Hacking Humans
Podcast image
MFA prompt bombing (noun) [Word Notes]
6 mins; October 11, 2022
What is cyber quantum computing?
44 mins; October 06, 2022
Apple Lockdown Mode (noun) [Word Notes]
6 mins; October 04, 2022
A cryptoqueen on the run and the cons she got away with.
38 mins; September 29, 2022
Simulated Phishing (noun) [Word Notes]
8 mins; September 27, 2022
The rise in fraudulent online content.
50 mins; September 22, 2022
Sideloading (noun) [Word Notes]
6 mins; September 20, 2022
It pays to do your research. [Hacking Humans Goes to the Movies}
31 mins; September 18, 2022
Is inflation affecting the Dark Web?
52 mins; September 15, 2022
Microsegmentation (noun) [Word Notes]
6 mins; September 13, 2022
A travel surge and a host of different scams.
40 mins; September 08, 2022
Homograph phishing (noun) [Word Notes]
6 mins; September 06, 2022
Is there a growing number of public and private partnerships forming?
38 mins; September 01, 2022
Policy Orchestration (noun) [Word Notes]
6 mins; August 30, 2022
Encore: Sometimes, deepfake victims don't want to be convinced it is fake.
44 mins; August 25, 2022
Anti-cheat software (noun) [Word Notes]
8 mins; August 23, 2022
Scams in the media.
51 mins; August 18, 2022
Pseudoransomware (noun) [Word Notes]
7 mins; August 16, 2022
Staying away from Medicare scams.
42 mins; August 11, 2022
Trusted Platform Module (TPM) (noun) [Word Notes]
6 mins; August 09, 2022
Making the world a safer online place.
49 mins; August 04, 2022
Private Network Access (PNA) (noun) [Word Notes]
5 mins; August 02, 2022
A return to office means a return to email scams.
47 mins; July 28, 2022
Extortion scams and the LGBTQ+ community.
48 mins; July 21, 2022
Web 3.0 (noun)
7 mins; July 19, 2022
Behavioral science in the world of InfoSec.
48 mins; July 14, 2022
Identity access management (IAM) (noun) [Word Notes]
11 mins; July 12, 2022
Human errors and why they're made.
50 mins; July 07, 2022
Abstraction layer (noun) [Word Notes]
5 mins; July 05, 2022
The top 10 brand names most likely used in a phishing scheme.
44 mins; June 30, 2022
Identity Fabric (noun) [Word Notes]
6 mins; June 28, 2022
North Korea and a global cyber war.
38 mins; June 23, 2022
Intrusion Kill Chain (noun) [Word Notes]
7 mins; June 21, 2022
The great resignation and data exposure challenges.
51 mins; June 16, 2022
Identity Orchestration (noun) [Word Notes]
6 mins; June 14, 2022
What to look out for with scan-and-exploit cyber attacks.
47 mins; June 09, 2022
Diamond Model (noun) [Word Notes]
7 mins; June 07, 2022
Is ransomware getting too fast?
48 mins; June 02, 2022
MITRE ATT&CK (noun) [Word Notes]
7 mins; May 31, 2022
Combating social engineering.
47 mins; May 26, 2022
DevOps (noun) [Word Notes]
7 mins; May 24, 2022
Voice authentication taking hold.
48 mins; May 19, 2022
MITRE ATT&CK (noun) [Word Notes]
7 mins; May 17, 2022
Business phishing: Who's biting the bait?
47 mins; May 12, 2022
Waterfall Software Development Method (noun) [Word Notes]
6 mins; May 10, 2022
Encore: The attackers keep coming every single day.
45 mins; May 05, 2022
Agile Software Development Method (noun) [Word Notes]
7 mins; May 03, 2022
The dark side of business email attacks.
45 mins; April 28, 2022
Pegasus (noun) [Word Notes]
8 mins; April 26, 2022
Cons through and through. [Hacking Humans Goes to the Movies]
20 mins; April 24, 2022
On the front lines of fraud protection.
43 mins; April 21, 2022
Domain-based Message Authentication Reporting Conformance (DMARC) (noun) [Word Notes]
8 mins; April 19, 2022
Magic, illusion, and scams, oh my.
