
Hacking Humans
Deception, influence, and social engineering in the world of cyber crime.
Latest episodes

Jan 16, 2025 • 42min
Crypto chameleons and star fraud.
This discussion dives into the alarming rise of social engineering scams, spotlighting a jury duty con that defrauded a victim out of $12,000. Listeners will learn about a prison-based scheme using spoofed identities to siphon cryptocurrency, as well as a job interview that turned into a hacking attempt through obfuscated code. The hosts also tackle the implications of Apple’s new AI feature, which may inadvertently aid scammers, and share tips on navigating tech scams, emphasizing the need for heightened cybersecurity awareness.

Jan 14, 2025 • 8min
lateral movement (noun) [Word Notes]
Cyber adversaries expertly navigate compromised networks, seeking sensitive data. Advanced security measures are crucial to preventing unauthorized access. The discussion also delves into the evolution of military and cybersecurity strategies, using real-world examples like the SolarWinds incident. Additionally, the podcast examines the complexities of ransomware from an attacker’s perspective and outlines various defensive strategies organizations can implement. Proactive cybersecurity is highlighted as essential to mitigate risks from evolving cyber threats.

Jan 9, 2025 • 53min
Nice to meet you, I'm a scammer.
This episode dives deep into the world of social engineering and the rise of romance scams, featuring a heartbreaking story of a woman who lost her life savings. The hosts debate whether diamonds are the original cryptocurrency and discuss the controversial PayPal Honey extension that affects influencers. They also explore the final payouts from the Madoff Victim Fund, highlighting the tragic fallout from Ponzi schemes. Along the way, there's a humorous take on scams and tech issues, making for an engaging and informative listen.

Jan 7, 2025 • 7min
common vulnerabilities and exposures (CVE) (noun) [Word Notes]
Dive into the world of cybersecurity with an exploration of the Common Vulnerabilities and Exposures list, a crucial tool for identifying software flaws. Learn how the U.S. government initiated this public database to help streamline vulnerability management. Discover the collaborative efforts of various organizations that keep this resource up to date, and understand its significance in tackling the increasing number of vulnerabilities in our digital landscape.

Jan 7, 2025 • 55min
Malware metamorphosis: 2024 reflections and 2025 predictions. [Only Malware in the building]
This episode dives into the wild world of cyber threats, revealing ransomware's alarming rise and the financial chaos it brings. The hosts discuss cutting-edge cybersecurity measures like zero-trust models and multi-factor authentication, stressing the importance of user education. Nation-state hacking, especially from China, raises eyebrows, while the ethics of AI get a critical spotlight. The mix of serious themes and humorous banter keeps the conversation engaging as they reflect on lessons learned and prepare for the challenges of 2025.

Jan 2, 2025 • 42min
The intersection of hackers, scammers, and false collaborations.
Dive into the dark world of social engineering scams and phishing schemes. Discover the alarming rise of brushing scams, where unsolicited packages lead victims to malicious QR codes. Learn how pallet liquidation scams lure buyers with unrealistic prices and false promises. Get essential tips on securing your text messages against sophisticated foreign hacking efforts. Plus, hear a cautionary tale of a suspicious email posing as a business collaboration with an unexpected twist. Awareness is key in this relentless digital battlefield!

Dec 31, 2024 • 6min
dead-box forensics (noun) [Word Notes]
Explore the fascinating world of dead box forensics, where experts capture complete images of digital systems to analyze their contents offline. Discover the evolution of methodologies that ensure evidence preservation and integrity. Uncover the challenges forensic professionals face in adapting to rapidly changing technology while striving for justice. This insightful discussion reveals the meticulous processes that go into digital evidence analysis, making it a crucial component in modern investigations.

Dec 26, 2024 • 49min
New tools, old problems.
Please enjoy this encore episode of Hacking Humans. This week we are joined by Maria Varmazis, host of the N2K daily space show, T-Minus. She discusses how AI is being used as a possible solution to one of the oldest scams in the book in Japan. Dave and Joe share some listener follow up, one from listener Alan and one from Clinton, who both write in about a recent episode and they share their thoughts on the story of Charlotte Cowles being scammed out of $50,000. Dave shares a story about calendar meeting links, from Calendly, a popular application for scheduling appointments and meetings, being used to spread mac malware. Joe shares write ins from several listeners, some writing in to share experiences with scams they have come across, others writing to warn others on scams they have seen used in the real world. Our catch of the day comes from Zach with an oddity, getting scammed by mail! Please take a moment to fill out an audience survey! Let us know how we are doing! Links to the stories:
Japan’s new ATMs automatically play anti-fraud videos to people talking on mobile phones【Video】
Fraudsters in Japan use foreigners' bank accounts in cash grab
【警察庁】ATMで携帯電話…AIで検知し警告表示 特殊詐欺の被害増受け
Calendar Meeting Links Used to Spread Mac Malware
IDcare
You can hear more from the T-Minus space daily show here.Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com.

Dec 24, 2024 • 7min
cybersecurity maturity model certification (CMMC) (noun) [Word Notes]
Discover the essentials of the Cybersecurity Maturity Model Certification, a crucial accreditation for companies aiming for U.S. Department of Defense contracts. Delve into the historical evolution of maturity models and the necessary shift from self-attestation to rigorous third-party audits. Understanding this framework is vital for enhancing cybersecurity and ensuring compliance by the 2025 deadline.

Dec 19, 2024 • 46min
Gold bars and bold lies.
Discover the shocking rise of gold bar scams as a couple loses over $367,000 to clever con artists posing as officials. Learn about a cybersecurity expert who foiled a social engineering attack by spotting inconsistencies in the impersonator's story. The discussion also includes how criminals are leveraging generative AI to amplify their fraud schemes, creating realistic phishing attempts. Dive into childhood memories mixed with critical tips for safeguarding against increasingly sophisticated online scams.
Remember Everything You Learn from Podcasts
Save insights instantly, chat with episodes, and build lasting knowledge - all powered by AI.