Hacking Humans

N2K Networks
undefined
Dec 30, 2021 • 21min

Identity "protection" and a pigeon drop. [Hacking Humans Goes to the Movies]

Thanks for joining us for Episode 5 of our fun project brought to you by the team of Hacking Humans, the CyberWire's social engineering podcast. Co-hosts Dave Bittner and Joe Carrigan are joined by Rick Howard in this series where they view clips from their favorite movies with examples of the social engineering scams and schemes you hear about on Hacking Humans. In this episode, Dave, Joe and Rick are watching Joe's and Dave's scene picks. They watch each of the selected scenes, describe the on-screen action for you, and then the team deconstructs what they saw. Grab your popcorn and join us for a trip to the movies.Links to this episode's clips if you'd like to watch along: Joe's clip from "Identity Thief" Rick's pick from "The Flim-Flam Man"
undefined
Dec 28, 2021 • 9min

Encore: zero trust (noun) [Word Notes]

A security philosophy that assumes adversaries have already penetrated the digital environment and tries to reduce the potential impact by limiting access by people, devices, and software to only the resources essential to perform their function and nothing more. 
undefined
Dec 25, 2021 • 7min

The CyberWire: The 12 Days of Malware.

Merry Christmas and Happy Holidays from the CyberWire and our friends! Enjoy our rendition of the 12 Days of Malware created by Dave Bittner and performed by Dave and friends: Rachel Tobac, Jayson Street, Ron Eddings & Chris Cochran, Ray [Redacted], Dinah Davis, Camille Stewart, Rick Howard, Michelle Dennedy, Jack Rhysider, Johannes Ullrich, and Charity Wright. Ba dum bum bum. Sing along if you are game! Check out our video for the full effect!The 12 Days of Malware lyricsOn the first day of Christmas, my malware gave to me:A keylogger logging my keys.On the second day of Christmas, my malware gave to me:2 Trojan Apps...And a keylogger logging my keys.On the third day of Christmas, my malware gave to me:3 Web shells...2 Trojan Apps...And a keylogger logging my keys.On the fourth day of Christmas, my malware gave to me:4 Crypto scams...3 Web shells...2 Trojan Apps...And a keylogger logging my keys.On the fifth day of Christmas, my malware gave to me:5 Zero Days!4 Crypto scams...3 Web shells...2 Trojan Apps...And a keylogger logging my keys.On the sixth day of Christmas, my malware gave to me:6 Passwords spraying...5 Zero Days!4 Crypto scams...3 Web shells...2 Trojan Apps...And a keylogger logging my keys.On the seventh day of Christmas, my malware gave to me:7 Scripts a scraping...6 Passwords spraying...5 Zero Days!4 Crypto scams...3 Web shells...2 Trojan Apps...And a keylogger logging my keys.On the eighth day of Christmas, my malware gave to me:8 Worms a wiping...7 Scripts a scraping...6 Passwords spraying...5 Zero Days!4 Crypto scams...3 Web shells...2 Trojan Apps...And a keylogger logging my keys.On the ninth day of Christmas, my malware gave to me:9 Rootkits rooting...8 Worms a wiping...7 Scripts a scraping...6 Passwords spraying...5 Zero Days!4 Crypto scams...3 Web shells...2 Trojan Apps...And a keylogger logging my keys.On the tenth day of Christmas, my malware gave to me:10 Darknet markets...9 Rootkits rooting...8 Worms a wiping...7 Scripts a scraping...6 Passwords spraying...5 Zero Days! (Bah-dum-dum-dum!)4 Crypto scams...3 Web shells...2 Trojan Apps...And a keylogger logging my keys.On the eleventh day of Christmas, my malware gave to me:11 Phishers phishing...10 Darknet markets...9 Rootkits rooting...8 Worms a wiping...7 Scripts a scraping...6 Passwords spraying...5 Zero Days! (Bah-dum-dum-dum!)4 Crypto scams...3 Web shells...2 Trojan Apps...And a keylogger logging my keys.On the twelfth day of Christmas, my malware gave to me:12 Hackers hacking...11 Phishers phishing...10 Darknet markets...9 Rootkits rooting...8 Worms a wiping...7 Scripts a scraping...6 Passwords spraying...5 Zero Days!4 Crypto scams...3 Web shells...2 Trojan Apps...And a keylogger logging my keys.
undefined
Dec 24, 2021 • 20min

