An optional security mode for macOS and iOS that reduces the attack surface of the operating system by disabling certain commonly attacked features.
Audio reference link: “How NSO Group’s Pegasus Sp…
This week Carole Theriault sits down to interview author Jamie Bartlett on his book, "The Missing Cryptoqueen - The Billion Dollar Cryptocurrency Con and the Woman Who Got Away with It." Dave and Joe…
A security awareness training technique in which authorized, but fake phishing emails are sent to employees in order to measure and improve their resistance to real phishing attacks.
CyberWire Gloss…
Guest Jane Lee, Trust and Safety Architect from Sift joins Dave to discuss the rise of fraudulent online content and fake crypto platforms. Dave and Joe share some listener follow up regarding the de…
The process of installing applications on a device without the use of official software distribution channels.
CyberWire Glossary link: https://thecyberwire.com/glossary/sideloading
Thanks for joining us again for another episode of fun project brought to you by the team of Hacking Humans, the CyberWire's social engineering podcast. Co-hosts Dave Bittner and Joe Carrigan are joi…
Dov Lerner, a Security Research Lead from Cybersixgill, sits down with Dave to discuss how inflation hasn't affected the Dark Web, including how the cratering of cryptocurrency may have affected thin…
A zero trust security technique that isolates application workloads from each other, allowing each one to be protected individually.
CyberWire Glossary link: https://thecyberwire.com/glossary/microse…
Greg Otto from Intel 471 joins Dave to discuss the findings of their work on "Cybercriminals preying on a travel surge with a host of different scams." Dave and Joe share some interesting listener fo…
The use of similar-looking characters in a phishing URL to spoof a legitimate site.
CyberWire Glossary link:
Audio reference link: “Mission Impossible III 2006 Masking 01,” uploaded by DISGUISE MASK,…
This week Carole Theriault interviews Chuck Everette from Deep Instinct on public and private partnerships. Dave and Joe share some listener follow up from Rodney who writes in about flexible spendin…
The deployment of rules to the security stack across all data islands, cloud, SaaS applications, data centers, and mobile devices designed to manifest an organization's cybersecurity first principle …
Guest Etay Maor of Cato Networks joins Dave Bittner to discuss the impact that deepfakes will have on our society, we share some fun feedback on the Lightning Rod story edit, Dave's story talks about…
Software designed to prevent cheating in video games.
CyberWire Glossary link: https://thecyberwire.com/glossary/anti-cheat-software
Audio reference link: “The BIG Problem with Anti-Cheat,” by Techq…
Mallory Sofastaii from Baltimore's WMAR 2 News sits down with Joe to talk about some recent stories on scams she's covered on Matter for Mallory. Dave and Joe share some listener follow up from Rober…
Malware, in the guise of ransomware, that destroys data rather than encrypts.
CyberWire Glossary link: https://thecyberwire.com/glossary/pseudoransomware
Audio reference link: “Some Men Just Want to …
Ari Parker, Lead Advisor from Chapter, discussing "Tips for Avoiding Medicare Scams." Joe and Dave share some follow up from several listeners, who write in about various scams they have encountered.…
A browser configuration control that prevents accessing resources within a private network.
CyberWire Glossary link:
Audio reference link: “TPM (Trusted Platform Module) - Computerphile,” Computerphi…
Raj Sarkar, CMO from 1Password and Julien Benichou, Senior Director of Partnership, Strategy, and Execution from Gen.G, join Dave to discuss making the online world a safer place and talk about helpi…
A browser configuration control that prevents accessing resources within a private network.
CyberWire Glossary link:
Audio reference link: “Chrome Limits Access to Private Networks,” by Daniel Lowrie…
00:05:36 |
Tue 02 Aug 2022
Disclaimer: The podcast and artwork embedded on this page are the property of N2K Networks, Inc.. This content is not affiliated with or endorsed by eachpod.com.