Site Map - skip to main content

Hacker Public Radio

Your ideas, projects, opinions - podcasted.

New episodes every weekday Monday through Friday.
This page was generated by The HPR Robot at


hpr3612 :: Who is Evil Steve? Part 2

We take a closer look at the types of Evil Steve's attacking us

<< First, < Previous, , Latest >>

Thumbnail of Lurking Prion
Hosted by Lurking Prion on 2022-06-07 is flagged as Explicit and is released under a CC-BY-SA license.
adminadmin, cybersecurity, security, threats, threat actors, Evil Steve. (Be the first).
The show is available on the Internet Archive at: https://archive.org/details/hpr3612

Listen in ogg, spx, or mp3 format. Play now:

Duration: 00:15:59

Privacy and Security.

In this open series, you can contribute shows that are on the topic of Privacy and Security

admin admin with Lurking Prion

Episode 4: Who is Evil Steve? Part 2

Picking up from Episode 3: Picking up from the last episode, we delve a bit more into the types of threat actors (people) that are attacking us. We explore the run of the mill data theft hacker to the more professional Advanced Persistent Threats (APTs). The show is about 16 minutes long.


Comments

Subscribe to the comments RSS feed.

Leave Comment

Note to Verbose Commenters
If you can't fit everything you want to say in the comment below then you really should record a response show instead.

Note to Spammers
All comments are moderated. All links are checked by humans. We strip out all html. Feel free to record a show about yourself, or your industry, or any other topic we may find interesting. We also check shows for spam :).

Provide feedback
Your Name/Handle:
Title:
Comment:
Anti Spam Question: What does the letter P in HPR stand for?
Are you a spammer?
What is the HOST_ID for the host of this show?
What does HPR mean to you?