260 episodes

Deception, influence, and social engineering in the world of cyber crime.

Hacking Humans CyberWire Inc.

    • Technology
    • 5.0 • 1 Rating

Deception, influence, and social engineering in the world of cyber crime.

    Misdirection and layering with a con in the middle. [Hacking Humans Goes to the Movies]

    Misdirection and layering with a con in the middle. [Hacking Humans Goes to the Movies]

    Thanks for joining us for our fun project brought to you by the team of Hacking Humans, the CyberWire's social engineering podcast. Co-hosts Dave Bittner and Joe Carrigan are joined by Rick Howard in this series where they view clips from their favorite movies with examples of the social engineering scams and schemes you hear about on Hacking Humans. In this episode, Dave, Joe and Rick are watching Joe's and Rick's scene picks. They watch each of the selected scenes, describe the on-screen action for you, and then the team deconstructs what they saw. Grab your popcorn and join us for a trip to the movies.
    Links to this episode's clips if you'd like to watch along:

    Joe's clip from "The Simpsons: Father and Son Grifting" episode

    Rick's pick from "Paper Moon"

    • 17 min
    software bill of materials (SBOM) (noun) [Word Notes]

    software bill of materials (SBOM) (noun) [Word Notes]

    A formal record containing the details and supply chain relationships of various components used in building software. 

    • 6 min
    A good amount of skepticism helps protect you online.

    A good amount of skepticism helps protect you online.

    Guest Blake Hall, CEO and founder of a company called ID.me, discusses protecting your identity online, Dave and Joe have some follow up from listener Rafa on 2FA he uses, Dave has a story about bots that take advantage of 2FA to break into your payment accounts, Joe's story is about scams carried out through QR codes, and our COTD comes from listener Wyatt about an award-winning email from Warren Buffett.
    Links to stories:

    The Booming Underground Market for Bots That Steal Your 2FA Codes

    Fake “Sugar Daddies” are cheating on Instagram


    Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.

    • 50 min
    zero trust (noun) [Word Notes]

    zero trust (noun) [Word Notes]

    A security philosophy that assumes adversaries have already penetrated the digital environment and tries to reduce the potential impact by limiting access by people, devices, and software to only the resources essential to perform their function and nothing more. 

    • 8 min
    Let's go to the movies. [Hacking Humans Goes to the Movies]

    Let's go to the movies. [Hacking Humans Goes to the Movies]

    Welcome to a fun new project by the team who brings you Hacking Humans, the CyberWire's social engineering podcast. Co-hosts Dave Bittner and Joe Carrigan are joined by Rick Howard in this series. They view clips from their favorite movies with examples of the social engineering scams and schemes you hear about on Hacking Humans. In this first episode, Dave, Joe and Rick are watching Dave's and Joe's picks. They watch each of the selected scenes, describe the on-screen action for you, and then the team deconstructs what they saw. Grab your popcorn and join us for a trip to the movies.
    Links to movie clips if you'd like to watch along:

    Dave's pick from "The Grifters"

    Joe's clip from "Matchstick Men"

    • 25 min
    OT security (noun) [Word Notes]

    OT security (noun) [Word Notes]

    Hardware and software designed to detect and prevent cyber adversary campaigns that target industrial operations. 

    • 7 min

Customer Reviews

5.0 out of 5
1 Rating

1 Rating

Top Podcasts In Technology

You Might Also Like