1. EachPod
EachPod
Hacking Humans - Podcast

Hacking Humans

Deception, influence, and social engineering in the world of cyber crime.

Technology Tech News News
Update frequency
every 3 days
Average duration
26 minutes
Episodes
696
Years Active
2018 - 2025
Share to:
denial-of-service attack (noun) [Word Notes]

denial-of-service attack (noun) [Word Notes]

A cyber attack designed to impair or eliminate access to online services or data.
00:06:37  |   Tue 27 Apr 2021
Make systems to mitigate the mistakes.

Make systems to mitigate the mistakes.

Guest Margaret Cunningham from Forcepoint talks with Dave about cognitive biases that lead to reasoning errors in cybersecurity, Joe shares some follow-up from a listener named Alex about the Alexa p…
00:42:28  |   Thu 22 Apr 2021
cold boot attack (noun) [Word Notes]

cold boot attack (noun) [Word Notes]

A type of side channel attack in which an attacker with physical access to a computer performs a memory dump of a computer’s Random Access Memory or RAM during the reboot process in order to steal se…
00:06:59  |   Tue 20 Apr 2021
Being aware can go a long way to prevent attacks.

Being aware can go a long way to prevent attacks.

Guest Herb Stapleton, the FBI’s cyber division sector chief, joins Dave to talk about the FBI's Internet Crime Complaint Center (IC3) annual report and its findings, Joe's story is about an ongoing I…
00:35:32  |   Thu 15 Apr 2021
cloud computing (noun) [Word Notes]

cloud computing (noun) [Word Notes]

On-demand pay-as-you-go Internet delivered compute, storage, infrastructure, and security services that are partially managed by the cloud provider and partially managed by the customer.
00:06:16  |   Tue 13 Apr 2021
Finding targets of opportunity.

Finding targets of opportunity.

Guest Peter Warmka, founder of the Counterintelligence Institute, joins Dave to talk about how insider targets are chosen and assessed, Joe shares a weird phone call he received, Dave's story from a …
00:40:10  |   Thu 08 Apr 2021
APT (noun) [Word Notes]

APT (noun) [Word Notes]

An acronym for Advanced Persistent Threat to describe hacker groups or campaigns normally, but not always, associated with nation state cyber espionage and continuous low-level cyber conflict operati…
00:06:52  |   Tue 06 Apr 2021
The pandemic is slowing, time to travel?

The pandemic is slowing, time to travel?

Guest Fleming Shi of Barracuda joins Dave to talk about about travel-related phishing attacks now that vaccines are more readily available, Dave and Joe share listener advice about preventative email…
00:34:50  |   Thu 01 Apr 2021
backdoor (noun) [Word Notes]

backdoor (noun) [Word Notes]

An undocumented or publicly unknown method to access a computer system undetected or to break a cypher used to encode messages.
00:05:54  |   Tue 30 Mar 2021
Technology is not designed for older users.

Technology is not designed for older users.

Guest Ming Yang of Orchard joins Dave to talk about ways to help your parents with technology (aka providing tech support for our parents). Dave shares the FBI's advisory warning of an expected incre…
00:37:17  |   Thu 25 Mar 2021
watering hole attack (noun) {Word Notes]

watering hole attack (noun) {Word Notes]

From the intrusion kill chain model, a technique where the hacker compromises sites commonly visited by members of a targeted community in order to deliver a malicious payload to the intended victim.
00:05:30  |   Tue 23 Mar 2021
Ideally, look for someone open to deception.

Ideally, look for someone open to deception.

Guest professional magician Brandon Williams talks with Joe about the art of deception. we have some follow-up on a watering hole attack we discussed a few episodes back, Joe's story is about the Att…
00:39:25  |   Thu 18 Mar 2021
network telescope (noun) [Word Notes]

network telescope (noun) [Word Notes]

Network observation systems designed to monitor globally unreachable but unused Internet address space or the Deep Web in order to study a wide range of interesting Internet phenomena.
00:05:18  |   Tue 16 Mar 2021
Insider threats and security concerns for APIs.

Insider threats and security concerns for APIs.

Guest Inon Shkedy, security researcher at Traceable and API project leader at OWASP Foundation, talks with Dave about the risks various types of insider threats pose to APIs, we have some follow-up f…
00:38:22  |   Thu 11 Mar 2021
SOC Triad (noun) [Word Notes]

SOC Triad (noun) [Word Notes]

A best practice for framing cyber intelligence critical information requirements that recommends collecting and consolidating data from three specific sources: endpoint, network and log.
00:05:21  |   Tue 09 Mar 2021
Fraud activity within secure messaging apps in plain sight.

Fraud activity within secure messaging apps in plain sight.

Guest Brittany Allen of Sift joins Dave to talk about a new fraud ring on Telegram where bad actors leverage the app to steal from on-demand food delivery services, Joe's story involves two of the fi…
00:41:35  |   Thu 04 Mar 2021
supply chain attacks (noun) [Word Notes]

supply chain attacks (noun) [Word Notes]

Also known as a third-party attack or a value-chain attack, advisory groups gain access to a targeted victims network by first infiltrating a business partner's network that has access to the victim'…
00:05:28  |   Tue 02 Mar 2021
How likely are online users to reveal private information?

How likely are online users to reveal private information?

Guest Professor Lior Fink from Ben Gurion University shares insights from their study on "How We Can Be Manipulated Into Sharing Private Information Online," Dave's story is some good news about a Ni…
00:33:14  |   Thu 25 Feb 2021
taint analysis (noun) [Word Notes]

taint analysis (noun) [Word Notes]

The process of software engineers checking the flow of user input in application code to determine if unanticipated input can affect program execution in malicious ways.
00:04:20  |   Tue 23 Feb 2021
Including your passwords in your final arrangements.

Including your passwords in your final arrangements.

Guest Sara Teare who is known as 1Password's Minister of Magic talks with Dave about things that people don't consider like custody of the digital keys to your stuff online, Dave and Joe share some l…
00:41:12  |   Thu 18 Feb 2021
Disclaimer: The podcast and artwork embedded on this page are the property of N2K Networks, Inc.. This content is not affiliated with or endorsed by eachpod.com.