Hacking Humans
Deception, influence, and social engineering in the world of cyber crime.

Avsnitt(767)

rogue access point (noun) [Word Notes]

rogue access point (noun) [Word Notes]

1. A wireless access point installed by employees in an office or data center environment as a convenience to connectivity without the consent or the knowledge of the network manager. 2. A wireless ac...

20 Okt 20204min

Use a Dance Dance Revolution floor lock for your data centers.

Use a Dance Dance Revolution floor lock for your data centers.

Starting with some listener follow-up on password managers, Joe's story has an angel investor bilking people out of due diligence fees, Dave's story comes from Graham Cluley on a malware campaign talk...

15 Okt 202036min

darknet (noun)  [Word Notes]

darknet (noun) [Word Notes]

A subset of the internet where communications between two parties or client-server transactions are obscured from search engines and surveillance systems by layers of encryption. The U.S. Navy designe...

13 Okt 20204min

Don't click any button...even the 'No' button.

Don't click any button...even the 'No' button.

Dave's story is about how some adware took a turn for the worse (and how his dad has fallen adware in the past), Joe's story talks about how someone is trying to phish AT&T employees and others, The C...

8 Okt 202042min

phishing (verb) [Word Notes]

phishing (verb) [Word Notes]

From the intrusion kill chain model, the delivery of a “lure” to a potential victim by pretending to be some trustworthy person or organization in order to trick the victim into revealing sensitive in...

6 Okt 20204min

Cookies make for some tasty phishing lure.

Cookies make for some tasty phishing lure.

In addition to his regular story Dave shares a situation where his mom almost took the bait, Dave's story is about an SMS phishing (smishing) Apple scam in UK (ps, there's never a free iPhone & Joe is...

1 Okt 202036min

credential stealing (verb) [Word Notes]

credential stealing (verb) [Word Notes]

From the intrusion kill chain model, the first part of an exploitation technique where the hacker tricks their victims into revealing their login credentials. In the second part of the technique, hack...

29 Sep 20203min

It's human nature.

It's human nature.

Dave and Joe have some follow-up from a listener on OG accounts, Joe's story talks about a new phishing campaign inspired by Twitter from earlier this summer, Dave shares a story about using security ...

24 Sep 202033min

Populärt inom Politik & nyheter

aftonbladet-krim
rss-krimstad
p3-krim
spar
svenska-fall
aftonbladet-daily
politiken
flashback-forever
rss-expressen-dok
rss-sanning-konsekvens
rss-krimreportrarna
kungligt
ett-rent-noje
rss-vad-fan-hande
motiv
blenda-2
grans
rss-frandfors-horna
rss-flodet
krimmagasinet