Podcast Episodes

Back to Search
Norton 360 Cryptominer, Fake QR Codes on Parking Meters, Facebook Account Deactivation

Norton 360 Cryptominer, Fake QR Codes on Parking Meters, Facebook Account Deactivation



Norton 360, a popular antivirus product, has installed a cryptocurrency mining program on its customers’ computers, some cities in Texas have been hit with a phishing scam designed to get users to pa…


Published on 3 years, 11 months ago

Phone Scam Targets Psychologists, All My Apes Gone, Supply Chain Skimmer Attack

Phone Scam Targets Psychologists, All My Apes Gone, Supply Chain Skimmer Attack



A phone scam targeting psychologists reveals that even professionals can become victims, stolen multi-million-dollar NFT’s results in a “all my apes gone” plea for help, and details on a skimmer supp…


Published on 3 years, 11 months ago

LastPass Master Passwords, New Cars and Your Privacy, Amazon Alexa Lethal Challenge

LastPass Master Passwords, New Cars and Your Privacy, Amazon Alexa Lethal Challenge



LastPass users received emails about their master passwords being compromised, details about the privacy policies of new cars, and a story about an Amazon Echo that proposed a lethal challenge to a t…


Published on 3 years, 11 months ago

Web3 and the Decentralized Internet

Web3 and the Decentralized Internet



In our last monthly show of the year we discuss Web3. What is it and what will it mean to have a decentralized Internet. If you’ve wanted to know what Web3, DeFI, NFTs, and cryptocurrency means for c…


Published on 3 years, 11 months ago

The Year in Review and 2022 Predictions

The Year in Review and 2022 Predictions



In our last weekly episode of the year, we discuss the top cybersecurity and privacy news from 2021, a recap of our previous “predictions”, and what we think we’ll see next year. Happy New Year!

** L…


Published on 4 years ago

Log4j Vulnerability, Apple AirTags Used by Thieves, FBI’s Encrypted Messaging App Document

Log4j Vulnerability, Apple AirTags Used by Thieves, FBI’s Encrypted Messaging App Document



This week we discuss the Apache Log4j vulnerability and the impact it will have on organizations now and into the future, details on how Apple AirTags are being used by thieves to steal cars, and a F…


Published on 4 years ago

Life360 Selling Location Data, NSO Group Spyware Hacks Government Employees, Homecoming Queen Contest Hacked

Life360 Selling Location Data, NSO Group Spyware Hacks Government Employees, Homecoming Queen Contest Hacked



Life360, a popular family safety app used by 33 million people worldwide, is selling location data to a dozen data brokers, phones of 11 U.S. State Department employees were hacked with spyware from …


Published on 4 years ago

Business Email Compromise Scams

Business Email Compromise Scams



This month we discuss Business Email Compromise (BEC) scams. What are they, how to identify them, and why BEC scams have created over $1.8 billion worth of losses to businesses last year alone.

** Li…


Published on 4 years ago

Is TikTok Listening to You, Apple Warns Activists, UK Government Website Shows Porn

Is TikTok Listening to You, Apple Warns Activists, UK Government Website Shows Porn



Is the TikTok app listening to you and playing videos based on your conversations? Apple takes the unique step of warning certain activists that their phones may be targeted by attackers, and details…


Published on 4 years ago

How to Break Into a Cybersecurity Career – Part 3 with Scott Wright

How to Break Into a Cybersecurity Career – Part 3 with Scott Wright



Co-host Scott Wright joins Tom Eston for part three in our series on how to break into a cybersecurity career. Scott shares his career journey and gives us some insight into his career path going fro…


Published on 4 years, 1 month ago





If you like Podbriefly.com, please consider donating to support the ongoing development.

Donate