message About The Red Team Village CTF’ appeared first on Security Boulevard. Our thanks to DEFCON for publishing their outstanding DEF CON 29 Red Team Village videos on the Conferences’ YouTube channel.
You’d think that having an amazing resume, a couple of bug bounties, or a CTF win would land you that dream infosec job. Welcome to the hacker mind and original podcast from for all secure, it's about challenging our expectations about the people who hack for a living. There's a serious shortage of InfoSec professionals.
You’d think that having an amazing resume, a couple of bug bounties, or a CTF win would land you that dream infosec job. Welcome to the hacker mind and original podcast from for all secure, it's about challenging our expectations about the people who hack for a living. There's a serious shortage of InfoSec professionals.
The LAPSUS$ hacking group has claimed to have hacked both Microsoft and Okta, details about a novel phishing technique called a browser-in-the-browser (BitB) attack, and how a popular software package that has 1.1
In the final episode of the Shared Security Podcast for 2024, join us as we recap our predictions for the year, discuss what we got right and wrong, and highlight our top episodes on YouTube. We also extend a heartfelt thank you to our Patreon supporters and special guests.
To quote an excellent talk from Billy Boatright (and Babe Ruth) at the SocialEngineering Village several years ago, If youre good enough to have a bat in your hands, youre good enough to swing it. We will keep this in mind throughout the interviews and will do our best to alleviate those concerns. So, swing for thefences!
The post Robert Kerbeck Author of RUSE: Lying the American Dream from Hollywood to Wall Street appeared first on The Shared Security Show. In this episode learn all about the world of corporate spying from someone who was a corporate spy and actually wrote a book on it!
Fifteen years after the launch of the microblogging social media platform, Twitter remains a dominant public forum for instant communication with individuals and organizations worldwide on a universe of topics, including #cybersecurity. Top Cybersecurity Experts to Follow on Twitter. Binni Shah | @binitamshah.
Find out why this file may not be as significant as it seems and the importance of avoiding password reuse. […] The post Authy Breach: What It Means for You, RockYou 2024 Password Leak appeared first on Shared Security Podcast. We also explore a massive password list leak titled ‘Rock You 2024’ that has surfaced online.
Then they switch to the best practices to prevent social media account takeovers, highlighting […] The post The World of Scambaiting, Preventing Social Media Account Takeovers, Network Wrenches Hacked appeared first on Shared Security Podcast.
Finally, we […] The post The FBI’s Qakbot Takedown, QR Code Phishing Attacks, Dox Anyone in America for $15 appeared first on Shared Security Podcast. In this episode we discuss the FBI’s remarkable takedown of the Qakbot botnet, a saga involving ransomware, cryptocurrency, and the FBI pushing an uninstaller to thousands of victim PCs.
In episode 346, we discuss new AI-driven voicemail scams that sound convincingly real and how to identify them. We also explore recent research on the privacy concerns surrounding donations to political parties through their websites.
Co-host Scott Wright joins the discussion, highlighting how millions of AT&T customer account passcodes, along with personal information, were compromised due to a leak discovered by a security researcher and reported by […] The post Massive AT&T Data Leak, The Danger of Thread Hijacking appeared first on Shared Security Podcast.
In episode 330 Tom, Scott, and Kevin discuss the new features for iPhones and Android phones designed to warn users about secret trackers, possibly aiding in identifying stalkers.
In this episode Luke Jennings VP of Research & Development from Push Security joins us to discuss SaaS attacks and how its possible to compromise an organization without touching a single endpoint or network.
The post DEF CON 29 Red Team Village – ‘CTF Day 3’ appeared first on Security Boulevard. Our thanks to DEFCON for publishing their outstanding DEF CON 29 Red Team Village videos on the Conferences’ YouTube channel.
In this episode, Tom shows off AI generated images of a “Lonely and Sad Security Awareness Manager in a Dog Pound” and the humorous outcomes. The conversation shifts to Apple’s upcoming support for Rich Communication Services (RCS) and the potential security implications.
They share their expertise on the key data and workflow hurdles that security teams face today. [] The post Tackling Data Overload: Strategies for Effective Vulnerability Remediation appeared first on Shared Security Podcast.
Janet Jackson’s “Rhythm Nation” has been recognized as an exploit for a vulnerability after Microsoft reported it can crash the hard drives of certain old laptop computers, phishing attacks that compromise credentials using brand impersonation are on the rise, and details about a new privacy focused phone carrier that doesn’t track your location or (..)
This week we discuss the top 3 location tracking apps in the Apple App Store and Google Play and which ones sell your data. Plus, details about recent fake Chick-fil-A and Olive Garden vouchers on Facebook. ** Links mentioned on the show ** #1 Phone Tracker by Number [link] [link] – Android [link] – iOS […].
The post DEF CON 29 Red Team Village – ‘CTF Recap and Upcoming Events’ appeared first on Security Boulevard. Our thanks to DEFCON for publishing their outstanding DEF CON 29 Red Team Village videos on the Conferences’ YouTube channel.
The post DEF CON 29 Red Team Village – Lange’s ‘Custom Mechanical Keyboard Build’ appeared first on Security Boulevard. Our thanks to DEFCON for publishing their outstanding DEF CON 29 Red Team Village videos on the Conferences’ YouTube channel.
The post DEF CON 29 Red Team Village – ‘CTF Day 1’ appeared first on Security Boulevard. Our thanks to DEFCON for publishing their outstanding DEF CON 29 Red Team Village videos on the Conferences’ YouTube channel.
The post DEF CON 29 Red Team Village – Bruce Schneier’s ‘AI And Red Team Village Panel’ appeared first on Security Boulevard. Our thanks to DEFCON for publishing their outstanding DEF CON 29 Red Team Village videos on the Conferences’ YouTube channel.
The post DEF CON 29 Red Team Village – ‘CTF Day 2’ appeared first on Security Boulevard. Our thanks to DEFCON for publishing their outstanding DEF CON 29 Red Team Village videos on the Conferences’ YouTube channel.
Vamosi: Like a lot of us, informationsecurity wasn’t necessarily our first line of work. Fortunately I was covering security for ZDNet from day one, and eventually got pretty good at explaining infosec to others. No infosec Twitter or Discord. I started in journalism. So I saved a lot of money to go.
Vamosi: Like a lot of us, informationsecurity wasn’t necessarily our first line of work. Fortunately I was covering security for ZDNet from day one, and eventually got pretty good at explaining infosec to others. No infosec Twitter or Discord. I started in journalism. So I saved a lot of money to go.
Vamosi: Like a lot of us, informationsecurity wasn’t necessarily our first line of work. Fortunately I was covering security for ZDNet from day one, and eventually got pretty good at explaining infosec to others. No infosec Twitter or Discord. I started in journalism. So I saved a lot of money to go.
We organize all of the trending information in your field so you don't have to. Join 28,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content