The only locks you should pick are your own.
Hacking Humans13 Jan 2022

The only locks you should pick are your own.

Guest Tom Tovar, CEO and Co-Creator of AppDome, joins Dave and Joe to discuss the results of a recent consumer survey, Dave's story is based on a tweet where the user's child's middle school had some unintended consequences of a phishing scam training, Joe has two stories: one on QR code scammers on parking kiosks, and one about a book publishing phishing scam, and our Catch of the Day is a message that purports to come from the USPS sent in by listener William about a missed package delivery. Links to stories: Tweet about phishing simulation gone wrong. QR code scammers hitting on-street parking in Texas cities -- including Houston, officials say; This is what you need to know FBI Arrests Suspect in Unpublished Book Manuscript Phishing Scam Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.

Denne episoden er hentet fra en åpen RSS-feed og er ikke publisert av Podme. Den kan derfor inneholde annonser.

Episoder(772)

Unix (noun) [Word Notes]

Unix (noun) [Word Notes]

A family of multitasking, multi-user computer operating systems that derive from the original Unix system built by Ken Thompson and Dennis Ritchie in the 1960s.

5 Jan 20215min

fuzzing (noun) [Word Notes]

fuzzing (noun) [Word Notes]

An automatic software bug and vulnerability discovery technique that input's invalid, unexpected and/or random data or fuzz into a program and then monitors the program's reaction to it.

5 Jan 20215min

Encore: Don't go looking for morality here. [Hacking Humans]

Encore: Don't go looking for morality here. [Hacking Humans]

Dave has a story of an investment scam featuring celebrities, Joe warns of scams surrounding the Coronavirus, the Catch of the Day features Joe's son-in-law's adventure with thousands of bot infiltrat...

31 Des 202038min

deep packet inspection (DPI) (noun) [Word Notes]

deep packet inspection (DPI) (noun) [Word Notes]

A network monitoring and filtering technique that examines both the header information and the payload of every packet traversing a network access point.

29 Des 20205min

Encore: Separating fools from money. [Hacking Humans]

Encore: Separating fools from money. [Hacking Humans]

Dave shares a story of airport penetration testing with high degree of yuck-factor. Joe explores research on protecting passwords from social engineering. The catch-of-the-day comes courtesy of Graham...

24 Des 202030min

rootkit (noun) [Word Notes]

rootkit (noun) [Word Notes]

A clandestine set of applications designed to give hackers access and control over a target device.

22 Des 20206min

tactics, techniques and procedures (TTPs) (noun) [Word Notes]

tactics, techniques and procedures (TTPs) (noun) [Word Notes]

A set of behaviors that precisely describes a cyber adversary attack campaign.

22 Des 20206min

Phishing lures that may be in your inbox soon, and how to deal "left of bang."

Phishing lures that may be in your inbox soon, and how to deal "left of bang."

Joe talks about phishing lures with holiday packages, current events, and things he expects to see in your inbox soon, Dave's shares a blog post on how to troll a Nigerian prince, The Catch of the Day...

17 Des 202037min

Populært innen Politikk og nyheter

giver-og-gjengen-vg
aftenpodden
forklart
aftenpodden-usa
popradet
stopp-verden
fotballpodden-2
lydartikler-fra-aftenposten
det-store-bildet
nokon-ma-ga
rss-gukild-johaug
dine-penger-pengeradet
rss-ness
rss-espen-lee-usensurert
hanna-de-heldige
aftenbla-bla
grasoner-den-nye-kalde-krigen
e24-podden
rss-dannet-uten-piano
frokostshowet-pa-p5