The perfect environment for ATOs (account takeovers) to breed.
Hacking Humans20 Jan 2022

The perfect environment for ATOs (account takeovers) to breed.

Guest Jane Lee, Trust and Safety Architect at Sift, joins Dave to talk about the Digital Trust and Safety Index, Joe and Dave share some follow up from a listener, Ben, with a suggestion as an alternative to prevent clicking on those bonus phishing scams, Joe's story is about fake ticket scams for the Kansas City Chiefs NFL playoff game against the Pittsburgh Steelers, Dave's got a story about scams on Apple's App Store, and our Catch of the Day is from an anonymous listener about an email they received from their "IT department" requesting credentials (including password) when getting a new laptop. (Note: This is our first COTD that is not a scam, rather a bad policy.) Links to stories: Kansas City police warn Chiefs fans about ticket scams APPLE’S $64 BILLION-A-YEAR APP STORE ISN’T CATCHING THE MOST EGREGIOUS SCAMS Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.

Det här avsnittet är hämtat från ett öppet RSS-flöde och publiceras inte av Podme. Det kan innehålla reklam.

Avsnitt(771)

What's behind Buy Now, Pay Later scams?

What's behind Buy Now, Pay Later scams?

Jim Ducharme, COO of Outseer joins Dave to discuss buy now pay later scams, Joe and Dave share some listener follow up, Joe has an interesting story about an Unchained Capital partner and how they wer...

24 Mars 202250min

adversary group naming (noun) [Word Notes]

adversary group naming (noun) [Word Notes]

A cyber threat intelligence best practice of assigning arbitrary labels to collections of hacker activity across the intrusion kill chain.

22 Mars 202210min

Data privacy: is it black and white when it comes to your kids?

Data privacy: is it black and white when it comes to your kids?

UK Correspondent Carole Theriault returns talking with guest David Ruiz from Malwarebytes about parents spying on their kids, Joe and Dave share some listener follow up, Joe's shares a story about the...

17 Mars 202240min

BSIMM (noun) [Word Notes]

BSIMM (noun) [Word Notes]

A descriptive model that provides a baseline of observed software security initiatives and activities from a collection of volunteer software development shops.

15 Mars 20226min

Technology's effects on students during the pandemic.

Technology's effects on students during the pandemic.

Guest Justin Reilly, the CEO of Impero, stops by to talk with Dave Bittner about the mental health of kids in the digital age, Dave's got a story about large-scale phishing campaigns targeting the Ind...

10 Mars 202240min

OWASP vulnerable and outdated components (noun) [Word Notes]

OWASP vulnerable and outdated components (noun) [Word Notes]

Software libraries, frameworks, packages, and other components, and their dependencies (third-party code that each component uses) that have inherent security weaknesses, either through newly discover...

8 Mars 20228min

Phishing seems to be cyclical and thematic.

Phishing seems to be cyclical and thematic.

Guest Jeff Nathan, the Director of Threat research at Norton Labs, joins Dave to discuss their most recent Consumer Cyber Safety Pulse Report, Joe and Dave share some follow up from listeners Daniel a...

3 Mars 202248min

OWASP software and data integrity failures (noun) [Word Notes]

OWASP software and data integrity failures (noun) [Word Notes]

Code and data repositories that don't protect against unauthorized changes.

1 Mars 20228min

Populärt inom Politik & nyheter

aftonbladet-krim
p3-krim
aftonbladet-daily
motiv
politiken
svenska-fall
rss-krimstad
flashback-forever
spar
rss-krimreportrarna
rss-vad-fan-hande
rss-sanning-konsekvens
kungligt
rss-flodet
rss-frandfors-horna
blenda-2
dagens-eko
olyckan-inifran
rss-aftonbladet-krim
krimmagasinet