Cons through and through. [Hacking Humans Goes to the Movies]
Hacking Humans24 Apr 2022

Cons through and through. [Hacking Humans Goes to the Movies]

Thanks for joining us for the latest episode of our fun project brought to you by the team of Hacking Humans, the CyberWire's social engineering podcast. Co-hosts Dave Bittner and Joe Carrigan are joined by Rick Howard in this series where they view clips from their favorite movies with examples of the social engineering scams and schemes you hear about on Hacking Humans. In this episode, Dave and Joe are joined on this episode by Perry Carpenter, host of 8th Layer Insights podcast and chief evangelist at KnowBe4. Dave,Joe and Perry watch and discuss Dave's and Perry's clips on this episode. They watch each of the selected scenes, describe the on-screen action for you, and then the team deconstructs what they saw. Grab your bowl of popcorn and join us for some Hollywood scams and frauds. A heads-up for our listeners: there is a bit of spicy language in today’s clips, so use your discretion if you are tuning in with your kids. Links to this episode's clips if you'd like to watch along: Dave's scene from "Focus" Perrys clip from "Ferris Bueller's Day Off"

Det här avsnittet är hämtat från ett öppet RSS-flöde och publiceras inte av Podme. Det kan innehålla reklam.

Avsnitt(770)

cold boot attack (noun) [Word Notes]

cold boot attack (noun) [Word Notes]

A type of side channel attack in which an attacker with physical access to a computer performs a memory dump of a computer’s Random Access Memory or RAM during the reboot process in order to steal sen...

20 Apr 20216min

Being aware can go a long way to prevent attacks.

Being aware can go a long way to prevent attacks.

Guest Herb Stapleton, the FBI’s cyber division sector chief, joins Dave to talk about the FBI's Internet Crime Complaint Center (IC3) annual report and its findings, Joe's story is about an ongoing IR...

15 Apr 202135min

cloud computing (noun) [Word Notes]

cloud computing (noun) [Word Notes]

On-demand pay-as-you-go Internet delivered compute, storage, infrastructure, and security services that are partially managed by the cloud provider and partially managed by the customer.

13 Apr 20216min

Finding targets of opportunity.

Finding targets of opportunity.

Guest Peter Warmka, founder of the Counterintelligence Institute, joins Dave to talk about how insider targets are chosen and assessed, Joe shares a weird phone call he received, Dave's story from a T...

8 Apr 202140min

APT (noun) [Word Notes]

APT (noun) [Word Notes]

An acronym for Advanced Persistent Threat to describe hacker groups or campaigns normally, but not always, associated with nation state cyber espionage and continuous low-level cyber conflict operatio...

6 Apr 20216min

The pandemic is slowing, time to travel?

The pandemic is slowing, time to travel?

Guest Fleming Shi of Barracuda joins Dave to talk about about travel-related phishing attacks now that vaccines are more readily available, Dave and Joe share listener advice about preventative email ...

1 Apr 202134min

backdoor (noun) [Word Notes]

backdoor (noun) [Word Notes]

An undocumented or publicly unknown method to access a computer system undetected or to break a cypher used to encode messages.

30 Mars 20215min

Technology is not designed for older users.

Technology is not designed for older users.

Guest Ming Yang of Orchard joins Dave to talk about ways to help your parents with technology (aka providing tech support for our parents). Dave shares the FBI's advisory warning of an expected increa...

25 Mars 202137min

Populärt inom Politik & nyheter

aftonbladet-krim
p3-krim
aftonbladet-daily
politiken
rss-krimstad
motiv
flashback-forever
svenska-fall
spar
rss-sanning-konsekvens
rss-krimreportrarna
rss-vad-fan-hande
kungligt
rss-frandfors-horna
rss-flodet
rss-aftonbladet-krim
blenda-2
svd-ledarredaktionen
dagens-eko
olyckan-inifran