1. EachPod
EachPod
Hacking Humans - Podcast

Hacking Humans

Deception, influence, and social engineering in the world of cyber crime.

Technology Tech News News
Update frequency
every 3 days
Average duration
26 minutes
Episodes
696
Years Active
2018 - 2025
Share to:
Encore: Is inflation affecting the Dark Web?

Encore: Is inflation affecting the Dark Web?

Dov Lerner, a Security Research Lead from Cybersixgill, sits down with Dave to discuss how inflation hasn't affected the Dark Web, including how the cratering of cryptocurrency may have affected thin…
00:52:06  |   Thu 05 Oct 2023
joint cyber defense collaborative (JCDC) (noun) [Word Notes]

joint cyber defense collaborative (JCDC) (noun) [Word Notes]

A cyber information-sharing U.S. Government organization designed to foster the public-private partnership. CyberWire Glossary link: https://thecyberwire.com/glossary/joint-cyber-defense-collaborativ…
00:07:25  |   Tue 03 Oct 2023
Stealing your car's identity.

Stealing your car's identity.

This week our guest is, Sam Crowther, Kasada CEO, he's sharing his team's findings on "Stolen Auto Accounts: The $2 Price Tag on Your Car’s Identity." Joe and Dave share some listener follow up from …
00:58:50  |   Thu 28 Sep 2023
Encore: penetration test (noun) [Word Notes]

Encore: penetration test (noun) [Word Notes]

The process of evaluating the security of a system or network by simulating an attack on it. Sometimes called "ethical hacking" or white hat hacking. The phrase started to appear in U.S. military cir…
00:04:08  |   Tue 26 Sep 2023
Rooting vs routing. [Hacking Humans Goes to the Movies]

Rooting vs routing. [Hacking Humans Goes to the Movies]

Thanks for joining us again for another episode of fun project brought to you by the team of Hacking Humans, the CyberWire's social engineering podcast. Hacking Humans co-host Dave Bittner is joined …
00:28:10  |   Sun 24 Sep 2023
Hackers play the evasion game.

Hackers play the evasion game.

This week our guest is, John Hammond from Huntress and he sits down to talk about spoofing and evasion techniques used by hackers. Dave and Joe share a bit of follow up, including a question form lis…
00:53:46  |   Thu 21 Sep 2023
Cloud Security Posture Management (CSPM) (noun) [Word Notes]

Cloud Security Posture Management (CSPM) (noun) [Word Notes]

Tools that automate the identification and remediation of cloud misconfigurations.  CyberWire Glossary link: https://thecyberwire.com/glossary/cloud-security-posture-management Audio reference link: …
00:07:18  |   Tue 19 Sep 2023
The online dating world is a jungle.

The online dating world is a jungle.

Andrew Hendel, CEO at Marshmallo, joins to share tips to safeguard your feelings and identity in the online dating world. Dave and Joe share some listener follow up from Gareth, who writes in to disc…
00:50:00  |   Thu 14 Sep 2023
Encore: The Bombe (noun) [Word Notes]

Encore: The Bombe (noun) [Word Notes]

An electro-mechanical device used to break Enigma-enciphered messages about enemy military operations during the Second World War. The first bombe–named Victory and designed by Alan Turning and Gordo…
00:04:15  |   Tue 12 Sep 2023
Passkeys: consumer-friendly password killers?

Passkeys: consumer-friendly password killers?

Guest Chris Sherwood, owner of Crosstalk Solutions, joins Dave to talk about passkeys. Joe shares some listener follow-up about "revert" and side-loading applications on Android phones. Joe's story c…
00:46:43  |   Thu 07 Sep 2023
single sign-on (SSO) (noun) [Word Notes]

single sign-on (SSO) (noun) [Word Notes]

A session and user authentication Zero Trust tactic that allows a user to access multiple applications with one set of login credentials. CyberWire Glossary link: https://thecyberwire.com/glossary/si…
00:08:20  |   Tue 05 Sep 2023
Exercise caution: online shopping edition.

Exercise caution: online shopping edition.

Oren Koren, CPO and Co-Founder of Veriti, is discussing the need for vigilance and caution when navigating the online shopping landscape. Dave and Joe share quite a bit of listener follow up, one lis…
00:55:25  |   Thu 31 Aug 2023
Encore: cross-site scripting (noun) [Word Notes]

Encore: cross-site scripting (noun) [Word Notes]

From the intrusion kill chain model, a malicious code delivery technique that allows hackers to send code of their choosing to their victim’s browser. XSS takes advantage of the fact that roughly 90%…
00:03:46  |   Tue 29 Aug 2023
Hunting the hackers.

Hunting the hackers.

Selena Larson and Tim Utzig discussing research titled "Twitter Scammers Stole $1,000 From My Friend—So I Hunted Them Down." Joe and Dave share a bit of follow up this week, they discuss Hawaii fire …
00:50:06  |   Thu 24 Aug 2023
Encore: credential stealing (verb) [Word Notes]

Encore: credential stealing (verb) [Word Notes]

From the intrusion kill chain model, the first part of an exploitation technique where the hacker tricks their victims into revealing their login credentials. In the second part of the technique, hac…
00:03:49  |   Tue 22 Aug 2023
AI versus AI.

AI versus AI.

Blair Cohen from AuthenticID joins Dave to discuss how generative AI and authentication go hand in hand. Joe and Dave share some follow up from listener Robert who discusses an ad for a device that u…
00:54:28  |   Thu 17 Aug 2023
two-factor authentication (noun) [Word Notes]

two-factor authentication (noun) [Word Notes]

An authentication process that requires two different factors before granting access. CyberWire Glossary link: https://thecyberwire.com/glossary/two-factor-authentication
00:09:07  |   Tue 15 Aug 2023
AI: A battle between heroes and villains.

AI: A battle between heroes and villains.

Dave Baggett from INKY joins Dave to dive into the latest phishing trends and discuss a broader view of how AI is being used by both the good guys and the bad guys. Joe's story this week dives into t…
00:58:16  |   Thu 10 Aug 2023
Encore: phishing (verb) [Word Notes]

Encore: phishing (verb) [Word Notes]

From the intrusion kill chain model, the delivery of a “lure” to a potential victim by pretending to be some trustworthy person or organization in order to trick the victim into revealing sensitive i…
00:04:17  |   Tue 08 Aug 2023
Are you pretending to be Russian? [Hacking humans goes to the movies]

Are you pretending to be Russian? [Hacking humans goes to the movies]

Thanks for joining us again for another episode of fun project brought to you by the team of Hacking Humans, the CyberWire's social engineering podcast. Hacking Humans co-host Dave Bittner is joined …
00:29:00  |   Sat 05 Aug 2023
Disclaimer: The podcast and artwork embedded on this page are the property of N2K Networks, Inc.. This content is not affiliated with or endorsed by eachpod.com.