472 episodes

Deception, influence, and social engineering in the world of cyber crime.

Hacking Humans N2K Networks

    • Technology
    • 5.0 • 2 Ratings

Deception, influence, and social engineering in the world of cyber crime.

    Rooting vs routing. [Hacking Humans Goes to the Movies]

    Rooting vs routing. [Hacking Humans Goes to the Movies]

    Thanks for joining us again for another episode of fun project brought to you by the team of Hacking Humans, the CyberWire's social engineering podcast. Hacking Humans co-host Dave Bittner is joined by Rick Howard in this series where they view clips from their favorite movies and television shows with examples of the social engineering scams and schemes you hear Dave and co-host Joe Carrigan talk about on Hacking Humans. In this episode, Dave and Rick watch each of the selected scenes, describe the on-screen action for you, and then they deconstruct what they saw. Grab your bowl of popcorn and join us for some fantastic scams and frauds.
    Links to this episode's clips if you'd like to watch along:

    Dave's clip from the movie: Matchstick Men


    Rick's clip from the movie: Mr. Robot

    • 28 min
    Hackers play the evasion game.

    Hackers play the evasion game.

    This week our guest is, John Hammond from Huntress and he sits down to talk about spoofing and evasion techniques used by hackers. Dave and Joe share a bit of follow up, including a question form listener John who writes in asking about a passkey discussion in the last episode. Joe has a story from Reddit this week, where someone posted about a dispute they are having with their wedding caterer, where the company is saying the couple still owes them over $5,000 after the wedding has happened for umbrellas, the person posting wants to know what they should do about this argument. Dave's story is from Retool, where they are warning customers after an employee of theirs fell victim to a phishing scheme through SMS. Our catch of the day comes from the University of Alabama department of engineering, where the receiver of a suspicious looking email is being "sued" after owing $300 and not paying it back.
    Links to follow-up and stories:

    Accelerating the Availability of Simpler, Stronger Passwordless Sign-Ins

    When MFA isn't actually MFA

    Wedding caterer charging us $5,000 post-wedding for their accountant’s error


    Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.

    • 53 min
    Cloud Security Posture Management (CSPM) (noun) [Word Notes]

    Cloud Security Posture Management (CSPM) (noun) [Word Notes]

    Tools that automate the identification and remediation of cloud misconfigurations. 
    CyberWire Glossary link: https://thecyberwire.com/glossary/cloud-security-posture-management
    Audio reference link: Josh Whedon. 2005. Serenity [Movie]. IMDb. URL https://www.imdb.com/title/tt0379786/

    • 7 min
    The online dating world is a jungle.

    The online dating world is a jungle.

    Andrew Hendel, CEO at Marshmallo, joins to share tips to safeguard your feelings and identity in the online dating world. Dave and Joe share some listener follow up from Gareth, who writes in to discuss strange emails he has been receiving. Dave's story follows a woman who was spared jail time after being manipulated by hackers into money laundering. Joe's story is from listener Doug who wrote in to the show to talk about the site he is in charge of and discusses a website he uses called "Buy me a coffee," where his viewers can buy him a coffee, and how he has been experiencing some weird instances with the payment methods of that website. Our catch of the day comes from listener Brandyon who shares an interesting way he was offered to make $600 a week.
    Links to follow-up and stories:
    Woman 'manipulated' by hackers into money laundering

    Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.

    • 50 min
    Encore: The Bombe (noun) [Word Notes]

    Encore: The Bombe (noun) [Word Notes]

    An electro-mechanical device used to break Enigma-enciphered messages about enemy military operations during the Second World War. The first bombe–named Victory and designed by Alan Turning and Gordon Welchman– started code-breaking at Bletchley Park on 14 March 1940, a year after WWII began. By the end of the war, five years later, almost 2000, mostly women, sailors and airmen operated 211 bombe machines in the effort. The allies essentially knew what the German forces were going to do before the German commanders in the field knew. Historians speculate that the effort at Bletchley Park shortened the war by years and estimate the number of lives saved to be between 14 and 21 million.

    • 4 min
    Passkeys: consumer-friendly password killers?

    Passkeys: consumer-friendly password killers?

    Guest Chris Sherwood, owner of Crosstalk Solutions, joins Dave to talk about passkeys. Joe shares some listener follow-up about "revert" and side-loading applications on Android phones. Joe's story came from a listener named Kyle who sent this as a Catch of the Day (COTD) about a phishing scam email conversation about event sponsorship. Dave discusses something he saw on Mastodon from user Bjorn about some fraudulent bank charges and stopping a scam in process. Our COTD is from listener Alec about a potential dating scam offering over Instagram.
    Links to follow-up and stories:


    Follow-up on side-loading applications (Note, we do not recommend you install any of these applications.)



    Mastodon thread about social engineering involving fraudulent banking charges.

    Chris Sherwood's passkey explainer video on YouTube



    Passkeys directory website


    Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.

    • 46 min

Customer Reviews

5.0 out of 5
2 Ratings

2 Ratings

Top Podcasts In Technology

Lex Fridman
Ben Gilbert and David Rosenthal
SINTEF
The Verge
The New York Times
Jason Calacanis

You Might Also Like

N2K Networks
Malicious Life
Graham Cluley & Carole Theriault
Hacked
CISO Series
Recorded Future News