DIRECTORY

  • Alerts
  • APTs
  • Blog
  • Books
  • Certifications
  • Cheat Sheets
  • Courses
  • Cyber Briefing
  • CyberDecoded
  • CyberReview
  • CyberStory
  • CyberTips
  • Definitions
  • Domains
  • Entertainment
  • FAQ
  • Frameworks
  • Hardware Tools
  • Incidents
  • Malware
  • News
  • Papers
  • Podcasts
  • Quotes
  • Reports
  • Tools
  • Threats
  • Tutorials
No Result
View All Result
  • Login
  • Register
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
CyberMaterial
Get Help
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
CyberMaterial
No Result
View All Result
Get Help
CyberMaterial
Home Entertainment

Shared Security — Podcast

Reading Time: 2 mins read
in Entertainment, Podcast

Podcast Overview (from podcast’s website)

Hosted by industry professionals Tom Eston, Scott Wright and Kevin Johnson, Shared Security is a weekly cybersecurity and privacy podcast that explores the trust you put in people and technology.

We bring you news, tips, advice, and interviews with cybersecurity and privacy experts to help you live more secure and private in our connected world.

Social Zombies Revisited: Your Friends Want to Eat Your Brains

On this week’s episode, We’re excited to bring you a classic conference talk that Tom Eston gave with co-host Kevin Johnson back in 2009 at DEF CON 17 in Las Vegas.

The talk is called “Social Zombies: Your Friends Want to Eat Your Brains” and it explores the various risks and concerns related to malware delivery through social networking sites.

We discuss how social networks make money and the privacy and security issues that arise due to the trust built on these platforms. We also delve into typical botnets and bot programs and examine the delivery of malware through social networks and the use of these networks as command and control channels.

LISTEN ALL EPISODES

Tags: EntertainmentPodcastsSocial MediaSocial Media SecuritySocial Media Security PodcastsTeens
ADVERTISEMENT

Related Posts

Enterprise Mobility Insights — Podcast

Enterprise Mobility Insights — Podcast

April 24, 2023
Find my Phone – Documentary

Find my Phone – Documentary

April 24, 2023
Portsmouth Computer Group — Podcast

Portsmouth Computer Group — Podcast

April 24, 2023
Digital Forensic Survival Podcast

Digital Forensic Survival Podcast

April 24, 2023

More Articles

Alerts

Dell security advisory (AV23-071)

February 6, 2023
Book

The EU General Data Protection Regulation (GDPR)

March 23, 2022
Book

Implementing Always On VPN

March 5, 2023
Alerts

Enigma Stealer Targets Cryptocurrency Industry with Fake Jobs

February 9, 2023
Definition

ATM Skimming – Definition

September 14, 2022
Movie

23 – Nichts ist so wie es scheint (1998)

September 25, 2020
Alerts

MacStealer Targets macOS Devices

March 27, 2023
Document

Securing Personal Social Media Accounts

April 12, 2023
Load More

Security through data

Cybersecurity Domains

  • API Security
  • Business Continuity
  • Career Development
  • Compliance
  • Cryptography
  • HSM
  • KPIs / KRIs
  • Penetration Testing
  • Shift Left
  • Vulnerability Scan

Emerging Technologies

  • 5G
  • Artificial Intelligence
  • Blockchain
  • Cryptocurrency
  • Deepfake
  • E-Commerce
  • Healthcare
  • IoT
  • Quantum Computing

Frameworks

  • CIS Controls
  • CCPA
  • GDPR
  • NIST
  • 23 NYCRR 500
  • HIPAA

Repository

  • Books
  • Certifications
  • Definitions
  • Documents
  • Entertainment
  • Quotes
  • Reports

Threats

  • APTs
  • DDoS
  • Insider Threat
  • Malware
  • Phishing
  • Ransomware
  • Social Engineering

© 2023 | CyberMaterial | All rights reserved.

World’s #1 Cybersecurity Repository

  • About
  • Legal and Privacy Policy
  • Site Map
No Result
View All Result
  • Audience
    • Cyber Citizens
    • Cyber Professionals
    • Institutions
  • Highlights
    • Blog
    • CyberDecoded
    • Cyber Review
    • CyberStory
    • CyberTips
  • Cyber Risks
    • Alerts
    • Attackers
    • Domains
    • Incidents
    • Threats
  • Opportunities
    • Events
    • Jobs
  • Repository
    • Books
    • Certifications
    • Cheat Sheets
    • Courses
    • Definitions
    • Frameworks
    • Games
    • Hardware Tools
    • Memes
    • Movies
    • Papers
    • Podcasts
    • Quotes
    • Reports
  • Report Cyber Incident
  • GET HELP

Subscribe to our newsletter

© 2022 Cybermaterial - Security Through Data .

Welcome Back!

Sign In with Google
Sign In with Linked In
OR

Forgotten Password? Sign Up

Create New Account!

Sign Up with Google
Sign Up with Linked In
OR

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.