Listen to a podcast, please open Podcast Republic app. Available on Google Play Store and Apple App Store.
Chris Libera
Sep 11, 2020
Very well made and informative.
Episode | Date |
---|---|
Encore: The age old battle between social engineering and banking.
|
Nov 30, 2023 |
Encore: business email compromise or BEC (noun) [Word Notes]
|
Nov 28, 2023 |
Cops in the catfish game.
|
Nov 23, 2023 |
HIPAA (noun) [Word Notes]
|
Nov 21, 2023 |
Unmasking the deceptive.
|
Nov 16, 2023 |
Encore: man trap (noun) [Word Notes]
|
Nov 14, 2023 |
Leaving a trail of digital breadcrumbs.
|
Nov 09, 2023 |
Common Vulnerability Scoring System (CVSS) (noun) [Word Notes]
|
Nov 07, 2023 |
Weaponizing your out-of-office replies.
|
Nov 02, 2023 |
Encore: anagram (noun) [Word Notes]
|
Oct 31, 2023 |
Spooky, scary, skeletons at the movies. [Hacking humans goes to the movies]
|
Oct 29, 2023 |
Scams, scams, and more scams.
|
Oct 26, 2023 |
Encore: zero-day (adjective) [Word Notes]
|
Oct 24, 2023 |
Scoring cybersecurity in the NFL.
|
Oct 19, 2023 |
extended detection response (XDR) (noun) [Word Notes]
|
Oct 17, 2023 |
Encore: Ways to make fraud less lucrative.
|
Oct 12, 2023 |
Encore: social engineering (noun)
|
Oct 10, 2023 |
Encore: Is inflation affecting the Dark Web?
|
Oct 05, 2023 |
joint cyber defense collaborative (JCDC) (noun) [Word Notes]
|
Oct 03, 2023 |
Stealing your car's identity.
|
Sep 28, 2023 |
Encore: penetration test (noun) [Word Notes]
|
Sep 26, 2023 |
Rooting vs routing. [Hacking Humans Goes to the Movies]
|
Sep 24, 2023 |
Hackers play the evasion game.
|
Sep 21, 2023 |
Cloud Security Posture Management (CSPM) (noun) [Word Notes]
|
Sep 19, 2023 |
The online dating world is a jungle.
|
Sep 14, 2023 |
Encore: The Bombe (noun) [Word Notes]
|
Sep 12, 2023 |
Passkeys: consumer-friendly password killers?
|
Sep 07, 2023 |
single sign-on (SSO) (noun) [Word Notes]
|
Sep 05, 2023 |
Exercise caution: online shopping edition.
|
Aug 31, 2023 |
Encore: cross-site scripting (noun) [Word Notes]
|
Aug 29, 2023 |
Hunting the hackers.
|
Aug 24, 2023 |
Encore: credential stealing (verb) [Word Notes]
|
Aug 22, 2023 |
AI versus AI.
|
Aug 17, 2023 |
two-factor authentication (noun) [Word Notes]
|
Aug 15, 2023 |
AI: A battle between heroes and villains.
|
Aug 10, 2023 |
Encore: phishing (verb) [Word Notes]
|
Aug 08, 2023 |
Are you pretending to be Russian? [Hacking humans goes to the movies]
|
Aug 05, 2023 |
Privacy matters when it comes to ChatGPT.
|
Aug 03, 2023 |
iCloud keychain (noun) [Word Notes]
|
Aug 01, 2023 |
Reducing risk in the cyber community.
|
Jul 27, 2023 |
Encore: darknet (noun) [Word Notes]
|
Jul 25, 2023 |
Barking up the wrong Facebook page.
|
Jul 20, 2023 |
Encore: rogue access point (noun) [Word notes]
|
Jul 18, 2023 |
Encore: The rise in fraudulent online content.
|
Jul 13, 2023 |
Encore: NMAP (noun) [Word Notes]
|
Jul 11, 2023 |
Indicators to insider threats.
|
Jul 06, 2023 |
Encore: Diamond Model (noun) [Word Notes]
|
Jul 04, 2023 |
Beware ChatGPT curious: Fleece-ware chabot apps.
|
Jun 29, 2023 |
CISA (noun) [Word Notes]
|
Jun 27, 2023 |
spam (noun) [Word Notes]
|
Jun 27, 2023 |
Risky chat applications.
|
Jun 22, 2023 |
CISA (noun) [Word Notes]
|
Jun 20, 2023 |
Replier attacks: the latest tool in a hacker's arsenal.
|
Jun 15, 2023 |
dumpster diving (noun) [Word Notes]
|
Jun 13, 2023 |
Criminals...assemble! [Hacking humans goes to the movies]
|
Jun 11, 2023 |
The rise of ChatGPT: A look into the future of chatbots.
|
Jun 08, 2023 |
SEO poisoning (noun) [Word Notes]
|
Jun 06, 2023 |
Are you who you say you are?
