It pays to do your research. [Hacking Humans Goes to the Movies}
Hacking Humans18 Sep 2022

It pays to do your research. [Hacking Humans Goes to the Movies}

Thanks for joining us again for another episode of fun project brought to you by the team of Hacking Humans, the CyberWire's social engineering podcast. Co-hosts Dave Bittner and Joe Carrigan are joined by Rick Howard in this series where they view clips from their favorite movies with examples of the social engineering scams and schemes you hear about on Hacking Humans. In this episode, Dave and Joe are joined on this episode by guest Tracy Maleeff from Krebs Stamos Group – you may know her on Twitter as @Infosecsherpa. Dave,Joe and Tracy watch and discuss Tracy;s and Joe's clips on this episode. They watch each of the selected scenes, describe the on-screen action for you, and then the team deconstructs what they saw. Grab your bowl of popcorn and join us for some Hollywood scams and frauds. Links to this episode's clips if you'd like to watch along: Tracy's clips from "Working Girl" Elevator scene Tess and Jack gatecrash a wedding scene Joe's clip from "Oceans 8"

Denne episoden er hentet fra en åpen RSS-feed og er ikke publisert av Podme. Den kan derfor inneholde annonser.

Episoder(771)

fuzzing (noun) [Word Notes]

fuzzing (noun) [Word Notes]

An automatic software bug and vulnerability discovery technique that input's invalid, unexpected and/or random data or fuzz into a program and then monitors the program's reaction to it.

5 Jan 20215min

Encore: Don't go looking for morality here. [Hacking Humans]

Encore: Don't go looking for morality here. [Hacking Humans]

Dave has a story of an investment scam featuring celebrities, Joe warns of scams surrounding the Coronavirus, the Catch of the Day features Joe's son-in-law's adventure with thousands of bot infiltrat...

31 Des 202038min

deep packet inspection (DPI) (noun) [Word Notes]

deep packet inspection (DPI) (noun) [Word Notes]

A network monitoring and filtering technique that examines both the header information and the payload of every packet traversing a network access point.

29 Des 20205min

Encore: Separating fools from money. [Hacking Humans]

Encore: Separating fools from money. [Hacking Humans]

Dave shares a story of airport penetration testing with high degree of yuck-factor. Joe explores research on protecting passwords from social engineering. The catch-of-the-day comes courtesy of Graham...

24 Des 202030min

rootkit (noun) [Word Notes]

rootkit (noun) [Word Notes]

A clandestine set of applications designed to give hackers access and control over a target device.

22 Des 20206min

tactics, techniques and procedures (TTPs) (noun) [Word Notes]

tactics, techniques and procedures (TTPs) (noun) [Word Notes]

A set of behaviors that precisely describes a cyber adversary attack campaign.

22 Des 20206min

Phishing lures that may be in your inbox soon, and how to deal "left of bang."

Phishing lures that may be in your inbox soon, and how to deal "left of bang."

Joe talks about phishing lures with holiday packages, current events, and things he expects to see in your inbox soon, Dave's shares a blog post on how to troll a Nigerian prince, The Catch of the Day...

17 Des 202037min

identity theft (noun) [Word Notes]

identity theft (noun) [Word Notes]

In this case Identity is the set of credentials, usually electronic that vouch for who you are and theft is to steal. The theft of a person's identity for purposes of fraud.

15 Des 20204min

Populært innen Politikk og nyheter

giver-og-gjengen-vg
aftenpodden
forklart
aftenpodden-usa
popradet
stopp-verden
fotballpodden-2
nokon-ma-ga
det-store-bildet
dine-penger-pengeradet
rss-gukild-johaug
hanna-de-heldige
rss-espen-lee-usensurert
lydartikler-fra-aftenposten
rss-ness
aftenbla-bla
rss-dannet-uten-piano
e24-podden
rss-utenrikskomiteen-med-bogen-og-grasvik
rss-gilbrantsuvatne