![Encore: unified extensible firmware interface (UEFI) (noun) [Word Notes]](https://cdn.podme.com/podcast-images/FE31AF8E61FA2AC9C69A5A9CA9E612D2_small.jpg)
Encore: unified extensible firmware interface (UEFI) (noun) [Word Notes]
An extension of the traditional Basic Input/Output System or BIOS that, during the boot process, facilitates the communication between the computer’s firmware and the computer’s operating system.
14 Touko 20245min

The illusion of influence.
Bogdan Botezatu from Bitdefender is discussing research on "Audio deepfakes: Celebrity-endorsed giveaway scams and fraudulent investment opportunities flood social media platforms." Dave and Joe share...
9 Touko 20241h 1min
![Encore: Daemon (noun) [Word Notes]](https://cdn.podme.com/podcast-images/FE31AF8E61FA2AC9C69A5A9CA9E612D2_small.jpg)
Encore: Daemon (noun) [Word Notes]
An operating system program running in the background designed to perform a specific task when certain conditions or events occur.
7 Touko 20244min

From support to scam.
This week we are joined by Maria Varmazis, host of the N2K daily space show, T-Minus. Maria shares an interesting story from Canada on a gentleman who thought he was calling Best Buy's Geek Squad, but...
2 Touko 202449min
![Encore: greyware (noun) [Word Notes]](https://cdn.podme.com/podcast-images/FE31AF8E61FA2AC9C69A5A9CA9E612D2_small.jpg)
Encore: greyware (noun) [Word Notes]
Also known as spyware and adware, it is a software category where developers design the application neither to cause explicit harm nor to accomplish some conventional legitimate purpose, but when run,...
30 Huhti 20245min

Fighting off phishing.
Roger Grimes, a Data Driven Defense Evangelist from KnowBe4 and author is discussing his new book, "Fighting Phishing: Everything You Can Do to Fight Social Engineering and Phishing." Dave and Joe sha...
25 Huhti 202451min
![Encore: fuzzing (noun) [Word Notes]](https://cdn.podme.com/podcast-images/FE31AF8E61FA2AC9C69A5A9CA9E612D2_small.jpg)
Encore: fuzzing (noun) [Word Notes]
An automatic software bug and vulnerability discovery technique that inputs invalid, unexpected and/or random data or fuzz into a program and then monitors the program's reaction to it.
23 Huhti 20245min

Is change presenting a window of opportunity for attackers?
Trevin Edgeworth, Red Team Practice Director at Bishop Fox, is discussing how change, like M&A, staff, tech, lack of clarity or even self-promotion within and around security environments presents win...
18 Huhti 20241h 4min



















