Hacking Humans cover image

When legit is the trick: Phishing’s sneaky new moves. [OMITB]

Hacking Humans

00:00

How device codes are weaponized

Hosts unpack the attack steps: believable lures, scanning QR codes, and sharing the device code token with criminals.

Play episode from 06:57
Transcript

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app