Hacking Humans

Advertise on podcast: Hacking Humans

Rating
4.6
from
275 reviews
This podcast has
516 episodes
Language
Publisher
Explicit
No
Date created
2018/05/30
Average duration
26 min.
Release period
4 days

Description

Deception, influence, and social engineering in the world of cyber crime.

Social media

Check Hacking Humans social media presence


Podcast episodes

Check latest episodes from Hacking Humans podcast


Scamming the innocent.
2024/02/22
This week we are joined by Maria Varmazis, host of the N2K daily space show, T-Minus. She brings us a scary story from a woman who never thought she'd ever be scammed. Dave and Joe shares some follow up before getting into their stories, they share a story from a listener who sent in a LinkedIn link about scammers targeting Walmart. They also share a question from listener Cynthia, who asks about bank scam covered before, and how to respond to these scams. Dave shares a story from an anonymous source this week, who writes in about the dangers of crypto scams. Joe has two stories for us this week, the first one being from a friend of his that works for a company that specializes in military contracts. This company was hiring an employee and received three emails that all were very similar to one another, sharing that this is a red flag and wanted to write in to share the dangers of this scam. The second story is a very similar story to the one covered on Andy Cohen a few episode ago, and shares how a Jefferson county couple were scammed out of hundreds of thousands of dollars. Our catch of the day comes from listener Thomas who shares a story on AI voices sounding like famous people and his experience. Links to the stories: The Day I Put $50,000 in a Shoe Box and Handed It to a Stranger I never thought I was the kind of person to fall for a scam. Phishing scam dupes Jefferson County couple out of $137K Phishing bank scam dupes Golden couple out of $137K SCAM HELL Walmart ‘gift card scammers’ caught spending $15k on jewelry, big-screen TVs and lobster tails at Sam’s Club You can hear more from the T-Minus space daily show here. Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com.
more
Encore: smishing (SMS phishing) (noun) [Word Notes]
2024/02/20
From the intrusion kill-chain model, the delivery of a “lure” via a text message to a potential victim by pretending to be some trustworthy person or organization in order to trick the victim into revealing sensitive information. Smishing is a portmanteau word made of two other words, the acronym “SMS” and the cyber coinage “Phishing“. It’s a text-message-centric variation of the email-based phishing scams that have been around since the 1990s. The term “Smishing” arose in the late 2000s. 
more
Looking forward in 2024.
2024/02/15
Aaron Walton, Threat Intel Analyst from Expel is discussing some things to look out for in 2024. Joe and Dave share some listener follow up from Mateusz, who shares some positive news with us. Dave's story is about a romance scammer coming clean after failing to woo CBS News reporter, Erica Johnson. Joe's story is on the latest decision from the FCC, and how they voted to ban scam robocalls that use AI-generated voices. Our catch of the day comes from listener Chuck, just in time for tax season, he warns against a phishing scam he received about his taxes. Links to the stories: Romance scammer reveals how he tricks women after failing to fool Go Public reporter FCC votes to ban scam robocalls that use AI-generated voices Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com.
more
Encore: port mirroring (noun) [Word Notes]
2024/02/13
A network switch configuration setting that forwards a copy of each incoming and outgoing packet to a third switch port. Also known as SPAN or Switched Port Analyzer, RAP or Roving Analysis Port, and TAP or Test Access Point. When network managers and security investigators want to capture packets for analysis, they need some sort of generic TAP or Test Access Point. You can buy specialized equipment for this operation but most modern switches have this capability built in. 
more
Scamming just isn't what it used to be.
2024/02/08
This week, we are joined by host of N2K's T-Minus Space Daily podcast, Maria Varmazis, she sits down with Joe and Dave to discuss sextorion materials that were found on popular social media apps such as, TikTok, Instagram, Snapchat and YouTube. Joe and Dave share quite a bit of follow up, Joe starts with an anonymous listener writing in sharing their story on gift card scams. Dave shares another anonymous listeners comments, sharing about what they think of Andy Cohen going public on how he got scammed. Finally, Joe and Dave hear from a listener by the name of "The Computrix," who says they need to defend Walmart. Dave share's his story about the most common phishing email themes of 2023. Joe's got the story of ransomware not being paid the same way as it used to be by companies, and share the two different angles on that. Our catch of the day comes from listener William, who writes in with a phishing scam that caught his eye. Links to the stories: Sextortion training materials found on TikTok, Instagram, Snapchat and YouTube, according to new report Most Common Phishing Email Themes of 2023 Companies aren’t paying ransoms like they used to New Ransomware Reporting Requirements Kick in as Victims Increasingly Avoid Paying FBI: Scammers Are Sending Couriers to Collect Cash From Victims You can hear more from the T-Minus space daily show here. Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com.
more
Encore: Network Time Protocol (NTP) attack (noun) [Word Notes]
2024/02/06
A reflection or amplification distributed denial-of-service attack in which hackers query Internet network time protocol servers, NTP servers for short, for the correct time, but spoof the destination address of their target victims.
more
Quiz scam nightmare.
2024/02/01
Jaeson Schultz, Technical Leader from Cisco Talos, is discussing "Spammers abuse Google Forms’ quiz to deliver scams." Dave's story discusses the disturbing new trick up a scammers sleeve to get you to fall for their schemes. Joe has two stories this week, the first a warning to those who pick up scammers phone calls and what that can lead to after gaining access to your voice. Joe's second story follows a band of organized thieves and how they have been targeting high-end homes across Metro Detroit. Our catch of the day comes from listener Van, who writes in to share a fun catch from a scammer who left a voicemail. Links to the stories: Spammers abuse Google Forms’ quiz to deliver scams Scammers are stealing people's faces for live video calls All it takes is one sentence for AI to clone your voice Expert says alleged recording of racist, antisemitic rant by Pikesville High principal could be fake Videos: Organized crews smash glass, use jammers to break into high-end Metro Detroit homes Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com.
more
Encore: smishing (SMS phishing) (noun) [Word Notes]
2024/01/30
From the intrusion kill-chain model, the delivery of a “lure” via a text message to a potential victim by pretending to be some trustworthy person or organization in order to trick the victim into revealing sensitive information. Smishing is a portmanteau word made of two other words, the acronym “SMS” and the cyber coinage “Phishing“. It’s a text-message-centric variation of the email-based phishing scams that have been around since the 1990s. The term “Smishing” arose in the late 2000s. 
more
Phishing for mail.
2024/01/25
Abhilash Garimella from Bolster joins to discuss a USPS phishing campaign abusing freemium dynamic DNS and SaaS providers. Dave and Joe share some follow up, one was from listener Mike who wrote in to tell us about a breach at Resend, another was regarding a previous episode on grief and the internet, and finally Joe and Dave discuss a listeners response to a previous episode regarding an SMS scam a listener wrote in about. Dave shares a story on Walmarts relaxed security methods and how scammers may be exploiting them. Joe shares a couple articles relating to the ever growing pop star Taylor Swift and how criminals are using her face to scam. Our catch of the day comes from Joe this week, and he shares an interesting looking email he received from "Apple." Links to the stories: Facebook users targeted with “I’ll miss him so much” scam Incident report for January 10, 2024 How Walmart’s Financial Services Became a Fraud Magnet Taylor Swift, Selena Gomez deepfakes used in Le Creuset giveaway scam No, That’s Not Taylor Swift Peddling Le Creuset Cookware Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com.
more
Encore: port mirroring (noun) [Word Notes]
2024/01/23
A network switch configuration setting that forwards a copy of each incoming and outgoing packet to a third switch port. Also known as SPAN or Switched Port Analyzer, RAP or Roving Analysis Port, and TAP or Test Access Point. When network managers and security investigators want to capture packets for analysis, they need some sort of generic TAP or Test Access Point. You can buy specialized equipment for this operation but most modern switches have this capability built in. 
more
It's the intricate deceptions that get you.
2024/01/18
This week we are joined by the host of T-Minus, N2Ks very own Maria Varmazis brings her own story and discusses with Dave and Joe. We start off with Joe, and he brings in the story of Andy Cohen and how he fell victim to a credit card scam and shares what he had learned through the experience. Maria shares Arctic Wolf Labs' story and how they have investigated several cases of Royal and Akira ransomware victims being targeted in follow-on extortion attacks dating back to October of 2023. Lastly, Dave shares his story warning YouTube users about videos promoting cracked software that is distributing Lumma Stealer. Our catch of the day comes from listener Jon, he shares and email that had made it through his spam filter. You can hear more from the T-Minus space daily show here. Links to the stories: Exclusive: Andy Cohen fell victim to a credit card scam. Here's what he learned Follow-On Extortion Campaign Targeting Victims of Akira and Royal Ransomware Beware! YouTube Videos Promoting Cracked Software Distribute Lumma Stealer Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com.
more
Encore: Network Detection and Response (NDR) (noun) [Word Notes]
2024/01/16
NDR tools provide anomaly detection and potential attack prevention by collecting telemetry across the entire intrusion kill chain on transactions across the network, between servers, hosts, and cloud-workloads, and running machine learning algorithms against this compiled and very large data set. NDR is an extension of the EDR, or endpoint detection and response idea that emerged in 2013. 
more