|
Jun 01, 2023 |
passkey (noun) [Word Notes]
|
May 30, 2023 |
catfish (noun) [Word Notes]
|
May 30, 2023 |
Bringing in the human side of scamming.
|
May 25, 2023 |
QR code phishing (noun) [Word Notes]
|
May 23, 2023 |
Who says the perfect heist doesn't exist? [Hacking Humans Goes to the Movies]
|
May 21, 2023 |
Data privacy in a consumers world.
|
May 18, 2023 |
attribution (noun) [Word Notes]
|
May 16, 2023 |
Remedies for infectious computers.
|
May 11, 2023 |
spear phishing (noun) [Word Notes]
|
May 09, 2023 |
Encore: Human errors and why they're made.
|
May 04, 2023 |
resiliency (noun) [Word Notes]
|
May 02, 2023 |
Is the industry ready for AI?
|
Apr 27, 2023 |
Security Operations Center (SOC) (noun) [Word Notes]
|
Apr 25, 2023 |
Lazarus Group: Breaking down the evolution.
|
Apr 20, 2023 |
Hunt forward operations (noun) [Word Notes]
|
Apr 18, 2023 |
Inside the history of a child hacker.
|
Apr 13, 2023 |
Cyber gravity (noun) [Word Notes]
|
Apr 11, 2023 |
As a scammer, sometimes you need to fake it till you make it. [Hacking Humans Goes to the Movies]
|
Apr 09, 2023 |
Protecting against financial cybercrimes.
|
Apr 06, 2023 |
Artificial Intelligence (AI) (noun) [Word Notes]
|
Apr 04, 2023 |
Seeking employment fraud?
|
Mar 30, 2023 |
Certification (noun) [Word Notes]
|
Mar 28, 2023 |
Fingerprinting fights off fraud? [Hacking Humans Goes to the Movies}
|
Mar 26, 2023 |
Do you have curtains on your house?
|
Mar 23, 2023 |
Network slicing (noun) [Word Notes]
|
Mar 21, 2023 |
Changing the face of identity.
|
Mar 16, 2023 |
Device trust (noun) [Word Notes]
|
Mar 14, 2023 |
Encore: Scams in the media.
|
Mar 09, 2023 |
ZTNA (noun) [Word Notes]
|
Mar 07, 2023 |
Saving the world from cybercrime.
|
Mar 02, 2023 |
GDPR (noun) [Word Notes]
|
Feb 28, 2023 |
Password managers and their benefits.
|
Feb 23, 2023 |
ChatGPT (noun) [Word Notes]
|
Feb 21, 2023 |
Scamming through generations.
|
Feb 16, 2023 |
Man-in-the-Middle (noun) [Word Notes]
|
Feb 14, 2023 |
Appearances count in the scam business. [Hacking Humans Goes to the Movies]
|
Feb 12, 2023 |
A boom of infostealers and stolen credentials.
|
Feb 09, 2023 |
NIST (Noun) [Word Notes]
|
Feb 07, 2023 |
A war on commerce.
|
Feb 02, 2023 |
CIRT (noun) [Word Notes]
|
Jan 31, 2023 |
Interview with the AI, part one. [Special Editions]
|
Jan 29, 2023 |
Outsmarting the scammers.
|
Jan 26, 2023 |
PUP (noun) [Word Notes]
|
Jan 24, 2023 |
The front lines of ransomware attacks.
|
Jan 19, 2023 |
Ransomware (noun) [Word Notes]
|
Jan 17, 2023 |
The age old battle between social engineering and banking.
|
Jan 12, 2023 |
Service Set Identifier (SSID) (noun) [Word Notes]
|
Jan 10, 2023 |
Leveraging credentials online and off isn't going away.
|
Jan 05, 2023 |
Advanced Encryption Standard (AES) (noun) [Word Notes]
|
Jan 03, 2023 |
Sisters, grifters, and shifters. [Hacking Humans Goes to the Movies]
|
Dec 29, 2022 |
The CyberWire: The 12 Days of Malware.[Special Editions]
|
Dec 25, 2022 |
How to avoid Instagram scams.
|
Dec 22, 2022 |
Data Loss Protection (DLP) (noun) [Word Notes]
|
Dec 20, 2022 |
Sometimes it's scripted and others, it's a target of opportunity. [Hacking Humans Goes to the Movies]
|
Dec 18, 2022 |
Disinformation and verification.
|
Dec 15, 2022 |
Domain Naming System (DNS) (noun) [Word Notes]
|
Dec 13, 2022 |
Keeping the scams in the family. [Hacking Humans Goes to the Movies]
|
Dec 11, 2022 |
Do not get your news on social media.
|
Dec 08, 2022 |
Pretexting (noun) [Word Notes]
|
Dec 06, 2022 |
A vishing competition and a Black Badge holder.
