What are the rules of hacking

What are the rules of hacking

Up next

The psychology of hacking

Another day, another breach. Organisations are still being hacked by malicious counterparts everyday, and the reason they're always a step ahead is not only gender diversity but a skills diversity as well - meanwhile we're still relying on our IT departments to handle cyber breac ...  Show more

Privacy from government and the importance of misinformation

In world where privacy is difficult to come by, how much can you actually trust the apps on your phone? Ex-Hacker and Brand Ambassador for CTRL Group Bastien Treptel talks with Simon Harmaan, the CEO of the Loki Project, a Melbourne-based privacy software foundation about why we ...  Show more

Recommended Episodes

How To Protect Yourself From Social Engineering Hacks
CYBER

Hacks are increasing but the hackers are not necessarily getting more sophisticated. What do Twitter, Twilio, and Uber all have in common? They were all hacked by, in part, a conversation. In all three cases, the hack was helped along by social engineering. Someone contacted an e ...  Show more

130: Ethical Hacking with Ted Harrington
Programming Throwdown

"Hacking" is a word that evokes awe from the public, laughter from developers, and pure fear from technology leaders.  But what really is hacking?  What does trust really mean and how do we acquire and keep trust on the Internet?  It turns out that, while hacking is associated ...

  Show more

More Exchange Server exploitation, and security advice. Updates on the SolarWinds compromise, criminal TTPs, and the Verkada hack. And news not you, but your friends might be able to use.
CyberWire Daily

Norway’s parliament is hit with Exchange Server exploitation. CISA and the FBI issue more advice on how to clean up an Exchange Server compromise. CISA hints at more detailed attribution of the SolarWinds compromise “soon,” and US Cyber Command says military networks were success ...  Show more

69: Human Hacker
Darknet Diaries

We all know that computers and networks are vulnerable to hacking and malicious actors, but what about us, the humans who interface with these devices? Con games, scams, and strategic deception are far older than computers, and in the modern era, these techniques can make huma ...

  Show more