

Hacking Humans
N2K Networks
Deception, influence, and social engineering in the world of cyber crime.
Episodes
Mentioned books

Jan 5, 2021 • 5min
fuzzing (noun) [Word Notes]
An automatic software bug and vulnerability discovery technique that input's invalid, unexpected and/or random data or fuzz into a program and then monitors the program's reaction to it.

Dec 31, 2020 • 39min
Encore: Don't go looking for morality here. [Hacking Humans]
Dave has a story of an investment scam featuring celebrities, Joe warns of scams surrounding the Coronavirus, the Catch of the Day features Joe's son-in-law's adventure with thousands of bot infiltrations, and later in the show, Dave's extended interview with magicians and entertainers Penn and Teller at RSAC 2020 in San Francisco.Links to stories: Revealed: fake 'traders' allegedly prey on victims in global investment scam Coronavirus: Scammers follow the headlinesHave a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.

Dec 29, 2020 • 6min
deep packet inspection (DPI) (noun) [Word Notes]
A network monitoring and filtering technique that examines both the header information and the payload of every packet traversing a network access point.

Dec 24, 2020 • 30min
Encore: Separating fools from money. [Hacking Humans]
Dave shares a story of airport penetration testing with high degree of yuck-factor. Joe explores research on protecting passwords from social engineering. The catch-of-the-day comes courtesy of Graham Cluley's email spam box. Dave interviews Wired's Security Staff Writer Lily Hay Newman on her article tracking Nigerian email scammers. Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.

Dec 22, 2020 • 7min
tactics, techniques and procedures (TTPs) (noun) [Word Notes]
A set of behaviors that precisely describes a cyber adversary attack campaign.

Dec 22, 2020 • 7min
rootkit (noun) [Word Notes]
A clandestine set of applications designed to give hackers access and control over a target device.

Dec 17, 2020 • 37min
Phishing lures that may be in your inbox soon, and how to deal "left of bang."
Joe talks about phishing lures with holiday packages, current events, and things he expects to see in your inbox soon, Dave's shares a blog post on how to troll a Nigerian prince, The Catch of the Day comes from a listener named Christian who received an email from an ill churchgoer that tests US knowledge of geography, and later in the show, Carole Theriault returns with a conversation with Rebecca McKeown, an independent Chartered Psychologist, with experience researching and evaluating learning and development across the Ministry of Defence. She is studying the psychology of cyber response.Links to stories:How to Troll a Nigerian PrinceHave a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.

Dec 15, 2020 • 4min
identity theft (noun) [Word Notes]
In this case Identity is the set of credentials, usually electronic that vouch for who you are and theft is to steal. The theft of a person's identity for purposes of fraud.

Dec 10, 2020 • 33min
The landscape has shifted for holiday shopping to online.
Joe provides some listener feedback on allowing site notifications, Dave shares good news in his story about taking down money mules, Joe's got not as good news about a phishing campaign targeting the COVID-19 vaccine cold chain, The Catch of the Day comes from a listener named Virginia who received a phishing email impersonating a bank, and later in the show, Dave's conversation with Neal Dennis from Cyware on the cybersecurity concerns and pitfalls customers need to look out for and why ecommerce has become a goldmine for hackers.Links to stories:
U.S. Law Enforcement Takes Action Against Approximately 2,300 Money Mules In Global Crackdown On Money Laundering
IBM Uncovers Global Phishing Campaign Targeting the COVID-19 Vaccine Cold Chain
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.

Dec 8, 2020 • 6min
cyber threat intelligence (CTI) (noun) [Word Notes]
Information used by leadership to make decisions regarding the cybersecurity posture of their organization.


