logo
episode-header-image
May 2021
6m 32s

brute-force attack (noun) [Word Notes]

N2K Networks
About this episode
A cryptographic hack that relies on guessing all possible letter combinations of a targeted password until the correct codeword is discovered. 
Up next
Today
Convinced, compromised, and confirmed.
This week, our hosts⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ ⁠⁠⁠Dave Bittner⁠⁠⁠, ⁠⁠⁠⁠⁠⁠⁠⁠Joe Carrigan⁠⁠⁠⁠⁠⁠⁠⁠, and ⁠⁠⁠⁠⁠⁠⁠⁠Maria Varmazis⁠⁠⁠⁠⁠⁠⁠⁠ (also host of the ⁠⁠⁠⁠⁠⁠⁠⁠T-Minus⁠⁠⁠⁠⁠⁠⁠⁠ Space Daily show) are back sharing the latest in social engineering scams, phishing schemes, and criminal exploits that a ... Show More
51m 16s
Jul 8
adversary group naming (noun) [Word Notes]
Please enjoy this encore of Word Notes. A cyber threat intelligence best practice of assigning arbitrary labels to collections of hacker activity across the intrusion kill chain. 
10m 17s
Jul 3
Brushed aside: The subtle scam you didn't order.
This week, our hosts⁠⁠⁠⁠⁠⁠⁠⁠⁠ ⁠⁠Dave Bittner⁠⁠, ⁠⁠⁠⁠⁠⁠⁠Joe Carrigan⁠⁠⁠⁠⁠⁠⁠, and ⁠⁠⁠⁠⁠⁠⁠Maria Varmazis⁠⁠⁠⁠⁠⁠⁠ (also host of the ⁠⁠⁠⁠⁠⁠⁠T-Minus⁠⁠⁠⁠⁠⁠⁠ Space Daily show) are back sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making ... Show More
44 m
Recommended Episodes
Dec 2020
Episode 10: Exploiting Authenticated Encryption Key Commitment!
Authenticated encryption such as AES-GCM or ChaCha20-Poly1305 is used in a wide variety of applications, including potentially in settings for which it was not originally designed. A question given relatively little attention is whether an authenticated encryption scheme guarante ... Show More
46m 34s
Oct 2023
Passwordless authentication startup SecureW2 raises $80M from Insight Partners
Passwordless authentication offers a host of advantages over traditional pins, passphrases and passcodes. Learn more about your ad choices. Visit podcastchoices.com/adchoices 
5m 1s
Nov 2021
Using bidirectionality override characters to obscure code. [Research Saturday]
Guests Nicholas Boucher and Ross Anderson from the University of Cambridge join Dave Bittner to discuss their research, "Trojan Source: Invisible Vulnerabilities." The researchers present a new type of attack in which source code is maliciously encoded so that it appears differen ... Show More
25m 10s
Jul 2010
140 GID Keeping Track of Passwords
Find out how to remember your passwords and get tips for the best ways to keep track of your passwords when you have too many passwords to remember easily. 
6m 1s
Jun 2020
Mots de passe (Passwords)
Texte: Le site de réseaux sociaux LinkedIn a déclaré que certains des mots de passe de ses membres ont été compromis après qu'il ait été observé que des millions de mots de passe ont fait l'objet de fuites. Traduction: Social networking website LinkedIn says some of its members' ... Show More
4m 56s