

Hacking Humans
N2K Networks
Deception, influence, and social engineering in the world of cyber crime.
Episodes
Mentioned books

Nov 25, 2025 • 7min
Pseudoransomware (noun) [Word Notes]
This discussion dives into the intriguing world of pseudoransomware, a form of malware that obliterates data instead of encrypting it. Explore why cybercriminals often neglect recovery efforts, and how nation-state actors employ this tactic as a smokescreen for misdirection. Discover the implications of North Korea's cyber campaigns against financial institutions and the notorious NotPetya attack, which led to monumental corporate losses. Ultimately, the podcast raises chilling insights into the motivations behind chaos-driven cyberattacks.

Nov 20, 2025 • 56min
Lost iPhone, found trouble.
This week, the hosts dive into alarming social engineering scams, including China's crackdown on a violent fraud gang and the extradition of a key scam figure. They discuss an unsettling sextortion method involving AI-generated images from unsolicited FaceTime calls. A debate erupts around the legitimacy of an AI-driven cyber-espionage claim by Anthropic amid skepticism from researchers. Plus, there's a warning about phishing attacks using lost iPhone contact info and mobile shopping threats during the holiday season.

Nov 18, 2025 • 7min
Trusted Platform Module (TPM) (noun) [Word Notes]
Delve into the world of Trusted Platform Modules (TPM), where cryptographic magic happens! Discover how these chips secure private keys and enable safer computing through asymmetric encryption. Explore the historical roots of key exchange methods and learn why TPM became essential. Find out about TPM's role in Windows 11 and its specifications. Intrigued? You'll also hear examples illustrating how TPMs work and enhance security in everyday devices!

Nov 13, 2025 • 53min
Tap, pay…and prey.
This week, the hosts dive into the alarming world of social engineering scams and the latest threats. Meta reveals how it could earn billions from fraudulent ads, while a new investigation uncovers the risks of hijacking trusted Windows updaters. Joe warns listeners about 'ghost tapping'—a sneakier scam draining funds from tap-to-pay cards in crowded places. They share tips on protecting against these scams, including using RFID-blocking wallets and monitoring your accounts closely.

Nov 11, 2025 • 6min
Private Network Access (PNA) (noun) [Word Notes]
Explore the definition and significance of Private Network Access, a critical browser control blocking access to private network resources. Learn why Chrome is phasing out access from non-secure sites and the origins of this move tied to CORS. Discover how PNA enhances security by preventing attackers from reaching local network devices. Insights into potential compatibility issues for hosted apps and the practical implications for cybersecurity are also discussed, highlighting its role in safeguarding home networks from malware.

Nov 6, 2025 • 50min
Seniors in scam crosshairs.
This week, our hosts Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of the T-Minus Space Daily show) are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. We start with some follow-up, listener Jay shared how Robinhood tackled a $25.4 billion phone scam problem with a simple fix—a bright yellow in-call banner that warns users, “We’re not calling you. If the caller says they’re from Robinhood, they’re not—hang up.” Meanwhile, Myanmar’s military blew up a major online scam center at KK Park, forcing over 1,500 people to flee into Thailand. Listener JJ reminds us it’s “CAC cards,” not just “CAC,” and Shannon reports from Scooter’s Coffee, where customers are now bringing chickens for pup cups—proving some pets really do rule the roost. Maria’s story is on Bitdefender and NETGEAR’s 2025 IoT Security Report, which found smart homes now face triple the attacks of last year—about 29 a day. Dave’s story is on a cloud architect who exposed his AWS keys online, letting attackers hijack his account for crypto-mining and phishing. His takeaway: secure keys, limit privileges, and assume it can happen to you. Joe’s got the story of scammers posing as banks or the FTC, using fake security alerts to trick older adults into draining their savings. The FTC says losses are skyrocketing—so don’t move money or trust surprise calls or pop-ups. Our catch of the day comes from the Scams SubReddit, where a scammer got way more than what they signed up for in a text chain.
Resources and links to stories:
Robinhood LinkedIn post.
Stragglers from Myanmar scam center raided by army cross into Thailand as buildings are blown up
My AWS Account Got Hacked - Here Is What Happened
False alarm, real scam: how scammers are stealing older adults’ life savings
Trying to scam the scammer
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@n2k.com.

Nov 4, 2025 • 7min
Web 3.0 (noun) [Word Notes]
Discover the potential of Web 3.0 as it aims to decentralize internet interactions, shifting power from tech giants to users. Explore the contrasts between Web 1.0's static sites, Web 2.0's user-monetizing platforms, and the promising benefits of Web 3.0, including data sovereignty. However, skepticism lingers around its practicality, with voices like Elon Musk questioning whether it's more marketing hype than reality. Dive into this evolving digital landscape and its implications for the future of online engagement.

Nov 4, 2025 • 38min
Pass the intel, please. [OMITB]
Welcome in! You’ve entered, Only Malware in the Building. Join us each month to sip tea and solve mysteries about today’s most interesting threats. Your host is Selena Larson, Proofpoint intelligence analyst and host of their podcast DISCARDED. Inspired by the residents of a building in New York’s exclusive upper west side, Selena is joined by her co-hosts N2K Networks Dave Bittner and Keith Mularski, former FBI cybercrime investigator and now Chief Global Ambassador at Qintel.
Being a security researcher is a bit like being a detective: you gather clues, analyze the evidence, and consult the experts to solve the cyber puzzle. On this episode, we explore what makes information sharing actually work. From public-private partnerships to actionable intelligence, our guests discuss how organizations can prioritize, process, and operationalize shared cyber threat data to stay ahead of emerging risks.
Plus, catch Dave, Selena, and Keith on their road trip adventure in our video on YouTube — full of laughs, unexpected detours, and plenty of sleuthing!

Oct 31, 2025 • 3min
The Malware Mash!
Get into the Halloween spirit with a catchy malware parody that explores the spooky world of cyber threats. From the infamous Stuxnet worm to the antics of dark web script kiddies, the discussion is both entertaining and informative. Enjoy vivid imagery of botnets, DDoS attacks, and ransomware as they paint a haunting picture of online dangers. A cheeky reference to Vladimir and the infamous NotPetya adds an international twist. Tune in for a celebration of defenders, all wrapped up in a fun music mash!

Oct 30, 2025 • 40min
Beware the boo-gus giveaway.
This week, our hosts Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of the T-Minus Space Daily show) are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. In our follow up, our hosts respond to a listener who wrote in with an insightful question about the role of wealth in scam susceptibility. Joe's story covers how a fake AI recruiter lures developers with a GitHub “technical assessment” that, when run, unleashes a five-stage malware chain to steal credentials, wallets, and install persistent backdoors. Maria has the story on a Halloween-themed phishing scam that lured victims with a fake Home Depot giveaway, using obfuscated code, stolen email threads, and tracking pixels to trick users into handing over personal and payment information. Dave’s story is on a convincing phishing email claiming Dashlane was hacked, showing how fear and urgency—even in obvious scams—can make anyone second-guess before thinking twice. Our catch of the day is from the scams sub-Reddit thread, and is how one user received a message from their "aunt" who wanted to be nice and grab the user a present.
Resources and links to stories:
How a fake AI recruiter delivers five staged malware disguised as a dream job
Home Depot Halloween phish gives users a fright, not a freebie
Why the Obviously Fake Dashlane Hack Phishing Email Still Made Me Jump
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@n2k.com.