51 mins; April 14, 2022
Shields Up (noun) [Word Notes]
7 mins; April 12, 2022
Online threats turned real world danger.
46 mins; April 07, 2022
Software Assurance Maturity Model (SAMM) (noun) [Word Notes]
5 mins; April 05, 2022
Robocall scams and the psychology surrounding them.
42 mins; March 31, 2022
Universal 2nd Factor (U2F) [Word Notes]
7 mins; March 29, 2022
Cons: the short one and the first one. [Hacking Humans Goes to the Movies]
18 mins; March 27, 2022
What's behind Buy Now, Pay Later scams?
50 mins; March 24, 2022
adversary group naming (noun) [Word Notes]
10 mins; March 22, 2022
Data privacy: is it black and white when it comes to your kids?
40 mins; March 17, 2022
BSIMM (noun) [Word Notes]
6 mins; March 15, 2022
Technology's effects on students during the pandemic.
40 mins; March 10, 2022
OWASP vulnerable and outdated components (noun) [Word Notes]
8 mins; March 08, 2022
Phishing seems to be cyclical and thematic.
48 mins; March 03, 2022
OWASP software and data integrity failures (noun) [Word Notes]
8 mins; March 01, 2022
A blurring of lines between nation states and criminals.
45 mins; February 24, 2022
OWASP server-side request forgery (noun) [Word Notes]
7 mins; February 22, 2022
Hustling the hustlers. [Hacking Humans Goes to the Movies]
21 mins; February 20, 2022
Vulnerabilities will be found.
47 mins; February 17, 2022
OWASP security logging and monitoring failures (noun) [Word Notes]
6 mins; February 15, 2022
If you wish for peace, prepare for cyberwar.
49 mins; February 10, 2022
OWASP identification and authentication failures (noun) [Word Notes]
5 mins; February 08, 2022
How to talk your way in anywhere. [Hacking Humans Goes to the Movies]
22 mins; February 06, 2022
The ransomware game has evolved.
52 mins; February 03, 2022
OWASP broken access control (noun) [Word Notes]
7 mins; February 01, 2022
Useful ransomware protection for you.
44 mins; January 27, 2022
OWASP security misconfiguration (noun) [Word Notes]
7 mins; January 25, 2022
The perfect environment for ATOs (account takeovers) to breed.
46 mins; January 20, 2022
OWASP insecure design (noun) [Word Notes]
8 mins; January 18, 2022
The only locks you should pick are your own.
44 mins; January 13, 2022
Log4j vulnerability (noun) [Word Notes]
9 mins; January 11, 2022
Changing the game on ransomware.
49 mins; January 06, 2022
OWASP injection (noun) [Word Notes]
6 mins; January 04, 2022
Identity "protection" and a pigeon drop. [Hacking Humans Goes to the Movies]
21 mins; December 30, 2021
Encore: zero trust (noun) [Word Notes]
8 mins; December 28, 2021
The CyberWire: The 12 Days of Malware.
7 mins; December 25, 2021
Hustling the hustler and three-card Monte. [Hacking Humans Goes to the Movies]
20 mins; December 24, 2021
Even if a cause moves you, do your due diligence.
30 mins; December 23, 2021
Conmen come in many flavors, all motivated by greed. [Hacking Humans Goes to the Movies]
22 mins; December 22, 2021
OWASP cryptographic failures (noun) [Word Notes]
6 mins; December 21, 2021
The 3 M's: Minimize, monitor and manage.
45 mins; December 16, 2021
account takeover prevention (noun) [Word Notes]
6 mins; December 14, 2021
Scams abound this time of year.
43 mins; December 09, 2021
threat hunting (noun) [Word Notes]
7 mins; December 07, 2021
Do you really want that device to be a connected device?
47 mins; December 02, 2021
vulnerability management (noun) [Word Notes]
8 mins; November 30, 2021
Misdirection and layering with a con in the middle. [Hacking Humans Goes to the Movies]
17 mins; November 25, 2021
software bill of materials (SBOM) (noun) [Word Notes]
6 mins; November 23, 2021