<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:media="http://search.yahoo.com/mrss/" xmlns:content="http://purl.org/rss/1.0/modules/content/">
  <channel>
    <atom:link href="https://feeds.megaphone.fm/hacking-humans" rel="self" type="application/rss+xml"/>
    <title>Hacking Humans</title>
    <link>https://thecyberwire.com/podcasts/hacking-humans</link>
    <language>en</language>
    <copyright>© 2024 N2K Networks, Inc. 706761</copyright>
    <description>Deception, influence, and social engineering in the world of cyber crime.</description>
    <image>
      <url>https://megaphone.imgix.net/podcasts/8797f03a-a50b-11ea-b6c0-87ebb093948d/image/hacking-humans-cover-art-cw.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress</url>
      <title>Hacking Humans</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans</link>
    </image>
    <itunes:explicit>no</itunes:explicit>
    <itunes:type>episodic</itunes:type>
    <itunes:subtitle></itunes:subtitle>
    <itunes:author>N2K Networks</itunes:author>
    <itunes:summary>Deception, influence, and social engineering in the world of cyber crime.</itunes:summary>
    <content:encoded>
      <![CDATA[<p>Deception, influence, and social engineering in the world of cyber crime.</p>]]>
    </content:encoded>
    <itunes:owner>
      <itunes:name>N2K Networks, Inc.</itunes:name>
      <itunes:email>producer@n2k.com</itunes:email>
    </itunes:owner>
    <itunes:image href="https://megaphone.imgix.net/podcasts/8797f03a-a50b-11ea-b6c0-87ebb093948d/image/hacking-humans-cover-art-cw.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
    <itunes:category text="News">
      <itunes:category text="Tech News"/>
    </itunes:category>
    <itunes:category text="Technology">
    </itunes:category>
    <item>
      <title>SLAM, scam, thank you ma’am.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/383/notes</link>
      <description>This week, while Maria is on vacation, ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Dave Bittner⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ and ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Joe Carrigan⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ are joined by Michele Kellerman as they discuss the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. Dave brings us a lively follow-up from his recent theater outing the conversation circles back to chicken talk. Michele also highlights the work of Blood Cancer United sharing insight into their mission and impact. Dave’s story is on the SLAM method, a simple phishing-defense framework that teaches users to evaluate suspicious emails by checking the sender, links, attachments, and message for common signs of deception and social engineering. Michele’s got the story on a potential turning point in online scams, where rising pressure—from revelations that Meta Platforms has profited from fraudulent ads, to banks and regulators like Jerome Powell and Scott Bessent warning about systemic risks—suggests liability may soon expand beyond banks to include social media, telecoms, and other upstream players. Joe’s story is on two cousins, Shray Goel and Shaunik Raheja, who pleaded guilty in a nationwide $8.5 million scheme using fake listings, double bookings, and last-minute cancellations across platforms like Airbnb and Vrbo to maximize profits while deceiving thousands of travelers. On our catch of the day, A Reddit user shares a message they got from a scammer posing as their child. 

Resources and links to stories:


  SLAM Method for a Comprehensive Phishing Prevention Guide

  Meta tolerates rampant ad fraud from China to safeguard billions in revenue

  Banks cannot save the UK financial system from fraud alone

  Bessent, Powell warned bank CEOs about Anthropic model risks, sources say


⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Have a Catch of the Day you'd like to share? Email it to us at ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠hackinghumans@n2k.com⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠.</description>
      <pubDate>Thu, 23 Apr 2026 05:00:00 -0000</pubDate>
      <itunes:title>SLAM, scam, thank you ma’am.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>383</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>This week, while Maria is on vacation, ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Dave Bittner⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ and ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Joe Carrigan⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ are joined by Michele Kellerman as they discuss the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. Dave brings us a lively follow-up from his recent theater outing the conversation circles back to chicken talk. Michele also highlights the work of Blood Cancer United sharing insight into their mission and impact. Dave’s story is on the SLAM method, a simple phishing-defense framework that teaches users to evaluate suspicious emails by checking the sender, links, attachments, and message for common signs of deception and social engineering. Michele’s got the story on a potential turning point in online scams, where rising pressure—from revelations that Meta Platforms has profited from fraudulent ads, to banks and regulators like Jerome Powell and Scott Bessent warning about systemic risks—suggests liability may soon expand beyond banks to include social media, telecoms, and other upstream players. Joe’s story is on two cousins, Shray Goel and Shaunik Raheja, who pleaded guilty in a nationwide $8.5 million scheme using fake listings, double bookings, and last-minute cancellations across platforms like Airbnb and Vrbo to maximize profits while deceiving thousands of travelers. On our catch of the day, A Reddit user shares a message they got from a scammer posing as their child. 

