Sometimes a fun game, a friendly email, or an innocuous link can be the most convenient place for an enemy to hide. And its prey is none the wiser—until it strikes. The trojan horse uses many layers of deception to do damage. The ingenuity of these attacks keeps an alarming pace with the technology we use every day. But as long as we stick to trusted sites and sources, we can better the odds against those who use our trusting nature against us.
Steve Weisman tells us about how trojans still keep security professionals on the defensive. Josephine Wolff details how these attacks have evolved, and keep evolving, to catch victims off guard. And Yanick Franantonio takes on the new frontier for trojan attacks.
If you want to read up on some of our research on trojans, you can check out all our bonus material over at redhat.com/commandlineheroes.
Follow along with the episode transcript.
All Together Now
Invisible Intruders
Ruthless Ransomers
Menace in the Middle
Dawn of the Botnets
Lurking Logic Bombs
Relentless Replicants
Command Line Heroes Season 9: The Horrors of Malware
Robot as Vehicle
Robot as Threat
Humans as Robot Caretakers
Robot as Body
From Compiler: Do We Want A World Without Technical Debt?
Robot as Humanoid
Robot as Maker
Robot as Software
Robot as Servant
Command Line Heroes Season 8: Broadcasting the Robot Revolution
After the Bubble
Create your
podcast in
minutes
It is Free
Command Line Heroes en español