Hacking Humans
Deception, influence, and social engineering in the world of cyber crime.

Jaksot(767)

smishing (SMS phishing) (noun) [Word Notes]

smishing (SMS phishing) (noun) [Word Notes]

From the intrusion kill-chain model, the delivery of a “lure” via a text message to a potential victim by pretending to be some trustworthy person or organization in order to trick the victim into rev...

1 Joulu 20204min

Network Time Protocol (NTP) attack (noun) [Word Notes]

Network Time Protocol (NTP) attack (noun) [Word Notes]

A reflection or amplification distributed denial-of-service attack in which hackers query Internet network time protocol servers, NTP servers for short, for the correct time, but spoof the destination...

1 Joulu 20206min

Encore: Wearing a mask in the Oval Office and the art of deception.

Encore: Wearing a mask in the Oval Office and the art of deception.

Joe shares his Classic Cons Part 3, Dave has an Apple device scam story, The Catch of the Day is your assassination heads-up, and later in the show our interview with Jonna Mendez, retired CIA intelli...

26 Marras 202043min

port mirroring (noun) [Word Notes]

port mirroring (noun) [Word Notes]

A network switch configuration setting that forwards a copy of each incoming and outgoing packet to a third switch port. Also known as SPAN or Switched Port Analyzer, RAP or Roving Analysis Port, and ...

24 Marras 20204min

The public's expectations are changing.

The public's expectations are changing.

Dave has a story about the security risks of your outbound email, Joe's story is about a fake company, Ecapitalloans, using fake BBB affiliation, The Catch of the Day comes from a listener named Max w...

19 Marras 202040min

Network Detection and Response (NDR) (noun) [Word Notes]

Network Detection and Response (NDR) (noun) [Word Notes]

NDR tools provide anomaly detection and potential attack prevention by collecting telemetry across the entire intrusion kill chain on transactions across the network, between servers, hosts, and cloud...

17 Marras 20206min

shadow IT (noun) {Word Notes]

shadow IT (noun) {Word Notes]

Technology, software and hardware deployed without explicit organizational approval. In the early days of the computer era from the 1980s through the 2000s security and information system practitioner...

17 Marras 20204min

Ransomware: Statistically, it's likely to happen to anybody.

Ransomware: Statistically, it's likely to happen to anybody.

Joe has a story about how Emotet is being used in phishing emails through thread hijacking, Dave's story is a two-fer: one is about bad guys using image manipulation and the other has Elon Musk giving...

12 Marras 202036min

Suosittua kategoriassa Politiikka ja uutiset

uutiscast
aikalisa
politiikan-puskaradio
rss-ootsa-kuullut-tasta
ootsa-kuullut-tasta-2
tervo-halme
rss-podme-livebox
rss-pinnalla
rss-ulkopoditiikkaa
aihe
the-ulkopolitist
viisupodi
otetaan-yhdet
et-sa-noin-voi-sanoo-esittaa
rss-vaalirankkurit-podcast
rss-tasta-on-kyse-ivan-puopolo-verkkouutiset
rss-asiastudio
radio-antro
rss-uusi-juttu-mediastartupin-tarina
rss-kaikki-uusiksi