An approach to detecting mallware in which a unique identifier, normally a specific string of code or the hash of known malicious code, is established as associated with some piece of malware. When ...
In anti-phishing training, the percentage of users tested who took one of the following unsafe actions in response to a simulated phishing email: clicking the embedded link, entering data on a landing ...
Software designed to prevent cheating in video games. "anti-cheat software" on the Word Notes podcast.
To get access to ad-free episodes, exclusive podcasts, unlimited briefings, stories, and transcripts, and other valuable bonus features sign up today. New details emerge about Chinese hackers ...
In this episode of Threat Vector, host David Moulton speaks with Margaret Kelley, a seasoned Digital Forensics and Incident Response Senior Consultant at Palo Alto Networks’ Unit 42. With a deep ...
In this episode of the Microsoft Threat Intelligence Podcast, host Sherrod DeGrippo is joined by security researchers Caitlin Hopkins, Diana Duvieilh, and Anna Seitz to discuss the latest trends in ...
A kind of side-channel attack in which an attacker with physical access to a device retrieves encryption keys after a cold reboot of the system. A computer is "cold booted" when its power is quickly ...
To get access to ad-free episodes, exclusive podcasts, unlimited briefings, stories, and transcripts, and other valuable bonus features sign up today. On Hacking Humans, Dave Bittner, Joe Carrigan, ...
Andrew Hammond, Ph.D. is Historian & Curator at the International Spy Museum, home of the world's preeminent collection of intelligence-related artifacts. Previous chapters have included seven years ...
A forensic technique where practitioners capture an entire image of a system and analyze the contents offline. "dead-box forensics" on the Word Notes podcast.
Exploitation of a bug, oversight, or misconfiguration to gain access to information from which one would normally be excluded. A privilege escalation attack elevates the attacker's level of access to ...
A unit of measurement for network bandwidth and internet speed; indicates how many millions of bits of data are transferred per second.