Episode 1186 - Hacked Social Media Accounts May Not Be Hacked But Abused By Approved Apps
Release Date: 04/20/2022
Security In Five Podcast
This episode talks about the show and behind-the-scenes challenges coming up as well as looking for the next level for the show through supporters like you Mighty Mackenzie - Be aware, be safe. Where you can find Security In Five - =========================== Support the show and get access to behind-the-scenes content as a patron - *** Support the podcast with a cup of coffee *** - Mighty Mackenzie - Email -
info_outlineSecurity In Five Podcast
DuckDuckGo was in some hot water recently for being exposed that they weren't blocking all of Microsoft ad trackers. Since then they have changed their approach and will start blocking all of them. This episode talks about this. Source - Be aware, be safe. *** Support the podcast with a cup of coffee *** - or become a patron Don't forget to subscribe to the —————— Where you can find Security In Five —————— - , , , , , Email -
info_outlineSecurity In Five Podcast
Twilio confirmed recently they were a victim of a SMS phishing attack. This attack led to customer data being accessed after a few employees were tricked into entering credentials into a hacker-controlled fake website. This epsiode talks about how it happened and the things you can do to slow down or prevent these types of attacks. Be aware, be safe. *** Support the podcast with a cup of coffee *** - or become a patron Don't forget to subscribe to the —————— Where you can find Security In Five —————— - , , , , , Email -
info_outlineSecurity In Five Podcast
Google has been served a class action lawsuit for a bait and switch type move with Google Workspace early adopters. This episode talks about what the lawsuit it and rants about it because your host is one of the early adopters. Be aware, be safe. *** Support the podcast with a cup of coffee *** - or become a patron Don't forget to subscribe to the —————— Where you can find Security In Five —————— - , , , , , Email -
info_outlineSecurity In Five Podcast
A recent study by a firm called ExtraHop revealed that over 60% of IT environments analyzed has SSH ports exposed. Additional research shows that many less than secure ports and protocols are left open, allowing more vectors for attackers to probe. This episode breaks down what those were and how you can get a handle on these in your environment. Be aware, be safe. *** Support the podcast with a cup of coffee *** - or become a patron Don't forget to subscribe to the —————— Where you can find Security In Five —————— - , , , , , Email -
info_outlineSecurity In Five Podcast
The Cybersecurity and Infrastructure Security Agency (CISA) released a report of the top malware strains of 2021. This episode talks about what reports like this are valuable to your continuing education as a cybersecurity professional. Source - Be aware, be safe. *** Support the podcast with a cup of coffee *** - or become a patron Don't forget to subscribe to the —————— Where you can find Security In Five —————— - , , , , , Email -
info_outlineSecurity In Five Podcast
New research shows that almost 90% of ransomware delivery is done through office macros. This ties into the move by Microsoft to block all macros by default in their Office products. This episode breaks it down. Be aware, be safe. *** Support the podcast with a cup of coffee *** - or become a patron Don't forget to subscribe to the —————— Where you can find Security In Five —————— - , , , , , Email -
info_outlineSecurity In Five Podcast
Security researchers have discovered thousands of mobile apps that are leaking API keys. This episode talks about how this is more of a problem than this shows and why it's happening. Be aware, be safe. *** Support the podcast with a cup of coffee *** - or become a patron Don't forget to subscribe to the —————— Where you can find Security In Five —————— - , , , , , Email -
info_outlineSecurity In Five Podcast
Phishing campaigns and attacks are constantly changing. A new credential stealing phishing campaign has been spotted in the wild. This episode talks about what it is and how you can help protect against it. Be aware, be safe. *** Support the podcast with a cup of coffee *** - or become a patron Don't forget to subscribe to the —————— Where you can find Security In Five —————— - , , , , , Email -
info_outlineSecurity In Five Podcast
This episode talks about some exciting news for the Security In Five and your host's new roles. Cloud Security Alliance of MN - Be aware, be safe. *** Support the podcast with a cup of coffee *** - or become a patron Don't forget to subscribe to the —————— Where you can find Security In Five —————— - , , , , , Email -
info_outlineSocial media accounts have changed the landscape of communication as well as technical complexities. Hackers and malicious agents try to use those accounts to spread their impact. However, accounts don't have to be hacked and taken over to use your account to spread spam for example. This episode talks about how this is done and how you can protect and prevent your account.
Be aware, be safe.
Get ExpressVPN, Secure Your Privacy And Support The Show
Become A Patron! Patreon Page
*** Support the podcast with a cup of coffee *** - Ko-Fi Security In Five
—————— Where you can find Security In Five ——————
Security In Five Reddit Channel r/SecurityInFive
Security In Five Podcast Page - Podcast RSS
iTunes, YouTube, TuneIn, iHeartRadio, Spotify, Stitcher
Email - [email protected]