Homograph phishing (noun) [Word Notes]
Hacking Humans6 Syys 2022

Homograph phishing (noun) [Word Notes]

The use of similar-looking characters in a phishing URL to spoof a legitimate site. CyberWire Glossary link: Audio reference link: “Mission Impossible III 2006 Masking 01,” uploaded by DISGUISE MASK, 28 July 2018.

Tämä jakso on lisätty Podme-palveluun avoimen RSS-syötteen kautta eikä se ole Podmen omaa tuotantoa. Siksi jakso saattaa sisältää mainontaa.

Jaksot(771)

What's behind Buy Now, Pay Later scams?

What's behind Buy Now, Pay Later scams?

Jim Ducharme, COO of Outseer joins Dave to discuss buy now pay later scams, Joe and Dave share some listener follow up, Joe has an interesting story about an Unchained Capital partner and how they wer...

24 Maalis 202250min

adversary group naming (noun) [Word Notes]

adversary group naming (noun) [Word Notes]

A cyber threat intelligence best practice of assigning arbitrary labels to collections of hacker activity across the intrusion kill chain.

22 Maalis 202210min

Data privacy: is it black and white when it comes to your kids?

Data privacy: is it black and white when it comes to your kids?

UK Correspondent Carole Theriault returns talking with guest David Ruiz from Malwarebytes about parents spying on their kids, Joe and Dave share some listener follow up, Joe's shares a story about the...

17 Maalis 202240min

BSIMM (noun) [Word Notes]

BSIMM (noun) [Word Notes]

A descriptive model that provides a baseline of observed software security initiatives and activities from a collection of volunteer software development shops.

15 Maalis 20226min

Technology's effects on students during the pandemic.

Technology's effects on students during the pandemic.

Guest Justin Reilly, the CEO of Impero, stops by to talk with Dave Bittner about the mental health of kids in the digital age, Dave's got a story about large-scale phishing campaigns targeting the Ind...

10 Maalis 202240min

OWASP vulnerable and outdated components (noun) [Word Notes]

OWASP vulnerable and outdated components (noun) [Word Notes]

Software libraries, frameworks, packages, and other components, and their dependencies (third-party code that each component uses) that have inherent security weaknesses, either through newly discover...

8 Maalis 20228min

Phishing seems to be cyclical and thematic.

Phishing seems to be cyclical and thematic.

Guest Jeff Nathan, the Director of Threat research at Norton Labs, joins Dave to discuss their most recent Consumer Cyber Safety Pulse Report, Joe and Dave share some follow up from listeners Daniel a...

3 Maalis 202248min

OWASP software and data integrity failures (noun) [Word Notes]

OWASP software and data integrity failures (noun) [Word Notes]

Code and data repositories that don't protect against unauthorized changes.

1 Maalis 20228min

Suosittua kategoriassa Politiikka ja uutiset

uutiscast
aikalisa
politiikan-puskaradio
viisupodi
ootsa-kuullut-tasta-2
rss-ootsa-kuullut-tasta
tervo-halme
rss-podme-livebox
rss-asiastudio
rss-pinnalla
rikosmyytit
otetaan-yhdet
the-ulkopolitist
rss-kaikki-uusiksi
aihe
linda-maria
et-sa-noin-voi-sanoo-esittaa
rss-ulkopoditiikkaa
rss-mina-ukkola
rss-girls-finish-f1rst