The perfect environment for ATOs (account takeovers) to breed.
Hacking Humans20 Jan 2022

The perfect environment for ATOs (account takeovers) to breed.

Guest Jane Lee, Trust and Safety Architect at Sift, joins Dave to talk about the Digital Trust and Safety Index, Joe and Dave share some follow up from a listener, Ben, with a suggestion as an alternative to prevent clicking on those bonus phishing scams, Joe's story is about fake ticket scams for the Kansas City Chiefs NFL playoff game against the Pittsburgh Steelers, Dave's got a story about scams on Apple's App Store, and our Catch of the Day is from an anonymous listener about an email they received from their "IT department" requesting credentials (including password) when getting a new laptop. (Note: This is our first COTD that is not a scam, rather a bad policy.) Links to stories: Kansas City police warn Chiefs fans about ticket scams APPLE’S $64 BILLION-A-YEAR APP STORE ISN’T CATCHING THE MOST EGREGIOUS SCAMS Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.

Denne episoden er hentet fra en åpen RSS-feed og er ikke publisert av Podme. Den kan derfor inneholde annonser.

Episoder(770)

Network Detection and Response (NDR) (noun) [Word Notes]

Network Detection and Response (NDR) (noun) [Word Notes]

NDR tools provide anomaly detection and potential attack prevention by collecting telemetry across the entire intrusion kill chain on transactions across the network, between servers, hosts, and cloud...

17 Nov 20206min

shadow IT (noun) {Word Notes]

shadow IT (noun) {Word Notes]

Technology, software and hardware deployed without explicit organizational approval. In the early days of the computer era from the 1980s through the 2000s security and information system practitioner...

17 Nov 20204min

Ransomware: Statistically, it's likely to happen to anybody.

Ransomware: Statistically, it's likely to happen to anybody.

Joe has a story about how Emotet is being used in phishing emails through thread hijacking, Dave's story is a two-fer: one is about bad guys using image manipulation and the other has Elon Musk giving...

12 Nov 202036min

remote access Trojan or RAT (noun) [Word Notes}

remote access Trojan or RAT (noun) [Word Notes}

From the intrusion kill chain model, a program that provides command and control services for an attack campaign. While the first ever deployed RAT is unknown, one early example is Back Orifice made f...

10 Nov 20204min

Too good to be true.

Too good to be true.

Dave has a story about a fake Facebook copyright violation scam trying to trick you out of your TFA to get into your account, Joe story about the largest elder fraud scam in US history, The Catch of t...

5 Nov 202036min

business email compromise or BEC (noun) [Word Notes]

business email compromise or BEC (noun) [Word Notes]

A social engineering scam where fraudsters spoof an email message from a trusted company officer that directs a staff member to transfer funds to an account controlled by the criminal.

3 Nov 20203min

David Sanger on the HBO documentary based off his book, "The Perfect Weapon". [Special Edition]

David Sanger on the HBO documentary based off his book, "The Perfect Weapon". [Special Edition]

On this Special Edition, our extended conversation with author and New York Times national security correspondent David E. Sanger. The Perfect Weapon explores the rise of cyber conflict as the primary...

1 Nov 202027min

The Malware Mash!

The Malware Mash!

30 Okt 20203min

Populært innen Politikk og nyheter

giver-og-gjengen-vg
aftenpodden
forklart
aftenpodden-usa
popradet
stopp-verden
fotballpodden-2
nokon-ma-ga
rss-gukild-johaug
det-store-bildet
dine-penger-pengeradet
hanna-de-heldige
rss-espen-lee-usensurert
rss-ness
lydartikler-fra-aftenposten
aftenbla-bla
rss-dannet-uten-piano
rss-penger-polser-og-politikk
e24-podden
rss-utenrikskomiteen-med-bogen-og-grasvik