Menu
My Activity Hub
Podcasts
Videos
Pricing
Feedback
Tutoring
Sign Up
Log In
My Activity Hub
Podcasts
Videos
How it works
Pricing
Tutoring
Sign Up
Log In
Hacking Humans
Deception, influence, and social engineering in the world of cyber crime.
MFA prompt bombing (noun) [Word Notes]
6 mins; October 11, 2022
What is cyber quantum computing?
44 mins; October 06, 2022
Apple Lockdown Mode (noun) [Word Notes]
6 mins; October 04, 2022
A cryptoqueen on the run and the cons she got away with.
38 mins; September 29, 2022
Simulated Phishing (noun) [Word Notes]
8 mins; September 27, 2022
The rise in fraudulent online content.
50 mins; September 22, 2022
Sideloading (noun) [Word Notes]
6 mins; September 20, 2022
It pays to do your research. [Hacking Humans Goes to the Movies}
31 mins; September 18, 2022
Is inflation affecting the Dark Web?
52 mins; September 15, 2022
Microsegmentation (noun) [Word Notes]
6 mins; September 13, 2022
A travel surge and a host of different scams.
40 mins; September 08, 2022
Homograph phishing (noun) [Word Notes]
6 mins; September 06, 2022
Is there a growing number of public and private partnerships forming?
38 mins; September 01, 2022
Policy Orchestration (noun) [Word Notes]
6 mins; August 30, 2022
Encore: Sometimes, deepfake victims don't want to be convinced it is fake.
44 mins; August 25, 2022
Anti-cheat software (noun) [Word Notes]
8 mins; August 23, 2022
Scams in the media.
51 mins; August 18, 2022
Pseudoransomware (noun) [Word Notes]
7 mins; August 16, 2022
Staying away from Medicare scams.
42 mins; August 11, 2022
Trusted Platform Module (TPM) (noun) [Word Notes]
6 mins; August 09, 2022
Making the world a safer online place.
49 mins; August 04, 2022
Private Network Access (PNA) (noun) [Word Notes]
5 mins; August 02, 2022
A return to office means a return to email scams.
47 mins; July 28, 2022
Extortion scams and the LGBTQ+ community.
48 mins; July 21, 2022
Web 3.0 (noun)
7 mins; July 19, 2022
Behavioral science in the world of InfoSec.
48 mins; July 14, 2022
Identity access management (IAM) (noun) [Word Notes]
11 mins; July 12, 2022
Human errors and why they're made.
50 mins; July 07, 2022
Abstraction layer (noun) [Word Notes]
5 mins; July 05, 2022
The top 10 brand names most likely used in a phishing scheme.
44 mins; June 30, 2022
Identity Fabric (noun) [Word Notes]
6 mins; June 28, 2022
North Korea and a global cyber war.
38 mins; June 23, 2022
Intrusion Kill Chain (noun) [Word Notes]
7 mins; June 21, 2022
The great resignation and data exposure challenges.
51 mins; June 16, 2022
Identity Orchestration (noun) [Word Notes]
6 mins; June 14, 2022
What to look out for with scan-and-exploit cyber attacks.
47 mins; June 09, 2022
Diamond Model (noun) [Word Notes]
7 mins; June 07, 2022
Is ransomware getting too fast?
48 mins; June 02, 2022
MITRE ATT&CK (noun) [Word Notes]
7 mins; May 31, 2022
Combating social engineering.
47 mins; May 26, 2022
DevOps (noun) [Word Notes]
7 mins; May 24, 2022
Voice authentication taking hold.
48 mins; May 19, 2022
MITRE ATT&CK (noun) [Word Notes]
7 mins; May 17, 2022
Business phishing: Who's biting the bait?
47 mins; May 12, 2022
Waterfall Software Development Method (noun) [Word Notes]
6 mins; May 10, 2022
Encore: The attackers keep coming every single day.
45 mins; May 05, 2022
Agile Software Development Method (noun) [Word Notes]
7 mins; May 03, 2022
The dark side of business email attacks.
45 mins; April 28, 2022
Pegasus (noun) [Word Notes]
8 mins; April 26, 2022
Cons through and through. [Hacking Humans Goes to the Movies]
20 mins; April 24, 2022
On the front lines of fraud protection.