Podcast reviews

Read Hacking Humans podcast reviews


4.6 out of 5
275 reviews
Duster008 2024/02/15
Great show
I listen to every episode, twice. 😊 Thanks for a great show.
[REDACTED] USER 2023/09/13
I now can listen again! Great podcast! It now plays using VPNs with anti malware/anti tracking VPNs.
I now can listen again! Great podcast! It now plays using VPNs with anti malware/anti tracking VPNs.
FreshDoughnuts 2023/01/05
Great Entertainment
Despite the real and tangible value of the information in this podcast, it’s just so entertaining! Concise, well curated, and delivered in a way that ...
more
Jedi Wannabi 2021/09/01
Informative and insightful, plus fun
Even if you're not deep into the cyber security world, this is a fun and interesting podcast. Sure, the delivery vehicle is cyber security, but the s...
more
ConjuringMind 2022/11/10
Long Time Subscriber UNSUBSCRIBING
I’ve subscribed for a few years now but getting very tired of hearing your political opinions. This podcast is no longer of any use to me.
Anon reviewer d00d 2022/04/06
Cross promoted content is irrelevant
For some reason they have cross promoted content that is totally irrelevant. I assume they’re worried that word notes can’t survive as a stand alone a...
more
......................clxlxlg 2021/09/18
Culturally insensitive
I am assuming it’s Dave Bittner that’s reading an email in an antiquated “Asian” accent (episode 165 around the 20 minute mark), but whether it’s him ...
more
Anti rookie 2021/04/23
Easy to listen to and informative!
This podcast is surprisingly lighthearted while still delivering salient and relevant information. The format of each episode keeps the content moving...
more
Mikeep423 2020/12/16
@offset
Was listening to “your information is already on the dark web” and joe was talking about his og username on Twitter that a rapper wanted. I’m going to...
more
ilooovebubbly 2020/09/28
Easy going brilliant podcast!
Who knew all this tech talk could be so easy to understand & interesting? I love this podcast because it has taught me so much about how I can protec...
more
check all reviews on aple podcasts

Podcast sponsorship advertising

Start advertising on Hacking Humans & sponsor relevant audience podcasts


What do you want to promote?

Ad Format

Campaign Budget

Business Details