podcatch.com
A good podcast listen, now.
Sun, 19 Apr 2015 14:20:13 GMT
The Target hack came through the side door via a vendor that had access to Target’s system. Expect to see more of that, and ever-more sophisticated hacks, says Wired security writer Kim Zetter. In this segment of the pod, Zetter breaks down how hacks happen -- from phishing to ...