Resources and links to stories:


  SLAM Method for a Comprehensive Phishing Prevention Guide

  Meta tolerates rampant ad fraud from China to safeguard billions in revenue

  Banks cannot save the UK financial system from fraud alone

  Bessent, Powell warned bank CEOs about Anthropic model risks, sources say


⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Have a Catch of the Day you'd like to share? Email it to us at ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠hackinghumans@n2k.com⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This week, while Maria is on vacation, <a href="https://www.linkedin.com/in/dave-bittner-27231a4/">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Dave Bittner⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a> and <a href="https://www.linkedin.com/in/joecarrigan/">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Joe Carrigan⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a> are joined by <a href="https://www.linkedin.com/in/michele-kellerman-cissp-b2933378/">Michele Kellerman</a> as they discuss the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. Dave brings us a lively follow-up from his recent theater outing the conversation circles back to chicken talk. Michele also highlights the work of <a href="https://pages.lls.org/voy/ma/ma26/mkellerman">Blood Cancer United</a> sharing insight into their mission and impact. Dave’s story is on the SLAM method, a simple phishing-defense framework that teaches users to evaluate suspicious emails by checking the sender, links, attachments, and message for common signs of deception and social engineering. Michele’s got the story on a potential turning point in online scams, where rising pressure—from revelations that Meta Platforms has profited from fraudulent ads, to banks and regulators like Jerome Powell and Scott Bessent warning about systemic risks—suggests liability may soon expand beyond banks to include social media, telecoms, and other upstream players. Joe’s story is on two cousins, Shray Goel and Shaunik Raheja, who pleaded guilty in a nationwide $8.5 million scheme using fake listings, double bookings, and last-minute cancellations across platforms like Airbnb and Vrbo to maximize profits while deceiving thousands of travelers. On our catch of the day, A Reddit user shares a message they got from a scammer posing as their child. </p>
<p><strong>Resources and links to stories:</strong></p>
<ul>
  <li><a href="https://www.picussecurity.com/resource/blog/slam-method-for-a-comprehensive-phishing-prevention-guide">SLAM Method for a Comprehensive Phishing Prevention Guide</a></li>
  <li><a href="https://www.reuters.com/investigations/meta-tolerates-rampant-ad-fraud-china-safeguard-billions-revenue-2025-12-15/">Meta tolerates rampant ad fraud from China to safeguard billions in revenue</a></li>
  <li><a href="https://www.thebanker.com/content/b19eacbc-2e24-4627-b9eb-986627e03bec">Banks cannot save the UK financial system from fraud alone</a></li>
  <li><a href="https://www.reuters.com/business/finance/bessent-powell-warn-bank-ceos-about-anthropic-model-risks-bloomberg-news-reports-2026-04-10/">Bessent, Powell warned bank CEOs about Anthropic model risks, sources say</a></li>
</ul>
<p><a href="https://www.ghanaweb.com/GhanaHomePage/business/Inside-the-alleged-2-5-million-Dubai-Crown-Prince-romance-scam-2020297">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a>Have a Catch of the Day you'd like to share? Email it to us at <a href="https://therecord.media/fin6-recruitment-scam-malware-campaign">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a><a href="mailto:hackinghumans@n2k.com">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠hackinghumans@n2k.com⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a>.</p>]]>
      </content:encoded>
      <itunes:duration>3099</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[4f707d2e-cdd5-11ef-8599-9bda67886a5e]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW9576019368.mp3?updated=1776878780" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Ransomware (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/130/notes</link>
      <description>Malware that disables a system in exchange for a ransom, usually by encrypting the system's data until the user pays for the decryption key.

CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/ransomware⁠

Audio reference link: ⁠https://watch.amazon.com/detail?gti=amzn1.dv.gti.d6a9f744-47b0-ac70-aa56-b31fd0f58482&amp;territory=US&amp;ref_=share_ios_season&amp;r=web</description>
      <pubDate>Tue, 21 Apr 2026 05:00:00 -0000</pubDate>
      <itunes:title>Ransomware (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>130</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Malware that disables a system in exchange for a ransom, usually by encrypting the system's data until the user pays for the decryption key.

CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/ransomware⁠

Audio reference link: ⁠https://watch.amazon.com/detail?gti=amzn1.dv.gti.d6a9f744-47b0-ac70-aa56-b31fd0f58482&amp;territory=US&amp;ref_=share_ios_season&amp;r=web</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Malware that disables a system in exchange for a ransom, usually by encrypting the system's data until the user pays for the decryption key.</p>
<p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/ransomware">⁠https://thecyberwire.com/glossary/ransomware⁠</a></p>
<p>Audio reference link: <a href="https://watch.amazon.com/detail?gti=amzn1.dv.gti.d6a9f744-47b0-ac70-aa56-b31fd0f58482&amp;territory=US&amp;ref_=share_ios_season&amp;r=web">⁠https://watch.amazon.com/detail?gti=amzn1.dv.gti.d6a9f744-47b0-ac70-aa56-b31fd0f58482&amp;territory=US&amp;ref_=share_ios_season&amp;r=web</a></p>]]>
      </content:encoded>
      <itunes:duration>466</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[dfd821f4-3d01-11f1-9b69-a7ed6ae2c396]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW8020836463.mp3?updated=1736193895" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Who is winning the scam game?</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/382/notes</link>
      <description>This week, hosts of N2K CyberWire ⁠⁠⁠⁠⁠⁠⁠⁠Maria Varmazis⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ and⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Dave Bittner⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ alongside ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Joe Carrigan⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ are discussing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines.  If you thought you could escape chicken talk, you we're wrong, this week Joe shares some more updates on his chickens. Joe’s got two stories this week, one on a New Jersey man arrested while attempting to collect $800,000 in gold as part of a widespread scam targeting elderly victims, and the second is on a new Google-tracked threat group using social engineering and phishing tactics to infiltrate BPOs and steal corporate data for extortion. Maria’s story is on a conversation she had with Sean Colicchio, highlighting how trusting human instincts, slowing down, and balancing security training can help individuals and organizations better defend against social engineering attacks. Dave’s got the story on a surge in traffic violation scams now using QR codes in phishing texts to trick victims, alongside ten hard-stop rules emphasizing verification, avoiding links or inbound requests, and slowing down to prevent falling for increasingly sophisticated scams. Our Catch of the Day comes from Reddit, where a user questioned a supposed “Google Play Console partnership” email, and the community quickly flagged it as a likely scam—citing red flags. 

Resources and links to stories:


  ⁠⁠⁠⁠Indian in New Jersey on work visa arrested in gold scam, nabbed when he was going to collect $800,000 in gold

  Google Warns of New Threat Group Targeting BPOs and Helpdesks

  Traffic violation scams switch to QR codes in new phishing texts

  [Nepal] Is this “Google Play Console partnership” email a scam?


⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Have a Catch of the Day you'd like to share? Email it to us at ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠hackinghumans@n2k.com⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠.</description>
      <pubDate>Thu, 16 Apr 2026 05:00:00 -0000</pubDate>
      <itunes:title>Who is winning the scam game?</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>382</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>This week, hosts of N2K CyberWire ⁠⁠⁠⁠⁠⁠⁠⁠Maria Varmazis⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ and⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Dave Bittner⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ alongside ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Joe Carrigan⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ are discussing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines.  If you thought you could escape chicken talk, you we're wrong, this week Joe shares some more updates on his chickens. Joe’s got two stories this week, one on a New Jersey man arrested while attempting to collect $800,000 in gold as part of a widespread scam targeting elderly victims, and the second is on a new Google-tracked threat group using social engineering and phishing tactics to infiltrate BPOs and steal corporate data for extortion. Maria’s story is on a conversation she had with Sean Colicchio, highlighting how trusting human instincts, slowing down, and balancing security training can help individuals and organizations better defend against social engineering attacks. Dave’s got the story on a surge in traffic violation scams now using QR codes in phishing texts to trick victims, alongside ten hard-stop rules emphasizing verification, avoiding links or inbound requests, and slowing down to prevent falling for increasingly sophisticated scams. Our Catch of the Day comes from Reddit, where a user questioned a supposed “Google Play Console partnership” email, and the community quickly flagged it as a likely scam—citing red flags. 

Resources and links to stories:


  ⁠⁠⁠⁠Indian in New Jersey on work visa arrested in gold scam, nabbed when he was going to collect $800,000 in gold

  Google Warns of New Threat Group Targeting BPOs and Helpdesks

  Traffic violation scams switch to QR codes in new phishing texts

  [Nepal] Is this “Google Play Console partnership” email a scam?


⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Have a Catch of the Day you'd like to share? Email it to us at ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠hackinghumans@n2k.com⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This week, hosts of N2K CyberWire <a href="https://www.linkedin.com/in/varmazis/">⁠⁠⁠⁠⁠⁠⁠⁠Maria Varmazis⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a> and<a href="https://www.linkedin.com/in/dave-bittner-27231a4/">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a> <a href="https://www.linkedin.com/in/dave-bittner-27231a4/">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Dave Bittner⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a> alongside <a href="https://www.linkedin.com/in/joecarrigan/">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Joe Carrigan⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a> are discussing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines.  If you thought you could escape chicken talk, you we're wrong, this week Joe shares some more updates on his chickens. Joe’s got two stories this week, one on a New Jersey man arrested while attempting to collect $800,000 in gold as part of a widespread scam targeting elderly victims, and the second is on a new Google-tracked threat group using social engineering and phishing tactics to infiltrate BPOs and steal corporate data for extortion. Maria’s story is on a conversation she had with <a href="https://www.linkedin.com/in/seanslinked/">Sean Colicchio</a>, highlighting how trusting human instincts, slowing down, and balancing security training can help individuals and organizations better defend against social engineering attacks. Dave’s got the story on a surge in traffic violation scams now using QR codes in phishing texts to trick victims, alongside ten hard-stop rules emphasizing verification, avoiding links or inbound requests, and slowing down to prevent falling for increasingly sophisticated scams. Our Catch of the Day comes from Reddit, where a user questioned a supposed “Google Play Console partnership” email, and the community quickly flagged it as a likely scam—citing red flags. </p>
<p><strong>Resources and links to stories:</strong></p>
<ul>
  <li><a href="https://timesofindia.indiatimes.com/world/us/indian-in-new-jersey-on-work-visa-arrested-in-gold-scam-nabbed-when-he-was-going-to-collect-800000-in-gold/articleshow/130143807.cms">⁠⁠⁠⁠Indian in New Jersey on work visa arrested in gold scam, nabbed when he was going to collect $800,000 in gold</a></li>
  <li><a href="https://www.infosecurity-magazine.com/news/google-warns-group-targeting-bpos/">Google Warns of New Threat Group Targeting BPOs and Helpdesks</a></li>
  <li><a href="https://www.bleepingcomputer.com/news/security/traffic-violation-scams-switch-to-qr-codes-in-new-phishing-texts/">Traffic violation scams switch to QR codes in new phishing texts</a></li>
  <li><a href="https://www.reddit.com/r/Scams/comments/1sggme7/nepal_is_this_google_play_console_partnership/">[Nepal] Is this “Google Play Console partnership” email a scam?</a></li>
</ul>
<p><a href="https://www.ghanaweb.com/GhanaHomePage/business/Inside-the-alleged-2-5-million-Dubai-Crown-Prince-romance-scam-2020297">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a>Have a Catch of the Day you'd like to share? Email it to us at <a href="https://therecord.media/fin6-recruitment-scam-malware-campaign">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a><a href="mailto:hackinghumans@n2k.com">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠hackinghumans@n2k.com⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a>.</p>]]>
      </content:encoded>
      <itunes:duration>3457</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[4f140648-cdd5-11ef-8599-97e6aaf41d40]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW5838255689.mp3?updated=1776272795" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Service Set Identifier (SSID) (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/129/notes</link>
      <description>Please enjoy this encore of Word Notes. 

The name of a wireless access point.

CyberWire Glossary ⁠link⁠.

Audio reference link: ⁠SSID Management - CompTIA Security+ SY0-401: 1.5⁠, Professor Messer, uploaded August 3rd, 2014.</description>
      <pubDate>Tue, 14 Apr 2026 07:00:00 -0000</pubDate>
      <itunes:title>Service Set Identifier (SSID) (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>129</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/e9d70740-3777-11f1-9fa6-dbf5571eb33c/image/441b0ca2db080b93b935568d381ce462.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle/>
      <itunes:summary>Please enjoy this encore of Word Notes. 

The name of a wireless access point.

CyberWire Glossary ⁠link⁠.

Audio reference link: ⁠SSID Management - CompTIA Security+ SY0-401: 1.5⁠, Professor Messer, uploaded August 3rd, 2014.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore of Word Notes. </p>
<p>The name of a wireless access point.</p>
<p>CyberWire Glossary <a href="https://thecyberwire.com/glossary/service-set-identifier-ssid">⁠link⁠</a>.</p>
<p>Audio reference link: <a href="https://www.youtube.com/watch?v=wlg4VaEXbrg">⁠SSID Management - CompTIA Security+ SY0-401: 1.5⁠</a>, Professor Messer, uploaded August 3rd, 2014.</p>]]>
      </content:encoded>
      <itunes:duration>342</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[e9d70740-3777-11f1-9fa6-dbf5571eb33c]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW2701710815.mp3?updated=1736193894" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>When “opportunity” knocks, don’t answer.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/381/notes</link>
      <description>This week, hosts of N2K CyberWire ⁠⁠⁠⁠⁠⁠⁠Maria Varmazis⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ and⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Dave Bittner⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ alongside ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Joe Carrigan⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ are discussing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines.  Your favorite follow up story is back, this time Sue from Australia discusses why Joe’s hen is losing feathers. Dave’s story is on a sophisticated LinkedIn phishing scam that tricks professionals with fake notifications and counterfeit login pages to steal credentials. Joe discusses a bizarre Everest scam where climbers and Sherpas were targeted with fake rescue schemes, highlighting the surprisingly high number of visitors versus summiters. Maria has the story of IRS and tax-related scams warning taxpayers about ghost preparers, urgent payment demands, and fraudulent contact attempts, with Proofpoint noting the use of remote monitoring tools in 40% of 2026 cases. Our catch of the day comes from Reddit, where a likely “stranded in the woods” scam involving a man named Michael begins to unfold but quickly unravels after he overwhelms the interaction with constant ChatGPT-style questioning.

