Hacking Humans
Deception, influence, and social engineering in the world of cyber crime.

Avsnitt(769)

Hustling the hustlers. [Hacking Humans Goes to the Movies]

Hustling the hustlers. [Hacking Humans Goes to the Movies]

Thanks for joining us for the latest episode of our fun project brought to you by the team of Hacking Humans, the CyberWire's social engineering podcast. Co-hosts Dave Bittner and Joe Carrigan are joi...

20 Feb 202221min

Vulnerabilities will be found.

Vulnerabilities will be found.

Guest Deral Heiland from Rapid7 talks with our UK Correspondent Carole Theriault about the state of IOT, Joe shares a personal story about bank checks and a debit card received at his home that were i...

17 Feb 202247min

OWASP security logging and monitoring failures (noun) [Word Notes]

OWASP security logging and monitoring failures (noun) [Word Notes]

The absence of telemetry that could help network defenders detect and respond to hostile attempts to compromise a system.

15 Feb 20226min

If you wish for peace, prepare for cyberwar.

If you wish for peace, prepare for cyberwar.

Guest Nick Shevelyov, Chief Security Officer for Silicon Valley Bank. joins Dave sharing some personal history around security, and discussing his book "Cyber War… and Peace," Dave and Joe have some f...

10 Feb 202249min

OWASP identification and authentication failures (noun) [Word Notes]

OWASP identification and authentication failures (noun) [Word Notes]

Ineffectual confirmation of a user's identity or authentication in session management.

8 Feb 20225min

How to talk your way in anywhere. [Hacking Humans Goes to the Movies]

How to talk your way in anywhere. [Hacking Humans Goes to the Movies]

Thanks for joining us for the latest episode of our fun project brought to you by the team of Hacking Humans, the CyberWire's social engineering podcast. Co-hosts Dave Bittner and Joe Carrigan are joi...

6 Feb 202222min

The ransomware game has evolved.

The ransomware game has evolved.

Guest Allan Liska from Recorded Future joins Dave to discuss the evolution of ransomware and his new book "Ransomware: Understand. Prevent. Recover," Joe shares a question from listener Joan about an ...

3 Feb 202252min

OWASP broken access control (noun) [Word Notes]

OWASP broken access control (noun) [Word Notes]

Software users are allowed access to data or functionality contrary to the defined zero trust policy by bypassing or manipulating the installed security controls.

1 Feb 20227min

Populärt inom Politik & nyheter

aftonbladet-krim
p3-krim
politiken
aftonbladet-daily
rss-krimstad
svenska-fall
spar
flashback-forever
rss-expressen-dok
rss-krimreportrarna
kungligt
rss-sanning-konsekvens
rss-vad-fan-hande
ett-rent-noje
rss-frandfors-horna
motiv
rss-flodet
blenda-2
krimmagasinet
svd-ledarredaktionen