Hacking humans: social engineering and the power of influence

Hacking humans: social engineering and the po...

‏التالي

Taking back control of your time

Our brains are easily distracted or overwhelmed. And that can make getting stuff done harder than it needs to be. This week, we look at methods and strategies for avoiding unnecessary stress by managing your priorities, your focus, and your energy with organisational psychologist ...  عرض المزيد

Not broken, just wired differently: ADHD in adulthood

Imagine getting a diagnosis in adulthood that suddenly made so much of your life make sense. It explains why you’ve always had trouble being on time, starting things you don’t finish, avoiding difficult projects. Producer Jennifer Leake explores the impact of an ADHD diagnosis in ...  عرض المزيد

‏حلقات موصى بها

69: Human Hacker
Darknet Diaries

We all know that computers and networks are vulnerable to hacking and malicious actors, but what about us, the humans who interface with these devices? Con games, scams, and strategic deception are far older than computers, and in the modern era, these techniques can make huma ...

  عرض المزيد

Hacking Humans
Prodigy

The days of robbing banks at gunpoint are gone. It's much more profitable to hijack networks. To better protect themselves companies hire people to test their security, but no firewall is going to stop a social engineer. Especially not one like Chris Hadnagy. Learn more about you ...  عرض المزيد

Hacking and cybercrime
Start the Week

Just how safe is the online world? Yale Professor of Law and Philosophy Scott Shapiro delves into cybersecurity in his book, Fancy Bear Goes Phishing. The book’s title derives from the exploits of ‘Fancy Bear’, an elite unit of the Russian military intelligence that hacked the ...

  عرض المزيد

How To Protect Yourself From Social Engineering Hacks
CYBER

Hacks are increasing but the hackers are not necessarily getting more sophisticated. What do Twitter, Twilio, and Uber all have in common? They were all hacked by, in part, a conversation. In all three cases, the hack was helped along by social engineering. Someone contacted an e ...  عرض المزيد