Podcast Episodes

Back to Search
First Ban on Selling Location Data, Prohibiting Password Managers, Real-Time Crime Center Concerns

First Ban on Selling Location Data, Prohibiting Password Managers, Real-Time Crime Center Concerns



In this episode we discuss how Massachusetts lawmakers are pushing a groundbreaking bill to ban the buying and selling of location data from mobile devices. This legislation raises vital questions ab…


Published on 2 years, 5 months ago

Meta’s Threads and Your Privacy, Airline Reservation Scams, IDOR Srikes Back

Meta’s Threads and Your Privacy, Airline Reservation Scams, IDOR Srikes Back



In this episode, we explore the rise of Threads, a new social media app developed by Meta, which has already attracted 10 million users in just seven hours. However, there’s a catch – the app collect…


Published on 2 years, 5 months ago

MOVEit Cyberattack, The Problem with Password Rotations, Military Alert on Free Smartwatches

MOVEit Cyberattack, The Problem with Password Rotations, Military Alert on Free Smartwatches



Several major organizations, including British Airways and the BBC, fell victim to the recent MOVEit cyberattack. We discuss the alarming trend of hackers targeting trusted suppliers to gain access t…


Published on 2 years, 5 months ago

Security Podcasting, Hacking Stories, and The State of Firmware Security with Paul Asadoorian

Security Podcasting, Hacking Stories, and The State of Firmware Security with Paul Asadoorian



Paul Asadoorian, OG security podcaster and host of the popular Paul’s Security Weekly podcast, joins us in this episode to talk about his career as one of the original security podcasters. Paul’s bee…


Published on 2 years, 6 months ago

The FTC’s Complaint Against Ring, Detecting Malware Infected Apps, America’s Most Cybersecure Companies

The FTC’s Complaint Against Ring, Detecting Malware Infected Apps, America’s Most Cybersecure Companies



The FTC charged Ring, the Amazon-owned home security camera company, for compromising customer privacy and having inadequate security measures. Employees accessed private videos, while hackers exploi…


Published on 2 years, 6 months ago

How to Break Into a Cybersecurity Career – Phillip Wylie

How to Break Into a Cybersecurity Career – Phillip Wylie



In this exciting episode of our podcast we have the pleasure of speaking with Phillip Wylie, a remarkable professional with a captivating career in cybersecurity. Join us as we discuss Phillip’s uniq…


Published on 2 years, 6 months ago

Netflix Cracks Down on Password Sharing, AI Legal Research Gone Wrong, Fake Identities and Surveillance Firms

Netflix Cracks Down on Password Sharing, AI Legal Research Gone Wrong, Fake Identities and Surveillance Firms



Netflix plans to crack down on the widespread practice of password sharing among households. We discuss their new verification feature and its impact on user experience and security.

A lawyer finds h…


Published on 2 years, 6 months ago

Meta’s $1.3 Billion Fine, AI Hoax Hysteria, Montana’s TikTok Ban

Meta’s $1.3 Billion Fine, AI Hoax Hysteria, Montana’s TikTok Ban



In this episode, we discuss Meta’s record-breaking $1.3 billion fine by the EU for unlawfully transferring user data, shedding light on the increasing risks faced by tech companies in violating priva…


Published on 2 years, 7 months ago

Google Now Supports Passkeys, Risky New Top Level Domains, Twitter’s Encryption Dilemma

Google Now Supports Passkeys, Risky New Top Level Domains, Twitter’s Encryption Dilemma



In this episode, we explore the arrival of passwordless Google accounts that use “passkeys,” which offer enhanced usability and security. We discuss the benefits of passkeys over traditional password…


Published on 2 years, 7 months ago

Private Tweets Exposed, Unauthorized Tracking Collaboration, AI Risks and Regulation

Private Tweets Exposed, Unauthorized Tracking Collaboration, AI Risks and Regulation



In this episode we discuss a recent Twitter security incident that caused private tweets sent to Twitter Circles to become visible to unintended recipients.

Next, we discuss the collaboration between…


Published on 2 years, 7 months ago





If you like Podbriefly.com, please consider donating to support the ongoing development.

Donate