1. EachPod
EachPod
Hacking Humans - Podcast

Hacking Humans

Deception, influence, and social engineering in the world of cyber crime.

Technology Tech News News
Update frequency
every 3 days
Average duration
26 minutes
Episodes
696
Years Active
2018 - 2025
Share to:
identity theft (noun) [Word Notes]

identity theft (noun) [Word Notes]

In this case Identity is the set of credentials, usually electronic that vouch for who you are and theft is to steal. The theft of a person's identity for purposes of fraud.
00:04:00  |   Tue 15 Dec 2020
The landscape has shifted for holiday shopping to online.

The landscape has shifted for holiday shopping to online.

Joe provides some listener feedback on allowing site notifications, Dave shares good news in his story about taking down money mules, Joe's got not as good news about a phishing campaign targeting th…
00:33:07  |   Thu 10 Dec 2020
cyber threat intelligence (CTI) (noun) [Word Notes]

cyber threat intelligence (CTI) (noun) [Word Notes]

Information used by leadership to make decisions regarding the cybersecurity posture of their organization.
00:06:02  |   Tue 08 Dec 2020
Virtual Private Network (VPN) (noun) [Word Notes}

Virtual Private Network (VPN) (noun) [Word Notes}

A software, hardware or hybrid encryption layer between two devices on the network that makes the traffic between the sites opaque to the other devices on the same network.
00:06:25  |   Tue 08 Dec 2020
Going behind the scenes and preventing social engineering in financial institutions.

Going behind the scenes and preventing social engineering in financial institutions.

Joe has a story about fake websites with advanced profiling tools and malicious software by OceanLotus, Dave's story is about sites that ask if it's ok to send you notifications, The Catch of the Day…
00:38:59  |   Thu 03 Dec 2020
smishing (SMS phishing) (noun) [Word Notes]

smishing (SMS phishing) (noun) [Word Notes]

From the intrusion kill-chain model, the delivery of a “lure” via a text message to a potential victim by pretending to be some trustworthy person or organization in order to trick the victim into re…
00:04:37  |   Tue 01 Dec 2020
Network Time Protocol (NTP) attack (noun) [Word Notes]

Network Time Protocol (NTP) attack (noun) [Word Notes]

A reflection or amplification distributed denial-of-service attack in which hackers query Internet network time protocol servers, NTP servers for short, for the correct time, but spoof the destinatio…
00:06:37  |   Tue 01 Dec 2020
Encore: Wearing a mask in the Oval Office and the art of deception.

Encore: Wearing a mask in the Oval Office and the art of deception.

Joe shares his Classic Cons Part 3, Dave has an Apple device scam story, The Catch of the Day is your assassination heads-up, and later in the show our interview with Jonna Mendez, retired CIA intell…
00:43:33  |   Thu 26 Nov 2020
port mirroring (noun) [Word Notes]

port mirroring (noun) [Word Notes]

A network switch configuration setting that forwards a copy of each incoming and outgoing packet to a third switch port. Also known as SPAN or Switched Port Analyzer, RAP or Roving Analysis Port, and…
00:04:37  |   Tue 24 Nov 2020
The public's expectations are changing.

The public's expectations are changing.

Dave has a story about the security risks of your outbound email, Joe's story is about a fake company, Ecapitalloans, using fake BBB affiliation, The Catch of the Day comes from a listener named Max …
00:40:43  |   Thu 19 Nov 2020
shadow IT (noun) {Word Notes]

shadow IT (noun) {Word Notes]

Technology, software and hardware deployed without explicit organizational approval. In the early days of the computer era from the 1980s through the 2000s security and information system practitione…
00:04:54  |   Tue 17 Nov 2020
Network Detection and Response (NDR) (noun) [Word Notes]

Network Detection and Response (NDR) (noun) [Word Notes]

NDR tools provide anomaly detection and potential attack prevention by collecting telemetry across the entire intrusion kill chain on transactions across the network, between servers, hosts, and clou…
00:06:19  |   Tue 17 Nov 2020
Ransomware: Statistically, it's likely to happen to anybody.

Ransomware: Statistically, it's likely to happen to anybody.

Joe has a story about how Emotet is being used in phishing emails through thread hijacking, Dave's story is a two-fer: one is about bad guys using image manipulation and the other has Elon Musk givin…
00:36:20  |   Thu 12 Nov 2020
remote access Trojan or RAT (noun) [Word Notes}

remote access Trojan or RAT (noun) [Word Notes}

From the intrusion kill chain model, a program that provides command and control services for an attack campaign. While the first ever deployed RAT is unknown, one early example is Back Orifice made …
00:04:42  |   Tue 10 Nov 2020
Too good to be true.

Too good to be true.

Dave has a story about a fake Facebook copyright violation scam trying to trick you out of your TFA to get into your account, Joe story about the largest elder fraud scam in US history, The Catch of …
00:36:16  |   Thu 05 Nov 2020
business email compromise or BEC (noun) [Word Notes]

business email compromise or BEC (noun) [Word Notes]

A social engineering scam where fraudsters spoof an email message from a trusted company officer that directs a staff member to transfer funds to an account controlled by the criminal.
00:03:47  |   Tue 03 Nov 2020
David Sanger on the HBO documentary based off his book,

David Sanger on the HBO documentary based off his book, "The Perfect Weapon". [Special Edition]

On this Special Edition, our extended conversation with author and New York Times national security correspondent David E. Sanger. The Perfect Weapon explores the rise of cyber conflict as the primar…
00:27:00  |   Sun 01 Nov 2020
The Malware Mash!

The Malware Mash!

00:03:05  |   Fri 30 Oct 2020
New consequences, extortion and cyber insurance.

New consequences, extortion and cyber insurance.

Joe has a story about a woman who called a fake customer service number and got scammed, Dave's story talks about how phishing kits are not that. hard to find, just check YouTube, The Catch of the Da…
00:40:23  |   Thu 29 Oct 2020
anagram (noun) [Word Notes]

anagram (noun) [Word Notes]

A word, phrase, or sentence formed from another by rearranging its letters. For example, cracking a columnar transposition cipher by hand involves looking for anagrams.
00:03:34  |   Tue 27 Oct 2020
Disclaimer: The podcast and artwork embedded on this page are the property of N2K Networks, Inc.. This content is not affiliated with or endorsed by eachpod.com.