Cons through and through. [Hacking Humans Goes to the Movies]
Hacking Humans24 Huhti 2022

Cons through and through. [Hacking Humans Goes to the Movies]

Thanks for joining us for the latest episode of our fun project brought to you by the team of Hacking Humans, the CyberWire's social engineering podcast. Co-hosts Dave Bittner and Joe Carrigan are joined by Rick Howard in this series where they view clips from their favorite movies with examples of the social engineering scams and schemes you hear about on Hacking Humans. In this episode, Dave and Joe are joined on this episode by Perry Carpenter, host of 8th Layer Insights podcast and chief evangelist at KnowBe4. Dave,Joe and Perry watch and discuss Dave's and Perry's clips on this episode. They watch each of the selected scenes, describe the on-screen action for you, and then the team deconstructs what they saw. Grab your bowl of popcorn and join us for some Hollywood scams and frauds. A heads-up for our listeners: there is a bit of spicy language in today’s clips, so use your discretion if you are tuning in with your kids. Links to this episode's clips if you'd like to watch along: Dave's scene from "Focus" Perrys clip from "Ferris Bueller's Day Off"

Tämä jakso on lisätty Podme-palveluun avoimen RSS-syötteen kautta eikä se ole Podmen omaa tuotantoa. Siksi jakso saattaa sisältää mainontaa.

Jaksot(771)

non-fungible tokens (NFT) (noun) [Word Notes]

non-fungible tokens (NFT) (noun) [Word Notes]

Digital assets that are cryptographically protected on a blockchain and contain unique identification codes and metadata that makes them one of a kind.

15 Kesä 20215min

Pandemic taxes: later due dates afford more time for scams.

Pandemic taxes: later due dates afford more time for scams.

Guest Robert Capps of NuData Security joins Dave to discuss what businesses can do to bolster their protection against tax fraud, Joe and Dave have some follow-up from 2 episodes ago when they discuss...

10 Kesä 202139min

multi-factor authentication (noun) [Word Notes]

multi-factor authentication (noun) [Word Notes]

The use of two or more verification methods to gain access to an account.

8 Kesä 20216min

The fight in the dog.

The fight in the dog.

Guests Jan Kallberg and Col Stephen Hamilton of Army Cyber Institute at West Point join Dave to talk about cognitive force protection, Joe and Dave have some follow-up from a listener named Obada abou...

3 Kesä 202139min

machine learning (noun) [Word Notes]

machine learning (noun) [Word Notes]

A programming technique where the developer doesn't specify each step of the algorithm in code, but instead teaches the algorithm to learn from the experience.

1 Kesä 20216min

Hacking people vs. hacking technologies to get into companies.

Hacking people vs. hacking technologies to get into companies.

Guest Tim Sadler from Tessian on how oversharing on social media and in OOO messages can open the door for hackers, Joe shares a story about vishing emails from "Amazon" that had spam confidence level...

27 Touko 202139min

intelligence (noun) [Word Notes]

intelligence (noun) [Word Notes]

The process of turning raw information into intelligence products that leaders use to make decisions with.

25 Touko 20215min

Whaling attacks are more targeted than phishing or spearphishing.

Whaling attacks are more targeted than phishing or spearphishing.

Guest Kev Breen from Immersive Labs joins Dave to talk about how to address whaling attacks, Dave shares a discussion he had with. a colleague about password managers and elderly parents and Joe weigh...

20 Touko 202133min

Suosittua kategoriassa Politiikka ja uutiset

uutiscast
aikalisa
politiikan-puskaradio
viisupodi
rss-ootsa-kuullut-tasta
tervo-halme
ootsa-kuullut-tasta-2
rss-podme-livebox
rss-asiastudio
rss-pinnalla
rikosmyytit
otetaan-yhdet
the-ulkopolitist
linda-maria
et-sa-noin-voi-sanoo-esittaa
rss-mina-ukkola
rss-kaikki-uusiksi
rss-ulkopoditiikkaa
aihe
rss-raha-talous-ja-politiikka