

Hacking Humans
N2K Networks
Deception, influence, and social engineering in the world of cyber crime.
Episodes
Mentioned books

Dec 24, 2023 • 33min
The grinch who hacked Christmas. [Hacking humans goes to the movies]
Thanks for joining us again for another episode of a fun project brought to you by the team of Hacking Humans, the CyberWire's social engineering podcast. Hacking Humans co-host Dave Bittner is joined by Rick Howard in this series where they view clips from their favorite movies and television shows with examples of the social engineering scams and schemes you hear Dave and co-host Joe Carrigan talk about on Hacking Humans. In this episode, Dave and Rick watch some holiday classics, describe the on-screen action for you, and then they deconstruct what they saw. Grab your Christmas cookies and join us for some fantastic scams and frauds.Links to this episode's clips if you'd like to watch along:
How The Grinch Stole Christmas (2000)
How The Grinch Stole Christmas (Cartoon)
The Greening of the Grinch (magazine)

Dec 21, 2023 • 55min
Reeling in some phishing trends.
Adam Bateman, Co-Founder & CEO at Push Security, is sharing some of the latest phishing trends his team has been observing. Dave and Joe share some listener follow up from Michael, who writes in with a new idea, calling it "eDeception." With the holiday season practically here, Joe shares a story about gift card scams, reminding everyone to be safe this holiday season. Dave's story follows a new iPhone update regarding stolen device protection in an upcoming version of iOS. Our catch of the day comes from listener Van who sent in an audio catch about Spectrum users. Links to the stories:
Amid holiday shopping, thieves utilize new scam eliminating gift card balances
iOS 17.3, Now in Beta, Includes New ‘Stolen Device Protection’ Feature
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com.

Dec 19, 2023 • 11min
chaos engineering (noun) [Word Notes]
The resilience discipline of controlled stress test experimentation in continuous integration/continuous delivery environments, CI/CD environments, to uncover systemic weaknesses.CyberWire Glossary link: https://thecyberwire.com/glossary/chaos-engineeringAudio reference link: Farnam Street, 2009. Richard Feynman Teaches you the Scientific Method [Website]. Farnam Street. URL https://fs.blog/mental-model-scientific-method/

Dec 14, 2023 • 53min
Shielding your inbox.
Seth Blank, CTO of Valimail, joins to discuss the implications on email security on behalf of DMARC. Joe and Dave share some follow up regarding Meta, who is the parent company to Facebook and Instagram, and how they are now in a lawsuit over steering predators to children in New Mexico. Joe shares how he was almost hacked, as scammers used Peacock to lure him in. Dave's story continues with popular streaming apps being impersonated, this time with Disney+ falling victim. Joe's story follows the U.S. Attorney’s Office, the FBI, and State and Local Law Enforcement Officials sharing another "Don't click December" PSA. Our catch of the day comes from listener Mauricio, who writes in sharing a phishing email, from "PayPal," saying he has an invoice of almost $600. Links to the stories:
Facebook and Instagram Steer Predators to Children, New Mexico Attorney General Alleges in Lawsuit
Threat actors impersonate Disney+ with considerable guile
U.S. Attorney’s Office, the FBI, and State and Local Law Enforcement Officials Release Second “Don’t Click December” PSA
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com.

Dec 12, 2023 • 5min
Encore: remote access Trojan or RAT (noun)
From the intrusion kill chain model, a program that provides command and control services for an attack campaign. While the first ever deployed RAT is unknown, one early example is Back Orifice made famous by the notorious hacktivist group called “The Cult of the Dead Cow,” or cDc, Back Orifice was written by the hacker, Sir Dystic AKA Josh Bookbinder and released to the public at DEFCON in 1998.

Dec 7, 2023 • 54min
Small, medium, and large phishing trends of 2023.
Mike Price from ZeroFox sits down to discuss what 2023 phishing trends mean for the broader industry as we quickly approach 2024. Dave and Joe share a serious write in from listener Michelle who shares her pleads for her aunt, who she believes is being catfished. Listener Marc also writes in with an email that claims to be from "Walmart," that he is quite suspicious of. Joe's story follows Meta, and how they have designed products to target and harm kids. Dave's story is on bad bots and the dangers they pose with fake businesses that are maximizing their illicit earnings. Our catch of the day comes from listener Konstantin, who shares and email received from scammers claiming to be "McAfee," trying to get payment of almost $600. Links to the stories:
Meta Designed Products to Capitalize on Teen Vulnerabilities, States Allege
Breaking (Bad) Bots: Bot Abuse Analysis and Other Fraud Benchmarks
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com.

Dec 5, 2023 • 7min
zero knowledge proof (noun)
A mathematical method by which one party (the prover) can prove to another party (the verifier) that something is true, without revealing any information apart from the fact that this specific statement is true.CyberWire Glossary link: https://thecyberwire.com/glossary/zero-knowledge-proofAudio reference link: Staff, 2022. Zero Knowledge Proofs [Video]. YouTube. URL https://www.youtube.com/watch?v=5qzNe1hk0oY

5 snips
Nov 30, 2023 • 54min
Encore: The age old battle between social engineering and banking.
Chip Gibbons, CISO at Thrive, sits down with Dave to talk about how to defend against social engineering attacks in banking. Dave starts us off this week with a story about Amazon opening up its selling market to Pakistani residents, and what consequences that led to for the organization’s business. Joe's story follows a scam targeting soldiers in the Army. The Army warns against unknown individuals purporting to be noncommissioned officers that are calling said soldiers and asking them for money to fix a "pay problem" and, if questioned, threatening them with a punishment. Our catch of the day comes from listener Manie who writes in about a scam found when trying to download a HDRI (High Dynamic Range Image). The scam involves a fake ad asking for people’s cell phone numbers as soon as they click on a button that reads "download here". Manie shares how after she clicked the ad, she realized the mistake and immediately researched more before proceeding further.Links to stories:
Amazon finally authorized Pakistani sellers. A wave of scammers followed
Army Warns of Scam Targeting New Soldiers
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.

Nov 28, 2023 • 4min
Encore: business email compromise or BEC (noun) [Word Notes]
A social engineering scam where fraudsters spoof an email message from a trusted company officer that directs a staff member to transfer funds to an account controlled by the criminal.

Nov 23, 2023 • 29min
Cops in the catfish game.
Thanks for joining us again for another episode of fun project brought to you by the team of Hacking Humans, the CyberWire's social engineering podcast. Hacking Humans co-host Dave Bittner is joined by Rick Howard in this series where they view clips from their favorite movies and television shows with examples of the social engineering scams and schemes you hear Dave and co-host Joe Carrigan talk about on Hacking Humans. In this episode, Dave and Rick watch each of the selected scenes, describe the on-screen action for you, and then they deconstruct what they saw. Grab your bowl of popcorn and join us for some fantastic scams and frauds.Links to this episode's clips if you'd like to watch along:
Dave's clip from the movie: Chicago P.D.
Rick's clip from the movie: The Imitation Game


