Fingerprinting fights off fraud? [Hacking Humans Goes to the Movies}
Hacking Humans26 Mars 2023

Fingerprinting fights off fraud? [Hacking Humans Goes to the Movies}

Thanks for joining us again for another episode of fun project brought to you by the team of Hacking Humans, the CyberWire's social engineering podcast. Hacking Humans co-host Dave Bittner is joined by Rick Howard in this series where they view clips from their favorite movies and television shows with examples of the social engineering scams and schemes you hear Dave and co-host Joe Carrigan talk about on Hacking Humans. In this episode, Dave and Rick watch each of the selected scenes, describe the on-screen action for you, and then they deconstruct what they saw. Grab your bowl of popcorn and join us for some fantastic scams and frauds. Links to this episode's clips if you'd like to watch along: Dave's clip from the movie I dream of Jeannie Rick's clip from the movie Ant Man

Det här avsnittet är hämtat från ett öppet RSS-flöde och publiceras inte av Podme. Det kan innehålla reklam.

Avsnitt(772)

Unix (noun) [Word Notes]

Unix (noun) [Word Notes]

A family of multitasking, multi-user computer operating systems that derive from the original Unix system built by Ken Thompson and Dennis Ritchie in the 1960s.

5 Jan 20215min

fuzzing (noun) [Word Notes]

fuzzing (noun) [Word Notes]

An automatic software bug and vulnerability discovery technique that input's invalid, unexpected and/or random data or fuzz into a program and then monitors the program's reaction to it.

5 Jan 20215min

Encore: Don't go looking for morality here. [Hacking Humans]

Encore: Don't go looking for morality here. [Hacking Humans]

Dave has a story of an investment scam featuring celebrities, Joe warns of scams surrounding the Coronavirus, the Catch of the Day features Joe's son-in-law's adventure with thousands of bot infiltrat...

31 Dec 202038min

deep packet inspection (DPI) (noun) [Word Notes]

deep packet inspection (DPI) (noun) [Word Notes]

A network monitoring and filtering technique that examines both the header information and the payload of every packet traversing a network access point.

29 Dec 20205min

Encore: Separating fools from money. [Hacking Humans]

Encore: Separating fools from money. [Hacking Humans]

Dave shares a story of airport penetration testing with high degree of yuck-factor. Joe explores research on protecting passwords from social engineering. The catch-of-the-day comes courtesy of Graham...

24 Dec 202030min

rootkit (noun) [Word Notes]

rootkit (noun) [Word Notes]

A clandestine set of applications designed to give hackers access and control over a target device.

22 Dec 20206min

tactics, techniques and procedures (TTPs) (noun) [Word Notes]

tactics, techniques and procedures (TTPs) (noun) [Word Notes]

A set of behaviors that precisely describes a cyber adversary attack campaign.

22 Dec 20206min

Phishing lures that may be in your inbox soon, and how to deal "left of bang."

Phishing lures that may be in your inbox soon, and how to deal "left of bang."

Joe talks about phishing lures with holiday packages, current events, and things he expects to see in your inbox soon, Dave's shares a blog post on how to troll a Nigerian prince, The Catch of the Day...

17 Dec 202037min

Populärt inom Politik & nyheter

aftonbladet-krim
p3-krim
aftonbladet-daily
motiv
svenska-fall
politiken
flashback-forever
rss-krimstad
spar
rss-sanning-konsekvens
rss-krimreportrarna
rss-expressen-dok
rss-flodet
rss-vad-fan-hande
rss-frandfors-horna
blenda-2
olyckan-inifran
kungligt
dagens-eko
rss-aftonbladet-krim