This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
Governor Mike Parson (R-MO) and his office are likely seeing a huge outpouring of letters, emails, phone calls, and certainly social media comments in this latest controversial matter related to cybersecurity. Journalists responsibly sounding an alarm on dataprivacy is not criminal hacking. October 14, 2021. moleg [link] — Rep.
Travel back to 2009 with the second-ever episode featuring discussions on early Facebook bugs, cross-site scripting vulnerabilities, and a pivotal Canadian privacy ruling involving Facebook. The post Facebook Flaws and Privacy Laws: A Journey into Early Social Media Security from 2009 appeared first on Security Boulevard.
Are we finally seeing a tipping point in social media? The post Is Social Media at a Tipping Point, The TikTok Invisible Challenge, San Francisco Police Can Use Killer Robots appeared first on The Shared Security Show. What is the TikTok “Invisible Challenge” and how links to fake “unfilter” software is being […].
January 28th is DataPrivacy Day, an international effort to empower individuals and support businesses in the endeavor to respect privacy, safeguard data, and enable trust. This year, the National Cybersecurity Alliance has extended the dataprivacy campaign to be a week-long initiative.
Still, the top response stood out clearlyprotecting dataprivacy. The thing is, secure communication goes beyond just protecting dataprivacy. This risk is even greater with the rise of synthetic media (deepfakes), which are now frighteningly real and easily accessible. Its not just hypothetical anymore.
Then they switch to the best practices to prevent social media account takeovers, highlighting […] The post The World of Scambaiting, Preventing Social Media Account Takeovers, Network Wrenches Hacked appeared first on Shared Security Podcast.
The episode also […] The post Who’s to Blame for Hacked Social Media Accounts, Spoofed Online Meeting Requests and Malware appeared first on Shared Security Podcast. The post Who’s to Blame for Hacked Social Media Accounts, Spoofed Online Meeting Requests and Malware appeared first on Security Boulevard.
The show covers identity fraud issues and explores the controversial practices of data brokers selling location data, including tracking US military personnel. The conversation shifts to social media platforms Twitter, Blue […] The post Deepfake Fraud, Data Brokers Tracking Military Personnel appeared first on Shared Security Podcast.
In episode 312, Tom and Scott discuss the implications of a new law in Ohio that may require parental consent for children under 16 using social media, including the pros and cons of this legislation. The post Ohio’s New Social Media Law, Meta’s Link History Feature, 175 Million Passcode Guesses appeared first on Security Boulevard.
Bill Bowman, CISSP, CIPM, is the Chief Information Security Officer & DataPrivacy Officer at financial software company Emburse. He is the father of five children and gives talks on helping families work through social media and technology challenges. He has been a first-hired CISO at five different companies.
In this episode of the Shared Security Podcast, the team debates the Surgeon General’s recent call for social media warning labels and explores the pros and cons. The hosts also provide an update on Microsoft’s delayed release of CoPilot Plus PCs […] The post Social Media Warning Labels, Should You Store Passwords in Your Web Browser?
Cybersecurity Awareness Month is a fixture of the calendar now, as are DataPrivacy Day, World Password Day, and a host of other well-intentioned privacy and security themed events. Some people get a lot of their security information from sources like Twitter, direct from infosec pros. Chris : Might work wonders.
CyberSecAsia Readers Choice Awards In a major triumph for our APAC team, Thales won the CyberSecAsia Readers Choice Award in the DataPrivacy and Protection and Application Security categories. Global Infosec Awards At the 2024 RSA Conference, Imperva nabbed an astounding eleven Cyber Defense Magazine Global InfoSec Awards.
Here are two of our favorites by Infosec blogger John Oppdenaker on Twitter: My password was hacked. As consumers and citizens become more aware of their online security and digital rights, they also have more concerns about their dataprivacy. What are the dangers of a such a company or organization holding my data?".
In this episode, we explore the rise of Threads, a new social media app developed by Meta, which has already attracted 10 million users in just seven hours. However, there’s a catch – the app collects extensive personal data, sparking concerns about privacy.
