1. EachPod
EachPod
Hacking Humans - Podcast

Hacking Humans

Deception, influence, and social engineering in the world of cyber crime.

Technology Tech News News
Update frequency
every 3 days
Average duration
26 minutes
Episodes
696
Years Active
2018 - 2025
Share to:
What is true and important versus what is the spin.

What is true and important versus what is the spin.

Dave's story is about some cybercriminal gangs that have stolen $22 million from users of the Electrum wallet app, Joe's story talks about a business email compromise scam cost a US company $15 milli…
00:35:37  |   Thu 22 Oct 2020
rogue access point (noun) [Word Notes]

rogue access point (noun) [Word Notes]

1. A wireless access point installed by employees in an office or data center environment as a convenience to connectivity without the consent or the knowledge of the network manager. 2. A wireless a…
00:04:07  |   Tue 20 Oct 2020
Use a Dance Dance Revolution floor lock for your data centers.

Use a Dance Dance Revolution floor lock for your data centers.

Starting with some listener follow-up on password managers, Joe's story has an angel investor bilking people out of due diligence fees, Dave's story comes from Graham Cluley on a malware campaign tal…
00:36:08  |   Thu 15 Oct 2020
darknet (noun)  [Word Notes]

darknet (noun) [Word Notes]

A subset of the internet where communications between two parties or client-server transactions are obscured from search engines and surveillance systems by layers of encryption. The U.S. Navy design…
00:04:47  |   Tue 13 Oct 2020
Don't click any button...even the 'No' button.

Don't click any button...even the 'No' button.

Dave's story is about how some adware took a turn for the worse (and how his dad has fallen adware in the past), Joe's story talks about how someone is trying to phish AT&T employees and others, The …
00:42:06  |   Thu 08 Oct 2020
phishing (verb) [Word Notes]

phishing (verb) [Word Notes]

From the intrusion kill chain model, the delivery of a “lure” to a potential victim by pretending to be some trustworthy person or organization in order to trick the victim into revealing sensitive i…
00:04:17  |   Tue 06 Oct 2020
Cookies make for some tasty phishing lure.

Cookies make for some tasty phishing lure.

In addition to his regular story Dave shares a situation where his mom almost took the bait, Dave's story is about an SMS phishing (smishing) Apple scam in UK (ps, there's never a free iPhone & Joe i…
00:36:03  |   Thu 01 Oct 2020
credential stealing (verb) [Word Notes]

credential stealing (verb) [Word Notes]

From the intrusion kill chain model, the first part of an exploitation technique where the hacker tricks their victims into revealing their login credentials. In the second part of the technique, hac…
00:03:49  |   Tue 29 Sep 2020
It's human nature.

It's human nature.

Dave and Joe have some follow-up from a listener on OG accounts, Joe's story talks about a new phishing campaign inspired by Twitter from earlier this summer, Dave shares a story about using security…
00:33:41  |   Thu 24 Sep 2020
The Bombe (noun) [Word Notes]

The Bombe (noun) [Word Notes]

An electro-mechanical device used to break Enigma-enciphered messages about enemy military operations during the Second World War. The first bombe–named Victory and designed by Alan Turning and Gordo…
00:04:15  |   Tue 22 Sep 2020
Your information is already on the Dark Web.

Your information is already on the Dark Web.

Dave and Joe have some follow-up on mobile banking apps, Dave talks about the website bitcoinabuse.com, Joe's story Brian Krebs did on old Gmail emails and people using them either errantly or malici…
00:36:00  |   Thu 17 Sep 2020
cross-site scripting (noun) [Word Notes]

cross-site scripting (noun) [Word Notes]

From the intrusion kill chain model, a malicious code delivery technique that allows hackers to send code of their choosing to their victim’s browser. XSS takes advantage of the fact that roughly 90%…
00:03:46  |   Tue 15 Sep 2020
The story is what gets people in.

The story is what gets people in.

Joe shares a story on the ability to make a scam work through storytelling skills, Dave's story is about a guy duping a convenience store clerk into taking over her shift and later robbing the place,…
00:34:19  |   Thu 10 Sep 2020
penetration test (noun) [Word Notes]

penetration test (noun) [Word Notes]

The process of evaluating the security of a system or network by simulating an attack on it. Sometimes called "ethical hacking" or white hat hacking. The phrase started to appear in U.S. military cir…
00:04:08  |   Tue 08 Sep 2020
It's evolving rapidly and getting more furious by the minute.

It's evolving rapidly and getting more furious by the minute.

Dave & Joe have a tip as some follow-up on cloning social media accounts, Dave's story is about turning the tables on hackers in the UK, Joe talks about Kaspersky's Spam and phishing report, The Catc…
00:37:07  |   Thu 03 Sep 2020
social engineering (noun)  [Word Notes]

social engineering (noun) [Word Notes]

The art of convincing a person or persons to take an action that may or may not be in their best interests. Social engineering in some form or the other has been around since the beginning of time. T…
00:04:10  |   Tue 01 Sep 2020
Take a deep breath.

Take a deep breath.

Joe's story is about the effectiveness of social media account cloning, Dave talks about toll fraud, The Catch of the Day is a Bitcoin scam with some scam baiting on the side, and later in the show, …
00:36:17  |   Thu 27 Aug 2020
man trap (noun)  [Word Notes]

man trap (noun) [Word Notes]

A physical security access control device consisting of an enclosed hallway with interlocking doors on each end where both doors can’t be open at the same time. A person presents credentials to the e…
00:04:42  |   Tue 25 Aug 2020
Many times it is less sophisticated than we think.

Many times it is less sophisticated than we think.

Dave's story is about robocalls to a telephony honeypot, Joe talks about postcards impersonating HIPAA communications (you have one? please let Joe know), The Catch of the Day is an email that our ed…
00:40:22  |   Thu 20 Aug 2020
Zero-day (adjective) [Word Notes]

Zero-day (adjective) [Word Notes]

A class of software-security-weakness-issues where independent researchers discover a software flaw before the owners of the code discover it. Zero-day, or 0-day in hacker slang, refers to the moment…
00:03:57  |   Tue 18 Aug 2020
Disclaimer: The podcast and artwork embedded on this page are the property of N2K Networks, Inc.. This content is not affiliated with or endorsed by eachpod.com.