passwords
Good Essay on the History of Bad Password Policies
Stuart Schechter makes some good points on the history of bad password policies: Morris and Thompson’s work brought much-needed data to highlight a problem that lots of people suspected was bad, but ...

Hacked Robot Vacuums, Secret Printer Tracking Dots
In episode 351, hosts Tom and Scott explore an unusual incident where robot vacuums were hacked to shout obscenities, exposing significant IoT security issues. The discussion includes the mechanics of the Bluetooth ...

Emergency Satellite Messaging, Stagnation in User Cybersecurity Habits
In the milestone 350th episode of the Shared Security Podcast, the hosts reflect on 15 years of podcasting, and the podcast’s evolution from its beginnings in 2009. They discuss the impact of ...

Kia Security Flaw Exposed, NIST’s New Password Guidelines
In this episode, the hosts discuss a significant vulnerability found in Kia’s web portal that allows remote control of various car features via their app, potentially enabling unauthorized unlocking and tracking. The ...
Unmasking the Hack-to-Trade Scheme: A Cautionary Tale for Executives
In a shocking revelation, federal prosecutors have charged UK national Robert B. Westbrook with orchestrating a sophisticated “hack-to-trade” scheme that netted him millions of dollars. By exploiting vulnerabilities in Office365, Westbrook allegedly ...
NIST Recommends Some Common-Sense Password Rules
NIST’s second draft of its “SP 800-63-4“—its digital identify guidelines—finally contains some really good rules about passwords: The following requirements apply to passwords: lVerifiers and CSPs SHALL require passwords to be a ...
Passwordless Authentication: Enhance UX, Bolster Security
The password’s days are numbered. Passwordless authentication is fast emerging as the password’s successor. Leveraging biometrics, hardware security keys, passkeys, and more, passwordless authentication technologies are a more secure alternative to the ...

Avoiding Credential Reuse: Minimizing the Risks of Targeted Cyberattacks
Cyber threats are a growing concern for individuals and businesses alike. One of the most common yet overlooked threats is credential reuse. Let’s take a look at the risks associated with credential ...
Compromising the Secure Boot Process
This isn’t good: On Thursday, researchers from security firm Binarly revealed that Secure Boot is completely compromised on more than 200 device models sold by Acer, Dell, Gigabyte, Intel, and Supermicro. The ...

Authy Breach: What It Means for You, RockYou 2024 Password Leak
In episode 338, we discuss the recent breach of the two-factor authentication provider Authy and its implications for users. We also explore a massive password list leak titled ‘Rock You 2024’ that ...