|
Dec 01, 2022 |
Web Application Firewall (noun) [Word Notes]
|
Nov 29, 2022 |
Counterfeit coupons and paybacks. [Hacking Humans Goes to the Movies]
|
Nov 24, 2022 |
COBIT (noun) [Word Notes]
|
Nov 22, 2022 |
Ways to make fraud less lucrative.
|
Nov 17, 2022 |
Security Service Edge (SSE) (noun) [Word Notes]
|
Nov 15, 2022 |
New laws and the effect on small businesses.
|
Nov 10, 2022 |
Domain spoofing (noun) [Word Notes]
|
Nov 08, 2022 |
What's Your Problem trailer.
|
Nov 03, 2022 |
Protecting your identity.
|
Nov 03, 2022 |
Secure Web Gateway (noun) [Word Notes]
|
Nov 01, 2022 |
The Malware Mash! [Bonus]
|
Oct 28, 2022 |
Setting tech limits with a new tool.
|
Oct 27, 2022 |
Indicators of Compromise (noun) [Word Notes]
|
Oct 25, 2022 |
The difference between shallow fakes vs. deep fakes.
|
Oct 20, 2022 |
Intrusion Detection System (noun) [Word Notes]
|
Oct 18, 2022 |
The long con and the flim flam. [Hacking Humans Goes to the Movies]
|
Oct 16, 2022 |
Falling for a phishing kit scam.
|
Oct 13, 2022 |
MFA prompt bombing (noun) [Word Notes]
|
Oct 11, 2022 |
What is cyber quantum computing?
|
Oct 06, 2022 |
Apple Lockdown Mode (noun) [Word Notes]
|
Oct 04, 2022 |
A cryptoqueen on the run and the cons she got away with.
|
Sep 29, 2022 |
Simulated Phishing (noun) [Word Notes]
|
Sep 27, 2022 |
The rise in fraudulent online content.
|
Sep 22, 2022 |
Sideloading (noun) [Word Notes]
|
Sep 20, 2022 |
It pays to do your research. [Hacking Humans Goes to the Movies}
|
Sep 18, 2022 |
Is inflation affecting the Dark Web?
|
Sep 15, 2022 |
Microsegmentation (noun) [Word Notes]
|
Sep 13, 2022 |
A travel surge and a host of different scams.
|
Sep 08, 2022 |
Homograph phishing (noun) [Word Notes]
|
Sep 06, 2022 |
Is there a growing number of public and private partnerships forming?
|
Sep 01, 2022 |
Policy Orchestration (noun) [Word Notes]
|
Aug 30, 2022 |
Encore: Sometimes, deepfake victims don't want to be convinced it is fake.
|
Aug 25, 2022 |
Anti-cheat software (noun) [Word Notes]
|
Aug 23, 2022 |
Scams in the media.
|
Aug 18, 2022 |
Pseudoransomware (noun) [Word Notes]
|
Aug 16, 2022 |
Staying away from Medicare scams.
|
Aug 11, 2022 |
Trusted Platform Module (TPM) (noun) [Word Notes]
|
Aug 09, 2022 |
Making the world a safer online place.
|
Aug 04, 2022 |
Private Network Access (PNA) (noun) [Word Notes]
|
Aug 02, 2022 |
A return to office means a return to email scams.
|
Jul 28, 2022 |
Extortion scams and the LGBTQ+ community.
|
Jul 21, 2022 |
Web 3.0 (noun)
|
Jul 19, 2022 |
Behavioral science in the world of InfoSec.
|
Jul 14, 2022 |
Identity access management (IAM) (noun) [Word Notes]
|
Jul 12, 2022 |
Human errors and why they're made.
|
Jul 07, 2022 |
Abstraction layer (noun) [Word Notes]
|
Jul 05, 2022 |
The top 10 brand names most likely used in a phishing scheme.
|
Jun 30, 2022 |
Identity Fabric (noun) [Word Notes]
|
Jun 28, 2022 |
North Korea and a global cyber war.
|
Jun 23, 2022 |
Intrusion Kill Chain (noun) [Word Notes]
|
Jun 21, 2022 |
The great resignation and data exposure challenges.
|
Jun 16, 2022 |
Identity Orchestration (noun) [Word Notes]
|
Jun 14, 2022 |
What to look out for with scan-and-exploit cyber attacks.
|
Jun 09, 2022 |
Diamond Model (noun) [Word Notes]
|
Jun 07, 2022 |
Is ransomware getting too fast?
|
Jun 02, 2022 |
MITRE ATT&CK (noun) [Word Notes]
|
May 31, 2022 |
Combating social engineering.
|
May 26, 2022 |
DevOps (noun) [Word Notes]
|
May 24, 2022 |
Voice authentication taking hold.
|
May 19, 2022 |
MITRE ATT&CK (noun) [Word Notes]
|
May 17, 2022 |
Business phishing: Who's biting the bait?
