

Hacking Humans
N2K Networks
Deception, influence, and social engineering in the world of cyber crime.
Episodes
Mentioned books

Sep 26, 2024 • 47min
The devil IS in the details.
In this intriguing discussion, cybersecurity expert Dave Bittner, tech-savvy Maria Varmazis, and information security pro Joe Carrigan tackle a myriad of alarming scams. They share a chilling tale about the risks of shoulder surfing with new debit cards, and a listener's warning against accepting checks from strangers. The trio dives into phishing campaigns targeting iPhone users and crafty e-commerce scams preying on Walmart shoppers. Expect a blend of cautionary tales and laughter as they navigate the digital minefield of scams.

Sep 24, 2024 • 6min
multi-factor authentication (noun) [Word Notes]
Explore the fascinating world of multi-factor authentication, where security meets innovation. Discover the history behind this crucial verification method and how it has evolved over time. The discussion unveils various ways to protect your accounts while highlighting the challenges and vulnerabilities in cybersecurity. Tune in for insights that blend technology with real-world implications!

Sep 19, 2024 • 31min
Scammers beware, the world is watching!
Clayton, a listener with insights on credit card fraud, shares valuable knowledge about the risks associated with automatic update services. The conversation takes a darker turn as the hosts delve into sextortion scams targeting unsuspecting spouses. They also discuss a significant policing success in Lebanon County, where an alleged grandparent scammer was caught in a sting operation. Finally, they highlight a new Australian plan that fines banks and social media platforms for their failure to protect consumers from scams, bringing light to the ongoing battle against fraud.

Sep 17, 2024 • 6min
machine learning (noun) [Word Notes]
Dive into the fascinating world of machine learning! Discover its evolution and how pioneers like Arthur Samuel shaped the field. Hear about the monumental victory of IBM's Deep Blue and how machine learning differs from traditional programming. The discussion highlights its incredible predictive power, especially in enhancing cybersecurity. This engaging exploration uncovers the future potential of algorithms learning from experience, making it a must-listen for tech enthusiasts!

Sep 12, 2024 • 43min
Baked goods and bad actors.
Maria Varmazis, host of N2K's T-Minus, delves into the chilling "Hello pervert" sextortion scam that employs threats and personal imagery to manipulate victims. The discussion highlights how bakery owner Loria Stern fell prey to a counterfeit check scam, illustrating the vulnerabilities small businesses face. They also expose scammers exploiting grieving families with fake funeral live streams on Facebook. Listeners learn about the recently reported YubiKey vulnerabilities and the importance of vigilance against evolving scams.

Sep 10, 2024 • 6min
intelligence (noun) [Word Notes]
Enjoy this special encore episode. The process of turning raw information into intelligence products that leaders use to make decisions with.

Sep 5, 2024 • 39min
Illusions & ill-intent.
Maria Varmazis, host of the daily space show T-Minus, sheds light on Colorado's surge in fraudulent LLCs, which has residents drowning in suspicious mail. She discusses the challenges in tackling this legal mess. The conversation also covers a scam operation out of the Isle of Man that deceived victims into losing millions through fake investments. Finally, phishing techniques disguised as employee surveys reveal how attackers exploit trust to steal sensitive information. It's a fascinating look at the darker side of modern business and cyber threats.

Sep 3, 2024 • 38min
RATs in the tunnel: Uncovering the cyber underworld. [OMITB]
Welcome in! You’ve entered, Only Malware in the Building. Join us each month to sip tea and solve mysteries about today’s most interesting threats. Your host is Selena Larson, Proofpoint intelligence analyst and host of their podcast DISCARDED. Inspired by the residents of a building in New York’s exclusive upper west side, Selena is joined by N2K Networks Dave Bittner and Rick Howard to uncover the stories behind notable cyberattacks. Being a security researcher is a bit like being a detective: you gather clues, analyze the evidence, and consult the experts to solve the cyber puzzle. On this episode, we talk about the abuse of legitimate services for malware delivery.Proofpoint has seen an increase in the abuse of tools like ScreenConnect and NetSupport, as well as Cloudflare Tunnel abuse and the use of IP filtering. They have also observed a rise in financially motivated malware delivery using TryCloudflare Tunnel abuse, focusing on remote access trojans (RATs) like Xworm and AsyncRAT.Today we look at how Cloudflare tunnels are used to evade detection and how they have evolved their tactics by incorporating obfuscation techniques, with ongoing research to identify the threat actors involved.

Sep 3, 2024 • 6min
SaaS (noun) [Word Notes]
Enjoy this special edition of Word Notes:A cloud-based software distribution method where app infrastructure, performance, and security are maintained by a service provider and accessible to users, typically via subscription, from any device connected to the internet.

Aug 29, 2024 • 45min
Beware of the deceivers.
Suzy Enos, a determined sister, shares her harrowing journey of protecting her late sister's assets from scammers who impersonated family members. She highlights the shocking ease with which fraudsters exploit personal information during times of grief. The conversation uncovers the importance of proactive account management and the need for awareness regarding automatic billing updates. Additionally, the discussion delves into absurd scam letters, emphasizing the ridiculousness of such schemes and the necessity of skepticism in detecting fraud.