Who says the perfect heist doesn't exist? [Hacking Humans Goes to the Movies]
Hacking Humans21 Touko 2023

Who says the perfect heist doesn't exist? [Hacking Humans Goes to the Movies]

Thanks for joining us again for another episode of fun project brought to you by the team of Hacking Humans, the CyberWire's social engineering podcast. Hacking Humans co-host Dave Bittner is joined by Rick Howard in this series where they view clips from their favorite movies and television shows with examples of the social engineering scams and schemes you hear Dave and co-host Joe Carrigan talk about on Hacking Humans. In this episode, Dave and Rick watch each of the selected scenes, describe the on-screen action for you, and then they deconstruct what they saw. Grab your bowl of popcorn and join us for some fantastic scams and frauds. Links to this episode's clips if you'd like to watch along: Dave's clip from the movie Out of Sight Rick's clip from the movie The Thomas Crown Affair

Tämä jakso on lisätty Podme-palveluun avoimen RSS-syötteen kautta eikä se ole Podmen omaa tuotantoa. Siksi jakso saattaa sisältää mainontaa.

Jaksot(771)

Nice to meet you, I'm a scammer.

Nice to meet you, I'm a scammer.

On Hacking Humans, Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of N2K's daily space podcast, T-Minus), are once again sharing the latest in social engineering scams, phishing schemes, an...

9 Tammi 202552min

Malware metamorphosis: 2024 reflections and 2025 predictions. [Only Malware in the building]

Malware metamorphosis: 2024 reflections and 2025 predictions. [Only Malware in the building]

Welcome in! You’ve entered, Only Malware in the Building. Join us each month to sip tea and solve mysteries about today’s most interesting threats. Your host is Selena Larson, Proofpoint intelligence ...

7 Tammi 202551min

common vulnerabilities and exposures (CVE) (noun) [Word Notes]

common vulnerabilities and exposures (CVE) (noun) [Word Notes]

A public list sponsored by the US government and designed to uniquely identify, without the need to manually cross- reference, all the known software vulnerabilities in the world.

7 Tammi 20257min

The intersection of hackers, scammers, and false collaborations.

The intersection of hackers, scammers, and false collaborations.

On Hacking Humans, Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of N2K's daily space podcast, T-Minus), are once again sharing the latest in social engineering scams, phishing schemes, an...

2 Tammi 202542min

dead-box forensics (noun) [Word Notes]

dead-box forensics (noun) [Word Notes]

A forensic technique where practitioners capture an entire image of a system and analyze the contents offline.

31 Joulu 20246min

New tools, old problems.

New tools, old problems.

Please enjoy this encore episode of Hacking Humans. This week we are joined by Maria Varmazis, host of the N2K daily space show, T-Minus. She discusses how AI is being used as a possible solution to ...

26 Joulu 202449min

cybersecurity maturity model certification (CMMC) (noun) [Word Notes]

cybersecurity maturity model certification (CMMC) (noun) [Word Notes]

Please enjoy this encore episode of Word Notes. A supply chain cybersecurity accreditation standard designed for the protection of controlled unclassified information that the U.S. Department of Defe...

24 Joulu 20246min

Gold bars and bold lies.

Gold bars and bold lies.

On Hacking Humans, Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of N2K's daily space podcast, T-Minus), are once again sharing the latest in social engineering scams, phishing schemes, an...

19 Joulu 202445min

Suosittua kategoriassa Politiikka ja uutiset

uutiscast
aikalisa
politiikan-puskaradio
viisupodi
ootsa-kuullut-tasta-2
rss-ootsa-kuullut-tasta
tervo-halme
rss-podme-livebox
rss-asiastudio
rss-pinnalla
rikosmyytit
otetaan-yhdet
the-ulkopolitist
rss-kaikki-uusiksi
aihe
linda-maria
et-sa-noin-voi-sanoo-esittaa
rss-ulkopoditiikkaa
rss-mina-ukkola
rss-girls-finish-f1rst