In information security you may have the term honeypot. They are important tools and technique in the defense of a network or application. This episode details what a honeypot is and how they are used.

Source

Be aware, be safe.

*** Support the podcast with a cup of coffee *** - Ko-Fi Security In Five

Don't forget to subscribe to the Security In Five Newsletter.

—————— Where you can find Binary Blogger ——————

Security In Five Reddit Channel r/SecurityInFive

Binary Blogger Website

Security In Five Podcast Page - Podcast RSS

Twitter @binaryblogger

iTunes, YouTube, TuneIn, iHeartRadio, Spotify, Stitcher

Email - bblogger@protonmail.com