Sometimes it's scripted and others, it's a target of opportunity. [Hacking Humans Goes to the Movies]
Hacking Humans18 Des 2022

Sometimes it's scripted and others, it's a target of opportunity. [Hacking Humans Goes to the Movies]

Thanks for joining us again for another episode of fun project brought to you by the team of Hacking Humans, the CyberWire's social engineering podcast. Hacking Humans co-host Dave Bittner is joined by Rick Howard in this series where they view clips from their favorite movies and television shows with examples of the social engineering scams and schemes you hear Dave and co-host Joe Carrigan talk about on Hacking Humans. In this episode, Dave and Rick watch each of the selected scenes, describe the on-screen action for you, and then they deconstruct what they saw. Grab your bowl of popcorn and join us for some fantastic scams and frauds. On this episode, Dave and Rick are joined once again by Tracy Maleeff, security researcher at the Krebs Stamos Group. You may also know Tracy on Twitter as infosecsherpa. Links to this episode's clips if you'd like to watch along: Rick's clip from the movie Criminal Tracy's clip from the movie The Talented Mr. Ripley

Denne episoden er hentet fra en åpen RSS-feed og er ikke publisert av Podme. Den kan derfor inneholde annonser.

Episoder(770)

Network Detection and Response (NDR) (noun) [Word Notes]

Network Detection and Response (NDR) (noun) [Word Notes]

NDR tools provide anomaly detection and potential attack prevention by collecting telemetry across the entire intrusion kill chain on transactions across the network, between servers, hosts, and cloud...

17 Nov 20206min

shadow IT (noun) {Word Notes]

shadow IT (noun) {Word Notes]

Technology, software and hardware deployed without explicit organizational approval. In the early days of the computer era from the 1980s through the 2000s security and information system practitioner...

17 Nov 20204min

Ransomware: Statistically, it's likely to happen to anybody.

Ransomware: Statistically, it's likely to happen to anybody.

Joe has a story about how Emotet is being used in phishing emails through thread hijacking, Dave's story is a two-fer: one is about bad guys using image manipulation and the other has Elon Musk giving...

12 Nov 202036min

remote access Trojan or RAT (noun) [Word Notes}

remote access Trojan or RAT (noun) [Word Notes}

From the intrusion kill chain model, a program that provides command and control services for an attack campaign. While the first ever deployed RAT is unknown, one early example is Back Orifice made f...

10 Nov 20204min

Too good to be true.

Too good to be true.

Dave has a story about a fake Facebook copyright violation scam trying to trick you out of your TFA to get into your account, Joe story about the largest elder fraud scam in US history, The Catch of t...

5 Nov 202036min

business email compromise or BEC (noun) [Word Notes]

business email compromise or BEC (noun) [Word Notes]

A social engineering scam where fraudsters spoof an email message from a trusted company officer that directs a staff member to transfer funds to an account controlled by the criminal.

3 Nov 20203min

David Sanger on the HBO documentary based off his book, "The Perfect Weapon". [Special Edition]

David Sanger on the HBO documentary based off his book, "The Perfect Weapon". [Special Edition]

On this Special Edition, our extended conversation with author and New York Times national security correspondent David E. Sanger. The Perfect Weapon explores the rise of cyber conflict as the primary...

1 Nov 202027min

The Malware Mash!

The Malware Mash!

30 Okt 20203min

Populært innen Politikk og nyheter

giver-og-gjengen-vg
aftenpodden
forklart
aftenpodden-usa
popradet
fotballpodden-2
nokon-ma-ga
stopp-verden
det-store-bildet
rss-gukild-johaug
dine-penger-pengeradet
hanna-de-heldige
rss-espen-lee-usensurert
aftenbla-bla
rss-ness
lydartikler-fra-aftenposten
rss-dannet-uten-piano
rss-penger-polser-og-politikk
e24-podden
frokostshowet-pa-p5