|
May 12, 2022 |
Waterfall Software Development Method (noun) [Word Notes]
|
May 10, 2022 |
Encore: The attackers keep coming every single day.
|
May 05, 2022 |
Agile Software Development Method (noun) [Word Notes]
|
May 03, 2022 |
The dark side of business email attacks.
|
Apr 28, 2022 |
Pegasus (noun) [Word Notes]
|
Apr 26, 2022 |
Cons through and through. [Hacking Humans Goes to the Movies]
|
Apr 24, 2022 |
On the front lines of fraud protection.
|
Apr 21, 2022 |
Domain-based Message Authentication Reporting Conformance (DMARC) (noun) [Word Notes]
|
Apr 19, 2022 |
Magic, illusion, and scams, oh my.
|
Apr 14, 2022 |
Shields Up (noun) [Word Notes]
|
Apr 12, 2022 |
Online threats turned real world danger.
|
Apr 07, 2022 |
Software Assurance Maturity Model (SAMM) (noun) [Word Notes]
|
Apr 05, 2022 |
Robocall scams and the psychology surrounding them.
|
Mar 31, 2022 |
Universal 2nd Factor (U2F) [Word Notes]
|
Mar 29, 2022 |
Cons: the short one and the first one. [Hacking Humans Goes to the Movies]
|
Mar 27, 2022 |
What's behind Buy Now, Pay Later scams?
|
Mar 24, 2022 |
adversary group naming (noun) [Word Notes]
|
Mar 22, 2022 |
Data privacy: is it black and white when it comes to your kids?
|
Mar 17, 2022 |
BSIMM (noun) [Word Notes]
|
Mar 15, 2022 |
Technology's effects on students during the pandemic.
|
Mar 10, 2022 |
OWASP vulnerable and outdated components (noun) [Word Notes]
|
Mar 08, 2022 |
Phishing seems to be cyclical and thematic.
|
Mar 03, 2022 |
OWASP software and data integrity failures (noun) [Word Notes]
|
Mar 01, 2022 |
A blurring of lines between nation states and criminals.
|
Feb 24, 2022 |
OWASP server-side request forgery (noun) [Word Notes]
|
Feb 22, 2022 |
Hustling the hustlers. [Hacking Humans Goes to the Movies]
|
Feb 20, 2022 |
Vulnerabilities will be found.
|
Feb 17, 2022 |
OWASP security logging and monitoring failures (noun) [Word Notes]
|
Feb 15, 2022 |
If you wish for peace, prepare for cyberwar.
|
Feb 10, 2022 |
OWASP identification and authentication failures (noun) [Word Notes]
|
Feb 08, 2022 |
How to talk your way in anywhere. [Hacking Humans Goes to the Movies]
|
Feb 06, 2022 |
The ransomware game has evolved.
|
Feb 03, 2022 |
OWASP broken access control (noun) [Word Notes]
|
Feb 01, 2022 |
Useful ransomware protection for you.
|
Jan 27, 2022 |
OWASP security misconfiguration (noun) [Word Notes]
|
Jan 25, 2022 |
The perfect environment for ATOs (account takeovers) to breed.
|
Jan 20, 2022 |
OWASP insecure design (noun)
|
Jan 18, 2022 |
The only locks you should pick are your own.
|
Jan 13, 2022 |
Log4j vulnerability (noun) [Word Notes]
|
Jan 11, 2022 |
Changing the game on ransomware.
|
Jan 06, 2022 |
OWASP injection (noun) [Word Notes]
|
Jan 04, 2022 |
Identity "protection" and a pigeon drop. [Hacking Humans Goes to the Movies]
|
Dec 30, 2021 |
Encore: zero trust (noun) [Word Notes]
|
Dec 28, 2021 |
The CyberWire: The 12 Days of Malware.
|
Dec 25, 2021 |
Hustling the hustler and three-card Monte. [Hacking Humans Goes to the Movies]
|
Dec 24, 2021 |
Even if a cause moves you, do your due diligence.
|
Dec 23, 2021 |
Conmen come in many flavors, all motivated by greed. [Hacking Humans Goes to the Movies]
|
Dec 22, 2021 |
OWASP cryptographic failures (noun) [Word Notes]
|
Dec 21, 2021 |
The 3 M's: Minimize, monitor and manage.
|
Dec 16, 2021 |
account takeover prevention (noun) [Word Notes]
|
Dec 14, 2021 |
Scams abound this time of year.
|
Dec 09, 2021 |
threat hunting (noun) [Word Notes]
|
Dec 07, 2021 |
Do you really want that device to be a connected device?
|
Dec 02, 2021 |
vulnerability management (noun) [Word Notes]
|
Nov 30, 2021 |
Misdirection and layering with a con in the middle. [Hacking Humans Goes to the Movies]
|
Nov 25, 2021 |
software bill of materials (SBOM) (noun) [Word Notes]
|
Nov 23, 2021 |
A good amount of skepticism helps protect you online.
