The perfect environment for ATOs (account takeovers) to breed.
Hacking Humans20 Jan 2022

The perfect environment for ATOs (account takeovers) to breed.

Guest Jane Lee, Trust and Safety Architect at Sift, joins Dave to talk about the Digital Trust and Safety Index, Joe and Dave share some follow up from a listener, Ben, with a suggestion as an alternative to prevent clicking on those bonus phishing scams, Joe's story is about fake ticket scams for the Kansas City Chiefs NFL playoff game against the Pittsburgh Steelers, Dave's got a story about scams on Apple's App Store, and our Catch of the Day is from an anonymous listener about an email they received from their "IT department" requesting credentials (including password) when getting a new laptop. (Note: This is our first COTD that is not a scam, rather a bad policy.) Links to stories: Kansas City police warn Chiefs fans about ticket scams APPLE’S $64 BILLION-A-YEAR APP STORE ISN’T CATCHING THE MOST EGREGIOUS SCAMS Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.

Denne episoden er hentet fra en åpen RSS-feed og er ikke publisert av Podme. Den kan derfor inneholde annonser.

Episoder(770)

single sign-on (SSO) (noun) [Word Notes]

single sign-on (SSO) (noun) [Word Notes]

A session and user authentication Zero Trust tactic that allows a user to access multiple applications with one set of login credentials. CyberWire Glossary link: https://thecyberwire.com/glossary/sin...

5 Sep 20238min

Exercise caution: online shopping edition.

Exercise caution: online shopping edition.

Oren Koren, CPO and Co-Founder of Veriti, is discussing the need for vigilance and caution when navigating the online shopping landscape. Dave and Joe share quite a bit of listener follow up, one list...

31 Aug 202355min

Encore: cross-site scripting (noun) [Word Notes]

Encore: cross-site scripting (noun) [Word Notes]

From the intrusion kill chain model, a malicious code delivery technique that allows hackers to send code of their choosing to their victim’s browser. XSS takes advantage of the fact that roughly 90% ...

29 Aug 20233min

Hunting the hackers.

Hunting the hackers.

Selena Larson and Tim Utzig discussing research titled "Twitter Scammers Stole $1,000 From My Friend—So I Hunted Them Down." Joe and Dave share a bit of follow up this week, they discuss Hawaii fire s...

24 Aug 202350min

Encore: credential stealing (verb) [Word Notes]

Encore: credential stealing (verb) [Word Notes]

From the intrusion kill chain model, the first part of an exploitation technique where the hacker tricks their victims into revealing their login credentials. In the second part of the technique, hack...

22 Aug 20233min

AI versus AI.

AI versus AI.

Blair Cohen from AuthenticID joins Dave to discuss how generative AI and authentication go hand in hand. Joe and Dave share some follow up from listener Robert who discusses an ad for a device that us...

17 Aug 202354min

two-factor authentication (noun) [Word Notes]

two-factor authentication (noun) [Word Notes]

An authentication process that requires two different factors before granting access. CyberWire Glossary link: https://thecyberwire.com/glossary/two-factor-authentication

15 Aug 20239min

AI: A battle between heroes and villains.

AI: A battle between heroes and villains.

Dave Baggett from INKY joins Dave to dive into the latest phishing trends and discuss a broader view of how AI is being used by both the good guys and the bad guys. Joe's story this week dives into th...

10 Aug 202358min

Populært innen Politikk og nyheter

giver-og-gjengen-vg
aftenpodden
forklart
aftenpodden-usa
popradet
stopp-verden
fotballpodden-2
nokon-ma-ga
det-store-bildet
dine-penger-pengeradet
rss-gukild-johaug
hanna-de-heldige
rss-espen-lee-usensurert
lydartikler-fra-aftenposten
rss-ness
aftenbla-bla
rss-dannet-uten-piano
e24-podden
rss-utenrikskomiteen-med-bogen-og-grasvik
rss-gilbrantsuvatne