Hacking Humans
Deception, influence, and social engineering in the world of cyber crime.

Jaksot(769)

Hustling the hustlers. [Hacking Humans Goes to the Movies]

Hustling the hustlers. [Hacking Humans Goes to the Movies]

Thanks for joining us for the latest episode of our fun project brought to you by the team of Hacking Humans, the CyberWire's social engineering podcast. Co-hosts Dave Bittner and Joe Carrigan are joi...

20 Helmi 202221min

Vulnerabilities will be found.

Vulnerabilities will be found.

Guest Deral Heiland from Rapid7 talks with our UK Correspondent Carole Theriault about the state of IOT, Joe shares a personal story about bank checks and a debit card received at his home that were i...

17 Helmi 202247min

OWASP security logging and monitoring failures (noun) [Word Notes]

OWASP security logging and monitoring failures (noun) [Word Notes]

The absence of telemetry that could help network defenders detect and respond to hostile attempts to compromise a system.

15 Helmi 20226min

If you wish for peace, prepare for cyberwar.

If you wish for peace, prepare for cyberwar.

Guest Nick Shevelyov, Chief Security Officer for Silicon Valley Bank. joins Dave sharing some personal history around security, and discussing his book "Cyber War… and Peace," Dave and Joe have some f...

10 Helmi 202249min

OWASP identification and authentication failures (noun) [Word Notes]

OWASP identification and authentication failures (noun) [Word Notes]

Ineffectual confirmation of a user's identity or authentication in session management.

8 Helmi 20225min

How to talk your way in anywhere. [Hacking Humans Goes to the Movies]

How to talk your way in anywhere. [Hacking Humans Goes to the Movies]

Thanks for joining us for the latest episode of our fun project brought to you by the team of Hacking Humans, the CyberWire's social engineering podcast. Co-hosts Dave Bittner and Joe Carrigan are joi...

6 Helmi 202222min

The ransomware game has evolved.

The ransomware game has evolved.

Guest Allan Liska from Recorded Future joins Dave to discuss the evolution of ransomware and his new book "Ransomware: Understand. Prevent. Recover," Joe shares a question from listener Joan about an ...

3 Helmi 202252min

OWASP broken access control (noun) [Word Notes]

OWASP broken access control (noun) [Word Notes]

Software users are allowed access to data or functionality contrary to the defined zero trust policy by bypassing or manipulating the installed security controls.

1 Helmi 20227min

Suosittua kategoriassa Politiikka ja uutiset

uutiscast
aikalisa
politiikan-puskaradio
rss-ootsa-kuullut-tasta
ootsa-kuullut-tasta-2
rss-podme-livebox
tervo-halme
rss-pinnalla
aihe
et-sa-noin-voi-sanoo-esittaa
rss-vaalirankkurit-podcast
the-ulkopolitist
rss-kaikki-uusiksi
rss-ulkopoditiikkaa
otetaan-yhdet
viisupodi
rss-uusi-juttu-mediastartupin-tarina
rss-asiastudio
rss-girls-finish-f1rst
radio-antro