Send us a text A fake contractor calls the help desk, a password gets reset, and suddenly a national retailer has hackers inside. We open the door on the human side of hacking—how believable stories and helpful habits become the first domino—then trace the technical steps that turn a small foothold into a system‑wide crisis. We walk through the anatomy of the Marks & Spencer breach: social engineering as the entry point, slow‑burn privilege escalation, and the moment attackers reached th...
All content for Tech Overflow is the property of Hannah Clayton-Langton and Hugh Williams and is served directly from their servers
with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
Send us a text A fake contractor calls the help desk, a password gets reset, and suddenly a national retailer has hackers inside. We open the door on the human side of hacking—how believable stories and helpful habits become the first domino—then trace the technical steps that turn a small foothold into a system‑wide crisis. We walk through the anatomy of the Marks & Spencer breach: social engineering as the entry point, slow‑burn privilege escalation, and the moment attackers reached th...
Behind the Screen: How Mobile Apps Work and Why Companies Build Them
Tech Overflow
34 minutes
1 month ago
Behind the Screen: How Mobile Apps Work and Why Companies Build Them
Send us a text Ever wondered what's really happening behind the scenes when you tap that app icon on your phone? From the sensors tracking your every move to the complex business decisions determining which features you get access to, the world of mobile apps is fascinating. Hannah Clayton-Langton and Hugh Williams, former VP at Google and eBay, break down why companies invest millions in app development instead of just using mobile websites. The answer lies in the incredible capabilities of...
Tech Overflow
Send us a text A fake contractor calls the help desk, a password gets reset, and suddenly a national retailer has hackers inside. We open the door on the human side of hacking—how believable stories and helpful habits become the first domino—then trace the technical steps that turn a small foothold into a system‑wide crisis. We walk through the anatomy of the Marks & Spencer breach: social engineering as the entry point, slow‑burn privilege escalation, and the moment attackers reached th...