Homograph phishing (noun) [Word Notes]
Hacking Humans6 Sep 2022

Homograph phishing (noun) [Word Notes]

The use of similar-looking characters in a phishing URL to spoof a legitimate site. CyberWire Glossary link: Audio reference link: “Mission Impossible III 2006 Masking 01,” uploaded by DISGUISE MASK, 28 July 2018.

Denne episoden er hentet fra en åpen RSS-feed og er ikke publisert av Podme. Den kan derfor inneholde annonser.

Episoder(771)

Security Service Edge (SSE) (noun) [Word Notes]

Security Service Edge (SSE) (noun) [Word Notes]

A security architecture that incorporates the cloud shared responsibility model, a vendor provided security stack, and network peering with one or more of the big content providers and their associate...

15 Nov 20228min

New laws and the effect on small businesses.

New laws and the effect on small businesses.

Kurtis Minder, CEO of GroupSense joins Dave to discuss how ransomware new laws leave small business behind. Dave and Joe share some follow up on Elon Musk after his big purchase and the changes that n...

10 Nov 202250min

Domain spoofing (noun) [Word Notes]

Domain spoofing (noun) [Word Notes]

A social engineering tactic in which hackers build a malicious domain to mimic a legitimate one. CyberWire Glossary link: https://thecyberwire.com/glossary/domain-spoofing Audio reference link: “Missi...

8 Nov 20227min

Protecting your identity.

Protecting your identity.

Jameeka Green Aaron, CISO, Customer Identity at Okta, sits down with Dave to speak about their State of Secure Identity report. Dave and Joe share some listener follow up from Richard, who writes in t...

3 Nov 202251min

What's Your Problem trailer.

What's Your Problem trailer.

We’re sharing a preview of a podcast we enjoy called “What’s Your Problem?”  Every week on What’s Your Problem, entrepreneurs talk about the future they’re trying to build and the problems they have t...

3 Nov 20222min

Secure Web Gateway (noun) [Word Notes]

Secure Web Gateway (noun) [Word Notes]

A layer seven firewall that sits in line at the boundary between the internet and an organization's network perimeter that allows security policy enforcement and can perform certain prevention and det...

1 Nov 20229min

The Malware Mash! [Bonus]

The Malware Mash! [Bonus]

Enjoy this CyberWire classic. They did the Mash...the did the Malware Mash...

28 Okt 20223min

Setting tech limits with a new tool.

Setting tech limits with a new tool.

Kim Allman from NortonLifeLock, and Carrie Neill from the National PTA, sit down with Dave to discuss the Smart Talk 2.0 tool. Joe and Dave share some follow up on an exciting new position Joe has acc...

27 Okt 202243min

Populært innen Politikk og nyheter

giver-og-gjengen-vg
aftenpodden
forklart
aftenpodden-usa
stopp-verden
fotballpodden-2
nokon-ma-ga
popradet
rss-gukild-johaug
det-store-bildet
dine-penger-pengeradet
lydartikler-fra-aftenposten
rss-espen-lee-usensurert
rss-ness
hanna-de-heldige
aftenbla-bla
rss-dannet-uten-piano
grasoner-den-nye-kalde-krigen
e24-podden
rss-utenrikskomiteen-med-bogen-og-grasvik