
Shared Security Podcast
Technology Podcasts
The longest running cybersecurity and privacy podcast for actual humans.
Location:
United States
Genres:
Technology Podcasts
Description:
The longest running cybersecurity and privacy podcast for actual humans.
Twitter:
@sharedsec
Language:
English
Contact:
613-693-0997
Website:
http://sharedsecurity.net/
Episodes
Project Glasswing: When AI Becomes the Ultimate Hacker—and Defender
4/20/2026
Anthropic has introduced Project Glasswing, a cybersecurity initiative powered by an unreleased AI model called Claude Mythos. This system can identify zero-day vulnerabilities, generate exploits, and even help fix them—often without human input. But there’s a catch: it’s considered too powerful for public release. In this episode, we discuss what Project Glasswing is, why it […]
The post Project Glasswing: When AI Becomes the Ultimate Hacker—and Defender appeared first on Shared Security Podcast.
Duration:00:28:23
The Dark Web Explained with John Hammond
4/13/2026
The dark web is often misunderstood, but it plays an important role in both privacy technology and cybercrime activity. In this episode, Tom Eston speaks with cybersecurity researcher and educator John Hammond about what the dark web actually is and how it has evolved in recent years. The discussion covers underground marketplaces, ransomware leak sites, […]
The post The Dark Web Explained with John Hammond appeared first on Shared Security Podcast.
Duration:00:22:30
Meta & YouTube Found Negligent: A Turning Point for Big Tech?
4/6/2026
A landmark jury verdict has found Meta and YouTube negligent in a social media addiction case, raising major questions about platform accountability and legal protections under Section 230. This episode covers the details of the case, why the ruling is significant, and what it could mean for the future of social media, privacy, and cybersecurity. […]
The post Meta & YouTube Found Negligent: A Turning Point for Big Tech? appeared first on Shared Security Podcast.
Duration:00:13:33
The Hidden Tracking Risk Inside Your Tires
3/30/2026
In this episode, Tom Eston and co-host Scott Wright discuss research showing that Tire Pressure Monitoring Systems (TPMS) can create privacy risks because the sensors broadcast unencrypted, uniquely identifying wireless signals that could be used to track vehicles. They reference a 10-week study by researchers at IMDEA in Madrid that collected about 6 million signals […]
The post The Hidden Tracking Risk Inside Your Tires appeared first on Shared Security Podcast.
Duration:00:14:10
The Real State of Offensive Security: AI, Penetration Testing & The Road Ahead with Andrew Wilson
3/23/2026
Tom Eston interviews offensive AI researcher and PhD candidate Andrew Wilson, a former Bishop Fox partner who helped grow the firm from under 20 people to nearly 500, built award-winning AI solutions for SOC modernization, founded Cactus Con, and relocated his family to Guadalajara to open and scale a Bishop Fox office. They discuss Mexico’s […]
The post The Real State of Offensive Security: AI, Penetration Testing & The Road Ahead with Andrew Wilson appeared first on Shared Security Podcast.
Duration:00:44:01
The Privacy Problem With Meta’s Ray-Ban Smart Glasses
3/16/2026
This episode discusses Meta Ray-Ban Smart Glasses, which blend a camera, microphone, AI features, and social media integration into sunglasses that look like normal fashion eyewear, raising major privacy concerns. It highlights reports that footage captured by the glasses may be reviewed by human contractors to help train Meta’s AI systems, and notes critics’ concerns […]
The post The Privacy Problem With Meta’s Ray-Ban Smart Glasses appeared first on Shared Security Podcast.
Duration:00:18:30
TikTok Says No to End-to-End Encryption: Here’s Why That’s a Big Deal
3/9/2026
In a move that bucks the entire industry trend, TikTok has confirmed it will not implement end-to-end encryption (E2EE) for direct messages on its platform — arguing that E2EE would make users less safe. We break down what’s really going on: the child safety argument, the privacy counterargument, the geopolitical questions surrounding ByteDance, and what […]
The post TikTok Says No to End-to-End Encryption: Here’s Why That’s a Big Deal appeared first on Shared Security Podcast.
Duration:00:15:10
Claude Code Security: The AI Shockwave Hitting Cybersecurity
3/2/2026
Anthropic’s Claude Code Security research preview promises AI-powered code analysis and vulnerability detection at scale. The announcement triggered strong reactions across the cybersecurity community and sent several vendor stocks lower. In this episode, we break down what the tool actually does, where it fits in modern AppSec, and whether AI automation threatens traditional security products […]
The post Claude Code Security: The AI Shockwave Hitting Cybersecurity appeared first on Shared Security Podcast.
Duration:00:13:02
TikTok’s New U.S. Deal and Privacy Policy: What Users Don’t Understand
2/23/2026
TikTok has shifted to a majority-American entity, TikTok USDS Joint Venture, LLC, to comply with U.S. national security requirements and avoid a ban. This week we discuss why a recent privacy policy update went viral—especially language about sensitive data like immigration status and precise location—and argue much of it reflects longstanding practices and required California […]
The post TikTok’s New U.S. Deal and Privacy Policy: What Users Don’t Understand appeared first on Shared Security Podcast.
Duration:00:16:16
Ring’s Search Party ‘Dystopia’ Debate & Claude Zero-Click RCE Vulnerability
2/16/2026
In this episode, we discuss two major tech stories impacting privacy and security. First, we analyze Ring’s new AI-powered ‘Search Party’ feature and its controversial Super Bowl ad that sparked privacy concerns. We then transition to a breaking story about a zero-click remote code execution flaw in the Claude Desktop, highlighting the potential risks of […]
The post Ring’s Search Party ‘Dystopia’ Debate & Claude Zero-Click RCE Vulnerability appeared first on Shared Security Podcast.
