1. EachPod
EachPod
Hacking Humans - Podcast

Hacking Humans

Deception, influence, and social engineering in the world of cyber crime.

Technology Tech News News
Update frequency
every 3 days
Average duration
26 minutes
Episodes
696
Years Active
2018 - 2025
Share to:
The intersection of hackers, scammers, and false collaborations.

The intersection of hackers, scammers, and false collaborations.

On Hacking Humans, Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of N2K's daily space podcast, T-Minus), are once again sharing the latest in social engineering scams, phishing schemes, a…
00:42:10  |   Thu 02 Jan 2025
dead-box forensics (noun) [Word Notes]

dead-box forensics (noun) [Word Notes]

A forensic technique where practitioners capture an entire image of a system and analyze the contents offline.
00:06:16  |   Tue 31 Dec 2024
New tools, old problems.

New tools, old problems.

Please enjoy this encore episode of Hacking Humans. This week we are joined by Maria Varmazis, host of the N2K daily space show, T-Minus. She discusses how AI is being used as a possible solution to…
00:49:08  |   Thu 26 Dec 2024
cybersecurity maturity model certification (CMMC) (noun) [Word Notes]

cybersecurity maturity model certification (CMMC) (noun) [Word Notes]

Please enjoy this encore episode of Word Notes. A supply chain cybersecurity accreditation standard designed for the protection of controlled unclassified information that the U.S. Department of Def…
00:06:57  |   Tue 24 Dec 2024
Gold bars and bold lies.

Gold bars and bold lies.

On Hacking Humans, Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of N2K's daily space podcast, T-Minus), are once again sharing the latest in social engineering scams, phishing schemes, a…
00:45:57  |   Thu 19 Dec 2024
incident response (noun) [Word Notes]

incident response (noun) [Word Notes]

Please enjoy this encore episode of Word Notes. A collection of people, process, and technology that provides an organization the ability to detect and respond to cyber attacks.
00:07:50  |   Tue 17 Dec 2024
Silent push, loud consequences.

Silent push, loud consequences.

On Hacking Humans, Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of N2K's daily space podcast, T-Minus), are once again sharing the latest in social engineering scams, phishing schemes, a…
00:44:48  |   Thu 12 Dec 2024
script kiddies (noun) [Word Notes]

script kiddies (noun) [Word Notes]

Please enjoy this encore episode of Word Notes. Cybercriminals who lack the expertise to write their own programs use existing scripts, code, or tools authored by other more skilled hackers.
00:05:38  |   Tue 10 Dec 2024
Fraud's festive frenzy.

Fraud's festive frenzy.

On Hacking Humans, Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of N2K's daily space podcast, T-Minus), are once again sharing the latest in social engineering scams, phishing schemes, a…
00:47:45  |   Thu 05 Dec 2024
sandbox (noun) [Word Notes]

sandbox (noun) [Word Notes]

Please enjoy this encore episode of Word Notes. An isolated and controlled set of resources that mimics real world environments and used to safely execute suspicious code without infecting or causing…
00:06:25  |   Tue 03 Dec 2024
A cyber carol. [Only Malware in the Building]

A cyber carol. [Only Malware in the Building]

Welcome in! You’ve entered, Only Malware in the Building. Grab your eggnog and don your coziest holiday sweater as we sleuth our way through cyber mysteries with a festive twist! Your host is Selena …
00:49:22  |   Tue 03 Dec 2024
Scamming just isn't what it used to be.

Scamming just isn't what it used to be.

Please enjoy this encore of Hacking Humans: This week, we are joined by host of N2K's T-Minus Space Daily podcast, Maria Varmazis, she sits down with Joe and Dave to discuss sextorion materials that…
00:47:37  |   Thu 28 Nov 2024
security orchestration, automation, and response (SOAR) (noun) [Word Notes]

security orchestration, automation, and response (SOAR) (noun) [Word Notes]

Please enjoy this encore episode of Word Notes. A stack of security software solutions and tools that allow organizations to orchestrate disparate internal and external tools which feed pre-built au…
00:06:26  |   Tue 26 Nov 2024
Granny’s got a new trick.

Granny’s got a new trick.

On Hacking Humans, Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of N2K's daily space podcast, T-Minus), are once again sharing the latest in social engineering scams, phishing schemes, a…
00:35:49  |   Thu 21 Nov 2024
personally identifiable information (PII) (noun) [Word Notes]

personally identifiable information (PII) (noun) [Word Notes]

A term of legal art that defines the types of data and circumstances that permits a third party to directly or indirectly identify an individual with collected data.
00:07:26  |   Tue 19 Nov 2024
Final approach to scammer advent.

Final approach to scammer advent.

On Hacking Humans, Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of N2K's daily space podcast, T-Minus), are once again sharing the latest in social engineering scams, phishing schemes, a…
00:42:44  |   Thu 14 Nov 2024
secure access service edge (SASE) (noun) [Word Notes]

secure access service edge (SASE) (noun) [Word Notes]

Enjoy this encore episode. A security architecture that incorporates the cloud shared responsibility model, a vendor provided security stack, an SD-WAN abstraction layer, and network peering with on…
00:08:25  |   Tue 12 Nov 2024
Happy hour hacking.

Happy hour hacking.

Maria Varmazis, host of N2K's daily space show T-Minus, joins Dave and Joe to share the story of the five types of social engineers Deanne Lewis encountered while tending bar, revealing how each barr…
00:48:13  |   Thu 07 Nov 2024
red teaming (noun) [Word Notes]

red teaming (noun) [Word Notes]

Enjoy this encore episode.  The practice of emulating known adversary behavior against an organization's actual defensive posture.
00:06:26  |   Tue 05 Nov 2024
Whispers in the wires: A closer look at the new age of intrusion. [OMITB]

Whispers in the wires: A closer look at the new age of intrusion. [OMITB]

Welcome in! You’ve entered, Only Malware in the Building. Join us each month to sip tea and solve mysteries about today’s most interesting threats. Your host is Selena Larson, Proofpoint intelligence…
00:39:10  |   Tue 05 Nov 2024
Disclaimer: The podcast and artwork embedded on this page are the property of N2K Networks, Inc.. This content is not affiliated with or endorsed by eachpod.com.