Hacking Humans
A podcast by N2K Networks
628 Episodes
-
Vulnerabilities will be found.
Published: 2/17/2022 -
OWASP security logging and monitoring failures (noun) [Word Notes]
Published: 2/15/2022 -
If you wish for peace, prepare for cyberwar.
Published: 2/10/2022 -
OWASP identification and authentication failures (noun) [Word Notes]
Published: 2/8/2022 -
How to talk your way in anywhere. [Hacking Humans Goes to the Movies]
Published: 2/6/2022 -
The ransomware game has evolved.
Published: 2/3/2022 -
OWASP broken access control (noun) [Word Notes]
Published: 2/1/2022 -
Useful ransomware protection for you.
Published: 1/27/2022 -
OWASP security misconfiguration (noun) [Word Notes]
Published: 1/25/2022 -
The perfect environment for ATOs (account takeovers) to breed.
Published: 1/20/2022 -
OWASP insecure design (noun)
Published: 1/18/2022 -
The only locks you should pick are your own.
Published: 1/13/2022 -
Log4j vulnerability (noun) [Word Notes]
Published: 1/11/2022 -
Changing the game on ransomware.
Published: 1/6/2022 -
OWASP injection (noun) [Word Notes]
Published: 1/4/2022 -
Identity "protection" and a pigeon drop. [Hacking Humans Goes to the Movies]
Published: 12/30/2021 -
Encore: zero trust (noun) [Word Notes]
Published: 12/28/2021 -
The CyberWire: The 12 Days of Malware.
Published: 12/25/2021 -
Hustling the hustler and three-card Monte. [Hacking Humans Goes to the Movies]
Published: 12/24/2021 -
Even if a cause moves you, do your due diligence.
Published: 12/23/2021
Deception, influence, and social engineering in the world of cyber crime.