Hacker Public Radio

HPR3719: HPR News


Listen Later

InfoSec; the language of
security.
What
is Typosquatting and How Do Scammers Use it?
Typosquatting, as an attack, uses modified or misspelled domain
names to trick users into visiting fraudulent websites; the heart of
this attack is domain name registration. Typosquatting is deployed by
scammers to defraud unaware users. Attackers will attempt to: mimic
login pages, redirect traffic, download malware, and extort users.
Past Known Typosquatting Attacks.
Several
Malicious Typosquatted Python Libraries Found On PyPI
Repository
Over
700 Malicious Typosquatted Libraries Found On RubyGems
Repository
Security
advisory: malicious crate rustdecimal
This
Week in Malware-Malicious Rust crate, 'colors' Typosquats
Solutions to Typosquatting.
How
to stop typosquatting attacks
What
Is a Checksum (and Why Should You Care)?
PiHole
Ubuntu font
family
DNS monitoring services.
Link to dnstwister: https://dnstwister.report/
Link to whois: https://www.whois.com/whois
Password Managers.
Link to bitwarden: https://bitwarden.com/
Link to keepassxc: https://keepassxc.org/
Two-factor and
Multifactor Authentication.
First, authentication. This is the process of verifying the
validity of something; in our case, user credentials/identity. The most
common way to authenticate is: USERNAME and PASSWORD.
This is just a single layer (single-factor authentication) and isn’t
enough to discourage attackers.
Second, 2FA (Two-factor Authentication). 2FA increases the
difficulty for attackers by providing users an additional layer of
security to accomplish authentication. Common 2FA methods are: TOTP/OTP
(the One Time Password), Authenticator
Applications (Bitwarden, KeePassXC,...), and Security Keys (Yubikey). This works similar to ATMs;
to authenticate the user must provide both knowledge (account
PIN) and a physical object (bank card).
Last, but not least, MFA (Multifactor Authentication). Similar to
2FA, MFA offers users security with the addition of biometrics
(fingerprint scan, retina scan, facial recognition, and voice
recognition). Attackers must overcome the knowledge factor, Possession
factor, Inherence/Biometric factor, Time factor, and sometimes Location
factor.
MORE helpful security information.
FIDO Alliance
Specifications.
Field
Guide to Two-Step Login.
...more
View all episodesView all episodes
Download on the App Store

Hacker Public RadioBy Hacker Public Radio

  • 4.2
  • 4.2
  • 4.2
  • 4.2
  • 4.2

4.2

34 ratings


More shows like Hacker Public Radio

View all
The Changelog: Software Development, Open Source by Changelog Media

The Changelog: Software Development, Open Source

289 Listeners

Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec by Jerry Bell and Andrew Kalat

Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec

373 Listeners

LINUX Unplugged by Jupiter Broadcasting

LINUX Unplugged

268 Listeners

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast) by Johannes B. Ullrich

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

653 Listeners

Curious Cases by BBC Radio 4

Curious Cases

826 Listeners

The Strong Towns Podcast by Strong Towns

The Strong Towns Podcast

422 Listeners

Late Night Linux by The Late Night Linux Family

Late Night Linux

164 Listeners

Darknet Diaries by Jack Rhysider

Darknet Diaries

8,046 Listeners

Cybersecurity Today by Jim Love

Cybersecurity Today

181 Listeners

CISO Series Podcast by David Spark, Mike Johnson, and Andy Ellis

CISO Series Podcast

189 Listeners

TechCrunch Daily Crunch by TechCrunch

TechCrunch Daily Crunch

42 Listeners

Strict Scrutiny by Crooked Media

Strict Scrutiny

5,809 Listeners

2.5 Admins by The Late Night Linux Family

2.5 Admins

98 Listeners

Cyber Security Headlines by CISO Series

Cyber Security Headlines

140 Listeners

What the Hack? by DeleteMe

What the Hack?

221 Listeners