From the intrusion kill chain model, the first part of an exploitation technique where the hacker tricks their victims into revealing their login credentials. In the second part of the technique, hackers legitimately log into the targeted system and gain access to the underlying network with the same permissions as the victim. Hackers use this method 80% of the time compared to other ways to gain access to a system like developing zero day exploits for known software packages. The most common way hackers steal credentials is with some version of a phishing attack.
What's Your Problem trailer.
Secure Web Gateway (noun) [Word Notes]
The Malware Mash! [Bonus]
Setting tech limits with a new tool.
Indicators of Compromise (noun) [Word Notes]
The difference between shallow fakes vs. deep fakes.
Intrusion Detection System (noun) [Word Notes]
The long con and the flim flam. [Hacking Humans Goes to the Movies]
Falling for a phishing kit scam.
MFA prompt bombing (noun) [Word Notes]
What is cyber quantum computing?
Apple Lockdown Mode (noun) [Word Notes]
A cryptoqueen on the run and the cons she got away with.
Simulated Phishing (noun) [Word Notes]
The rise in fraudulent online content.
Sideloading (noun) [Word Notes]
It pays to do your research. [Hacking Humans Goes to the Movies}
Is inflation affecting the Dark Web?
Microsegmentation (noun) [Word Notes]
A travel surge and a host of different scams.
Create your
podcast in
minutes
It is Free
Insight Story: Tech Trends Unpacked
Zero-Shot
Fast Forward by Tomorrow Unlocked: Tech past, tech future
The Unbelivable Truth - Series 1 - 26 including specials and pilot
Lex Fridman Podcast