Resources and links to stories:


  
⁠LinkedIn Phishing Scam Uses Fake Notifications to Hijack Accounts


  Everest guides accused of poisoning foreign climbers to force fake rescues in $20m scam

  Surge in sophisticated tax scams reported by BBB ahead of deadline

  Security brief: tax scams aim to steal funds from taxpayers

  The Guy in the Woods - Seduction on Scrabble - Part 1


⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Have a Catch of the Day you'd like to share? Email it to us at ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠hackinghumans@n2k.com⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠.</description>
      <pubDate>Thu, 09 Apr 2026 05:00:00 -0000</pubDate>
      <itunes:title>When “opportunity” knocks, don’t answer.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>381</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>This week, hosts of N2K CyberWire ⁠⁠⁠⁠⁠⁠⁠Maria Varmazis⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ and⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Dave Bittner⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ alongside ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Joe Carrigan⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ are discussing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines.  Your favorite follow up story is back, this time Sue from Australia discusses why Joe’s hen is losing feathers. Dave’s story is on a sophisticated LinkedIn phishing scam that tricks professionals with fake notifications and counterfeit login pages to steal credentials. Joe discusses a bizarre Everest scam where climbers and Sherpas were targeted with fake rescue schemes, highlighting the surprisingly high number of visitors versus summiters. Maria has the story of IRS and tax-related scams warning taxpayers about ghost preparers, urgent payment demands, and fraudulent contact attempts, with Proofpoint noting the use of remote monitoring tools in 40% of 2026 cases. Our catch of the day comes from Reddit, where a likely “stranded in the woods” scam involving a man named Michael begins to unfold but quickly unravels after he overwhelms the interaction with constant ChatGPT-style questioning.

Resources and links to stories:


  
⁠LinkedIn Phishing Scam Uses Fake Notifications to Hijack Accounts


  Everest guides accused of poisoning foreign climbers to force fake rescues in $20m scam

  Surge in sophisticated tax scams reported by BBB ahead of deadline

  Security brief: tax scams aim to steal funds from taxpayers

  The Guy in the Woods - Seduction on Scrabble - Part 1


⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Have a Catch of the Day you'd like to share? Email it to us at ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠hackinghumans@n2k.com⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This week, hosts of N2K CyberWire <a href="https://www.linkedin.com/in/varmazis/">⁠⁠⁠⁠⁠⁠⁠Maria Varmazis⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a> and<a href="https://www.linkedin.com/in/dave-bittner-27231a4/">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a> <a href="https://www.linkedin.com/in/dave-bittner-27231a4/">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Dave Bittner⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a> alongside <a href="https://www.linkedin.com/in/joecarrigan/">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Joe Carrigan⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a> are discussing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines.  Your favorite follow up story is back, this time Sue from Australia discusses why Joe’s hen is losing feathers. Dave’s story is on a sophisticated LinkedIn phishing scam that tricks professionals with fake notifications and counterfeit login pages to steal credentials. Joe discusses a bizarre Everest scam where climbers and Sherpas were targeted with fake rescue schemes, highlighting the surprisingly high number of visitors versus summiters. Maria has the story of IRS and tax-related scams warning taxpayers about ghost preparers, urgent payment demands, and fraudulent contact attempts, with Proofpoint noting the use of remote monitoring tools in 40% of 2026 cases. Our catch of the day comes from Reddit, where a likely “stranded in the woods” scam involving a man named Michael begins to unfold but quickly unravels after he overwhelms the interaction with constant ChatGPT-style questioning.</p>
<p><strong>Resources and links to stories:</strong></p>
<ul>
  <li>
<a href="https://attack.mitre.org/techniques/T1667/">⁠</a><a href="https://hackread.com/linkedin-phishing-scam-fake-notificatioms-hijack-accounts/">LinkedIn Phishing Scam Uses Fake Notifications to Hijack Accounts</a>
</li>
  <li><a href="https://www.independent.co.uk/travel/news-and-advice/mount-everest-climb-nepal-insurance-scam-sherpa-poisoning-b2952027.html">Everest guides accused of poisoning foreign climbers to force fake rescues in $20m scam</a></li>
  <li><a href="https://www.newsnationnow.com/us-news/recalls/tax-scams-april-15-deadline-bbb-warning/">Surge in sophisticated tax scams reported by BBB ahead of deadline</a></li>
  <li><a href="https://www.proofpoint.com/us/blog/threat-insight/security-brief-tax-scams-aim-steal-funds-taxpayers">Security brief: tax scams aim to steal funds from taxpayers</a></li>
  <li><a href="https://www.reddit.com/r/scambait/comments/1s8p1jj/the_guy_in_the_woods_seduction_on_scrabble_part_1/?solution=d9ec8e59cd30cbd8d9ec8e59cd30cbd8&amp;js_challenge=1&amp;token=bbbe4bf1c9a2b5160829c4be34da58619d8cfe58c234fe2d6d3629d61c58b5ef">The Guy in the Woods - Seduction on Scrabble - Part 1</a></li>
</ul>
<p><a href="https://www.ghanaweb.com/GhanaHomePage/business/Inside-the-alleged-2-5-million-Dubai-Crown-Prince-romance-scam-2020297">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a>Have a Catch of the Day you'd like to share? Email it to us at <a href="https://therecord.media/fin6-recruitment-scam-malware-campaign">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a><a href="mailto:hackinghumans@n2k.com">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠hackinghumans@n2k.com⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a>.</p>]]>
      </content:encoded>
      <itunes:duration>2949</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[4f430632-cdd5-11ef-8599-33b51aca3a68]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW9589328900.mp3?updated=1775675871" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Advanced Encryption Standard (AES) (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/128/notes</link>
      <description>Please enjoy this encore of Word Notes. 

