Private Network Access (PNA) (noun) [Word Notes]
Hacking Humans2 Aug 2022

Private Network Access (PNA) (noun) [Word Notes]

A browser configuration control that prevents accessing resources within a private network. CyberWire Glossary link: Audio reference link: “Chrome Limits Access to Private Networks,” by Daniel Lowrie, ITProTV, YouTube, 19 January 2022.

Denne episoden er hentet fra en åpen RSS-feed og er ikke publisert av Podme. Den kan derfor inneholde annonser.

Episoder(770)

Healthcare hassles and hefty heists.

Healthcare hassles and hefty heists.

This week, Maria Varmazis host of the N2K daily space show, T-Minus, joins Dave and Joe, as they celebrate Maria joining the Hacking Humans podcast every week! Maria's story is from a listener this we...

25 Jul 202449min

Encore: APT (noun) [Word Notes]

Encore: APT (noun) [Word Notes]

An acronym for Advanced Persistent Threat to describe hacker groups or campaigns normally, but not always, associated with nation state cyber espionage and continuous low-level cyber conflict operatio...

23 Jul 20246min

Welcome to a new age in digital deception.

Welcome to a new age in digital deception.

This week, Maria Varmazis host of the N2K daily space show, T-Minus, joins Dave and Joe, as they celebrate Maria joining the Hacking Humans podcast every week! Maria's story is on supplement scams, as...

18 Jul 202437min

Encore: backdoor (noun) [Word Notes]

Encore: backdoor (noun) [Word Notes]

An undocumented or publicly unknown method to access a computer system undetected or to break a cypher used to encode messages.

16 Jul 20245min

The costly consequences of communication scams.

The costly consequences of communication scams.

This week Dave shares a story on Business email compromise (BEC) scams, and how they are a major threat, costing $26 billion annually. The story shares how it's crucial for employees to verify suspici...

11 Jul 202431min

Encore: watering hole attack (noun) [Word Notes]

Encore: watering hole attack (noun) [Word Notes]

From the intrusion kill chain model, a technique where the hacker compromises sites commonly visited by members of a targeted community in order to deliver a malicious payload to the intended victim.

9 Jul 20245min

Encore: AI versus AI.

Encore: AI versus AI.

Blair Cohen from AuthenticID joins Dave to discuss how generative AI and authentication go hand in hand. Joe and Dave share some follow up from listener Robert who discusses an ad for a device that us...

4 Jul 202454min

Operation Endgame: The ultimate troll patrol. [Only Malware in the Building]

Operation Endgame: The ultimate troll patrol. [Only Malware in the Building]

Welcome in! You’ve entered, Only Malware in the Building. Join us each month to sip tea and solve mysteries about today’s most interesting threats. Your host is Selena Larson, Proofpoint intelligence ...

2 Jul 202428min

Populært innen Politikk og nyheter

giver-og-gjengen-vg
aftenpodden
forklart
aftenpodden-usa
popradet
fotballpodden-2
nokon-ma-ga
stopp-verden
det-store-bildet
rss-gukild-johaug
dine-penger-pengeradet
hanna-de-heldige
rss-espen-lee-usensurert
aftenbla-bla
rss-ness
lydartikler-fra-aftenposten
rss-dannet-uten-piano
rss-penger-polser-og-politikk
e24-podden
frokostshowet-pa-p5