|
Nov 18, 2021 |
zero trust (noun) [Word Notes]
|
Nov 16, 2021 |
Let's go to the movies. [Hacking Humans Goes to the Movies]
|
Nov 11, 2021 |
OT security (noun) [Word Notes]
|
Nov 09, 2021 |
Cybersecurity awareness should be a year-round activity.
|
Nov 04, 2021 |
cybersecurity skills gap (noun) [Word Notes]
|
Nov 02, 2021 |
The Malware Mash!
|
Oct 29, 2021 |
Good grammar is essential for business email compromise.
|
Oct 28, 2021 |
digital transformation (noun) [Word Notes]
|
Oct 26, 2021 |
Joekens, Bittnercoins, and the serious impacts of spam analysis.
|
Oct 21, 2021 |
bulletproof hosting (noun) [Word Notes]
|
Oct 19, 2021 |
Physical pen testing: You've got to be able to think on your feet.
|
Oct 14, 2021 |
endpoint security (noun) [Word Notes]
|
Oct 12, 2021 |
Measuring security awareness proactively.
|
Oct 07, 2021 |
Executive Order on Improving the Nation's Cybersecurity (noun) [Word Notes]
|
Oct 05, 2021 |
Capture the Flag, Black Badges and social engineering tricks.
|
Sep 30, 2021 |
lateral movement (noun) [Word Notes]
|
Sep 28, 2021 |
They won't ask for sensitive information over the phone.
|
Sep 23, 2021 |
common vulnerabilities and exposures (CVE) (noun) [Word Notes]
|
Sep 21, 2021 |
Sometimes, deepfake victims don't want to be convinced it is fake.
|
Sep 16, 2021 |
dead-box forensics (noun) [Word Notes]
|
Sep 14, 2021 |
Collaboration platforms are a gateway for ransomware attacks.
|
Sep 09, 2021 |
cybersecurity maturity model certification (CMMC) (noun) [Word Notes]
|
Sep 07, 2021 |
Don't blindly test your colleagues.
|
Sep 02, 2021 |
incident response (noun) [Word Notes]
|
Aug 31, 2021 |
Companies don't want their customers to be victims of fraud.
|
Aug 26, 2021 |
script kiddies (noun) [Word Notes]
|
Aug 24, 2021 |
Effective cybersecurity training has to be meaningful to employees.
|
Aug 19, 2021 |
sandbox (noun) [Word Notes]
|
Aug 17, 2021 |
The attackers keep coming every single day.
|
Aug 12, 2021 |
security orchestration, automation, and response (SOAR) (noun) [Word Notes]
|
Aug 10, 2021 |
Acceleration of our digital lives and impacts on cybercrime.
|
Aug 05, 2021 |
personally identifiable information (PII) (noun) [Word Notes]
|
Aug 03, 2021 |
What are our devices doing to our compassion?
|
Jul 29, 2021 |
secure access service edge (SASE) (noun) [Word Notes]
|
Jul 27, 2021 |
It's ok to be trusting, just be careful.
|
Jul 22, 2021 |
red teaming (noun) [Word Notes]
|
Jul 20, 2021 |
Threat actors changing ransomware tactics.
|
Jul 15, 2021 |
next generation firewall (noun) [Word Notes]
|
Jul 13, 2021 |
Introducing 8th Layer Insights: Deceptionology 101: Introduction to the Dark Arts
|
Jul 11, 2021 |
Collaboration, data portability, and employee mobility fuel insider risk.
|
Jul 08, 2021 |
fast flux (noun) [Word Notes]
|
Jul 06, 2021 |
An inside view on North Korean cybercrime.
|
Jul 01, 2021 |
encryption (noun) [Word Notes]
|
Jun 29, 2021 |
Bad password hygiene jeopardizes streaming services.
|
Jun 24, 2021 |
keylogger (noun) [Word Notes]
|
Jun 22, 2021 |
Answering a job ad from a ransomware gang.
|
Jun 17, 2021 |
non-fungible tokens (NFT) (noun) [Word Notes]
|
Jun 15, 2021 |
Pandemic taxes: later due dates afford more time for scams.
|
Jun 10, 2021 |
multi-factor authentication (noun) [Word Notes]
|
Jun 08, 2021 |
The fight in the dog.
|
Jun 03, 2021 |
machine learning (noun) [Word Notes]
|
Jun 01, 2021 |
Hacking people vs. hacking technologies to get into companies.
|
May 27, 2021 |
intelligence (noun) [Word Notes]
|
May 25, 2021 |
Whaling attacks are more targeted than phishing or spearphishing.
|
May 20, 2021 |
Introducing 8th Layer Insights [Trailer]
|
May 19, 2021 |
SaaS (noun) [Word Notes]
|
May 18, 2021 |
How to best fight fake news.