Hustling the hustler and three-card Monte. [Hacking Humans Goes to the Movies]

Thanks for joining us for Episode 4 of our fun project brought to you by the team of Hacking Humans, the CyberWire's social engineering podcast. Co-hosts Dave Bittner and Joe Carrigan are joined by Rick Howard in this series where they view clips from their favorite movies with examples of the social engineering scams and schemes you hear about on Hacking Humans. In this episode, Dave, Joe and Rick are watching Joe's and Rick's scene picks. They watch each of the selected scenes, describe the on-screen action for you, and then the team deconstructs what they saw. Grab your popcorn and join us for a trip to the movies.Links to this episode's clips if you'd like to watch along: Joe's clip from "The Fresh Prince Of Bel-Air: Pool Hall Hustle" scene Rick's pick from "Lock, Stock and Two Smoking Barrels"
undefined
Dec 23, 2021 • 30min

Even if a cause moves you, do your due diligence.

Guest Amaya Hadnagy, Media Support for the Social-Engineer, LLC, joins Dave to share information about charity scams, Dave shares a personal story about some safety triggers he recently put into place to help protect his elderly parents financial accounts from scams, Joe's story comes from a listener Alice about someone scamming female Indian news anchors about jobs in Harvard University's journalism department, and our Catch of the Day comes from an imposter of Navy Federal Credit Union via listener Chris.Links to stories:The Harvard Job Offer No One at Harvard Ever Heard OfHave a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.
undefined
Dec 22, 2021 • 22min

Conmen come in many flavors, all motivated by greed. [Hacking Humans Goes to the Movies]

Thanks for joining us for our fun project brought to you by the team of Hacking Humans, the CyberWire's social engineering podcast. Co-hosts Dave Bittner and Joe Carrigan are joined by Rick Howard in this series where they view clips from their favorite movies with examples of the social engineering scams and schemes you hear about on Hacking Humans. In this episode, Dave, Joe and Rick are watching Dave's and Rick's scene picks. They watch each of the selected scenes, describe the on-screen action for you, and then the team deconstructs what they saw. Grab your popcorn and head to the movies with us.Links to this episode's clips if you'd like to watch along: Dave's clip from "Dirty Rotten Scoundrels" Rick's pick from "The Sting"
undefined
Dec 21, 2021 • 7min

OWASP cryptographic failures (noun) [Word Notes]

Code that fails to protect sensitive information. 
undefined
Dec 16, 2021 • 46min

The 3 M's: Minimize, monitor and manage.

Guest Adam Levin, security expert and podcast host of "What the Hack with Adam Levin," joins Dave to share advice and discuss some experiences shared on his podcast, Dave and Joe have some listener follow up from David with clarification on 2FA, Joe's story is about a job scam for positions at a video game company, Dave's got a story about how tools like Google and smartphones affect our memories and how we judge our own abilities, our Catch of the Day is from a listener named Chris with a fake email from Amazon about a TV his father "purchased," and how Chris had to intervene.Links to stories: They thought they got their dream job at Riot Games — but it was a scam Indeed's Guidelines for Safe Job Search The internet is tricking our brains Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.
undefined
Dec 14, 2021 • 6min

account takeover prevention (noun) [Word Notes]

The prevention of the first part of an intrusion kill chain model exploitation technique, where the hacker steals valid logging credentials from a targeted victim. 
undefined
Dec 9, 2021 • 44min

Scams abound this time of year.

Guest Dave Senci of Mastercard's NuData Security talks about the security issues with remote access and coaching frauds, Dave's got a story about receiving a "Best Buy gift card" and USB mailing, Joe's story is from the Better Business Bureau about their "12 Scams of Christmas," and our Catch of the Day is from our listener Henry who received an email that appeals to one's faith.Links to stories: PSA: If You Get a 'Best Buy Gift Card' on a USB Drive in the Mail, Don't Plug It Into Your PC The Naughty List: BBB's 12 Scams of Christmas Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app