

Hacking Humans
N2K Networks
Deception, influence, and social engineering in the world of cyber crime.
Episodes
Mentioned books

Nov 18, 2025 • 7min
Trusted Platform Module (TPM) (noun) [Word Notes]
Delve into the world of Trusted Platform Modules (TPM), where cryptographic magic happens! Discover how these chips secure private keys and enable safer computing through asymmetric encryption. Explore the historical roots of key exchange methods and learn why TPM became essential. Find out about TPM's role in Windows 11 and its specifications. Intrigued? You'll also hear examples illustrating how TPMs work and enhance security in everyday devices!

Nov 13, 2025 • 53min
Tap, pay…and prey.
This week, the hosts dive into the alarming world of social engineering scams and the latest threats. Meta reveals how it could earn billions from fraudulent ads, while a new investigation uncovers the risks of hijacking trusted Windows updaters. Joe warns listeners about 'ghost tapping'—a sneakier scam draining funds from tap-to-pay cards in crowded places. They share tips on protecting against these scams, including using RFID-blocking wallets and monitoring your accounts closely.

Nov 11, 2025 • 6min
Private Network Access (PNA) (noun) [Word Notes]
Explore the definition and significance of Private Network Access, a critical browser control blocking access to private network resources. Learn why Chrome is phasing out access from non-secure sites and the origins of this move tied to CORS. Discover how PNA enhances security by preventing attackers from reaching local network devices. Insights into potential compatibility issues for hosted apps and the practical implications for cybersecurity are also discussed, highlighting its role in safeguarding home networks from malware.

Nov 6, 2025 • 50min
Seniors in scam crosshairs.
This week, our hosts Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of the T-Minus Space Daily show) are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. We start with some follow-up, listener Jay shared how Robinhood tackled a $25.4 billion phone scam problem with a simple fix—a bright yellow in-call banner that warns users, “We’re not calling you. If the caller says they’re from Robinhood, they’re not—hang up.” Meanwhile, Myanmar’s military blew up a major online scam center at KK Park, forcing over 1,500 people to flee into Thailand. Listener JJ reminds us it’s “CAC cards,” not just “CAC,” and Shannon reports from Scooter’s Coffee, where customers are now bringing chickens for pup cups—proving some pets really do rule the roost. Maria’s story is on Bitdefender and NETGEAR’s 2025 IoT Security Report, which found smart homes now face triple the attacks of last year—about 29 a day. Dave’s story is on a cloud architect who exposed his AWS keys online, letting attackers hijack his account for crypto-mining and phishing. His takeaway: secure keys, limit privileges, and assume it can happen to you. Joe’s got the story of scammers posing as banks or the FTC, using fake security alerts to trick older adults into draining their savings. The FTC says losses are skyrocketing—so don’t move money or trust surprise calls or pop-ups. Our catch of the day comes from the Scams SubReddit, where a scammer got way more than what they signed up for in a text chain.
Resources and links to stories:
Robinhood LinkedIn post.
Stragglers from Myanmar scam center raided by army cross into Thailand as buildings are blown up
My AWS Account Got Hacked - Here Is What Happened
False alarm, real scam: how scammers are stealing older adults’ life savings
Trying to scam the scammer
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@n2k.com.

Nov 4, 2025 • 38min
Pass the intel, please. [OMITB]
Welcome in! You’ve entered, Only Malware in the Building. Join us each month to sip tea and solve mysteries about today’s most interesting threats. Your host is Selena Larson, Proofpoint intelligence analyst and host of their podcast DISCARDED. Inspired by the residents of a building in New York’s exclusive upper west side, Selena is joined by her co-hosts N2K Networks Dave Bittner and Keith Mularski, former FBI cybercrime investigator and now Chief Global Ambassador at Qintel.
Being a security researcher is a bit like being a detective: you gather clues, analyze the evidence, and consult the experts to solve the cyber puzzle. On this episode, we explore what makes information sharing actually work. From public-private partnerships to actionable intelligence, our guests discuss how organizations can prioritize, process, and operationalize shared cyber threat data to stay ahead of emerging risks.
Plus, catch Dave, Selena, and Keith on their road trip adventure in our video on YouTube — full of laughs, unexpected detours, and plenty of sleuthing!

