Homograph phishing (noun) [Word Notes]
Hacking Humans6 Sep 2022

Homograph phishing (noun) [Word Notes]

The use of similar-looking characters in a phishing URL to spoof a legitimate site. CyberWire Glossary link: Audio reference link: “Mission Impossible III 2006 Masking 01,” uploaded by DISGUISE MASK, 28 July 2018.

Denne episoden er hentet fra en åpen RSS-feed og er ikke publisert av Podme. Den kan derfor inneholde annonser.

Episoder(770)

Cookies make for some tasty phishing lure.

Cookies make for some tasty phishing lure.

In addition to his regular story Dave shares a situation where his mom almost took the bait, Dave's story is about an SMS phishing (smishing) Apple scam in UK (ps, there's never a free iPhone & Joe is...

1 Okt 202036min

credential stealing (verb) [Word Notes]

credential stealing (verb) [Word Notes]

From the intrusion kill chain model, the first part of an exploitation technique where the hacker tricks their victims into revealing their login credentials. In the second part of the technique, hack...

29 Sep 20203min

It's human nature.

It's human nature.

Dave and Joe have some follow-up from a listener on OG accounts, Joe's story talks about a new phishing campaign inspired by Twitter from earlier this summer, Dave shares a story about using security ...

24 Sep 202033min

The Bombe (noun) [Word Notes]

The Bombe (noun) [Word Notes]

An electro-mechanical device used to break Enigma-enciphered messages about enemy military operations during the Second World War. The first bombe–named Victory and designed by Alan Turning and Gordon...

22 Sep 20204min

Your information is already on the Dark Web.

Your information is already on the Dark Web.

Dave and Joe have some follow-up on mobile banking apps, Dave talks about the website bitcoinabuse.com, Joe's story Brian Krebs did on old Gmail emails and people using them either errantly or malicio...

17 Sep 202036min

cross-site scripting (noun) [Word Notes]

cross-site scripting (noun) [Word Notes]

From the intrusion kill chain model, a malicious code delivery technique that allows hackers to send code of their choosing to their victim’s browser. XSS takes advantage of the fact that roughly 90% ...

15 Sep 20203min

The story is what gets people in.

The story is what gets people in.

Joe shares a story on the ability to make a scam work through storytelling skills, Dave's story is about a guy duping a convenience store clerk into taking over her shift and later robbing the place, ...

10 Sep 202034min

penetration test (noun) [Word Notes]

penetration test (noun) [Word Notes]

The process of evaluating the security of a system or network by simulating an attack on it. Sometimes called "ethical hacking" or white hat hacking. The phrase started to appear in U.S. military circ...

8 Sep 20204min

Populært innen Politikk og nyheter

giver-og-gjengen-vg
aftenpodden
forklart
aftenpodden-usa
popradet
stopp-verden
fotballpodden-2
nokon-ma-ga
rss-gukild-johaug
det-store-bildet
dine-penger-pengeradet
hanna-de-heldige
rss-espen-lee-usensurert
rss-ness
lydartikler-fra-aftenposten
aftenbla-bla
rss-dannet-uten-piano
rss-penger-polser-og-politikk
e24-podden
rss-utenrikskomiteen-med-bogen-og-grasvik