Artwork

内容由Red Hat提供。所有播客内容(包括剧集、图形和播客描述)均由 Red Hat 或其播客平台合作伙伴直接上传和提供。如果您认为有人在未经您许可的情况下使用您的受版权保护的作品,您可以按照此处概述的流程进行操作https://zh.player.fm/legal
Player FM -播客应用
使用Player FM应用程序离线!

Terrifying Trojans

22:52
 
分享
 

Manage episode 322178401 series 1911932
内容由Red Hat提供。所有播客内容(包括剧集、图形和播客描述)均由 Red Hat 或其播客平台合作伙伴直接上传和提供。如果您认为有人在未经您许可的情况下使用您的受版权保护的作品,您可以按照此处概述的流程进行操作https://zh.player.fm/legal

Sometimes a fun game, a friendly email, or an innocuous link can be the most convenient place for an enemy to hide. And its prey is none the wiser—until it strikes. The trojan horse uses many layers of deception to do damage. The ingenuity of these attacks keeps an alarming pace with the technology we use every day. But as long as we stick to trusted sites and sources, we can better the odds against those who use our trusting nature against us.
Steve Weisman tells us about how trojans still keep security professionals on the defensive. Josephine Wolff details how these attacks have evolved, and keep evolving, to catch victims off guard. And Yanick Franantonio takes on the new frontier for trojan attacks.

If you want to read up on some of our research on trojans, you can check out all our bonus material over at redhat.com/commandlineheroes.
Follow along with the episode transcript.

  continue reading

82集单集

Artwork

Terrifying Trojans

Command Line Heroes

2,439 subscribers

published

icon分享
 
Manage episode 322178401 series 1911932
内容由Red Hat提供。所有播客内容(包括剧集、图形和播客描述)均由 Red Hat 或其播客平台合作伙伴直接上传和提供。如果您认为有人在未经您许可的情况下使用您的受版权保护的作品,您可以按照此处概述的流程进行操作https://zh.player.fm/legal

Sometimes a fun game, a friendly email, or an innocuous link can be the most convenient place for an enemy to hide. And its prey is none the wiser—until it strikes. The trojan horse uses many layers of deception to do damage. The ingenuity of these attacks keeps an alarming pace with the technology we use every day. But as long as we stick to trusted sites and sources, we can better the odds against those who use our trusting nature against us.
Steve Weisman tells us about how trojans still keep security professionals on the defensive. Josephine Wolff details how these attacks have evolved, and keep evolving, to catch victims off guard. And Yanick Franantonio takes on the new frontier for trojan attacks.

If you want to read up on some of our research on trojans, you can check out all our bonus material over at redhat.com/commandlineheroes.
Follow along with the episode transcript.

  continue reading

82集单集

كل الحلقات

×
 
Loading …

欢迎使用Player FM

Player FM正在网上搜索高质量的播客,以便您现在享受。它是最好的播客应用程序,适用于安卓、iPhone和网络。注册以跨设备同步订阅。

 

快速参考指南