Encore: rogue access point (noun) [Word notes]
Hacking Humans18 Jul 2023

Encore: rogue access point (noun) [Word notes]

1. A wireless access point installed by employees in an office or data center environment as a convenience to connectivity without the consent or the knowledge of the network manager. 2. A wireless access point, sometimes called an Evil Twin, installed by a cyber adversary in or near an office or data center environment designed to bypass security controls, gain access, and/or surveil the network traffic of the victim’s network. Both kinds, the employee installed and the adversary installed rogue access points, increase the attack surface of the organization. The employee installed device, because of its electronic footprint range, might make it easier for hackers and mischief makers outside of the organization’s network to bypass the corporate security controls and gain access without permission. The adversary installed device is designed specifically to bypass the security controls of the target network.

Denne episoden er hentet fra en åpen RSS-feed og er ikke publisert av Podme. Den kan derfor inneholde annonser.

Episoder(770)

Kidnappers, robots and deep fakes.

Kidnappers, robots and deep fakes.

Joe shares a kidnapping scam targeting foreign students. Dave describes social engineering involving robots. Our guest is Robert Anderson from the Chertoff Group, discussing Deep Fake technology and h...

27 Sep 201828min

Stringing along a scammer.

Stringing along a scammer.

Dave warns of scammers taking advantage of hurricane Florence, both on the phone and in person. Joe shares a scheme targeting the kindness of local churchgoers. A cosmic variation on the Nigerian emai...

20 Sep 201829min

Influence versus manipulation.

Influence versus manipulation.

Joe describes a law firm impersonating a rival to funnel business away from them. Dave has a story of pontiff impersonation. Our guest is Joe Gray from Advanced Persistent Security.  Links to stories ...

13 Sep 201830min

Real estate transactions in the crosshairs.

Real estate transactions in the crosshairs.

Dave gets scammed on an exit ramp. Joe describes real estate transaction scams. Is LinkedIn moonlighting in Himalayan tourism? Guest Asaf Cidon from Barracuda Networks shares social engineering trends...

6 Sep 201830min

Red teaming starts with research.

Red teaming starts with research.

Joe describes an Office 365 phishing campaign. Dave warns of dangerous USB cables. A listener shares a fax from the UK. Joe interviews security consultant and pen tester Justin White. Links to stories...

30 Aug 201830min

Telling the truth in a dishonest way.

Telling the truth in a dishonest way.

Dave looks at Hollywood script pitch event scams. Joe describes a romance scam murder scheme. Spontaneously combusting ATM cards. Guest Jayson E. Street from SphereNY describes his security awareness ...

23 Aug 201830min

Sometimes less is more.

Sometimes less is more.

Joe shares the story of a retiree scammed by a clever scheme. Dave describes a tech-support scam with a Russian twist. Our Catch of the Day features an adorable puppy. Guest Michael Murray from Lookou...

16 Aug 201836min

Focus, technology, and training fight phishing.

Focus, technology, and training fight phishing.

Dave describes a phishing attempt to infiltrate U.S. election systems. Joe shares a story of government agencies receiving malicious CDs in the mail. University employees are lured by greed. And David...

9 Aug 201829min

Populært innen Politikk og nyheter

giver-og-gjengen-vg
aftenpodden
forklart
aftenpodden-usa
popradet
fotballpodden-2
nokon-ma-ga
stopp-verden
det-store-bildet
rss-gukild-johaug
dine-penger-pengeradet
hanna-de-heldige
rss-espen-lee-usensurert
aftenbla-bla
rss-ness
lydartikler-fra-aftenposten
rss-dannet-uten-piano
rss-penger-polser-og-politikk
e24-podden
frokostshowet-pa-p5