Ultimately, he believes “this is good for businesses as, through the insurance process, they will gain better visibility into their cyber risks and measures they can deploy to keep digital operations secure and compliant to dataprivacy regulations.”. appeared first on SC Media. billion in premium.
CyberSecAsia Readers Choice Awards In a major triumph for our APAC team, Thales won the CyberSecAsia Readers Choice Award in the DataPrivacy and Protection and Application Security categories. Global Infosec Awards At the 2024 RSA Conference, Imperva nabbed an astounding eleven Cyber Defense Magazine Global InfoSec Awards.
In the words of Duo Security’s Head of Advisory CISOs Wendy Nather, “This is not a marketing report to toss in your swag bag and ignore …this report will change how we think about running infosec programs.” DataPrivacy Day with a difference. The report is available to download free from the Cisco website. Links we liked.
In episode 307, Tom and Scott debunk misinformation circulating about the iOS 17 NameDrop feature by law enforcement and others on social media. Next, they discuss the potential risks of QR code scams, detailing a real-life incident where a woman lost a significant amount of money due to a QR code scam.
Defining “storytelling” in an InfoSec context Inspiration - We the People: Democratizing Security “Storytelling” is a word that you will hear frequently within Duo’s creative team — now part of a Brand & Strategy unit for Cisco’s rebranded security organization Cisco Secure. But where to begin?
The conversation covers the challenges of maintaining reliable information in social media and the [] The post Meta Ditches Fact-Checking for Community Notes, RedNote and the TikTok Ban appeared first on Shared Security Podcast. We also discuss the implications of a TikTok ban in the U.S., with users migrating to similar apps like RedNote.
In this episode, we discuss the UK governments demand for Apple to create a secret backdoor for accessing encrypted iCloud backups under the Investigatory Powers Act and its potential global implications on privacy.
In this episode, we explore the recent arrest of Telegram founder Pavel Durov in France and discuss the app’s encryption claims. Is Telegram truly an encrypted messaging app? Joining the conversation is co-host Kevin Johnson, bringing his trademark opinions.
In this episode we discuss the FBI’s remarkable takedown of the Qakbot botnet, a saga involving ransomware, cryptocurrency, and the FBI pushing an uninstaller to thousands of victim PCs. Next, we explore how a major U.S. energy organization fell victim to a QR code phishing attack, highlighting the ever-evolving tactics used by attackers.
In the milestone 350th episode of the Shared Security Podcast, the hosts reflect on 15 years of podcasting, and the podcast’s evolution from its beginnings in 2009. They discuss the impact of a current hurricane on Florida, offering advice on using iPhone and Android satellite communication features during emergencies.
Joined by co-host Scott Wright, we discuss the potential implications of KOSA, including concerns about censorship, mass surveillance, and the impact on free expression and online privacy. In this episode, we explore the Kids Online Safety Act (KOSA), a controversial bill aimed at protecting children online.
In episode 355, Tom discusses his decision to deactivate his Twitter accounts due to privacy concerns with Twitter’s new AI policy and changes in the blocking features.
In this episode, we explore Mark Zuckerbergs bold claim that AI friends will replace human friendships, and discuss the potential implications of a world where technology mediates our connections. We also update listeners on the recent developments in the 23andMe bankruptcy case and what it means for former customers.
billion fine by the EU for unlawfully transferring user data, shedding light on the increasing risks faced by tech companies in violating privacy rules. In this episode, we discuss Meta’s record-breaking $1.3 Highly realistic images of a Pentagon explosion went viral on Twitter, causing a stock market dip.
operations of its popular social media app in the coming weeks following threats of a shutdown by the Trump administration. Cloutier, who after joining the company dismissed the notion that TikTok shared any data with governments, was left with a significant challenge: overcome technological hurdles, while also regaining the trust of users.
We organize all of the trending information in your field so you don't have to. Join 28,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content