534 episodes

Deception, influence, and social engineering in the world of cyber crime.

Hacking Humans N2K Networks

    • Technology
    • 4.6 • 276 Ratings

Deception, influence, and social engineering in the world of cyber crime.

    Fighting off phishing.

    Fighting off phishing.

    Roger Grimes, a Data Driven Defense Evangelist from KnowBe4 and author is discussing his new book, "Fighting Phishing: Everything You Can Do to Fight Social Engineering and Phishing." Dave and Joe share some listener follow up, the first being from listener Tim, who shares a story of him almost falling for a scam involving some of his investment assets. Lastly, Dave and Joe share a story from an anonymous listener who wrote in to share about a LinkedIn imposter nightmare. Dave's story focuses on a how the LabHost PhaaS platform was disrupted by a year-long global law enforcement operation, resulting in the arrest of 37 suspects, including the original developer. Joe shares the story of an 81 year old Ohio man, who was arrested after shooting a woman after both of them got wrapped up in a phone call scam. Our catch of the day comes from Robert, who writes in with what he believes is a email scam from a Chinese company called "Infoonity."
    Please take a moment to fill out an audience survey! Let us know how we are doing!
    Links to the stories:

    LabHost phishing service with 40,000 domains disrupted, 37 arrested

    Ohio Man - Daily Mail


    Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com.

    • 51 min
    Encore: fuzzing (noun) [Word Notes]

    Encore: fuzzing (noun) [Word Notes]

    An automatic software bug and vulnerability discovery technique that inputs invalid, unexpected and/or random data or fuzz into a program and then monitors the program's reaction to it.

    • 5 min
    Is change presenting a window of opportunity for attackers?

    Is change presenting a window of opportunity for attackers?

    Trevin Edgeworth, Red Team Practice Director at Bishop Fox, is discussing how change, like M&A, staff, tech, lack of clarity or even self-promotion within and around security environments presents windows of opportunity for attackers. Joe and Dave share some listener follow up, the first one comes from Erin, who writes in from Northern Ireland, shares an interesting new find about scammers now keeping up with the news. The second one comes from listener Johnathan who shared thoughts on reconsidering his view on defining Apple's non-rate-limited MFA notifications as a "vulnerability." Lastly, we have follow up from listener Anders who shares an article on AI. Joe shares a story from Amazon sellers, and how they are being plagued in scam returns. Dave brings us the story of how to save yourself and your loved ones from AI robocalls.
    Please take a moment to fill out an audience survey! Let us know how we are doing!
    Links to the stories:

    Theory Is All You Need: AI, Human Cognition, and Decision Making

    Amazon Sellers Plagued by Surge in Scam Returns

    How to Protect Yourself (and Your Loved Ones) From AI Scam Calls

    News Insights: Does X Mark a Target? with Trevin Edgeworth, Director of Red Team


    Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com.

    • 1 hr 4 min
    Encore: Unix (noun) [Word Notes]

    Encore: Unix (noun) [Word Notes]

    A family of multitasking, multi-user computer operating systems that derive from the original Unix system built by Ken Thompson and Dennis Ritchie in the 1960s.

    • 5 min
    Could AI's doomsday be deferred?

    Could AI's doomsday be deferred?

    Dr. Robert Blumofe, CTO at Akamai, sits down to talk about the AI doomsday versus a "very bad day" scenario. Dave shares a story from The Knowledge Project Podcast, where the host talks to Adam Robinson, a multifaceted individual known for his work as an author, educator, entrepreneur, and hedge fund advisor, and he talks about what is all incorporated into the term "stupidity." Dave goes on to share that while most people may feel stupid when falling for a scam, this research suggests otherwise, and you should never feel that way for falling for any scam. Joe's story comes from Hayley Compton at BBC, and is on a Facebook scam sneaking it's way into a family's home after a couple just had their first child. Our catch of the day comes from listener Michael, who shares an email he received that caught him off guard at first.
    Please take a moment to fill out an audience survey! Let us know how we are doing!
    Links to the stories:

    How Not to Be Stupid

    'Facebook scammer tricked his way into our home'


    Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com.

    • 54 min
    Encore: deep packet inspection (DPI) (noun) [Word Notes]

    Encore: deep packet inspection (DPI) (noun) [Word Notes]

    A network monitoring and filtering technique that examines both the header information and the payload of every packet traversing a network access point.

    • 5 min

Customer Reviews

4.6 out of 5
276 Ratings

276 Ratings

Duster008 ,

Great show

I listen to every episode, twice. 😊 Thanks for a great show.

[REDACTED] USER ,

I now can listen again! Great podcast! It now plays using VPNs with anti malware/anti tracking VPNs.

I now can listen again! Great podcast! It now plays using VPNs with anti malware/anti tracking VPNs.

FreshDoughnuts ,

Great Entertainment

Despite the real and tangible value of the information in this podcast, it’s just so entertaining! Concise, well curated, and delivered in a way that non-techies can also enjoy it!

Top Podcasts In Technology

Lex Fridman Podcast
Lex Fridman
All-In with Chamath, Jason, Sacks & Friedberg
All-In Podcast, LLC
Acquired
Ben Gilbert and David Rosenthal
The Neuron: AI Explained
The Neuron
BG2Pod with Brad Gerstner and Bill Gurley
BG2Pod
TED Radio Hour
NPR

You Might Also Like

CyberWire Daily
N2K Networks
Malicious Life
Malicious Life
Smashing Security
Graham Cluley & Carole Theriault
Hacked
Hacked
Click Here
Recorded Future News
Cyber Security Headlines
CISO Series