Who says the perfect heist doesn't exist? [Hacking Humans Goes to the Movies]
Hacking Humans21 Touko 2023

Who says the perfect heist doesn't exist? [Hacking Humans Goes to the Movies]

Thanks for joining us again for another episode of fun project brought to you by the team of Hacking Humans, the CyberWire's social engineering podcast. Hacking Humans co-host Dave Bittner is joined by Rick Howard in this series where they view clips from their favorite movies and television shows with examples of the social engineering scams and schemes you hear Dave and co-host Joe Carrigan talk about on Hacking Humans. In this episode, Dave and Rick watch each of the selected scenes, describe the on-screen action for you, and then they deconstruct what they saw. Grab your bowl of popcorn and join us for some fantastic scams and frauds. Links to this episode's clips if you'd like to watch along: Dave's clip from the movie Out of Sight Rick's clip from the movie The Thomas Crown Affair

Tämä jakso on lisätty Podme-palveluun avoimen RSS-syötteen kautta eikä se ole Podmen omaa tuotantoa. Siksi jakso saattaa sisältää mainontaa.

Jaksot(771)

Smells like scam season is upon us.

Smells like scam season is upon us.

This week our hosts, Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of N2K's daily space podcast, T-Minus), are sharing the latest in social engineering scams, phishing schemes, and crimina...

27 Maalis 202548min

threat hunting (noun) [Word Notes]

threat hunting (noun) [Word Notes]

Please enjoy this encore of Word Notes. The process of proactively searching through networks to detect and isolate security threats, rather than relying on security solutions or services to detect t...

25 Maalis 20257min

E-ZPass or easy scam?

E-ZPass or easy scam?

On Hacking Humans, this week Dave Bittner is back with Joe Carrigan, and Maria Varmazis (also host of N2K's daily space podcast, T-Minus), and they are sharing the latest in social engineering scams, ...

20 Maalis 202536min

vulnerability management (noun) [Word Notes]

vulnerability management (noun) [Word Notes]

Please enjoy this encore of Word Notes. The continuous practice of identifying classifying, prioritizing, remediating, and mitigating software vulnerabilities within this. CyberWire Glossary link: htt...

18 Maalis 20258min

Catch me if you scam.

Catch me if you scam.

On Hacking Humans, this week Dave Bittner is on vacation so our two hosts Joe Carrigan, and Maria Varmazis (also host of N2K's daily space podcast, T-Minus), are sharing the latest in social engineeri...

13 Maalis 202541min

software bill of materials (SBOM) (noun) [Word Notes]

software bill of materials (SBOM) (noun) [Word Notes]

Please enjoy this encore of Word Notes. A formal record containing the details and supply chain relationships of various components used in building software.

11 Maalis 20256min

Scams in the henhouse.

Scams in the henhouse.

On Hacking Humans, this week Dave Bittner is on vacation so our two hosts Joe Carrigan, and Maria Varmazis (also host of N2K's daily space podcast, T-Minus), are sharing the latest in social engineer...

6 Maalis 202534min

zero trust (noun) [Word Notes]

zero trust (noun) [Word Notes]

Please enjoy this encore of Word Notes. A security philosophy that assumes adversaries have already penetrated the digital environment and tries to reduce the potential impact by limiting access by p...

4 Maalis 20259min

Suosittua kategoriassa Politiikka ja uutiset

uutiscast
aikalisa
politiikan-puskaradio
viisupodi
rss-ootsa-kuullut-tasta
tervo-halme
ootsa-kuullut-tasta-2
rss-podme-livebox
rss-asiastudio
rss-pinnalla
rikosmyytit
otetaan-yhdet
the-ulkopolitist
linda-maria
et-sa-noin-voi-sanoo-esittaa
rss-mina-ukkola
rss-kaikki-uusiksi
rss-ulkopoditiikkaa
aihe
rss-raha-talous-ja-politiikka