From the intrusion kill chain model, the first part of an exploitation technique where the hacker tricks their victims into revealing their login credentials. In the second part of the technique, hackers legitimately log into the targeted system and gain access to the underlying network with the same permissions as the victim. Hackers use this method 80% of the time compared to other ways to gain access to a system like developing zero day exploits for known software packages. The most common way hackers steal credentials is with some version of a phishing attack.
Advanced Encryption Standard (AES) (noun) [Word Notes]
Sisters, grifters, and shifters. [Hacking Humans Goes to the Movies]
The CyberWire: The 12 Days of Malware.[Special Editions]
How to avoid Instagram scams.
Data Loss Protection (DLP) (noun) [Word Notes]
Sometimes it's scripted and others, it's a target of opportunity. [Hacking Humans Goes to the Movies]
Disinformation and verification.
Domain Naming System (DNS) (noun) [Word Notes]
Keeping the scams in the family. [Hacking Humans Goes to the Movies]
Do not get your news on social media.
Pretexting (noun) [Word Notes]
A vishing competition and a Black Badge holder.
Web Application Firewall (noun) [Word Notes]
Counterfeit coupons and paybacks. [Hacking Humans Goes to the Movies]
COBIT (noun) [Word Notes]
Ways to make fraud less lucrative.
Security Service Edge (SSE) (noun) [Word Notes]
New laws and the effect on small businesses.
Domain spoofing (noun) [Word Notes]
Protecting your identity.
Create your
podcast in
minutes
It is Free
Insight Story: Tech Trends Unpacked
Zero-Shot
Fast Forward by Tomorrow Unlocked: Tech past, tech future
The Unbelivable Truth - Series 1 - 26 including specials and pilot
Lex Fridman Podcast