A U.S. Government specification for data encryption using an asymmetric key algorithm.

CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/advanced-encryption-standard⁠

Audio reference link: papadoc73. ⁠“Claude Debussy: Clair De Lune.”⁠ YouTube, YouTube, 6 Oct. 2008. </description>
      <pubDate>Tue, 07 Apr 2026 07:00:00 -0000</pubDate>
      <itunes:title>Advanced Encryption Standard (AES) (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>128</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/8c27b0de-31fc-11f1-810f-73b2dc891b89/image/441b0ca2db080b93b935568d381ce462.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle/>
      <itunes:summary>Please enjoy this encore of Word Notes. 

A U.S. Government specification for data encryption using an asymmetric key algorithm.

CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/advanced-encryption-standard⁠

Audio reference link: papadoc73. ⁠“Claude Debussy: Clair De Lune.”⁠ YouTube, YouTube, 6 Oct. 2008. </itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore of Word Notes. </p>
<p>A U.S. Government specification for data encryption using an asymmetric key algorithm.</p>
<p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/advanced-encryption-standard">⁠https://thecyberwire.com/glossary/advanced-encryption-standard⁠</a></p>
<p>Audio reference link: papadoc73. <a href="https://www.youtube.com/watch?v=CvFH_6DNRCY">⁠“Claude Debussy: Clair De Lune.”⁠</a> <em>YouTube</em>, YouTube, 6 Oct. 2008. </p>]]>
      </content:encoded>
      <itunes:duration>517</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[8c27b0de-31fc-11f1-810f-73b2dc891b89]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW1076812107.mp3?updated=1736193894" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Who’s logging in? [OMITB]</title>
      <link>https://thecyberwire.com/podcasts/only-malware-in-the-building/22/notes</link>
      <description>Welcome in! You’ve entered, Only Malware in the Building. Join us each month to sip tea and solve mysteries about today’s most interesting threats. Your host is ⁠⁠⁠⁠⁠⁠⁠⁠Selena Larson⁠⁠⁠⁠⁠⁠⁠⁠, ⁠⁠⁠⁠⁠⁠⁠⁠Proofpoint⁠⁠⁠⁠⁠⁠⁠⁠ intelligence analyst and host of their podcast ⁠⁠⁠⁠⁠⁠⁠⁠DISCARDED⁠⁠⁠⁠⁠⁠⁠⁠. Inspired by the residents of a building in New York’s exclusive upper west side, Selena is joined by her co-hosts ⁠⁠⁠⁠⁠⁠⁠⁠N2K Networks⁠⁠⁠⁠⁠⁠⁠⁠ ⁠⁠⁠⁠⁠⁠⁠⁠Dave Bittner⁠⁠⁠⁠⁠⁠⁠⁠ and ⁠⁠⁠⁠⁠⁠⁠Keith Mularski⁠⁠⁠⁠⁠⁠⁠, former FBI cybercrime investigator and now Chief Global Ambassador at ⁠⁠⁠⁠⁠⁠⁠Qintel⁠⁠⁠⁠⁠⁠⁠.

