

Hacking Humans
N2K Networks
Deception, influence, and social engineering in the world of cyber crime.
Episodes
Mentioned books

May 14, 2024 • 6min
Encore: unified extensible firmware interface (UEFI) (noun) [Word Notes]
An extension of the traditional Basic Input/Output System or BIOS that, during the boot process, facilitates the communication between the computer’s firmware and the computer’s operating system.

May 9, 2024 • 1h 2min
The illusion of influence.
Security expert Bogdan Botezatu from Bitdefender discusses audio deepfakes scams. Stories include a game changer in social engineering, a grandmother falling victim to a pig butchering scam, and a catch of the day email scam about puppies.

May 7, 2024 • 5min
Encore: Daemon (noun) [Word Notes]
An operating system program running in the background designed to perform a specific task when certain conditions or events occur.

May 2, 2024 • 49min
From support to scam.
Join Maria Varmazis, host of N2K daily space show, as she discusses a man scammed out of $25,000 calling Geek Squad. Dave and Joe share listener updates on Facebook scams and toll scam alerts. Learn about social engineering takeovers in open source projects and an ex-athletic director arrested with a gun. Catch of the day: an email scam selling puppies.

Apr 30, 2024 • 5min
Encore: greyware (noun) [Word Notes]
Also known as spyware and adware, it is a software category where developers design the application neither to cause explicit harm nor to accomplish some conventional legitimate purpose, but when run, usually annoys the user and often performs actions that the developer did not disclose, and that the user regards as undesirable.

4 snips
Apr 25, 2024 • 52min
Fighting off phishing.
Roger Grimes, a cybersecurity expert, discusses phishing in the podcast. Stories include a phishing service shutdown, an Ohio man shooting incident due to a phone scam, and an email scam from a Chinese company. The podcast highlights real-life vulnerabilities, LinkedIn impersonation challenges, and the importance of cybersecurity awareness and defense strategies.

Apr 23, 2024 • 5min
Encore: fuzzing (noun) [Word Notes]
Discover the origins and impact of fuzzing in software testing, a technique that uncovers vulnerabilities by inputting random data. Learn about purpose-built fuzzing tools, its acceptance in programming and security circles, and its influence on exploit discovery.

Apr 18, 2024 • 1h 4min
Is change presenting a window of opportunity for attackers?
Red Team Practice Director, Trevin Edgeworth, discusses how changes like M&A and lack of clarity present opportunities for attackers. Stories cover scams keeping up with news, Amazon sellers facing returns, and protecting against AI robocalls. Insights on AI, fraudulent returns, voice cloning scams, and enhancing cybersecurity through red teaming are shared.

Apr 16, 2024 • 5min
Encore: Unix (noun) [Word Notes]
A family of multitasking, multi-user computer operating systems that derive from the original Unix system built by Ken Thompson and Dennis Ritchie in the 1960s.

5 snips
Apr 11, 2024 • 55min
Could AI's doomsday be deferred?
Dr. Blumofe discusses AI doomsday scenarios. Adam Robinson explores what defines 'stupidity.' Stories on falling for scams and a Facebook scam. Insight on phishing emails and generative AI concerns. Cybersecurity measures and technological advancements discussed.