Private Network Access (PNA) (noun) [Word Notes]
Hacking Humans2 Elo 2022

Private Network Access (PNA) (noun) [Word Notes]

A browser configuration control that prevents accessing resources within a private network. CyberWire Glossary link: Audio reference link: “Chrome Limits Access to Private Networks,” by Daniel Lowrie, ITProTV, YouTube, 19 January 2022.

Tämä jakso on lisätty Podme-palveluun avoimen RSS-syötteen kautta eikä se ole Podmen omaa tuotantoa. Siksi jakso saattaa sisältää mainontaa.

Jaksot(770)

Healthcare hassles and hefty heists.

Healthcare hassles and hefty heists.

This week, Maria Varmazis host of the N2K daily space show, T-Minus, joins Dave and Joe, as they celebrate Maria joining the Hacking Humans podcast every week! Maria's story is from a listener this we...

25 Heinä 202449min

Encore: APT (noun) [Word Notes]

Encore: APT (noun) [Word Notes]

An acronym for Advanced Persistent Threat to describe hacker groups or campaigns normally, but not always, associated with nation state cyber espionage and continuous low-level cyber conflict operatio...

23 Heinä 20246min

Welcome to a new age in digital deception.

Welcome to a new age in digital deception.

This week, Maria Varmazis host of the N2K daily space show, T-Minus, joins Dave and Joe, as they celebrate Maria joining the Hacking Humans podcast every week! Maria's story is on supplement scams, as...

18 Heinä 202437min

Encore: backdoor (noun) [Word Notes]

Encore: backdoor (noun) [Word Notes]

An undocumented or publicly unknown method to access a computer system undetected or to break a cypher used to encode messages.

16 Heinä 20245min

The costly consequences of communication scams.

The costly consequences of communication scams.

This week Dave shares a story on Business email compromise (BEC) scams, and how they are a major threat, costing $26 billion annually. The story shares how it's crucial for employees to verify suspici...

11 Heinä 202431min

Encore: watering hole attack (noun) [Word Notes]

Encore: watering hole attack (noun) [Word Notes]

From the intrusion kill chain model, a technique where the hacker compromises sites commonly visited by members of a targeted community in order to deliver a malicious payload to the intended victim.

9 Heinä 20245min

Encore: AI versus AI.

Encore: AI versus AI.

Blair Cohen from AuthenticID joins Dave to discuss how generative AI and authentication go hand in hand. Joe and Dave share some follow up from listener Robert who discusses an ad for a device that us...

4 Heinä 202454min

Operation Endgame: The ultimate troll patrol. [Only Malware in the Building]

Operation Endgame: The ultimate troll patrol. [Only Malware in the Building]

Welcome in! You’ve entered, Only Malware in the Building. Join us each month to sip tea and solve mysteries about today’s most interesting threats. Your host is Selena Larson, Proofpoint intelligence ...

2 Heinä 202428min

Suosittua kategoriassa Politiikka ja uutiset

uutiscast
aikalisa
politiikan-puskaradio
rss-ootsa-kuullut-tasta
viisupodi
tervo-halme
ootsa-kuullut-tasta-2
rss-podme-livebox
rss-asiastudio
rss-pinnalla
rikosmyytit
otetaan-yhdet
the-ulkopolitist
et-sa-noin-voi-sanoo-esittaa
rss-ulkopoditiikkaa
aihe
linda-maria
rss-mina-ukkola
rss-kaikki-uusiksi
rss-hyvaa-huomenta-bryssel