It pays to do your research. [Hacking Humans Goes to the Movies}
Hacking Humans18 Sep 2022

It pays to do your research. [Hacking Humans Goes to the Movies}

Thanks for joining us again for another episode of fun project brought to you by the team of Hacking Humans, the CyberWire's social engineering podcast. Co-hosts Dave Bittner and Joe Carrigan are joined by Rick Howard in this series where they view clips from their favorite movies with examples of the social engineering scams and schemes you hear about on Hacking Humans. In this episode, Dave and Joe are joined on this episode by guest Tracy Maleeff from Krebs Stamos Group – you may know her on Twitter as @Infosecsherpa. Dave,Joe and Tracy watch and discuss Tracy;s and Joe's clips on this episode. They watch each of the selected scenes, describe the on-screen action for you, and then the team deconstructs what they saw. Grab your bowl of popcorn and join us for some Hollywood scams and frauds. Links to this episode's clips if you'd like to watch along: Tracy's clips from "Working Girl" Elevator scene Tess and Jack gatecrash a wedding scene Joe's clip from "Oceans 8"

Det här avsnittet är hämtat från ett öppet RSS-flöde och publiceras inte av Podme. Det kan innehålla reklam.

Avsnitt(770)

Log4j vulnerability (noun) [Word Notes]

Log4j vulnerability (noun) [Word Notes]

Please enjoy this encore of Word Notes. An open source Java-based software tool available from the Apache Software Foundation designed to log security and performance information.  CyberWire Glossa...

13 Maj 20259min

What’s inside the mystery box? Spoiler: It’s a scam!

What’s inside the mystery box? Spoiler: It’s a scam!

As Dave Bittner is at the RSA Conference this week, our hosts ⁠⁠Maria Varmazis and ⁠⁠Joe Carrigan⁠⁠, are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that a...

8 Maj 202546min

OWASP broken access control (noun) [Word Notes]

OWASP broken access control (noun) [Word Notes]

Please enjoy this encore of Word Notes. Software users are allowed access to data or functionality contrary to the defined zero trust policy by bypassing or manipulating the installed security contr...

6 Maj 20257min

The RMM protocol: Remote, risky, and ready to strike. [OMITB]

The RMM protocol: Remote, risky, and ready to strike. [OMITB]

Welcome in! You’ve entered, Only Malware in the Building. Join us each month to sip tea and solve mysteries about today’s most interesting threats. Your host is ⁠Selena Larson⁠, ⁠Proofpoint⁠ intellige...

6 Maj 202539min

The prince, the pretender, and the PSA.

The prince, the pretender, and the PSA.

As Maria is on vacation this week, our hosts ⁠Dave Bittner⁠ and ⁠Joe Carrigan⁠, are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. ...

1 Maj 202528min

OWASP security misconfiguration (noun) [Word Notes]

OWASP security misconfiguration (noun) [Word Notes]

Please enjoy this encore of Word Notes. The state of a web application when it's vulnerable to attack due to an insecure configuration.  CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/...

29 Apr 20257min

When AI lies, hackers rise.

When AI lies, hackers rise.

This week, our hosts Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of the T-Minus Space Daily show) are sharing the latest in social engineering scams, phishing schemes, and criminal explo...

24 Apr 202542min

OWASP insecure design (noun) [Word Notes]

OWASP insecure design (noun) [Word Notes]

Please enjoy this encore episode of Word Notes. A broad OWASP Top 10 software development category representing missing, ineffective, or unforeseen security measures. CyberWire Glossary link: https:/...

22 Apr 20258min

Populärt inom Politik & nyheter

aftonbladet-krim
p3-krim
aftonbladet-daily
politiken
rss-krimstad
motiv
flashback-forever
svenska-fall
spar
rss-sanning-konsekvens
rss-krimreportrarna
rss-vad-fan-hande
kungligt
rss-frandfors-horna
rss-flodet
blenda-2
svd-ledarredaktionen
olyckan-inifran
dagens-eko
rss-aftonbladet-krim