|
May 13, 2021 |
decryption (noun) [Word Notes]
|
May 11, 2021 |
Digital identities are at the core of recent breaches.
|
May 06, 2021 |
brute-force attack (noun) [Word Notes]
|
May 04, 2021 |
Anyone can be a target of romance scams.
|
Apr 29, 2021 |
denial-of-service attack (noun) [Word Notes]
|
Apr 27, 2021 |
Make systems to mitigate the mistakes.
|
Apr 22, 2021 |
cold boot attack (noun) [Word Notes]
|
Apr 20, 2021 |
Being aware can go a long way to prevent attacks.
|
Apr 15, 2021 |
cloud computing (noun) [Word Notes]
|
Apr 13, 2021 |
Finding targets of opportunity.
|
Apr 08, 2021 |
APT (noun) [Word Notes]
|
Apr 06, 2021 |
The pandemic is slowing, time to travel?
|
Apr 01, 2021 |
backdoor (noun) [Word Notes]
|
Mar 30, 2021 |
Technology is not designed for older users.
|
Mar 25, 2021 |
watering hole attack (noun) {Word Notes]
|
Mar 23, 2021 |
Ideally, look for someone open to deception.
|
Mar 18, 2021 |
network telescope (noun) [Word Notes]
|
Mar 16, 2021 |
Insider threats and security concerns for APIs.
|
Mar 11, 2021 |
SOC Triad (noun) [Word Notes]
|
Mar 09, 2021 |
Fraud activity within secure messaging apps in plain sight.
|
Mar 04, 2021 |
supply chain attacks (noun) [Word Notes]
|
Mar 02, 2021 |
How likely are online users to reveal private information?
|
Feb 25, 2021 |
taint analysis (noun) [Word Notes]
|
Feb 23, 2021 |
Including your passwords in your final arrangements.
|
Feb 18, 2021 |
ATM skimming (noun) [Word Notes]
|
Feb 16, 2021 |
In the disinformation and misinformation crosshairs.
|
Feb 11, 2021 |
APT side hustle (noun) [Word Notes]
|
Feb 09, 2021 |
Understanding human behavior is a key to security.
|
Feb 04, 2021 |
endpoint (noun) [Word Notes}
|
Feb 02, 2021 |
Covid has shifted the way we deal with money and increased fraud.
|
Jan 28, 2021 |
unified extensible firmware interface (UEFI) (noun) [Word Notes]
|
Jan 26, 2021 |
Targeted phishing campaigns and lottery scams abound.
|
Jan 21, 2021 |
Daemon (noun) [Word Notes]
|
Jan 19, 2021 |
As B2C interactions shift online, call centers become new fraud vector.
|
Jan 14, 2021 |
greyware (noun) [Word Notes]
|
Jan 12, 2021 |
Combating growing online financial fraud.
|
Jan 07, 2021 |
Unix (noun) [Word Notes]
|
Jan 05, 2021 |
fuzzing (noun) [Word Notes]
|
Jan 05, 2021 |
Encore: Don't go looking for morality here. [Hacking Humans]
|
Dec 31, 2020 |
deep packet inspection (DPI) (noun) [Word Notes]
|
Dec 29, 2020 |
Encore: Separating fools from money. [Hacking Humans]
|
Dec 24, 2020 |
tactics, techniques and procedures (TTPs) (noun) [Word Notes]
|
Dec 22, 2020 |
rootkit (noun) [Word Notes]
|
Dec 22, 2020 |
Phishing lures that may be in your inbox soon, and how to deal "left of bang."
|
Dec 17, 2020 |
identity theft (noun) [Word Notes]
|
Dec 15, 2020 |
The landscape has shifted for holiday shopping to online.
|
Dec 10, 2020 |
cyber threat intelligence (CTI) (noun) [Word Notes]
|
Dec 08, 2020 |
Virtual Private Network (VPN) (noun) [Word Notes}
|
Dec 08, 2020 |
Going behind the scenes and preventing social engineering in financial institutions.
|
Dec 03, 2020 |
Network Time Protocol (NTP) attack (noun) [Word Notes]
|
Dec 01, 2020 |
smishing (SMS phishing) (noun) [Word Notes]
|
Dec 01, 2020 |
Encore: Wearing a mask in the Oval Office and the art of deception.
|
Nov 26, 2020 |
port mirroring (noun) [Word Notes]
|
Nov 24, 2020 |
The public's expectations are changing.
|
Nov 19, 2020 |
shadow IT (noun) {Word Notes]
|
Nov 17, 2020 |
Network Detection and Response (NDR) (noun) [Word Notes]
|
Nov 17, 2020 |
Ransomware: Statistically, it's likely to happen to anybody.
|
Nov 12, 2020 |
remote access Trojan or RAT (noun) [Word Notes}
|
Nov 10, 2020 |
Too good to be true.
