1. EachPod
EachPod
Hacking Humans - Podcast

Hacking Humans

Deception, influence, and social engineering in the world of cyber crime.

Technology Tech News News
Update frequency
every 3 days
Average duration
26 minutes
Episodes
696
Years Active
2018 - 2025
Share to:
Log4j vulnerability (noun) [Word Notes]

Log4j vulnerability (noun) [Word Notes]

An open source Java-based software tool available from the Apache Software Foundation designed to log security and performance information.
00:09:16  |   Tue 11 Jan 2022
Changing the game on ransomware.

Changing the game on ransomware.

Guest Adam Flatley, Director of Threat Intelligence at Redacted, talks with Dave about "the only way to truly disrupt the ransomware problem is to target the actors themselves," Joe shares some stati…
00:49:21  |   Thu 06 Jan 2022
OWASP injection (noun) [Word Notes]

OWASP injection (noun) [Word Notes]

A broad class of attack vectors, where an attacker supplies input to an applications command interpreter that results in unanticipated functionality.
00:06:32  |   Tue 04 Jan 2022
Identity

Identity "protection" and a pigeon drop. [Hacking Humans Goes to the Movies]

Thanks for joining us for Episode 5 of our fun project brought to you by the team of Hacking Humans, the CyberWire's social engineering podcast. Co-hosts Dave Bittner and Joe Carrigan are joined by R…
00:21:23  |   Thu 30 Dec 2021
Encore: zero trust (noun) [Word Notes]

Encore: zero trust (noun) [Word Notes]

A security philosophy that assumes adversaries have already penetrated the digital environment and tries to reduce the potential impact by limiting access by people, devices, and software to only the…
00:08:32  |   Tue 28 Dec 2021
The CyberWire: The 12 Days of Malware.

The CyberWire: The 12 Days of Malware.

Merry Christmas and Happy Holidays from the CyberWire and our friends! Enjoy our rendition of the 12 Days of Malware created by Dave Bittner and performed by Dave and friends: Rachel Tobac, Jayson St…
00:07:28  |   Sat 25 Dec 2021
Hustling the hustler and three-card Monte. [Hacking Humans Goes to the Movies]

Hustling the hustler and three-card Monte. [Hacking Humans Goes to the Movies]

Thanks for joining us for Episode 4 of our fun project brought to you by the team of Hacking Humans, the CyberWire's social engineering podcast. Co-hosts Dave Bittner and Joe Carrigan are joined by R…
00:20:14  |   Fri 24 Dec 2021
Even if a cause moves you, do your due diligence.

Even if a cause moves you, do your due diligence.

Guest Amaya Hadnagy, Media Support for the Social-Engineer, LLC, joins Dave to share information about charity scams, Dave shares a personal story about some safety triggers he recently put into plac…
00:30:28  |   Thu 23 Dec 2021
Conmen come in many flavors, all motivated by greed. [Hacking Humans Goes to the Movies]

Conmen come in many flavors, all motivated by greed. [Hacking Humans Goes to the Movies]

Thanks for joining us for our fun project brought to you by the team of Hacking Humans, the CyberWire's social engineering podcast. Co-hosts Dave Bittner and Joe Carrigan are joined by Rick Howard in…
00:22:14  |   Wed 22 Dec 2021
OWASP cryptographic failures (noun) [Word Notes]

OWASP cryptographic failures (noun) [Word Notes]

Code that fails to protect sensitive information.
00:06:35  |   Tue 21 Dec 2021
The 3 M's: Minimize, monitor and manage.

The 3 M's: Minimize, monitor and manage.

Guest Adam Levin, security expert and podcast host of "What the Hack with Adam Levin," joins Dave to share advice and discuss some experiences shared on his podcast, Dave and Joe have some listener f…
00:45:52  |   Thu 16 Dec 2021
account takeover prevention (noun) [Word Notes]

account takeover prevention (noun) [Word Notes]

The prevention of the first part of an intrusion kill chain model exploitation technique, where the hacker steals valid logging credentials from a targeted victim.
00:06:23  |   Tue 14 Dec 2021
Scams abound this time of year.

Scams abound this time of year.

Guest Dave Senci of Mastercard's NuData Security talks about the security issues with remote access and coaching frauds, Dave's got a story about receiving a "Best Buy gift card" and USB mailing, Joe…
00:43:55  |   Thu 09 Dec 2021
threat hunting (noun) [Word Notes]

threat hunting (noun) [Word Notes]

The process of proactively searching through networks to detect and isolate security threats, rather than relying on security solutions or services to detect those threats.
00:07:01  |   Tue 07 Dec 2021
Do you really want that device to be a connected device?

Do you really want that device to be a connected device?

Guest Jay Radcliffe from Thermo Fisher Scientific shares his advice and security concerns with smart devices since the holiday gifting season is around the corner, Joe and Dave have some listener fol…
00:47:24  |   Thu 02 Dec 2021
vulnerability management (noun) [Word Notes]

vulnerability management (noun) [Word Notes]

The continuous practice of identifying classifying, prioritizing, remediating, and mitigating software vulnerabilities within this.
00:08:16  |   Tue 30 Nov 2021
Misdirection and layering with a con in the middle. [Hacking Humans Goes to the Movies]

Misdirection and layering with a con in the middle. [Hacking Humans Goes to the Movies]

Thanks for joining us for our fun project brought to you by the team of Hacking Humans, the CyberWire's social engineering podcast. Co-hosts Dave Bittner and Joe Carrigan are joined by Rick Howard in…
00:17:45  |   Thu 25 Nov 2021
software bill of materials (SBOM) (noun) [Word Notes]

software bill of materials (SBOM) (noun) [Word Notes]

A formal record containing the details and supply chain relationships of various components used in building software.
00:06:59  |   Tue 23 Nov 2021
A good amount of skepticism helps protect you online.

A good amount of skepticism helps protect you online.

Guest Blake Hall, CEO and founder of a company called ID.me, discusses protecting your identity online, Dave and Joe have some follow up from listener Rafa on 2FA he uses, Dave has a story about bots…
00:50:48  |   Thu 18 Nov 2021
zero trust (noun) [Word Notes]

zero trust (noun) [Word Notes]

A security philosophy that assumes adversaries have already penetrated the digital environment and tries to reduce the potential impact by limiting access by people, devices, and software to only the…
00:09:02  |   Tue 16 Nov 2021
Disclaimer: The podcast and artwork embedded on this page are the property of N2K Networks, Inc.. This content is not affiliated with or endorsed by eachpod.com.