492 episodes

Deception, influence, and social engineering in the world of cyber crime.

Hacking Humans N2K Networks

    • Technology
    • 4.7 • 267 Ratings

Deception, influence, and social engineering in the world of cyber crime.

    Encore: business email compromise or BEC (noun) [Word Notes]

    Encore: business email compromise or BEC (noun) [Word Notes]

    A social engineering scam where fraudsters spoof an email message from a trusted company officer that directs a staff member to transfer funds to an account controlled by the criminal. 

    • 3 min
    Cops in the catfish game.

    Cops in the catfish game.

    Thanks for joining us again for another episode of fun project brought to you by the team of Hacking Humans, the CyberWire's social engineering podcast. Hacking Humans co-host Dave Bittner is joined by Rick Howard in this series where they view clips from their favorite movies and television shows with examples of the social engineering scams and schemes you hear Dave and co-host Joe Carrigan talk about on Hacking Humans. In this episode, Dave and Rick watch each of the selected scenes, describe the on-screen action for you, and then they deconstruct what they saw. Grab your bowl of popcorn and join us for some fantastic scams and frauds.
    Links to this episode's clips if you'd like to watch along:

    Dave's clip from the movie: Chicago P.D.


    Rick's clip from the movie: The Imitation Game

    • 29 min
    HIPAA (noun) [Word Notes]

    HIPAA (noun) [Word Notes]

    A U.S. law designed to improve the portability and accountability of health insurance coverage.
    CyberWire Glossary link: https://thecyberwire.com/glossary/hipaa
    Audio reference link: Dr. Dana Brems, 2021. Doctor reacts to “HIPAA violations” [Video]. YouTube. URL https://www.youtube.com/shorts/Ksk00s8a_IU

    • 10 min
    Unmasking the deceptive.

    Unmasking the deceptive.

    John Wilson, Senior Fellow, Threat Research at Fortra, joins to discuss email impersonation attacks which found that nearly 99% of these threats can be classified as business email compromise. Dave and Joe share some listener follow up from Terry, who writes in with some comments on episode 262 regarding cybersecurity jargon used. Joe's story comes from a listener this week, this individual writes in sharing the horror story he had to deal with when him and his wife ended up on a target list for scammers. Dave's story follows Elon Musk and Joanna Gaines, co-host of the HGTV show "Fixer Upper," and how they are selling a scam device that claims to lower your electricity bills. Our catch of the day comes from listener William, who writes in sharing an email he received from the"Tampa International Airport Police Department Florida," saying they want to release his fund with the service of DHL Courier Company.
    Links to the stories:

    Worst fake "power saver" plug yet

    Better Business Bureau

    Elon Musk Energy Saving Device: The Scam You Need to Know About


    Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com.

    • 53 min
    Encore: man trap (noun) [Word Notes]

    Encore: man trap (noun) [Word Notes]

    A physical security access control device consisting of an enclosed hallway with interlocking doors on each end where both doors can’t be open at the same time. A person presents credentials to the entry doorway. If authorized, the entry door opens and the person walks into the mantrap. The man trap exit door will not open until the entry door closes. The person presents credentials to the exit door. If authorized, the exit door will open. If not, the person is captured in the man trap until security arrives to handle the situation. Physical security leadership installs man traps to separate unrestricted areas from restricted areas, to prevent tailgating by uncleared personnel, and to impede access by unauthorized persons.

    • 4 min
    Leaving a trail of digital breadcrumbs.

    Leaving a trail of digital breadcrumbs.

    This week we are joined by Harry Maugans from Privacy Bee who sits down to discuss how our digital breadcrumbs, old and new, are coming back to haunt us. Joe and Dave discuss some follow up from listener Phil, who writes in with a question about the safety of IoT and consumer devices. Dave's story follows the ever so popular YouTube, and its implemented measures to prevent users with ad blockers from watching videos. Joe shares a personal story from a friend regarding a scam he had fallen for, where the scammer got personal information and threatened him, asking for $500. Our catch of the day comes from listener John who found a hilarious text conversation on reddit that he just had to share.
    Links to the stories:
    YouTube's ‘War’ on Adblockers Shows How Google Controls the Internet

    Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com.

    • 1 hr 1 min

Customer Reviews

4.7 out of 5
267 Ratings

267 Ratings

[REDACTED] USER ,

I now can listen again! Great podcast! It now plays using VPNs with anti malware/anti tracking VPNs.

I now can listen again! Great podcast! It now plays using VPNs with anti malware/anti tracking VPNs.

FreshDoughnuts ,

Great Entertainment

Despite the real and tangible value of the information in this podcast, it’s just so entertaining! Concise, well curated, and delivered in a way that non-techies can also enjoy it!

Jedi Wannabi ,

Informative and insightful, plus fun

Even if you're not deep into the cyber security world, this is a fun and interesting podcast. Sure, the delivery vehicle is cyber security, but the subject matter is really human nature and applicable everywhere.

Top Podcasts In Technology

Boston Consulting Group BCG
The New York Times
Lex Fridman
Ben Gilbert and David Rosenthal
Jason Calacanis
NPR

You Might Also Like

N2K Networks
Malicious Life
Graham Cluley & Carole Theriault
Hacked
CISO Series
Recorded Future News