

Hacking Humans
N2K Networks
Deception, influence, and social engineering in the world of cyber crime.
Episodes
Mentioned books

Jul 16, 2024 • 6min
Encore: backdoor (noun) [Word Notes]
Delving into the history and impact of 'backdoors' in cybersecurity, this episode explores their origins from World War I to current supply chain attacks. References to 'War Games' and high-profile breaches like NotPetya and SolarWinds highlight the significance of this hidden access method.

Jul 11, 2024 • 31min
The costly consequences of communication scams.
A discussion on the costly Business Email Compromise scams, emphasizing the need for verification. Stories shared include a police impersonation scam and the privacy concerns on Venmo transactions. An amusing email scam involving EuroMillions winners is dissected, along with communication mishaps and unique trivia banter.

Jul 9, 2024 • 6min
Encore: watering hole attack (noun) [Word Notes]
Exploration of watering hole attacks, including a real-life case on the International Civil Aviation Organization. Browser exploitation contest showcases evolving IT security landscape and need for robust protection in the digital age.

Jul 4, 2024 • 54min
Encore: AI versus AI.
Blair Cohen from AuthenticID explains how generative AI intersects with authentication. The hosts discuss scams, NFT dev impostors, and taking a scammer quiz. They share tech scam experiences and caution against clicking on suspicious links. The conversation also covers advancements in AI technology, biometric security, and the use of Mastodon for social media.

Jul 2, 2024 • 29min
Operation Endgame: The ultimate troll patrol. [Only Malware in the Building]
Join Selena Larson with Dave Bittner and Rick Howard as they uncover 'Operation Endgame,' a strategy to disrupt Russian cybercriminals. Explore the tactics used to erode trust and expose internal communications, hindering their operations. Dive into the impact of law enforcement efforts on ransomware and the role of cryptocurrency in global cyber operations.

Jul 2, 2024 • 5min
Encore: network telescope (noun) [Word Notes]
Network observation systems designed to monitor globally unreachable but unused Internet address space or the Deep Web in order to study a wide range of interesting Internet phenomena.

Jun 27, 2024 • 39min
Public pianos and private scams.
This week Joe and Dave share some interesting follow up from a few episodes ago where Dave shared his love for baby grand pianos and how scammers we're using that to lure people into traps. Listener George wrote in to share about a show on UK Channel 4, called "The Piano," it's a music competition where visitors play a public piano in a train station, judged by hidden famous pianists, with winners performing at the UK Royal Festival Hall. Joe's story is a warning to travel goers using booking.com, as they share scams are at a all time high. Dave's story follows some neighborhood Facebook groups, and how they are inundated with posts about air duct cleaning services, prompting an investigation that reveals a scam involving fake profiles, telemarketers in Pakistan, and local technicians. Our catch of the day comes from listener Christopher, who writes in to share an outlandish message he received from a hacker with too much time on their hands.Please take a moment to fill out an audience survey! Let us know how we are doing!Links to the stories:
Note by Note: The Making of a Steinway Piano | Musical Instrument | ENDEVR Documentary
Booking.com warns of up to 900% increase in travel scams
Air Duct Cleaning Scam Exposed!
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com.

Jun 25, 2024 • 5min
Encore: SOC Triad (noun) [Word Notes]
A best practice for framing cyber intelligence critical information requirements that recommends collecting and consolidating data from three specific sources: endpoint, network and log.

5 snips
Jun 20, 2024 • 57min
From dark shadows to main stage.
Brandon Kovacs from Bishop Fox discusses AI in social engineering. Listener shares overseas trip bank account lock due to VPN. Maryland Lottery warns of phone scam. Catch of the day about a Reddit task scam. Deep dive into deep fakes and software scams.

Jun 18, 2024 • 5min
Encore: supply chain attacks (noun) [Word Notes]
Also known as a third-party attack or a value-chain attack, advisory groups gain access to a targeted victims network by first infiltrating a business partner's network that has access to the victim's systems or data.