logo
episode-header-image
May 2021
6m 32s

brute-force attack (noun) [Word Notes]

N2K Networks
About this episode
A cryptographic hack that relies on guessing all possible letter combinations of a targeted password until the correct codeword is discovered. 
Up next
Today
Waterfall Software Development Method (noun) [Word Notes]
Please enjoy this encore of Word Notes. A software development model that relies on a series of sequential steps that flow into each other, like a series of waterfalls. CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/waterfall-software-development⁠ Audio reference lin ... Show More
6m 25s
Aug 21
Scammers hit the right notes in the wrong way.
This week, our hosts⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ ⁠⁠⁠⁠⁠⁠⁠⁠Dave Bittner⁠⁠⁠⁠⁠⁠⁠⁠, ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Joe Carrigan⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠, and ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Maria Varmazis⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ (also host of the ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠T-Minus⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ Space Daily show) are sharing the latest in social engineering scams, p ... Show More
49m 6s
Aug 19
Agile Software Development Method (noun) [Word Notes]
Please enjoy this encore of Word Notes. A software development philosophy that emphasizes incremental delivery, team collaboration, continual planning, and continual learning CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/agile-software-development⁠ Audio reference l ... Show More
7m 45s
Recommended Episodes
Dec 2020
Episode 10: Exploiting Authenticated Encryption Key Commitment!
Authenticated encryption such as AES-GCM or ChaCha20-Poly1305 is used in a wide variety of applications, including potentially in settings for which it was not originally designed. A question given relatively little attention is whether an authenticated encryption scheme guarante ... Show More
46m 34s
Oct 2023
Passwordless authentication startup SecureW2 raises $80M from Insight Partners
Passwordless authentication offers a host of advantages over traditional pins, passphrases and passcodes. Learn more about your ad choices. Visit podcastchoices.com/adchoices 
5m 1s
Nov 2021
Using bidirectionality override characters to obscure code. [Research Saturday]
Guests Nicholas Boucher and Ross Anderson from the University of Cambridge join Dave Bittner to discuss their research, "Trojan Source: Invisible Vulnerabilities." The researchers present a new type of attack in which source code is maliciously encoded so that it appears differen ... Show More
25m 10s
Jul 2010
140 GID Keeping Track of Passwords
Find out how to remember your passwords and get tips for the best ways to keep track of your passwords when you have too many passwords to remember easily. 
6m 1s
Jun 2020
Mots de passe (Passwords)
Texte: Le site de réseaux sociaux LinkedIn a déclaré que certains des mots de passe de ses membres ont été compromis après qu'il ait été observé que des millions de mots de passe ont fait l'objet de fuites. Traduction: Social networking website LinkedIn says some of its members' ... Show More
4m 56s