

Hacking Humans
N2K Networks
Deception, influence, and social engineering in the world of cyber crime.
Episodes
Mentioned books

Mar 7, 2024 • 49min
New tools, old problems.
AI combating phone call scams in Japan, scams targeting elderly through ATMs, calendar meeting links spreading mac malware, real-life scam experiences shared by listeners, getting scammed by mail, and humorous banter on collar stays and reviews.

Mar 5, 2024 • 6min
Encore: Monte Carlo Simulation (noun) [Word Notes]
A probability simulation technique used to understand the impact of risk and uncertainty in complex problems.

Feb 29, 2024 • 46min
Navigating the post-password landscape.
Topics include passkeys, threat actors, cybersecurity certification, social engineering scams, financial fraud prevention, Costco phishing scam, smug superiority in cybersecurity community, session hijacking risks, evolving cyber threats, and securing critical infrastructure systems.

Feb 27, 2024 • 6min
Encore: Virtual Private Network (VPN) (noun) [Word Notes]
A software, hardware or hybrid encryption layer between two devices on the network that makes the traffic between the sites opaque to the other devices on the same network.

Feb 22, 2024 • 47min
Scamming the innocent.
This podcast episode covers various scams, including a woman who fell for a scam, scammers targeting Walmart, dangers of crypto scams, military contract scam warnings, a couple scammed out of thousands, and AI voices sounding like famous people.

Feb 20, 2024 • 5min
Encore: smishing (SMS phishing) (noun) [Word Notes]
From the intrusion kill-chain model, the delivery of a “lure” via a text message to a potential victim by pretending to be some trustworthy person or organization in order to trick the victim into revealing sensitive information. Smishing is a portmanteau word made of two other words, the acronym “SMS” and the cyber coinage “Phishing“. It’s a text-message-centric variation of the email-based phishing scams that have been around since the 1990s. The term “Smishing” arose in the late 2000s.

Feb 15, 2024 • 43min
Looking forward in 2024.
Aaron Walton, Threat Intel Analyst from Expel is discussing some things to look out for in 2024. Joe and Dave share some listener follow up from Mateusz, who shares some positive news with us. Dave's story is about a romance scammer coming clean after failing to woo CBS News reporter, Erica Johnson. Joe's story is on the latest decision from the FCC, and how they voted to ban scam robocalls that use AI-generated voices. Our catch of the day comes from listener Chuck, just in time for tax season, he warns against a phishing scam he received about his taxes. Links to the stories:
Romance scammer reveals how he tricks women after failing to fool Go Public reporter
FCC votes to ban scam robocalls that use AI-generated voices
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com.

Feb 13, 2024 • 5min
Encore: port mirroring (noun) [Word Notes]
A network switch configuration setting that forwards a copy of each incoming and outgoing packet to a third switch port. Also known as SPAN or Switched Port Analyzer, RAP or Roving Analysis Port, and TAP or Test Access Point. When network managers and security investigators want to capture packets for analysis, they need some sort of generic TAP or Test Access Point. You can buy specialized equipment for this operation but most modern switches have this capability built in.

Feb 8, 2024 • 48min
Scamming just isn't what it used to be.
This week, we are joined by host of N2K's T-Minus Space Daily podcast, Maria Varmazis, she sits down with Joe and Dave to discuss sextorion materials that were found on popular social media apps such as, TikTok, Instagram, Snapchat and YouTube. Joe and Dave share quite a bit of follow up, Joe starts with an anonymous listener writing in sharing their story on gift card scams. Dave shares another anonymous listeners comments, sharing about what they think of Andy Cohen going public on how he got scammed. Finally, Joe and Dave hear from a listener by the name of "The Computrix," who says they need to defend Walmart. Dave share's his story about the most common phishing email themes of 2023. Joe's got the story of ransomware not being paid the same way as it used to be by companies, and share the two different angles on that. Our catch of the day comes from listener William, who writes in with a phishing scam that caught his eye. Links to the stories:
Sextortion training materials found on TikTok, Instagram, Snapchat and YouTube, according to new report
Most Common Phishing Email Themes of 2023
Companies aren’t paying ransoms like they used to
New Ransomware Reporting Requirements Kick in as Victims Increasingly Avoid Paying
FBI: Scammers Are Sending Couriers to Collect Cash From Victims
You can hear more from the T-Minus space daily show here.Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com.

Feb 6, 2024 • 7min
Encore: Network Time Protocol (NTP) attack (noun) [Word Notes]
A reflection or amplification distributed denial-of-service attack in which hackers query Internet network time protocol servers, NTP servers for short, for the correct time, but spoof the destination address of their target victims.