Nov 4, 2025 • 7min
Web 3.0 (noun) [Word Notes]
Discover the potential of Web 3.0 as it aims to decentralize internet interactions, shifting power from tech giants to users. Explore the contrasts between Web 1.0's static sites, Web 2.0's user-monetizing platforms, and the promising benefits of Web 3.0, including data sovereignty. However, skepticism lingers around its practicality, with voices like Elon Musk questioning whether it's more marketing hype than reality. Dive into this evolving digital landscape and its implications for the future of online engagement.

Oct 31, 2025 • 3min
The Malware Mash!
Get into the Halloween spirit with a catchy malware parody that explores the spooky world of cyber threats. From the infamous Stuxnet worm to the antics of dark web script kiddies, the discussion is both entertaining and informative. Enjoy vivid imagery of botnets, DDoS attacks, and ransomware as they paint a haunting picture of online dangers. A cheeky reference to Vladimir and the infamous NotPetya adds an international twist. Tune in for a celebration of defenders, all wrapped up in a fun music mash!

Oct 30, 2025 • 40min
Beware the boo-gus giveaway.
This week, our hosts Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of the T-Minus Space Daily show) are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. In our follow up, our hosts respond to a listener who wrote in with an insightful question about the role of wealth in scam susceptibility. Joe's story covers how a fake AI recruiter lures developers with a GitHub “technical assessment” that, when run, unleashes a five-stage malware chain to steal credentials, wallets, and install persistent backdoors. Maria has the story on a Halloween-themed phishing scam that lured victims with a fake Home Depot giveaway, using obfuscated code, stolen email threads, and tracking pixels to trick users into handing over personal and payment information. Dave’s story is on a convincing phishing email claiming Dashlane was hacked, showing how fear and urgency—even in obvious scams—can make anyone second-guess before thinking twice. Our catch of the day is from the scams sub-Reddit thread, and is how one user received a message from their "aunt" who wanted to be nice and grab the user a present.
Resources and links to stories:
How a fake AI recruiter delivers five staged malware disguised as a dream job
Home Depot Halloween phish gives users a fright, not a freebie
Why the Obviously Fake Dashlane Hack Phishing Email Still Made Me Jump
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@n2k.com.

Oct 28, 2025 • 12min
Identity access management (IAM) (noun) [Word Notes]
Please enjoy this encore of Word Notes.
A set of solutions for ensuring that the right users can only access the appropriate resources.
CyberWire Glossary link: https://thecyberwire.com/glossary/identity-and-access-management
Audio reference link: “The Wrath of Khan (1982) ‘Kirk’s Response,’” by Russell, YouTube, 16 May 2017.

Oct 23, 2025 • 45min
Liar, liar, AI on fire.
This week, while Dave Bittner is on vacation, hosts Joe Carrigan, and Maria Varmazis (also host of the T-Minus Space Daily show) are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. Users are reporting a potential new Signal scam involving fake in-app messages posing as official support, though Signal confirms it never contacts users first and only communicates via Signal email addresses. Joe’s story is on South Korea targeting Cambodia’s scam industry after reports of kidnappings, torture, and a death, as officials crack down on criminal groups luring citizens into forced online fraud operations across Southeast Asia. Maria has the story on how AI-driven scams like deepfakes and virtual kidnappings are increasingly targeting Gen Z, using fake voices and videos to power extortion schemes that exploit their mobile-first, always-online lives. Listener DarkProphet6 shares a clever phishing attempt disguised as a fake Cloudflare “I’m not a robot” check, which tried to trick users into pasting malicious code into their terminal — a move that could have created a remote shell for attackers.
Resources and links to stories:
South Korea Targets Cambodia’s Scam Industry After Kidnappings, Torture and a Death
Feds seize $15 billion in bitcoin after busting alleged global crypto scam
China sentences 11 members of mafia family to death
AI-driven scams are preying on Gen Z’s digital lives
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@n2k.com.


