1. EachPod
EachPod
Hacking Humans - Podcast

Hacking Humans

Deception, influence, and social engineering in the world of cyber crime.

Technology Tech News News
Update frequency
every 3 days
Average duration
26 minutes
Episodes
696
Years Active
2018 - 2025
Share to:
MITRE ATT&CK (noun) [Word Notes]

MITRE ATT&CK (noun) [Word Notes]

A knowledge base of adversary tactics, techniques, and procedures established and maintained by the MITRE Corporation.  CyberWire Glossary link: https://thecyberwire.com/glossary/mitre-attck Audio re…
00:07:43  |   Tue 17 May 2022
Business phishing: Who's biting the bait?

Business phishing: Who's biting the bait?

Matthew Connor, Founder of Conscious Security, discusses a study he conducted while working with F-Secure, the study targeted 82,402 individuals with one of four phishing emails, he goes into the fin…
00:47:44  |   Thu 12 May 2022
Waterfall Software Development Method (noun) [Word Notes]

Waterfall Software Development Method (noun) [Word Notes]

A software development model that relies on a series of sequential steps that flow into each other, like a series of waterfalls.  CyberWire Glossary link: https://thecyberwire.com/glossary/waterfall-…
00:06:25  |   Tue 10 May 2022
Encore: The attackers keep coming every single day.

Encore: The attackers keep coming every single day.

Guest Andrew Rubin, CEO and co-founder of Illumio, joins Dave to discuss Zero Trust, Dave and Joe share some follow-up from several listeners including one with a variation on prison pen pals we disc…
00:45:09  |   Thu 05 May 2022
Agile Software Development Method (noun) [Word Notes]

Agile Software Development Method (noun) [Word Notes]

A software development philosophy that emphasizes incremental delivery, team collaboration, continual planning, and continual learning  Audio reference link: https://thecyberwire.com/glossary/agile-s…
00:07:45  |   Tue 03 May 2022
The dark side of business email attacks.

The dark side of business email attacks.

John Wilson, Senior Fellow Threat Research at Agari by HelpSystems, discusses business email compromise attacks, Joe shares three stories on different types of scams, the first being a mystery shoppe…
00:45:28  |   Thu 28 Apr 2022
Pegasus (noun) [Word Notes]

Pegasus (noun) [Word Notes]

The flagship product of the controversial Israeli spyware vendor, the NSO Group, use for remotely hacking mobile devices, most notably iPhones, via zero-click exploits. CyberWire Glossary link: https…
00:08:45  |   Tue 26 Apr 2022
Cons through and through. [Hacking Humans Goes to the Movies]

Cons through and through. [Hacking Humans Goes to the Movies]

Thanks for joining us for the latest episode of our fun project brought to you by the team of Hacking Humans, the CyberWire's social engineering podcast. Co-hosts Dave Bittner and Joe Carrigan are jo…
00:20:49  |   Sun 24 Apr 2022
On the front lines of fraud protection.

On the front lines of fraud protection.

Pete Barker, director of Fraud and Identity at SpyCloud offers critical insights on the alarming evolution of fraud and how consumers and enterprises can protect themselves, Joe and Dave share some l…
00:43:44  |   Thu 21 Apr 2022
Domain-based Message Authentication Reporting Conformance (DMARC) (noun) [Word Notes]

Domain-based Message Authentication Reporting Conformance (DMARC) (noun) [Word Notes]

An open source email authentication protocol designed to prevent emails, spoofing in phishing, business email compromise or BEC, and other email-based attacks.
00:08:27  |   Tue 19 Apr 2022
Magic, illusion, and scams, oh my.

Magic, illusion, and scams, oh my.

Brian Brushwood a former magician, joins Perry Carpenter, host of 8th Layer Insights, to talk about his new podcast, The Worlds Greatest Con, and how magic led him to discussing cons and scams on a p…
00:51:01  |   Thu 14 Apr 2022
Shields Up (noun) [Word Notes]

Shields Up (noun) [Word Notes]

A condition announced by the US Cybersecurity and Infrastructure Security Agency (CISA) to draw attention to a temporary period of high alert, associated with expectation of a connected wave of cyber…
00:07:46  |   Tue 12 Apr 2022
Online threats turned real world danger.

Online threats turned real world danger.

Laura Hoffner from Concentric, joins Dave to discuss online dangers and how they can very easily turn into real world dangers, Laura explains about the popular social media platform TikTok and how us…
00:46:26  |   Thu 07 Apr 2022
Software Assurance Maturity Model (SAMM) (noun) [Word Notes]

Software Assurance Maturity Model (SAMM) (noun) [Word Notes]

A prescriptive open source software security maturity model designed to guide strategies tailored to an organization’s specific risks.
00:05:43  |   Tue 05 Apr 2022
Robocall scams and the psychology surrounding them.

Robocall scams and the psychology surrounding them.

Alex Quilici, Robocall Scam Expert of YouMail, discusses how unwanted robocalls are becoming more targeted and the psychology behind some of the worst calls, Joe and Dave share some listener follow u…
00:42:35  |   Thu 31 Mar 2022
Universal 2nd Factor (U2F) [Word Notes]

Universal 2nd Factor (U2F) [Word Notes]

An open standard for hardware authentication tokens that use the universal serial bus, or USB, near-field communications, or NFCs, or Bluetooth to communicate one factor in a two-factor authenticatio…
00:07:17  |   Tue 29 Mar 2022
Cons: the short one and the first one. [Hacking Humans Goes to the Movies]

Cons: the short one and the first one. [Hacking Humans Goes to the Movies]

Thanks for joining us for the latest episode of our fun project brought to you by the team of Hacking Humans, the CyberWire's social engineering podcast. Co-hosts Dave Bittner and Joe Carrigan are jo…
00:18:04  |   Sun 27 Mar 2022
What's behind Buy Now, Pay Later scams?

What's behind Buy Now, Pay Later scams?

Jim Ducharme, COO of Outseer joins Dave to discuss buy now pay later scams, Joe and Dave share some listener follow up, Joe has an interesting story about an Unchained Capital partner and how they we…
00:50:22  |   Thu 24 Mar 2022
adversary group naming (noun) [Word Notes]

adversary group naming (noun) [Word Notes]

A cyber threat intelligence best practice of assigning arbitrary labels to collections of hacker activity across the intrusion kill chain.
00:10:17  |   Tue 22 Mar 2022
Data privacy: is it black and white when it comes to your kids?

Data privacy: is it black and white when it comes to your kids?

UK Correspondent Carole Theriault returns talking with guest David Ruiz from Malwarebytes about parents spying on their kids, Joe and Dave share some listener follow up, Joe's shares a story about th…
00:40:17  |   Thu 17 Mar 2022
Disclaimer: The podcast and artwork embedded on this page are the property of N2K Networks, Inc.. This content is not affiliated with or endorsed by eachpod.com.