Hacking Humans

N2K Networks
undefined
Jan 5, 2021 • 5min

fuzzing (noun) [Word Notes]

An automatic software bug and vulnerability discovery technique that input's invalid, unexpected and/or random data or fuzz into a program and then monitors the program's reaction to it.
undefined
Dec 31, 2020 • 39min

Encore: Don't go looking for morality here. [Hacking Humans]

Dave has a story of an investment scam featuring celebrities, Joe warns of scams surrounding the Coronavirus, the Catch of the Day features Joe's son-in-law's adventure with thousands of bot infiltrations, and later in the show, Dave's extended interview with magicians and entertainers Penn and Teller at RSAC 2020 in San Francisco.Links to stories: Revealed: fake 'traders' allegedly prey on victims in global investment scam Coronavirus: Scammers follow the headlinesHave a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.
undefined
Dec 29, 2020 • 6min

deep packet inspection (DPI) (noun) [Word Notes]

A network monitoring and filtering technique that examines both the header information and the payload of every packet traversing a network access point.
undefined
Dec 24, 2020 • 30min

Encore: Separating fools from money. [Hacking Humans]

Dave shares a story of airport penetration testing with high degree of yuck-factor. Joe explores research on protecting passwords from social engineering. The catch-of-the-day comes courtesy of Graham Cluley's email spam box. Dave interviews Wired's Security Staff Writer Lily Hay Newman on her article tracking Nigerian email scammers. Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.
undefined
Dec 22, 2020 • 7min

tactics, techniques and procedures (TTPs) (noun) [Word Notes]

A set of behaviors that precisely describes a cyber adversary attack campaign.
undefined
Dec 22, 2020 • 7min

rootkit (noun) [Word Notes]

A clandestine set of applications designed to give hackers access and control over a target device.
undefined
Dec 17, 2020 • 37min

Phishing lures that may be in your inbox soon, and how to deal "left of bang."

Joe talks about phishing lures with holiday packages, current events, and things he expects to see in your inbox soon, Dave's shares a blog post on how to troll a Nigerian prince, The Catch of the Day comes from a listener named Christian who received an email from an ill churchgoer that tests US knowledge of geography, and later in the show, Carole Theriault returns with a conversation with Rebecca McKeown, an independent Chartered Psychologist, with experience researching and evaluating learning and development across the Ministry of Defence. She is studying the psychology of cyber response.Links to stories:How to Troll a Nigerian PrinceHave a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.
undefined
Dec 15, 2020 • 4min

identity theft (noun) [Word Notes]

In this case Identity is the set of credentials, usually electronic that vouch for who you are and theft is to steal. The theft of a person's identity for purposes of fraud.
undefined
Dec 10, 2020 • 33min

The landscape has shifted for holiday shopping to online.

Joe provides some listener feedback on allowing site notifications, Dave shares good news in his story about taking down money mules, Joe's got not as good news about a phishing campaign targeting the COVID-19 vaccine cold chain, The Catch of the Day comes from a listener named Virginia who received a phishing email impersonating a bank, and later in the show, Dave's conversation with Neal Dennis from Cyware on the cybersecurity concerns and pitfalls customers need to look out for and why ecommerce has become a goldmine for hackers.Links to stories: U.S. Law Enforcement Takes Action Against Approximately 2,300 Money Mules In Global Crackdown On Money Laundering IBM Uncovers Global Phishing Campaign Targeting the COVID-19 Vaccine Cold Chain Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.
undefined
Dec 8, 2020 • 6min

cyber threat intelligence (CTI) (noun) [Word Notes]

Information used by leadership to make decisions regarding the cybersecurity posture of their organization.

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app