Hacking Humans
A podcast by N2K Networks
Categories:
595 Episodes
-
Technology's effects on students during the pandemic.
Published: 3/10/2022 -
OWASP vulnerable and outdated components (noun) [Word Notes]
Published: 3/8/2022 -
Phishing seems to be cyclical and thematic.
Published: 3/3/2022 -
OWASP software and data integrity failures (noun) [Word Notes]
Published: 3/1/2022 -
A blurring of lines between nation states and criminals.
Published: 2/24/2022 -
OWASP server-side request forgery (noun) [Word Notes]
Published: 2/22/2022 -
Hustling the hustlers. [Hacking Humans Goes to the Movies]
Published: 2/20/2022 -
Vulnerabilities will be found.
Published: 2/17/2022 -
OWASP security logging and monitoring failures (noun) [Word Notes]
Published: 2/15/2022 -
If you wish for peace, prepare for cyberwar.
Published: 2/10/2022 -
OWASP identification and authentication failures (noun) [Word Notes]
Published: 2/8/2022 -
How to talk your way in anywhere. [Hacking Humans Goes to the Movies]
Published: 2/6/2022 -
The ransomware game has evolved.
Published: 2/3/2022 -
OWASP broken access control (noun) [Word Notes]
Published: 2/1/2022 -
Useful ransomware protection for you.
Published: 1/27/2022 -
OWASP security misconfiguration (noun) [Word Notes]
Published: 1/25/2022 -
The perfect environment for ATOs (account takeovers) to breed.
Published: 1/20/2022 -
OWASP insecure design (noun)
Published: 1/18/2022 -
The only locks you should pick are your own.
Published: 1/13/2022 -
Log4j vulnerability (noun) [Word Notes]
Published: 1/11/2022
Deception, influence, and social engineering in the world of cyber crime.