
Advice on security, from Washington, DC and Washington State. The Predator Files have bad news on privacy. Notes on the hybrid war. And LoveGPT is not your soulmate.
CyberWire Daily
00:00
Understanding Social Engineering Tactics and the Need to Rethink Authentication Methods
In this chapter, the speakers discuss social engineering tactics used by adversaries to gain unauthorized access and emphasize the need to rethink the reliance on phone numbers as a reliable authentication method.
Transcript
Play full episode


