329 episodes

Deception, influence, and social engineering in the world of cyber crime.

Hacking Humans CyberWire Inc.

    • Technology
    • 4.7 • 244 Ratings

Deception, influence, and social engineering in the world of cyber crime.

    The top 10 brand names most likely used in a phishing scheme.

    The top 10 brand names most likely used in a phishing scheme.

    Omer Dembinsky, a Data Research Manager from Check Point Research, joins Dave to discuss their Brand Phishing Report for Q1 2022 and how DHL, Maersk, and AliExpress were all in the top 10 list. Joe and Dave have some listener follow up from the 200th episode discussing how many redirects are too many. Joe has two stories this week, the first on how Instagram (Meta Platforms) was hit with multiple lawsuits from the Beasley Allen Law Firm over exploiting young people for money. The second story is about social media addiction, and how companies are making the platforms deliberately addictive. Dave's story is on your internet fingerprint that you leave behind, and how easy it is for websites to know everything about you and your computer settings. Our catch of the day comes from listener Pablo, who shares about a scammer contacting him through text trying to receive money for coronavirus insurance.
    Links to stories:

    Meta, Instagram hit with 8 lawsuits for ‘exploiting young people for profit’

    Social media apps are 'deliberately' addictive to users

    The Fingerprint You Leave


    Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter

    • 44 min
    Identity Fabric (noun) [Word Notes]

    Identity Fabric (noun) [Word Notes]

    A set of services for managing identity and access management, or IAM across all of an organization's data islands.
    CyberWire Glossary link: https://thecyberwire.com/glossary/identity-fabric
    Audio reference link: “Leadership Compass Identity Fabrics - Analyst Chat 126,” by KuppingerCole, YouTube, 30 May 2022.

    • 6 min
    North Korea and a global cyber war.

    North Korea and a global cyber war.

    Carole Theriault interviews author and journalist Geoff White on his upcoming book, "The Lazarus Heist: From Hollywood to High Finance: Inside North Korea's Global Cyber War." Joe and Dave share some listener follow up from listener John, regarding a T-mobile breach and how he was notified through a third-party monitoring service and not T-Mobile. Joe's story shares how hackers are also keeping an eye on the upcoming holidays and describes how a Father's Day beer contest from Heineken was a scam. Dave's story is on police warning against a rise in voice phishing as they have made 2000 arrests since the crackdown on social engineering and business email scams started. Our catch of the day comes all the way from the Netherlands, listener Joram shares a scam he discovered in his spam folder. The sender notified him that she is frail and will be dying soon, to which her millions of dollars will be lost since she has no next of kin. The sender goes on to tell him that he is receiving this money just out of the goodness of her heart.
    Links to stories:

    Heineken says Father's Day beer contest is a scam

    2,000 arrests in crackdown on social engineering and business email scams


    Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter

    • 38 min
    Intrusion Kill Chain (noun) [Word Notes]

    Intrusion Kill Chain (noun) [Word Notes]

    A cybersecurity first principle strategy focused on disrupting known adversary activity at one of several phases of an attack sequence.
    CyberWire Glossary link: https://thecyberwire.com/glossary/intrusion-kill-chain
    Audio reference link: "Cybersecurity Days: A Network Defender's Future," by Rick Howard, Integrated Cyber Conference, Integrated Adaptive Cyber Defense (IACD), YouTube, 26 October 2018.

    • 7 min
    The great resignation and data exposure challenges.

    The great resignation and data exposure challenges.

    Abhik Mitra, Head of Portfolio Strategy at Code42, shares the findings on Code 42's 2022 Data Exposure Report (DER). Joe breaks down a story that follows a couple in Westlake, where the woman was called about a supposed warrant out for her arrest, and how she was told that she needs to provide thousands of dollars in order for the police to not come and arrest her. The story describes how her fast-thinking husband was able to figure out the scam and get in touch with real authorities. Dave's story delves into Facebook and a phishing scam that ended in a threat actor stealing 1M credentials in 4 months. Our catch of the day comes from listener William who received an email about a new laptop that he supposedly bought through PayPal. He shares why he knew it was a scheme right away, and hopes to make this information known so others know what to look out for.
    Links to stories:

    Westlake doctor and lawyer avoid telephone scam; police warn residents to be alert

    Phishing tactics: how a threat actor stole 1M credentials in 4 months


    Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitte

    • 51 min
    Identity Orchestration (noun) [Word Notes]

    Identity Orchestration (noun) [Word Notes]

    A subset of security orchestration, the management of identities across an organization's set of digital islands. 
    CyberWire Glossary link: https://thecyberwire.com/glossary/identity-orchestration

    • 5 min

Customer Reviews

4.7 out of 5
244 Ratings

244 Ratings

Jedi Wannabi ,

Informative and insightful, plus fun

Even if you're not deep into the cyber security world, this is a fun and interesting podcast. Sure, the delivery vehicle is cyber security, but the subject matter is really human nature and applicable everywhere.

Anon reviewer d00d ,

Cross promoted content is irrelevant

For some reason they have cross promoted content that is totally irrelevant. I assume they’re worried that word notes can’t survive as a stand alone as a podcast, so they subject the rest of us to it. OVER AND OVER AND OVER.

......................clxlxlg ,

Culturally insensitive

I am assuming it’s Dave Bittner that’s reading an email in an antiquated “Asian” accent (episode 165 around the 20 minute mark), but whether it’s him or not it’s culturally inappropriate / insensitive and should not have happened. It’s 2021 and you should know better, so please do better.

Top Podcasts In Technology

Lex Fridman
Jason Calacanis
NPR
Jack Rhysider
PJ Vogt
Andrew Gelina

You Might Also Like

Cybereason
CyberWire, Inc.
Graham Cluley, Carole Theriault
VICE
The Record by Recorded Future
Jack Rhysider