Duration:00:24:50
OpenClaw & Moltbook: AI Agents and Cybersecurity Risks
2/9/2026
Autonomous AI assistants are hitting the mainstream — but at what cost? This week, we discuss the recent OpenClaw phenomenon (formerly Clawdbot/Moltbot), the security fiasco surrounding Moltbook’s exposed database, and the quirky yet concerning AI agent dating platform MoltMatch. We explore the privacy and cybersecurity implications of entrusting AI agents with sensitive access and how […]
The post OpenClaw & Moltbook: AI Agents and Cybersecurity Risks appeared first on Shared Security Podcast.
Duration:00:21:37
Why Gen Z is Ditching Smartphones for Dumbphones
2/2/2026
Younger generations are increasingly ditching smartphones in favor of “dumbphones”—simpler devices with fewer apps, fewer distractions, and less tracking. But what happens when you step away from a device that now functions as your wallet, your memory, and your security key? In this episode, Tom and Scott explore the dumbphone movement through a privacy and […]
The post Why Gen Z is Ditching Smartphones for Dumbphones appeared first on Shared Security Podcast.
Duration:00:19:16
AirDrop Security in iOS 26.2: Time Limits, Codes & Privacy Best Practices
1/26/2026
In this episode, we explore the latest changes to AirDrop in iOS 26.2 and how they enhance privacy and security. Learn about the new 10-minute limitation on the ‘Everyone’ setting and the introduction of AirDrop codes for safer file sharing with non-contacts. We also discuss best practices for configuring your AirDrop settings to safeguard your […]
The post AirDrop Security in iOS 26.2: Time Limits, Codes & Privacy Best Practices appeared first on Shared Security Podcast.
Duration:00:07:49
Ring’s Facial Recognition Feature: Convenience or Privacy Nightmare?
1/19/2026
In this episode, we explore Amazon Ring’s newly introduced Familiar Faces feature that utilizes AI for facial recognition. We discuss the convenience of identifying familiar people at your doorstep, the privacy concerns it raises, and the legal implications surrounding biometric data. Learn about how this feature works, potential inaccuracies, and privacy laws in certain U.S. […]
The post Ring’s Facial Recognition Feature: Convenience or Privacy Nightmare? appeared first on Shared Security Podcast.
Duration:00:15:43
Your Google Searches Aren’t Private? PA Court’s Surprising Ruling
1/12/2026
In this episode of Shared Security, we discuss a significant Pennsylvania Supreme Court ruling that permits police to access unprotected Google search histories without a traditional warrant. The discussion centers around the implications of the Commonwealth vs. Kurtz case and the concept of reverse keyword searches. Kevin Tackett joins the conversation, providing insights and posing […]
The post Your Google Searches Aren’t Private? PA Court’s Surprising Ruling appeared first on Shared Security Podcast.
Duration:00:16:02
AI and the End of the Traditional Entry-Level Tech Job
1/5/2026
Welcome to the first episode of the Shared Security Podcast in 2026! As AI becomes increasingly integrated into technical fields such as software development and cybersecurity, traditional entry-level roles are evolving or disappearing. This episode discusses the implications of AI on entry-level knowledge worker jobs, emphasizing the need for students, recent graduates, and those entering […]
The post AI and the End of the Traditional Entry-Level Tech Job appeared first on Shared Security Podcast.
Duration:00:14:28
2025 Predictions: Hits, Misses & What We Learned
12/29/2025
Join us this week as we rewind the tape on our 2025 predictions. In this episode, we revisit last year’s forecasts in cybersecurity, geopolitics, and AI, discussing which ones came true, which ones fizzled out, and which ones were a mixed bag. Additionally, we share insights from past guests, celebrate milestones, and make bold new […]
The post 2025 Predictions: Hits, Misses & What We Learned appeared first on Shared Security Podcast.
Duration:00:36:26
Why Networking Is Your Secret Weapon in Cybersecurity Job Hunting
12/22/2025
In this episode, Tom Eston discusses the unique challenges in the current cybersecurity job market, emphasizing the importance of networking. Tom provides practical tips on how to enhance networking skills, such as attending conferences, volunteering for open source projects, creating a blog, and seeking mentors. He also addresses misconceptions about the job shortage in cybersecurity […]
The post Why Networking Is Your Secret Weapon in Cybersecurity Job Hunting appeared first on Shared Security Podcast.
Duration:00:12:42
The Hidden Threat in Your Holiday Emails: Tracking Pixels and Privacy Concerns
12/15/2025
Join us in the midst of the holiday shopping season as we discuss a growing privacy problem: tracking pixels embedded in marketing emails. According to Proton’s latest Spam Watch 2025 report, nearly 80% of promotional emails now contain trackers that report back your email activity. We discuss how these trackers work, why they become more […]
The post The Hidden Threat in Your Holiday Emails: Tracking Pixels and Privacy Concerns appeared first on Shared Security Podcast.
Duration:00:18:47
Seeing Is Not Believing: How to Spot AI-Generated Video
12/8/2025
In this episode we discuss the rising challenge of AI-generated videos, including deepfakes and synthetic clips that can deceive even a skeptical viewer. Once the gold standard of proof, video content is now increasingly manipulated through advanced AI tools like Sora 2 and Google’s Nano Banana, making it harder to separate reality from fiction. Tom […]
The post Seeing Is Not Believing: How to Spot AI-Generated Video appeared first on Shared Security Podcast.
Duration:00:17:10
