Partner im RedaktionsNetzwerk Deutschland
Radio Logo
The station's stream will start in null sec.
Listen to Hacking Humans in the App
Listen to Hacking Humans in the App
(171,489)
Save favourites
Alarm
Sleep timer
Save favourites
Alarm
Sleep timer

Hacking Humans

Podcast Hacking Humans
Podcast Hacking Humans

Hacking Humans

N2K Networks
add
Deception, influence, and social engineering in the world of cyber crime. More
Deception, influence, and social engineering in the world of cyber crime. More

Available Episodes

5 of 433
  • Bringing in the human side of scamming.
    Nick Percoco from Kraken sits down to discuss the human factor of crypto scams, including going over common red flags and what to do when a third party is exerting pressure that taps into a human emotions. Listener Sean writes in with some follow up to discuss the increase in AI scams and if people would be more likely to talk about falling for these scams as AI becomes better and better. An anonymous listener also reached out with some follow up regarding there experience with corporate ID theft. Joe's story follows the report on "dark patterns," and what they are. Dave's story is on people who got hired as customer service reps, but instead helped lure in lonely and lovestruck through a network of dating and hookup sites. Our catch of the day comes from listener Gareth who shares his catch of a phishing scheme from the "NSA." Links to stories: Guide to Dark Patterns – Terms and examples from the CCPA and the CPA Bringing Dark Patterns to Light This Is Catfishing on an Industrial Scale Have a Catch of the Day you'd like to share? Email it to us at [email protected] or hit us up on Twitter.
    2023-05-25
    1:06:28
  • QR code phishing (noun) [Word Notes]
    A type of phishing attack that uses QR codes as the lure. CyberWire Glossary link: https://thecyberwire.com/glossary/qr-code-phishing Audio reference link: KNR, 2018. Batman The Dark Knight Joker bomb blast by phone calls scene [Video]. YouTube. URL https://www.youtube.com/watch?v=qB_fXfzB4z0.
    2023-05-23
    7:59
  • Who says the perfect heist doesn't exist? [Hacking Humans Goes to the Movies]
    Thanks for joining us again for another episode of fun project brought to you by the team of Hacking Humans, the CyberWire's social engineering podcast. Hacking Humans co-host Dave Bittner is joined by Rick Howard in this series where they view clips from their favorite movies and television shows with examples of the social engineering scams and schemes you hear Dave and co-host Joe Carrigan talk about on Hacking Humans. In this episode, Dave and Rick watch each of the selected scenes, describe the on-screen action for you, and then they deconstruct what they saw. Grab your bowl of popcorn and join us for some fantastic scams and frauds. Links to this episode's clips if you'd like to watch along: Dave's clip from the movie Out of Sight Rick's clip from the movie The Thomas Crown Affair
    2023-05-21
    22:26
  • Data privacy in a consumers world.
    Our guest, Mark Kapczynski from OneRep, joins Dave to discuss what consumers should know about data privacy. Listener Jon writes in to the show with some follow-up with some thoughts on tap interface. Another anonymous listener wrote into the show discussing ethical hacking. Dave's story is on fake QR codes and how people are getting scammed out of money after receiving a fake QR code parking ticket survey. Joe's story follows an attempted attack at Dragos and what they didn't get. Our catch of the day comes from listener Richard who writes in with a fun scam he caught from the "Marine Corps." Links to stories: QR codes used in fake parking tickets, surveys to steal your money Deconstructing a Cybersecurity Event Have a Catch of the Day you'd like to share? Email it to us at [email protected] or hit us up on Twitter.
    2023-05-18
    1:04:31
  • attribution (noun) [Word Notes]
    Definition one: The recognition of a set of repeatable attack patterns across the intrusion kill chain. Definition two: Determining the responsibility for offensive cyber operations. CyberWire Glossary link: https://thecyberwire.com/glossary/attribution Audio reference link: Nunnikhoven, M., 2018. Cybersecurity Basics #9 - Attack Attribution [Video]. YouTube. URL www.youtube.com/watch?v=rlyMz5jN_Vs
    2023-05-16
    9:24

More Technology podcasts

About Hacking Humans

Deception, influence, and social engineering in the world of cyber crime.
Podcast website

Listen to Hacking Humans, AndroidGuys and Many Other Stations from Around the World with the radio.net App

Hacking Humans

Hacking Humans

Download now for free and listen to the radio easily.

Google Play StoreApp Store

Hacking Humans: Podcasts in Family