

Hacking Humans
N2K Networks
Deception, influence, and social engineering in the world of cyber crime.
Episodes
Mentioned books

Dec 12, 2023 • 5min
Encore: remote access Trojan or RAT (noun)
From the intrusion kill chain model, a program that provides command and control services for an attack campaign. While the first ever deployed RAT is unknown, one early example is Back Orifice made famous by the notorious hacktivist group called “The Cult of the Dead Cow,” or cDc, Back Orifice was written by the hacker, Sir Dystic AKA Josh Bookbinder and released to the public at DEFCON in 1998.

Dec 7, 2023 • 54min
Small, medium, and large phishing trends of 2023.
Mike Price from ZeroFox sits down to discuss what 2023 phishing trends mean for the broader industry as we quickly approach 2024. Dave and Joe share a serious write in from listener Michelle who shares her pleads for her aunt, who she believes is being catfished. Listener Marc also writes in with an email that claims to be from "Walmart," that he is quite suspicious of. Joe's story follows Meta, and how they have designed products to target and harm kids. Dave's story is on bad bots and the dangers they pose with fake businesses that are maximizing their illicit earnings. Our catch of the day comes from listener Konstantin, who shares and email received from scammers claiming to be "McAfee," trying to get payment of almost $600. Links to the stories:
Meta Designed Products to Capitalize on Teen Vulnerabilities, States Allege
Breaking (Bad) Bots: Bot Abuse Analysis and Other Fraud Benchmarks
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com.

Dec 5, 2023 • 7min
zero knowledge proof (noun)
A mathematical method by which one party (the prover) can prove to another party (the verifier) that something is true, without revealing any information apart from the fact that this specific statement is true.CyberWire Glossary link: https://thecyberwire.com/glossary/zero-knowledge-proofAudio reference link: Staff, 2022. Zero Knowledge Proofs [Video]. YouTube. URL https://www.youtube.com/watch?v=5qzNe1hk0oY

5 snips
Nov 30, 2023 • 54min
Encore: The age old battle between social engineering and banking.
Chip Gibbons, CISO at Thrive, sits down with Dave to talk about how to defend against social engineering attacks in banking. Dave starts us off this week with a story about Amazon opening up its selling market to Pakistani residents, and what consequences that led to for the organization’s business. Joe's story follows a scam targeting soldiers in the Army. The Army warns against unknown individuals purporting to be noncommissioned officers that are calling said soldiers and asking them for money to fix a "pay problem" and, if questioned, threatening them with a punishment. Our catch of the day comes from listener Manie who writes in about a scam found when trying to download a HDRI (High Dynamic Range Image). The scam involves a fake ad asking for people’s cell phone numbers as soon as they click on a button that reads "download here". Manie shares how after she clicked the ad, she realized the mistake and immediately researched more before proceeding further.Links to stories:
Amazon finally authorized Pakistani sellers. A wave of scammers followed
Army Warns of Scam Targeting New Soldiers
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.

Nov 28, 2023 • 4min
Encore: business email compromise or BEC (noun) [Word Notes]
A social engineering scam where fraudsters spoof an email message from a trusted company officer that directs a staff member to transfer funds to an account controlled by the criminal.

Nov 23, 2023 • 29min
Cops in the catfish game.
Thanks for joining us again for another episode of fun project brought to you by the team of Hacking Humans, the CyberWire's social engineering podcast. Hacking Humans co-host Dave Bittner is joined by Rick Howard in this series where they view clips from their favorite movies and television shows with examples of the social engineering scams and schemes you hear Dave and co-host Joe Carrigan talk about on Hacking Humans. In this episode, Dave and Rick watch each of the selected scenes, describe the on-screen action for you, and then they deconstruct what they saw. Grab your bowl of popcorn and join us for some fantastic scams and frauds.Links to this episode's clips if you'd like to watch along:
Dave's clip from the movie: Chicago P.D.
Rick's clip from the movie: The Imitation Game

Nov 21, 2023 • 10min
HIPAA (noun) [Word Notes]
A U.S. law designed to improve the portability and accountability of health insurance coverage.CyberWire Glossary link: https://thecyberwire.com/glossary/hipaaAudio reference link: Dr. Dana Brems, 2021. Doctor reacts to “HIPAA violations” [Video]. YouTube. URL https://www.youtube.com/shorts/Ksk00s8a_IU

Nov 16, 2023 • 53min
Unmasking the deceptive.
John Wilson, Senior Fellow at Fortra, discusses email impersonation attacks and the rising threat of scams in corporate mailboxes. Stories include a man's encounter with bank scammers, deceptive ads on Facebook, and a trunk box scam. Measures to protect against email scams and the importance of educating employees are highlighted.

Nov 14, 2023 • 5min
Encore: man trap (noun) [Word Notes]
A physical security access control device consisting of an enclosed hallway with interlocking doors on each end where both doors can’t be open at the same time. A person presents credentials to the entry doorway. If authorized, the entry door opens and the person walks into the mantrap. The man trap exit door will not open until the entry door closes. The person presents credentials to the exit door. If authorized, the exit door will open. If not, the person is captured in the man trap until security arrives to handle the situation. Physical security leadership installs man traps to separate unrestricted areas from restricted areas, to prevent tailgating by uncleared personnel, and to impede access by unauthorized persons.

Nov 9, 2023 • 1h 2min
Leaving a trail of digital breadcrumbs.
Harry Maugans, Founder of Privacy Bee, discusses the repercussions of our digital breadcrumbs. They talk about YouTube's battle against ad blockers, a scammer's threat for $500, and the concerns of enterprises regarding employee privacy. They also explore managing personal data and privacy, and the shocking tools used by data brokers.