|
Nov 05, 2020 |
business email compromise or BEC (noun) [Word Notes]
|
Nov 03, 2020 |
David Sanger on the HBO documentary based off his book, "The Perfect Weapon". [Special Edition]
|
Nov 01, 2020 |
The Malware Mash!
|
Oct 30, 2020 |
New consequences, extortion and cyber insurance.
|
Oct 29, 2020 |
anagram (noun) [Word Notes]
|
Oct 27, 2020 |
What is true and important versus what is the spin.
|
Oct 22, 2020 |
rogue access point (noun) [Word Notes]
|
Oct 20, 2020 |
Use a Dance Dance Revolution floor lock for your data centers.
|
Oct 15, 2020 |
darknet (noun) [Word Notes]
|
Oct 13, 2020 |
Don't click any button...even the 'No' button.
|
Oct 08, 2020 |
phishing (verb) [Word Notes]
|
Oct 06, 2020 |
Cookies make for some tasty phishing lure.
|
Oct 01, 2020 |
credential stealing (verb) [Word Notes]
|
Sep 29, 2020 |
It's human nature.
|
Sep 24, 2020 |
The Bombe (noun) [Word Notes]
|
Sep 22, 2020 |
Your information is already on the Dark Web.
|
Sep 17, 2020 |
cross-site scripting (noun) [Word Notes]
|
Sep 15, 2020 |
The story is what gets people in.
|
Sep 10, 2020 |
penetration test (noun) [Word Notes]
|
Sep 08, 2020 |
It's evolving rapidly and getting more furious by the minute.
|
Sep 03, 2020 |
social engineering (noun) [Word Notes]
|
Sep 01, 2020 |
Take a deep breath.
|
Aug 27, 2020 |
man trap (noun) [Word Notes]
|
Aug 25, 2020 |
Many times it is less sophisticated than we think.
|
Aug 20, 2020 |
Zero-day (adjective) [Word Notes]
|
Aug 18, 2020 |
Flying under the radar.
|
Aug 13, 2020 |
NMAP (noun) [Word Notes]
|
Aug 11, 2020 |
Ignore the actor, focus on the behavior.
|
Aug 06, 2020 |
Be the custodian of your own digital identity.
|
Jul 30, 2020 |
Never think of security as a destination.
|
Jul 23, 2020 |
A little dose of skepticism.
|
Jul 16, 2020 |
Send me money so I know you are real.
|
Jul 09, 2020 |
Because they deserve the money!
|
Jul 02, 2020 |
Close in your pajamas.
|
Jun 25, 2020 |
It can happen to anybody.
|
Jun 18, 2020 |
Taking a selfie with your ID.
|
Jun 11, 2020 |
Seniors and millennials more alike than people think.
|
Jun 04, 2020 |
HH Extra - Happy 100 shows!
|
May 28, 2020 |
Wearing a mask in the Oval Office.
|
May 28, 2020 |
How scammers fill the gap.
|
May 21, 2020 |
Every day you're a firefighter.
|
May 14, 2020 |
Exploiting our distractions.
|
May 07, 2020 |
Passwords are the easiest things to steal.
|
Apr 30, 2020 |
Wallet inspector.
|
Apr 23, 2020 |
They're getting smart, but we're getting smarter.
|
Apr 16, 2020 |
Even famous people get scammed.
|
Apr 09, 2020 |
Shedding light on the human element.
|
Apr 02, 2020 |
Paging Dr. Dochterman.
|
Mar 26, 2020 |
Disinformation vs. misinformation.
|
Mar 19, 2020 |
Winking emoji.
|
Mar 12, 2020 |
Don't go looking for morality here.
|
Mar 05, 2020 |
The art of cheating.
|
Feb 27, 2020 |
Hi, I'm trying to steal your money.
|
Feb 20, 2020 |
Fake news and misplaced trust.
|
Feb 13, 2020 |
I wouldn't want my computer to be disappointed.
|
Feb 06, 2020 |
They had no idea.
|
Jan 30, 2020 |
Flipping the script.
|
Jan 23, 2020 |
Life in the (second) age of pirates.
|
Jan 16, 2020 |
Ransomware is a reality.
|
Jan 09, 2020 |
Leading by example and positive reenforcement.
|
Jan 02, 2020 |
Telling The Truth In A Dishonest Way - Rebroadcast
|
Dec 26, 2019 |
Managing access and insider threats.
|
Dec 19, 2019 |
If you didn't ask for it don't install it.
|
Dec 12, 2019 |
I really wanted that shed.
|
Dec 05, 2019 |
Security has to be friendly.
|
Nov 21, 2019 |
Skepticism is the first step.
|
Nov 14, 2019 |
When you are the target, objectivity is gone.
|
Nov 07, 2019 |
The Malware Mash!
|
Oct 31, 2019 |
Don't dismiss the fraudsters.
|
Oct 31, 2019 |
The ability to fundamentally deceive someone.
|
Oct 24, 2019 |
The fallacy of futility.
