All content for Hacking Humans is the property of N2K Networks and is served directly from their servers
with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
Deception, influence, and social engineering in the world of cyber crime.
This week, our hosts Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of the T-Minus Space Daily show) are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. We start with some follow up, this time involving a surprising new flock of chickens and a listener note from Belgium. Via Peter Janssen, as he’s seen the same fake “employee discount” scams we covered, only this time targeting backpacks and other products. Dave's story is on a new “podcast imposter” scam, where fake invites trick business owners and influencers into giving remote access so attackers can hijack their accounts. Joe's got a story on Workday disclosing a breach after attackers used social engineering to infiltrate a third-party CRM system, and why this matters given Workday’s wide use as the front end for so many companies’ HR departments. Maria brings two quick hits this week: a fake FedEx text scam making the rounds, and a look at whether covering kids’ faces with emojis in photos really protects their privacy — or if it’s more illusion than protection. On today's catch of the day, Dave got a text claiming he’s been recommended for a high-paying, no-experience-needed YouTube job—classic signs of a scam promising easy money and “free training.”
Complete our annual audience survey before August 31.
Resources and links to stories:
Dumbest Friend Just Bought 20 Chickens
Executives Warned About Celebrity Podcast Scams
Workday Discloses Data Breach Following CRM-Targeted Social Engineering Attack
Will covering your child’s face with an emoji actually protect their privacy?
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@n2k.com.
Hacking Humans
Deception, influence, and social engineering in the world of cyber crime.