43 mins; April 21, 2022
Domain-based Message Authentication Reporting Conformance (DMARC) (noun) [Word Notes]
8 mins; April 19, 2022
Magic, illusion, and scams, oh my.
51 mins; April 14, 2022
Shields Up (noun) [Word Notes]
7 mins; April 12, 2022
Online threats turned real world danger.
46 mins; April 07, 2022
Software Assurance Maturity Model (SAMM) (noun) [Word Notes]
5 mins; April 05, 2022
Robocall scams and the psychology surrounding them.
42 mins; March 31, 2022
Universal 2nd Factor (U2F) [Word Notes]
7 mins; March 29, 2022
Cons: the short one and the first one. [Hacking Humans Goes to the Movies]
18 mins; March 27, 2022
What's behind Buy Now, Pay Later scams?
50 mins; March 24, 2022
adversary group naming (noun) [Word Notes]
10 mins; March 22, 2022
Data privacy: is it black and white when it comes to your kids?
40 mins; March 17, 2022
BSIMM (noun) [Word Notes]
6 mins; March 15, 2022
Technology's effects on students during the pandemic.
40 mins; March 10, 2022
OWASP vulnerable and outdated components (noun) [Word Notes]
8 mins; March 08, 2022
Phishing seems to be cyclical and thematic.
48 mins; March 03, 2022
OWASP software and data integrity failures (noun) [Word Notes]
8 mins; March 01, 2022
A blurring of lines between nation states and criminals.
45 mins; February 24, 2022
OWASP server-side request forgery (noun) [Word Notes]
7 mins; February 22, 2022
Hustling the hustlers. [Hacking Humans Goes to the Movies]
21 mins; February 20, 2022
Vulnerabilities will be found.
47 mins; February 17, 2022
OWASP security logging and monitoring failures (noun) [Word Notes]
6 mins; February 15, 2022
If you wish for peace, prepare for cyberwar.
49 mins; February 10, 2022
OWASP identification and authentication failures (noun) [Word Notes]
5 mins; February 08, 2022
How to talk your way in anywhere. [Hacking Humans Goes to the Movies]
22 mins; February 06, 2022
The ransomware game has evolved.
52 mins; February 03, 2022
OWASP broken access control (noun) [Word Notes]
7 mins; February 01, 2022
Useful ransomware protection for you.
44 mins; January 27, 2022
OWASP security misconfiguration (noun) [Word Notes]
7 mins; January 25, 2022
The perfect environment for ATOs (account takeovers) to breed.
46 mins; January 20, 2022
OWASP insecure design (noun) [Word Notes]
8 mins; January 18, 2022
The only locks you should pick are your own.
44 mins; January 13, 2022
Log4j vulnerability (noun) [Word Notes]
9 mins; January 11, 2022
Changing the game on ransomware.
49 mins; January 06, 2022
OWASP injection (noun) [Word Notes]
6 mins; January 04, 2022
Identity "protection" and a pigeon drop. [Hacking Humans Goes to the Movies]
21 mins; December 30, 2021
Encore: zero trust (noun) [Word Notes]
8 mins; December 28, 2021
The CyberWire: The 12 Days of Malware.
7 mins; December 25, 2021
Hustling the hustler and three-card Monte. [Hacking Humans Goes to the Movies]
20 mins; December 24, 2021
Even if a cause moves you, do your due diligence.
30 mins; December 23, 2021
Conmen come in many flavors, all motivated by greed. [Hacking Humans Goes to the Movies]
22 mins; December 22, 2021
OWASP cryptographic failures (noun) [Word Notes]
6 mins; December 21, 2021
The 3 M's: Minimize, monitor and manage.
45 mins; December 16, 2021
account takeover prevention (noun) [Word Notes]
6 mins; December 14, 2021
Scams abound this time of year.
43 mins; December 09, 2021
threat hunting (noun) [Word Notes]
7 mins; December 07, 2021
Do you really want that device to be a connected device?
47 mins; December 02, 2021
vulnerability management (noun) [Word Notes]
8 mins; November 30, 2021
Misdirection and layering with a con in the middle. [Hacking Humans Goes to the Movies]
17 mins; November 25, 2021
software bill of materials (SBOM) (noun) [Word Notes]
6 mins; November 23, 2021
Click here to see more
‹ Prev
1
2
3
4
5
6
7
8
Next ›