|
Oct 17, 2019 |
Don't trust ransomware to tell you its real name.
|
Oct 10, 2019 |
The ultimate hacking tool.
|
Oct 03, 2019 |
The usefulness of single sign on.
|
Sep 26, 2019 |
Algorithms controlling truth in our society.
|
Sep 19, 2019 |
An ethical hacker can be a teacher.
|
Sep 12, 2019 |
Think before you post.
|
Sep 05, 2019 |
Securing your SMS.
|
Aug 29, 2019 |
Backups backups backups.
|
Aug 22, 2019 |
Swamping search results for reputation management.
|
Aug 15, 2019 |
Positive pretexting on the rise.
|
Aug 08, 2019 |
Images are the language of the brain.
|
Aug 01, 2019 |
Looking after Dad.
|
Jul 25, 2019 |
The skills gap disconnect.
|
Jul 18, 2019 |
Know and spot the patterns.
|
Jul 11, 2019 |
Encore — Separating fools from money.
|
Jul 04, 2019 |
Be wary of all emails.
|
Jun 27, 2019 |
The knowledge / intention behavior gap.
|
Jun 20, 2019 |
Just because I trusted you yesterday doesn't mean I trust you today.
|
Jun 13, 2019 |
The best way to break in is to walk through the front door.
|
Jun 06, 2019 |
Be willing to admit you don't know everything.
|
May 30, 2019 |
People aren't perfectly rational.
|
May 23, 2019 |
Live at KB4CON 2019.
|
May 16, 2019 |
A data-driven approach to trust.
|
May 09, 2019 |
Twitter bots amplifying divisive messages.
|
May 02, 2019 |
Let's play, "Covered by cyber insurance — true or false?"
|
Apr 25, 2019 |
I have been practicing honesty and truthfulness my whole life.
|
Apr 18, 2019 |
Scammers have no ethics whatsoever.
|
Apr 11, 2019 |
Girl Scouts empowering cyber security leaders.
|
Apr 04, 2019 |
Pick a persona to match the goal.
|
Mar 28, 2019 |
Kids are a great target.
|
Mar 21, 2019 |
When we rush we make bad decisions.
|
Mar 14, 2019 |
Don't assume younger people get it.
|
Mar 07, 2019 |
Delivering yourself to a kidnapper.
|
Feb 28, 2019 |
Stop and think before you click that link.
|
Feb 21, 2019 |
The trauma is multifactored.
|
Feb 14, 2019 |
Make it seem like the real answer is impossible to know.
|
Feb 07, 2019 |
The excitement of tricking someone wears off quickly.
|
Jan 31, 2019 |
Opening your eyes to the reality in which we live.
|
Jan 24, 2019 |
Prisoners have nothing but time.
|
Jan 17, 2019 |
Trained humans are your strongest link.
|
Jan 10, 2019 |
At some point you're probably going to have to do some running.
|
Jan 03, 2019 |
Truth emerges from the clash of ideas.
|
Dec 20, 2018 |
A pesky problem that doesn't go away.
|
Dec 13, 2018 |
Bringing trust to a trustless world.
|
Dec 06, 2018 |
Be very aware of your desire to be right.
|
Nov 29, 2018 |
CEOs can be the weakest link.
|
Nov 15, 2018 |
Human sources are essential.
|
Nov 08, 2018 |
Scams are fraud and fraud is crime.
|
Nov 01, 2018 |
Fear, flattery, greed and timing.
|
Oct 25, 2018 |
Waste my time and I'll waste yours back.
|
Oct 18, 2018 |
Information is the life blood of social engineering.
|
Oct 11, 2018 |
Easier to trick than to hack.
|
Oct 04, 2018 |
Kidnappers, robots and deep fakes.
|
Sep 27, 2018 |
Stringing along a scammer.
|
Sep 20, 2018 |
Influence versus manipulation.
|
Sep 13, 2018 |
Real estate transactions in the crosshairs.
|
Sep 06, 2018 |
Red teaming starts with research.
|
Aug 30, 2018 |
Telling the truth in a dishonest way.
|
Aug 23, 2018 |
Sometimes less is more.
|
Aug 16, 2018 |
Focus, technology, and training fight phishing.
|
Aug 09, 2018 |
Luring unsuspecting money mules.
|
Aug 02, 2018 |
Nothing up my sleeve.
|
Jul 26, 2018 |
Think like an attacker.
|
Jul 19, 2018 |
Presidential prank, pensioner pilfered.
|
Jul 12, 2018 |
Phone scams, phantom employees and sitting Ducks.
|
Jul 05, 2018 |
Separating fools from money.
|
Jun 28, 2018 |
Playing on kindness.
|
Jun 21, 2018 |
Gaming pro athletes online.
|
Jun 14, 2018 |
A flood of misinformation and fake news.
|
Jun 07, 2018 |
Social Engineering works because we're human.
|
May 30, 2018 |