517 episodes

Deception, influence, and social engineering in the world of cyber crime.

Hacking Humans N2K Networks

    • Technology

Deception, influence, and social engineering in the world of cyber crime.

    Encore: Virtual Private Network (VPN) (noun) [Word Notes]

    Encore: Virtual Private Network (VPN) (noun) [Word Notes]

    A software, hardware or hybrid encryption layer between two devices on the network that makes the traffic between the sites opaque to the other devices on the same network.

    • 6 min
    Scamming the innocent.

    Scamming the innocent.

    This week we are joined by Maria Varmazis, host of the N2K daily space show, T-Minus. She brings us a scary story from a woman who never thought she'd ever be scammed. Dave and Joe shares some follow up before getting into their stories, they share a story from a listener who sent in a LinkedIn link about scammers targeting Walmart. They also share a question from listener Cynthia, who asks about bank scam covered before, and how to respond to these scams. Dave shares a story from an anonymous source this week, who writes in about the dangers of crypto scams. Joe has two stories for us this week, the first one being from a friend of his that works for a company that specializes in military contracts. This company was hiring an employee and received three emails that all were very similar to one another, sharing that this is a red flag and wanted to write in to share the dangers of this scam. The second story is a very similar story to the one covered on Andy Cohen a few episode ago, and shares how a Jefferson county couple were scammed out of hundreds of thousands of dollars. Our catch of the day comes from listener Thomas who shares a story on AI voices sounding like famous people and his experience.
    Links to the stories:

    The Day I Put $50,000 in a Shoe Box and Handed It to a Stranger I never thought I was the kind of person to fall for a scam.

    Phishing scam dupes Jefferson County couple out of $137K

    Phishing bank scam dupes Golden couple out of $137K

    SCAM HELL Walmart ‘gift card scammers’ caught spending $15k on jewelry, big-screen TVs and lobster tails at Sam’s Club


    You can hear more from the T-Minus space daily show here.
    Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com.

    • 47 min
    Encore: smishing (SMS phishing) (noun) [Word Notes]

    Encore: smishing (SMS phishing) (noun) [Word Notes]

    From the intrusion kill-chain model, the delivery of a “lure” via a text message to a potential victim by pretending to be some trustworthy person or organization in order to trick the victim into revealing sensitive information. Smishing is a portmanteau word made of two other words, the acronym “SMS” and the cyber coinage “Phishing“. It’s a text-message-centric variation of the email-based phishing scams that have been around since the 1990s. The term “Smishing” arose in the late 2000s. 

    • 4 min
    Looking forward in 2024.

    Looking forward in 2024.

    Aaron Walton, Threat Intel Analyst from Expel is discussing some things to look out for in 2024. Joe and Dave share some listener follow up from Mateusz, who shares some positive news with us. Dave's story is about a romance scammer coming clean after failing to woo CBS News reporter, Erica Johnson. Joe's story is on the latest decision from the FCC, and how they voted to ban scam robocalls that use AI-generated voices. Our catch of the day comes from listener Chuck, just in time for tax season, he warns against a phishing scam he received about his taxes.
    Links to the stories:

    Romance scammer reveals how he tricks women after failing to fool Go Public reporter

    FCC votes to ban scam robocalls that use AI-generated voices


    Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com.

    • 42 min
    Encore: port mirroring (noun) [Word Notes]

    Encore: port mirroring (noun) [Word Notes]

    A network switch configuration setting that forwards a copy of each incoming and outgoing packet to a third switch port. Also known as SPAN or Switched Port Analyzer, RAP or Roving Analysis Port, and TAP or Test Access Point. When network managers and security investigators want to capture packets for analysis, they need some sort of generic TAP or Test Access Point. You can buy specialized equipment for this operation but most modern switches have this capability built in. 

    • 4 min
    Scamming just isn't what it used to be.

    Scamming just isn't what it used to be.

    This week, we are joined by host of N2K's T-Minus Space Daily podcast, Maria Varmazis, she sits down with Joe and Dave to discuss sextorion materials that were found on popular social media apps such as, TikTok, Instagram, Snapchat and YouTube. Joe and Dave share quite a bit of follow up, Joe starts with an anonymous listener writing in sharing their story on gift card scams. Dave shares another anonymous listeners comments, sharing about what they think of Andy Cohen going public on how he got scammed. Finally, Joe and Dave hear from a listener by the name of "The Computrix," who says they need to defend Walmart. Dave share's his story about the most common phishing email themes of 2023. Joe's got the story of ransomware not being paid the same way as it used to be by companies, and share the two different angles on that. Our catch of the day comes from listener William, who writes in with a phishing scam that caught his eye.
    Links to the stories:

    Sextortion training materials found on TikTok, Instagram, Snapchat and YouTube, according to new report

    Most Common Phishing Email Themes of 2023

    Companies aren’t paying ransoms like they used to

    New Ransomware Reporting Requirements Kick in as Victims Increasingly Avoid Paying

    FBI: Scammers Are Sending Couriers to Collect Cash From Victims


    You can hear more from the T-Minus space daily show here.
    Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com.

    • 47 min

Top Podcasts In Technology

The Verge
Vox Media Podcast Network
BG2Pod
Lenny Rachitsky
KubeFM
Chuck Bowser, RCDD, TECH

You Might Also Like

N2K Networks
Malicious Life
Graham Cluley & Carole Theriault
Hacked
CISO Series
VICE