Being a security researcher is a bit like being a detective: you gather clues, analyze the evidence, and consult the experts to solve the cyber puzzle. On this episode, we discuss findings from the Sophos Active Adversary Report 2026 by Sophos, highlighting how identity-related weaknesses like compromised credentials and gaps in MFA continue to drive a majority of security incidents. The conversation explores how attackers are moving faster, often operating after hours, and how a growing number of threat groups is adding to the complexity.</description>
      <pubDate>Tue, 07 Apr 2026 07:00:00 -0000</pubDate>
      <itunes:title>Who’s logging in? [OMITB]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>22</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/8f5f25a4-31cd-11f1-9d43-ef4a074b920c/image/14002263e169460f16ca12e04624eb3a.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Welcome in! You’ve entered, Only Malware in the Building. Join us each month to sip tea and solve mysteries about today’s most interesting threats. Your host is ⁠⁠⁠⁠⁠⁠⁠⁠Selena Larson⁠⁠⁠⁠⁠⁠⁠⁠, ⁠⁠⁠⁠⁠⁠⁠⁠Proofpoint⁠⁠⁠⁠⁠⁠⁠⁠ intelligence analyst and host of their podcast ⁠⁠⁠⁠⁠⁠⁠⁠DISCARDED⁠⁠⁠⁠⁠⁠⁠⁠. Inspired by the residents of a building in New York’s exclusive upper west side, Selena is joined by her co-hosts ⁠⁠⁠⁠⁠⁠⁠⁠N2K Networks⁠⁠⁠⁠⁠⁠⁠⁠ ⁠⁠⁠⁠⁠⁠⁠⁠Dave Bittner⁠⁠⁠⁠⁠⁠⁠⁠ and ⁠⁠⁠⁠⁠⁠⁠Keith Mularski⁠⁠⁠⁠⁠⁠⁠, former FBI cybercrime investigator and now Chief Global Ambassador at ⁠⁠⁠⁠⁠⁠⁠Qintel⁠⁠⁠⁠⁠⁠⁠.

Being a security researcher is a bit like being a detective: you gather clues, analyze the evidence, and consult the experts to solve the cyber puzzle. On this episode, we discuss findings from the Sophos Active Adversary Report 2026 by Sophos, highlighting how identity-related weaknesses like compromised credentials and gaps in MFA continue to drive a majority of security incidents. The conversation explores how attackers are moving faster, often operating after hours, and how a growing number of threat groups is adding to the complexity.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Welcome in! You’ve entered, Only Malware in the Building. Join us each month to sip tea and solve mysteries about today’s most interesting threats. Your host is <a href="https://www.linkedin.com/in/selenalarson/">⁠⁠⁠⁠⁠⁠⁠⁠Selena Larson⁠⁠⁠⁠⁠⁠⁠⁠</a>, <a href="https://www.proofpoint.com/">⁠⁠⁠⁠⁠⁠⁠⁠Proofpoint⁠⁠⁠⁠⁠⁠⁠⁠</a> intelligence analyst and host of their podcast <a href="https://www.proofpoint.com/us/podcasts/discarded">⁠⁠⁠⁠⁠⁠⁠⁠DISCARDED⁠⁠⁠⁠⁠⁠⁠⁠</a>. Inspired by the residents of a building in New York’s exclusive upper west side, Selena is joined by her co-hosts <a href="https://www.n2k.com/">⁠⁠⁠⁠⁠⁠⁠⁠N2K Networks⁠⁠⁠⁠⁠⁠⁠⁠</a> <a href="https://www.linkedin.com/in/dave-bittner-27231a4/">⁠⁠⁠⁠⁠⁠⁠⁠Dave Bittner⁠⁠⁠⁠⁠⁠⁠⁠</a> and <a href="https://www.linkedin.com/in/keith-mularski-b737551/">⁠⁠⁠⁠⁠⁠⁠Keith Mularski⁠⁠⁠⁠⁠⁠⁠</a>, former FBI cybercrime investigator and now Chief Global Ambassador at <a href="https://www.linkedin.com/company/qintel/">⁠⁠⁠⁠⁠⁠⁠Qintel⁠⁠⁠⁠⁠⁠⁠</a>.</p>
<p>Being a security researcher is a bit like being a detective: you gather clues, analyze the evidence, and consult the experts to solve the cyber puzzle. On this episode, we discuss findings from the Sophos Active Adversary Report 2026 by Sophos, highlighting how identity-related weaknesses like compromised credentials and gaps in MFA continue to drive a majority of security incidents. The conversation explores how attackers are moving faster, often operating after hours, and how a growing number of threat groups is adding to the complexity.</p>]]>
      </content:encoded>
      <itunes:duration>225</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[8f5f25a4-31cd-11f1-9d43-ef4a074b920c]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW8502381900.mp3?updated=1775489725" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The fine print of fraud.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/380/notes</link>
      <description>This week, ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Maria Varmazis⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ and ⁠Joe Carrigan⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠, joined by friend of the show ⁠Michele Kellerman⁠, dig into the latest social engineering scams, phishing schemes, and criminal exploits making headlines. Dave Bittner is tied up covering RSA, but will be back next week. First up, a follow-up from listener Bruce, who was hit with hundreds of spam emails in what looks like a subscription bombing attack, overwhelming Google’s filters before tapering off; his local hospital saw an even bigger wave, showing how alarming these attacks can be for seniors and other vulnerable users.Joe’s got the story of the UK sanctioning Xinbi, a Chinese-language cryptocurrency marketplace accused of profiting from scam centers in Southeast Asia, marking Britain’s first action against the platform. Michele shares the FBI’s takedown of 11 people in Los Angeles who ran a $17 million “house stealing” mortgage fraud scheme targeting elderly homeowners, highlighting the rising risk of title and refinance fraud for seniors. Maria dives into a new fake CAPTCHA scam that tricks Windows PC users into downloading malware, showing how even simple web prompts can be weaponized by cybercriminals. Our catch of the day is an email on Medicare, but what makes it fake? Tune in to find out!  

