It pays to do your research. [Hacking Humans Goes to the Movies}
Hacking Humans18 Sep 2022

It pays to do your research. [Hacking Humans Goes to the Movies}

Thanks for joining us again for another episode of fun project brought to you by the team of Hacking Humans, the CyberWire's social engineering podcast. Co-hosts Dave Bittner and Joe Carrigan are joined by Rick Howard in this series where they view clips from their favorite movies with examples of the social engineering scams and schemes you hear about on Hacking Humans. In this episode, Dave and Joe are joined on this episode by guest Tracy Maleeff from Krebs Stamos Group – you may know her on Twitter as @Infosecsherpa. Dave,Joe and Tracy watch and discuss Tracy;s and Joe's clips on this episode. They watch each of the selected scenes, describe the on-screen action for you, and then the team deconstructs what they saw. Grab your bowl of popcorn and join us for some Hollywood scams and frauds. Links to this episode's clips if you'd like to watch along: Tracy's clips from "Working Girl" Elevator scene Tess and Jack gatecrash a wedding scene Joe's clip from "Oceans 8"

Denne episoden er hentet fra en åpen RSS-feed og er ikke publisert av Podme. Den kan derfor inneholde annonser.

Episoder(771)

Passkeys: consumer-friendly password killers?

Passkeys: consumer-friendly password killers?

Guest Chris Sherwood, owner of Crosstalk Solutions, joins Dave to talk about passkeys. Joe shares some listener follow-up about "revert" and side-loading applications on Android phones. Joe's story ca...

7 Sep 202346min

single sign-on (SSO) (noun) [Word Notes]

single sign-on (SSO) (noun) [Word Notes]

A session and user authentication Zero Trust tactic that allows a user to access multiple applications with one set of login credentials. CyberWire Glossary link: https://thecyberwire.com/glossary/sin...

5 Sep 20238min

Exercise caution: online shopping edition.

Exercise caution: online shopping edition.

Oren Koren, CPO and Co-Founder of Veriti, is discussing the need for vigilance and caution when navigating the online shopping landscape. Dave and Joe share quite a bit of listener follow up, one list...

31 Aug 202355min

Encore: cross-site scripting (noun) [Word Notes]

Encore: cross-site scripting (noun) [Word Notes]

From the intrusion kill chain model, a malicious code delivery technique that allows hackers to send code of their choosing to their victim’s browser. XSS takes advantage of the fact that roughly 90% ...

29 Aug 20233min

Hunting the hackers.

Hunting the hackers.

Selena Larson and Tim Utzig discussing research titled "Twitter Scammers Stole $1,000 From My Friend—So I Hunted Them Down." Joe and Dave share a bit of follow up this week, they discuss Hawaii fire s...

24 Aug 202350min

Encore: credential stealing (verb) [Word Notes]

Encore: credential stealing (verb) [Word Notes]

From the intrusion kill chain model, the first part of an exploitation technique where the hacker tricks their victims into revealing their login credentials. In the second part of the technique, hack...

22 Aug 20233min

AI versus AI.

AI versus AI.

Blair Cohen from AuthenticID joins Dave to discuss how generative AI and authentication go hand in hand. Joe and Dave share some follow up from listener Robert who discusses an ad for a device that us...

17 Aug 202354min

two-factor authentication (noun) [Word Notes]

two-factor authentication (noun) [Word Notes]

An authentication process that requires two different factors before granting access. CyberWire Glossary link: https://thecyberwire.com/glossary/two-factor-authentication

15 Aug 20239min

Populært innen Politikk og nyheter

giver-og-gjengen-vg
aftenpodden
forklart
aftenpodden-usa
stopp-verden
fotballpodden-2
nokon-ma-ga
popradet
rss-gukild-johaug
det-store-bildet
dine-penger-pengeradet
lydartikler-fra-aftenposten
rss-espen-lee-usensurert
rss-ness
hanna-de-heldige
aftenbla-bla
rss-dannet-uten-piano
grasoner-den-nye-kalde-krigen
e24-podden
rss-utenrikskomiteen-med-bogen-og-grasvik