logo
episode-header-image
May 2021
6m 32s

brute-force attack (noun) [Word Notes]

N2K Networks
About this episode
A cryptographic hack that relies on guessing all possible letter combinations of a targeted password until the correct codeword is discovered. 
Up next
Today
Web Application Firewall (noun) [Word Notes]
Please enjoy this encore of Word Notes. A layer seven firewall designed to block threats at the application layer of the open system interconnection model, the OSI model. CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/web-application-firewall⁠ Audio reference link: “ ... Show More
8m 59s
Feb 26
AI ate my homework.
This week, hosts of N2K CyberWire ⁠⁠⁠Maria Varmazis⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ and⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Dave Bittner⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ alongside ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Joe Carrigan⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ ... Show More
51m 39s
Feb 24
COBIT (noun) [Word Notes]
Please enjoy this encore of Word Notes. An IT governance framework developed by ISACA. CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/cobit⁠ Audio reference link: isacappc. “How Do You Explain Cobit to Your Dad – or Your CEO?” YouTube, YouTube, 24 Aug. 2016, ⁠https:/ ... Show More
7m 6s
Recommended Episodes
Dec 2020
Episode 10: Exploiting Authenticated Encryption Key Commitment!
Authenticated encryption such as AES-GCM or ChaCha20-Poly1305 is used in a wide variety of applications, including potentially in settings for which it was not originally designed. A question given relatively little attention is whether an authenticated encryption scheme guarante ... Show More
46m 34s
Oct 2023
Passwordless authentication startup SecureW2 raises $80M from Insight Partners
Passwordless authentication offers a host of advantages over traditional pins, passphrases and passcodes. Learn more about your ad choices. Visit podcastchoices.com/adchoices 
5m 1s
Nov 2021
Using bidirectionality override characters to obscure code. [Research Saturday]
Guests Nicholas Boucher and Ross Anderson from the University of Cambridge join Dave Bittner to discuss their research, "Trojan Source: Invisible Vulnerabilities." The researchers present a new type of attack in which source code is maliciously encoded so that it appears differen ... Show More
25m 10s
Jul 2010
140 GID Keeping Track of Passwords
<p>Find out how to remember your passwords and get tips for the best ways to keep track of your passwords when you have too many passwords to remember easily.</p> <p><p>Modern Mentor is hosted by Rachel Cooke. A transcript is available at Simplecast.</p><p>Have a question for Mod ... Show More
6m 1s
Jun 2020
Mots de passe (Passwords)
<p>Texte:<br> Le site de réseaux sociaux LinkedIn a déclaré que certains des mots de passe de ses membres ont été compromis après qu'il ait été observé que des millions de mots de passe ont fait l'objet de fuites.</p> <p>Traduction:<br> Social networking website LinkedIn says som ... Show More
4m 56s