Elon’s CSAM FAIL: Twitter Fined by Australian Govt.
Richi Jennings | | Australia, Australian Government, Child Abuse, child exploitation, Child Online Safety, child porn, child pornography, Child protection, Child Safety, child security online, child sexual exploitation, childpornography, CSAM, Digital Trust and Safety, Elon Musk, elon musk twitter, eSafety Commission, grooming, Julie Inman Grant, Linda Yaccarino, SB Blogwatch, trust and safety, Twitter, X
Straya strikes back: Musk’s mob declines to answer questions, breaking law dunundah ...
Security Boulevard
Content Creation, Mental Health in Cyber, The MGM Ransomware Attack
Tom Eston | | Content Creation, Content Creator, Cyber Security, Cybersecurity, Data Privacy, Digital Privacy, Episodes, Information Security, Infosec, Matt Johansen, Mental Health, MGM, Orign Story, Podcast, Podcaster, podcasting, Podcasts, Privacy, Ransom, Ransomware, ransomware attack, security, Security Twits, Shmoocon, technology, Twitter, Vulnerable U, Weekly Edition, X, YouTube
In this episode Matt Johansen, Security Architect at Reddit and Vulnerable U newsletter and YouTube content creator, joins host Tom Eston to discuss Matt’s background as one of the original “Security Twits”, ...
Back to School Cybersecurity, Phishing Pitfalls and Strategies, X’s (Twitter) Blocking Overhaul
Tom Eston | | back to school, blocking, Blocking Content, Blocking People, Cyber Security, Cybersecurity, Data Privacy, Digital Privacy, education, Elon Musk, Episodes, Information Security, Infosec, Phishing, Phishing Prevention Tips, Podcast, Podcasts, Privacy, safety, school, security, students, Teachers, technology, tips, Twitter, Weekly Edition, X
In this episode, we discuss essential cybersecurity tips for students and educational institutions as they gear up for the school season. From software updates to strong passwords and cybersecurity education, we explore ...
Amid Switch to X, a Phishing Scam Targets Twitter Users
Jeffrey Burt | | business email compromise, cybersecruity, elon musk twitter, email security, Phishing, Twitter
Cybercriminals are trying to take advantage of the unsettled situation surrounding Elon Musk’s decision to remake Twitter into X ...
Security Boulevard
Meta’s Threads and Your Privacy, Airline Reservation Scams, IDOR Srikes Back
Tom Eston | | airline, Airline Reservation, alarm, Alarm System, Cyber Security, Cybersecurity, Data Privacy, Data Tracking, Digital Privacy, Eaton, Episodes, facebook, Flight, Fraud, idor, Information Security, Infosec, insecure-direct-object-reference, Instagram, Meta, owasp, OWASP Top 10, Podcast, Podcasts, Privacy, scam, Scams, SecureConnect, security, Smart Alarm, technology, Threads, Twitter, vulnerability, Weekly Edition
In this episode, we explore the rise of Threads, a new social media app developed by Meta, which has already attracted 10 million users in just seven hours. However, there’s a catch ...
Meta’s $1.3 Billion Fine, AI Hoax Hysteria, Montana’s TikTok Ban
Tom Eston | | AI, Cyber Security, Cybersecurity, Data Privacy, deepfakes, Digital Privacy, Episodes, eu, facebook, fine, first amendment, hoax, Information Security, Infosec, Meta, Montana, Online Freedom, Photoshop, Podcast, Podcasts, Privacy, regulation, security, social media, technology, TikTok, TikTok Ban, Twitter, Viral, Weekly Edition
In this episode, we discuss Meta’s record-breaking $1.3 billion fine by the EU for unlawfully transferring user data, shedding light on the increasing risks faced by tech companies in violating privacy rules ...
Interview With a Crypto Scam Investment Spammer
BrianKrebs | | Arkose Labs, Breadcrumbs, Constella Intelligence, DomainTools, [email protected], Lolzteam, mastodon, Mondi Group, moonxtrade, [email protected], Ne'er-Do-Well News, quot.pw, Renaud Chaput, Sergey Proshutinskiy, TGM, Twitter, Web Fraud 2.0, ципа
Social networks are constantly battling inauthentic bot accounts that send direct messages to users promoting scam cryptocurrency investment platforms. What follows is an interview with a Russian hacker responsible for a series ...
Google Now Supports Passkeys, Risky New Top Level Domains, Twitter’s Encryption Dilemma
Tom Eston | | Cyber Security, Cybersecurity, Data Privacy, Digital Privacy, Direct Messages, end-to-end encryption, Episodes, google, Information Security, Infosec, Passkeys, passwordless, passwords, Podcast, Podcasts, Privacy, security, signal, technology, TLD, Top Level Domain, Twitter, Weekly Edition, WhatsApp
In this episode, we explore the arrival of passwordless Google accounts that use “passkeys,” which offer enhanced usability and security. We discuss the benefits of passkeys over traditional passwords, but also why ...
Social Media: Be Aware of What You Share
Social-Engineer | | Cybersecurity, facebook, General Social Engineer Blog, how to be safe on social media, Instagram, Privacy, security, social media, TikTok, Twitter
Two scammers are currently being prosecuted for deploying a romance scam against at least two victims, successfully stealing over £200,000. […] ...
Private Tweets Exposed, Unauthorized Tracking Collaboration, AI Risks and Regulation
Tom Eston | | AI, AI Regulation, AI Risks, AirTags, Apple, Artificial Intelligence, Cyber Security, Cybersecurity, Data Privacy, Digital Privacy, Episodes, google, Information Security, Infosec, Podcast, Podcasts, Privacy, security, technology, Twitter, Twitter Circles, US government, Weekly Edition, White House
In this episode we discuss a recent Twitter security incident that caused private tweets sent to Twitter Circles to become visible to unintended recipients. Next, we discuss the collaboration between Apple and ...