

Hacking Humans
N2K Networks
Deception, influence, and social engineering in the world of cyber crime.
Episodes
Mentioned books

Dec 23, 2021 • 30min
Even if a cause moves you, do your due diligence.
Guest Amaya Hadnagy, Media Support for the Social-Engineer, LLC, joins Dave to share information about charity scams, Dave shares a personal story about some safety triggers he recently put into place to help protect his elderly parents financial accounts from scams, Joe's story comes from a listener Alice about someone scamming female Indian news anchors about jobs in Harvard University's journalism department, and our Catch of the Day comes from an imposter of Navy Federal Credit Union via listener Chris.Links to stories:The Harvard Job Offer No One at Harvard Ever Heard OfHave a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.

Dec 22, 2021 • 22min
Conmen come in many flavors, all motivated by greed. [Hacking Humans Goes to the Movies]
Thanks for joining us for our fun project brought to you by the team of Hacking Humans, the CyberWire's social engineering podcast. Co-hosts Dave Bittner and Joe Carrigan are joined by Rick Howard in this series where they view clips from their favorite movies with examples of the social engineering scams and schemes you hear about on Hacking Humans. In this episode, Dave, Joe and Rick are watching Dave's and Rick's scene picks. They watch each of the selected scenes, describe the on-screen action for you, and then the team deconstructs what they saw. Grab your popcorn and head to the movies with us.Links to this episode's clips if you'd like to watch along:
Dave's clip from "Dirty Rotten Scoundrels"
Rick's pick from "The Sting"

Dec 21, 2021 • 7min
OWASP cryptographic failures (noun) [Word Notes]
Code that fails to protect sensitive information.

Dec 16, 2021 • 46min
The 3 M's: Minimize, monitor and manage.
Guest Adam Levin, security expert and podcast host of "What the Hack with Adam Levin," joins Dave to share advice and discuss some experiences shared on his podcast, Dave and Joe have some listener follow up from David with clarification on 2FA, Joe's story is about a job scam for positions at a video game company, Dave's got a story about how tools like Google and smartphones affect our memories and how we judge our own abilities, our Catch of the Day is from a listener named Chris with a fake email from Amazon about a TV his father "purchased," and how Chris had to intervene.Links to stories:
They thought they got their dream job at Riot Games — but it was a scam
Indeed's Guidelines for Safe Job Search
The internet is tricking our brains
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.

Dec 14, 2021 • 6min
account takeover prevention (noun) [Word Notes]
The prevention of the first part of an intrusion kill chain model exploitation technique, where the hacker steals valid logging credentials from a targeted victim.

Dec 9, 2021 • 44min
Scams abound this time of year.
Guest Dave Senci of Mastercard's NuData Security talks about the security issues with remote access and coaching frauds, Dave's got a story about receiving a "Best Buy gift card" and USB mailing, Joe's story is from the Better Business Bureau about their "12 Scams of Christmas," and our Catch of the Day is from our listener Henry who received an email that appeals to one's faith.Links to stories:
PSA: If You Get a 'Best Buy Gift Card' on a USB Drive in the Mail, Don't Plug It Into Your PC
The Naughty List: BBB's 12 Scams of Christmas
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.

Dec 7, 2021 • 7min
threat hunting (noun) [Word Notes]
The process of proactively searching through networks to detect and isolate security threats, rather than relying on security solutions or services to detect those threats.

Dec 2, 2021 • 47min
Do you really want that device to be a connected device?
Guest Jay Radcliffe from Thermo Fisher Scientific shares his advice and security concerns with smart devices since the holiday gifting season is around the corner, Joe and Dave have some listener follow up about 2FA, Joe's got a story about the Robinhood breach, Dave's story is about numerous LinkedIn requests from HR specialists with GAN images (Generated Adversarial Network), and our Catch of the Day is from listener Michael who was just trying to sell his car and then he got a text message.Links to stories:
Data Breach of Robinhood Trading Platform Blamed on Social Engineering, Similar to 2020 Twitter Breach
LinkedIn Fakes: A Wolf in Business Casual Clothing
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.

Nov 30, 2021 • 8min
vulnerability management (noun) [Word Notes]
The continuous practice of identifying classifying, prioritizing, remediating, and mitigating software vulnerabilities within this.

Nov 25, 2021 • 18min
Misdirection and layering with a con in the middle. [Hacking Humans Goes to the Movies]
Thanks for joining us for our fun project brought to you by the team of Hacking Humans, the CyberWire's social engineering podcast. Co-hosts Dave Bittner and Joe Carrigan are joined by Rick Howard in this series where they view clips from their favorite movies with examples of the social engineering scams and schemes you hear about on Hacking Humans. In this episode, Dave, Joe and Rick are watching Joe's and Rick's scene picks. They watch each of the selected scenes, describe the on-screen action for you, and then the team deconstructs what they saw. Grab your popcorn and join us for a trip to the movies.Links to this episode's clips if you'd like to watch along:
Joe's clip from "The Simpsons: Father and Son Grifting" episode
Rick's pick from "Paper Moon"