The top 10 brand names most likely used in a phishing scheme.
Hacking Humans30 Juni 2022

The top 10 brand names most likely used in a phishing scheme.

Omer Dembinsky, a Data Research Manager from Check Point Research, joins Dave to discuss their Brand Phishing Report for Q1 2022 and how DHL, Maersk, and AliExpress were all in the top 10 list. Joe and Dave have some listener follow up from the 200th episode discussing how many redirects are too many. Joe has two stories this week, the first on how Instagram (Meta Platforms) was hit with multiple lawsuits from the Beasley Allen Law Firm over exploiting young people for money. The second story is about social media addiction, and how companies are making the platforms deliberately addictive. Dave's story is on your internet fingerprint that you leave behind, and how easy it is for websites to know everything about you and your computer settings. Our catch of the day comes from listener Pablo, who shares about a scammer contacting him through text trying to receive money for coronavirus insurance. Links to stories: Meta, Instagram hit with 8 lawsuits for ‘exploiting young people for profit’ Social media apps are 'deliberately' addictive to users The Fingerprint You Leave Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter

Det här avsnittet är hämtat från ett öppet RSS-flöde och publiceras inte av Podme. Det kan innehålla reklam.

Avsnitt(771)

non-fungible tokens (NFT) (noun) [Word Notes]

non-fungible tokens (NFT) (noun) [Word Notes]

Digital assets that are cryptographically protected on a blockchain and contain unique identification codes and metadata that makes them one of a kind.

15 Juni 20215min

Pandemic taxes: later due dates afford more time for scams.

Pandemic taxes: later due dates afford more time for scams.

Guest Robert Capps of NuData Security joins Dave to discuss what businesses can do to bolster their protection against tax fraud, Joe and Dave have some follow-up from 2 episodes ago when they discuss...

10 Juni 202139min

multi-factor authentication (noun) [Word Notes]

multi-factor authentication (noun) [Word Notes]

The use of two or more verification methods to gain access to an account.

8 Juni 20216min

The fight in the dog.

The fight in the dog.

Guests Jan Kallberg and Col Stephen Hamilton of Army Cyber Institute at West Point join Dave to talk about cognitive force protection, Joe and Dave have some follow-up from a listener named Obada abou...

3 Juni 202139min

machine learning (noun) [Word Notes]

machine learning (noun) [Word Notes]

A programming technique where the developer doesn't specify each step of the algorithm in code, but instead teaches the algorithm to learn from the experience.

1 Juni 20216min

Hacking people vs. hacking technologies to get into companies.

Hacking people vs. hacking technologies to get into companies.

Guest Tim Sadler from Tessian on how oversharing on social media and in OOO messages can open the door for hackers, Joe shares a story about vishing emails from "Amazon" that had spam confidence level...

27 Maj 202139min

intelligence (noun) [Word Notes]

intelligence (noun) [Word Notes]

The process of turning raw information into intelligence products that leaders use to make decisions with.

25 Maj 20215min

Whaling attacks are more targeted than phishing or spearphishing.

Whaling attacks are more targeted than phishing or spearphishing.

Guest Kev Breen from Immersive Labs joins Dave to talk about how to address whaling attacks, Dave shares a discussion he had with. a colleague about password managers and elderly parents and Joe weigh...

20 Maj 202133min

Populärt inom Politik & nyheter

aftonbladet-krim
p3-krim
aftonbladet-daily
motiv
svenska-fall
politiken
flashback-forever
rss-krimstad
spar
rss-sanning-konsekvens
rss-krimreportrarna
rss-expressen-dok
rss-flodet
rss-vad-fan-hande
rss-frandfors-horna
blenda-2
olyckan-inifran
kungligt
dagens-eko
rss-aftonbladet-krim