Chapter

The Trend of Attacks Moving Towards Humans
listen on Spotify
01:32 - 12:46 (11:14)

With attacks moving more towards humans through social engineering tactics, it's important to consider the security of the entire stack, from networking security to software security.

Clips
Attackers can exploit vulnerabilities in software, such as buffer overflows and memory safety issues, to take over control of the program and execute codes that were unintended, leading to compromised systems under the attacker's control.
01:32 - 04:43 (03:10)
listen on Spotify
Software Vulnerabilities
Summary

Attackers can exploit vulnerabilities in software, such as buffer overflows and memory safety issues, to take over control of the program and execute codes that were unintended, leading to compromised systems under the attacker's control.

Chapter
The Trend of Attacks Moving Towards Humans
Episode
#95 – Dawn Song: Adversarial Machine Learning and Computer Security
Podcast
Lex Fridman Podcast
This podcast discusses the use of formally verified systems and the importance of having verified security.
04:43 - 07:52 (03:09)
listen on Spotify
Formally Verified Systems
Summary

This podcast discusses the use of formally verified systems and the importance of having verified security. With a wide range of systems being formally verified, including micro kernels, compilers, and crypto libraries, it's exciting to see the recognition of their importance.

Chapter
The Trend of Attacks Moving Towards Humans
Episode
#95 – Dawn Song: Adversarial Machine Learning and Computer Security
Podcast
Lex Fridman Podcast
The weakest link in cybersecurity often is humans rather than the system themselves, with recent attacks beginning to exploit this overlooked aspect of cybersecurity.
07:52 - 10:59 (03:06)
listen on Spotify
Cybersecurity
Summary

The weakest link in cybersecurity often is humans rather than the system themselves, with recent attacks beginning to exploit this overlooked aspect of cybersecurity.

Chapter
The Trend of Attacks Moving Towards Humans
Episode
#95 – Dawn Song: Adversarial Machine Learning and Computer Security
Podcast
Lex Fridman Podcast
Social engineering attacks target humans to manipulate their opinions, perceptions and ultimately gain unauthorized access to sensitive information.
10:59 - 12:46 (01:47)
listen on Spotify
Social Engineering Attacks
Summary

Social engineering attacks target humans to manipulate their opinions, perceptions and ultimately gain unauthorized access to sensitive information. In the future, these attacks are expected to become even more effective on humans.

Chapter
The Trend of Attacks Moving Towards Humans
Episode
#95 – Dawn Song: Adversarial Machine Learning and Computer Security
Podcast
Lex Fridman Podcast