The perfect environment for ATOs (account takeovers) to breed.
Hacking Humans20 Jan 2022

The perfect environment for ATOs (account takeovers) to breed.

Guest Jane Lee, Trust and Safety Architect at Sift, joins Dave to talk about the Digital Trust and Safety Index, Joe and Dave share some follow up from a listener, Ben, with a suggestion as an alternative to prevent clicking on those bonus phishing scams, Joe's story is about fake ticket scams for the Kansas City Chiefs NFL playoff game against the Pittsburgh Steelers, Dave's got a story about scams on Apple's App Store, and our Catch of the Day is from an anonymous listener about an email they received from their "IT department" requesting credentials (including password) when getting a new laptop. (Note: This is our first COTD that is not a scam, rather a bad policy.) Links to stories: Kansas City police warn Chiefs fans about ticket scams APPLE’S $64 BILLION-A-YEAR APP STORE ISN’T CATCHING THE MOST EGREGIOUS SCAMS Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.

Denne episoden er hentet fra en åpen RSS-feed og er ikke publisert av Podme. Den kan derfor inneholde annonser.

Episoder(770)

The 3 M's: Minimize, monitor and manage.

The 3 M's: Minimize, monitor and manage.

Guest Adam Levin, security expert and podcast host of "What the Hack with Adam Levin," joins Dave to share advice and discuss some experiences shared on his podcast, Dave and Joe have some listener fo...

16 Des 202145min

account takeover prevention (noun) [Word Notes]

account takeover prevention (noun) [Word Notes]

The prevention of the first part of an intrusion kill chain model exploitation technique, where the hacker steals valid logging credentials from a targeted victim.

14 Des 20216min

Scams abound this time of year.

Scams abound this time of year.

Guest Dave Senci of Mastercard's NuData Security talks about the security issues with remote access and coaching frauds, Dave's got a story about receiving a "Best Buy gift card" and USB mailing, Joe'...

9 Des 202143min

threat hunting (noun) [Word Notes]

threat hunting (noun) [Word Notes]

The process of proactively searching through networks to detect and isolate security threats, rather than relying on security solutions or services to detect those threats.

7 Des 20217min

Do you really want that device to be a connected device?

Do you really want that device to be a connected device?

Guest Jay Radcliffe from Thermo Fisher Scientific shares his advice and security concerns with smart devices since the holiday gifting season is around the corner, Joe and Dave have some listener foll...

2 Des 202147min

vulnerability management (noun) [Word Notes]

vulnerability management (noun) [Word Notes]

The continuous practice of identifying classifying, prioritizing, remediating, and mitigating software vulnerabilities within this.

30 Nov 20218min

Misdirection and layering with a con in the middle. [Hacking Humans Goes to the Movies]

Misdirection and layering with a con in the middle. [Hacking Humans Goes to the Movies]

Thanks for joining us for our fun project brought to you by the team of Hacking Humans, the CyberWire's social engineering podcast. Co-hosts Dave Bittner and Joe Carrigan are joined by Rick Howard in ...

25 Nov 202117min

software bill of materials (SBOM) (noun) [Word Notes]

software bill of materials (SBOM) (noun) [Word Notes]

A formal record containing the details and supply chain relationships of various components used in building software.

23 Nov 20216min

Populært innen Politikk og nyheter

giver-og-gjengen-vg
aftenpodden
forklart
aftenpodden-usa
popradet
stopp-verden
fotballpodden-2
nokon-ma-ga
det-store-bildet
dine-penger-pengeradet
rss-gukild-johaug
hanna-de-heldige
rss-espen-lee-usensurert
lydartikler-fra-aftenposten
rss-ness
aftenbla-bla
rss-dannet-uten-piano
e24-podden
rss-utenrikskomiteen-med-bogen-og-grasvik
rss-gilbrantsuvatne