Hacking Humans

By CyberWire Inc.

Deception, influence, and social engineering in the world of cyber crime.

  1. 1.
    Bad password hygiene jeopardizes streaming services.
    38:06
  2. 2.
    keylogger (noun) [Word Notes]
    4:50
  3. 3.
    Answering a job ad from a ransomware gang.
    36:05
  4. 4.
    non-fungible tokens (NFT) (noun) [Word Notes]
    4:55
  5. 5.
    Pandemic taxes: later due dates afford more time for scams.
    37:45
  6. 6.
    multi-factor authentication (noun) [Word Notes]
    5:37
  7. 7.
    The fight in the dog.
    37:02
  8. 8.
    machine learning (noun) [Word Notes]
    5:37
  1. 9.
    Hacking people vs. hacking technologies to get into companies.
    38:05
  2. 10.
    intelligence (noun) [Word Notes]
    5:17
  3. 11.
    Whaling attacks are more targeted than phishing or spearphishing.
    32:54
  4. 12.
    Introducing 8th Layer Insights [Trailer]
    3:19
  5. 13.
    SaaS (noun) [Word Notes]
    5:22
  6. 14.
    How to best fight fake news.
    38:31
  7. 15.
    decryption (noun) [Word Notes]
    6:53
  8. 16.
    Digital identities are at the core of recent breaches.
    37:17
  9. 17.
    brute-force attack (noun) [Word Notes]
    5:54
  10. 18.
    Anyone can be a target of romance scams.
    33:56
  11. 19.
    denial-of-service attack (noun) [Word Notes]
    6:02
  12. 20.
    Make systems to mitigate the mistakes.
    40:29
  13. 21.
    cold boot attack (noun) [Word Notes]
    6:24
  14. 22.
    Being aware can go a long way to prevent attacks.
    33:48
  15. 23.
    cloud computing (noun) [Word Notes]
    5:41
  16. 24.
    Finding targets of opportunity.
    38:10
  17. 25.
    APT (noun) [Word Notes]
    6:17
  18. 26.
    The pandemic is slowing, time to travel?
    32:42
  19. 27.
    backdoor (noun) [Word Notes]
    5:18
  20. 28.
    Technology is not designed for older users.
    35:18
  21. 29.
    watering hole attack (noun) {Word Notes]
    4:55
  22. 30.
    Ideally, look for someone open to deception.
    37:41
  23. 31.
    network telescope (noun) [Word Notes]
    5:25
  24. 32.
    Insider threats and security concerns for APIs.
    36:22
  25. 33.
    SOC Triad (noun) [Word Notes]
    4:46
  26. 34.
    Fraud activity within secure messaging apps in plain sight.
    39:27
  27. 35.
    supply chain attacks (noun) [Word Notes]
    4:57
  28. 36.
    How likely are online users to reveal private information?
    31:15
  29. 37.
    taint analysis (noun) [Word Notes]
    3:49
  30. 38.
    Including your passwords in your final arrangements.
    39:28
  31. 39.
    ATM skimming (noun) [Word Notes]
    4:21
  32. 40.
    In the disinformation and misinformation crosshairs.
    35:26
  33. 41.
    APT side hustle (noun) [Word Notes]
    4:54
  34. 42.
    Understanding human behavior is a key to security.
    37:23
  35. 43.
    endpoint (noun) [Word Notes}
    5:30
  36. 44.
    Covid has shifted the way we deal with money and increased fraud.
    39:12
  37. 45.
    unified extensible firmware interface (UEFI) (noun) [Word Notes]
    5:21
  38. 46.
    Targeted phishing campaigns and lottery scams abound.
    32:29
  39. 47.
    Daemon (noun) [Word Notes]
    4:14
  40. 48.
    As B2C interactions shift online, call centers become new fraud vector.
    37:27
  41. 49.
    greyware (noun) [Word Notes]
    4:39
  42. 50.
    Combating growing online financial fraud.
    34:12

Listen to Hacking Humans now.

Listen to Hacking Humans in full in the Spotify app