Fingerprinting fights off fraud? [Hacking Humans Goes to the Movies}
Hacking Humans26 Mars 2023

Fingerprinting fights off fraud? [Hacking Humans Goes to the Movies}

Thanks for joining us again for another episode of fun project brought to you by the team of Hacking Humans, the CyberWire's social engineering podcast. Hacking Humans co-host Dave Bittner is joined by Rick Howard in this series where they view clips from their favorite movies and television shows with examples of the social engineering scams and schemes you hear Dave and co-host Joe Carrigan talk about on Hacking Humans. In this episode, Dave and Rick watch each of the selected scenes, describe the on-screen action for you, and then they deconstruct what they saw. Grab your bowl of popcorn and join us for some fantastic scams and frauds. Links to this episode's clips if you'd like to watch along: Dave's clip from the movie I dream of Jeannie Rick's clip from the movie Ant Man

Det här avsnittet är hämtat från ett öppet RSS-flöde och publiceras inte av Podme. Det kan innehålla reklam.

Avsnitt(772)

backdoor (noun) [Word Notes]

backdoor (noun) [Word Notes]

An undocumented or publicly unknown method to access a computer system undetected or to break a cypher used to encode messages.

30 Mars 20215min

Technology is not designed for older users.

Technology is not designed for older users.

Guest Ming Yang of Orchard joins Dave to talk about ways to help your parents with technology (aka providing tech support for our parents). Dave shares the FBI's advisory warning of an expected increa...

25 Mars 202137min

watering hole attack (noun) {Word Notes]

watering hole attack (noun) {Word Notes]

From the intrusion kill chain model, a technique where the hacker compromises sites commonly visited by members of a targeted community in order to deliver a malicious payload to the intended victim.

23 Mars 20215min

Ideally, look for someone open to deception.

Ideally, look for someone open to deception.

Guest professional magician Brandon Williams talks with Joe about the art of deception. we have some follow-up on a watering hole attack we discussed a few episodes back, Joe's story is about the Atto...

18 Mars 202139min

network telescope (noun) [Word Notes]

network telescope (noun) [Word Notes]

Network observation systems designed to monitor globally unreachable but unused Internet address space or the Deep Web in order to study a wide range of interesting Internet phenomena.

16 Mars 20215min

Insider threats and security concerns for APIs.

Insider threats and security concerns for APIs.

Guest Inon Shkedy, security researcher at Traceable and API project leader at OWASP Foundation, talks with Dave about the risks various types of insider threats pose to APIs, we have some follow-up fr...

11 Mars 202138min

SOC Triad (noun) [Word Notes]

SOC Triad (noun) [Word Notes]

A best practice for framing cyber intelligence critical information requirements that recommends collecting and consolidating data from three specific sources: endpoint, network and log.

9 Mars 20215min

Fraud activity within secure messaging apps in plain sight.

Fraud activity within secure messaging apps in plain sight.

Guest Brittany Allen of Sift joins Dave to talk about a new fraud ring on Telegram where bad actors leverage the app to steal from on-demand food delivery services, Joe's story involves two of the fiv...

4 Mars 202141min

Populärt inom Politik & nyheter

aftonbladet-krim
p3-krim
aftonbladet-daily
motiv
svenska-fall
politiken
flashback-forever
rss-krimstad
spar
rss-sanning-konsekvens
rss-krimreportrarna
rss-expressen-dok
rss-flodet
rss-vad-fan-hande
rss-frandfors-horna
blenda-2
olyckan-inifran
kungligt
dagens-eko
rss-aftonbladet-krim