1. EachPod
EachPod
Hacking Humans - Podcast

Hacking Humans

Deception, influence, and social engineering in the world of cyber crime.

Technology Tech News News
Update frequency
every 3 days
Average duration
26 minutes
Episodes
696
Years Active
2018 - 2025
Share to:
An inside view on North Korean cybercrime.

An inside view on North Korean cybercrime.

The CyberWire's UK correspondent Carole Theriault returns to share an interview with Geoff White, reporter from the BBC and co-host of the Lazarus Heist podcast, Joe has some listener follow-up from …
00:35:35  |   Thu 01 Jul 2021
encryption (noun) [Word Notes]

encryption (noun) [Word Notes]

The process of converting plain text into an unrecognizable form or secret code to hide its true meaning.
00:06:47  |   Tue 29 Jun 2021
Bad password hygiene jeopardizes streaming services.

Bad password hygiene jeopardizes streaming services.

Guest Matthew Gracey-McMinn joins us from Netacea to speak with Dave about security issues with streaming services, Joe shares some follow-up from listener Jason about a bracelet sale mentioned a few…
00:40:14  |   Thu 24 Jun 2021
keylogger (noun) [Word Notes]

keylogger (noun) [Word Notes]

Software or hardware that records the computer keys pressed by a user.
00:05:30  |   Tue 22 Jun 2021
Answering a job ad from a ransomware gang.

Answering a job ad from a ransomware gang.

Guest Mantas Sasnauskas from CyberNews joins Dave to talk about how he and his colleagues applied for a job with a ransomware gang, Joe and Dave reply to a listener named Christopher about certificat…
00:37:22  |   Thu 17 Jun 2021
non-fungible tokens (NFT) (noun) [Word Notes]

non-fungible tokens (NFT) (noun) [Word Notes]

Digital assets that are cryptographically protected on a blockchain and contain unique identification codes and metadata that makes them one of a kind.
00:05:34  |   Tue 15 Jun 2021
Pandemic taxes: later due dates afford more time for scams.

Pandemic taxes: later due dates afford more time for scams.

Guest Robert Capps of NuData Security joins Dave to discuss what businesses can do to bolster their protection against tax fraud, Joe and Dave have some follow-up from 2 episodes ago when they discus…
00:39:29  |   Thu 10 Jun 2021
multi-factor authentication (noun) [Word Notes]

multi-factor authentication (noun) [Word Notes]

The use of two or more verification methods to gain access to an account.
00:06:01  |   Tue 08 Jun 2021
The fight in the dog.

The fight in the dog.

Guests Jan Kallberg and Col Stephen Hamilton of Army Cyber Institute at West Point join Dave to talk about cognitive force protection, Joe and Dave have some follow-up from a listener named Obada abo…
00:39:03  |   Thu 03 Jun 2021
machine learning (noun) [Word Notes]

machine learning (noun) [Word Notes]

A programming technique where the developer doesn't specify each step of the algorithm in code, but instead teaches the algorithm to learn from the experience.
00:06:16  |   Tue 01 Jun 2021
Hacking people vs. hacking technologies to get into companies.

Hacking people vs. hacking technologies to get into companies.

Guest Tim Sadler from Tessian on how oversharing on social media and in OOO messages can open the door for hackers, Joe shares a story about vishing emails from "Amazon" that had spam confidence leve…
00:39:23  |   Thu 27 May 2021
intelligence (noun) [Word Notes]

intelligence (noun) [Word Notes]

The process of turning raw information into intelligence products that leaders use to make decisions with.
00:05:56  |   Tue 25 May 2021
Whaling attacks are more targeted than phishing or spearphishing.

Whaling attacks are more targeted than phishing or spearphishing.

Guest Kev Breen from Immersive Labs joins Dave to talk about how to address whaling attacks, Dave shares a discussion he had with. a colleague about password managers and elderly parents and Joe weig…
00:33:59  |   Thu 20 May 2021
Introducing 8th Layer Insights [Trailer]

Introducing 8th Layer Insights [Trailer]

Coming May 25, 2021. Get ready for a deep dive into what cybersecurity professionals often refer to as the "8th Layer" of security: HUMANS. This podcast is a multidisciplinary exploration into how th…
00:04:34  |   Wed 19 May 2021
SaaS (noun) [Word Notes]

SaaS (noun) [Word Notes]

A cloud-based software distribution method where app infrastructure, performance, and security are maintained by a service provider and accessible to users, typically via subscription, from any devic…
00:06:04  |   Tue 18 May 2021
How to best fight fake news.

How to best fight fake news.

Guest Helen Lee Bouygues of the Reboot Foundation joins Dave to talk about social media’s effect within the misinformation ecosystem and how users can best fight fake news, Dave and Joe share some fo…
00:39:23  |   Thu 13 May 2021
decryption (noun) [Word Notes]

decryption (noun) [Word Notes]

A process of converting encrypted data into something that a human or computer can understand.
00:07:28  |   Tue 11 May 2021
Digital identities are at the core of recent breaches.

Digital identities are at the core of recent breaches.

Our UK correspondent Carole Theriault returns to share her interview with Julie Smith from the Security Alliance and Kelvin Coleman from National Cyber Security Alliance about Identity Management Day…
00:39:18  |   Thu 06 May 2021
brute-force attack (noun) [Word Notes]

brute-force attack (noun) [Word Notes]

A cryptographic hack that relies on guessing all possible letter combinations of a targeted password until the correct codeword is discovered.
00:06:32  |   Tue 04 May 2021
Anyone can be a target of romance scams.

Anyone can be a target of romance scams.

Guest Stacey Nash, Head of Fraud and Central Operations at USAA, joins Dave to discuss romance or sweetheart scams, Joe and Dave share some listener follow-up, Joe's got a story about emails sent to …
00:36:04  |   Thu 29 Apr 2021
Disclaimer: The podcast and artwork embedded on this page are the property of N2K Networks, Inc.. This content is not affiliated with or endorsed by eachpod.com.