Resources and links to stories:


  Email Bombing

  UK sanctions crypto-linked marketplace Xinbi amid crackdown on Southeast Asia scam centres

  UK sanctions Chinese crypto marketplace tied to scam compounds

  FBI arrests 11 in LA over alleged $17m real estate, loan fraud

  Don’t Press Those Keys! How to Spot the New “Captcha Scam”

  Windows PCs targeted by hackers in a fake CAPTCHA scam to spread malware — Outlook account credentials are at risk

  Blood Cancer United


⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Have a Catch of the Day you'd like to share? Email it to us at ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠hackinghumans@n2k.com⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠.</description>
      <pubDate>Thu, 02 Apr 2026 05:00:00 -0000</pubDate>
      <itunes:title>The fine print of fraud.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>380</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>This week, ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Maria Varmazis⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ and ⁠Joe Carrigan⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠, joined by friend of the show ⁠Michele Kellerman⁠, dig into the latest social engineering scams, phishing schemes, and criminal exploits making headlines. Dave Bittner is tied up covering RSA, but will be back next week. First up, a follow-up from listener Bruce, who was hit with hundreds of spam emails in what looks like a subscription bombing attack, overwhelming Google’s filters before tapering off; his local hospital saw an even bigger wave, showing how alarming these attacks can be for seniors and other vulnerable users.Joe’s got the story of the UK sanctioning Xinbi, a Chinese-language cryptocurrency marketplace accused of profiting from scam centers in Southeast Asia, marking Britain’s first action against the platform. Michele shares the FBI’s takedown of 11 people in Los Angeles who ran a $17 million “house stealing” mortgage fraud scheme targeting elderly homeowners, highlighting the rising risk of title and refinance fraud for seniors. Maria dives into a new fake CAPTCHA scam that tricks Windows PC users into downloading malware, showing how even simple web prompts can be weaponized by cybercriminals. Our catch of the day is an email on Medicare, but what makes it fake? Tune in to find out!  

Resources and links to stories:


  Email Bombing

  UK sanctions crypto-linked marketplace Xinbi amid crackdown on Southeast Asia scam centres

  UK sanctions Chinese crypto marketplace tied to scam compounds

  FBI arrests 11 in LA over alleged $17m real estate, loan fraud

  Don’t Press Those Keys! How to Spot the New “Captcha Scam”

  Windows PCs targeted by hackers in a fake CAPTCHA scam to spread malware — Outlook account credentials are at risk

  Blood Cancer United


⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Have a Catch of the Day you'd like to share? Email it to us at ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠hackinghumans@n2k.com⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This week, <a href="https://www.linkedin.com/in/varmazis/">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Maria Varmazis⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a> and <a href="https://www.linkedin.com/in/joecarrigan/">⁠Joe Carrigan⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a>, joined by friend of the show <a href="https://www.linkedin.com/in/michele-kellerman-cissp-b2933378/">⁠Michele Kellerman⁠</a>, dig into the latest social engineering scams, phishing schemes, and criminal exploits making headlines. Dave Bittner is tied up covering RSA, but will be back next week. First up, a follow-up from listener Bruce, who was hit with hundreds of spam emails in what looks like a subscription bombing attack, overwhelming Google’s filters before tapering off; his local hospital saw an even bigger wave, showing how alarming these attacks can be for seniors and other vulnerable users.Joe’s got the story of the UK sanctioning Xinbi, a Chinese-language cryptocurrency marketplace accused of profiting from scam centers in Southeast Asia, marking Britain’s first action against the platform. Michele shares the FBI’s takedown of 11 people in Los Angeles who ran a $17 million “house stealing” mortgage fraud scheme targeting elderly homeowners, highlighting the rising risk of title and refinance fraud for seniors. Maria dives into a new fake CAPTCHA scam that tricks Windows PC users into downloading malware, showing how even simple web prompts can be weaponized by cybercriminals. Our catch of the day is an email on Medicare, but what makes it fake? Tune in to find out!  </p>
<p><strong>Resources and links to stories:</strong></p>
<ul>
  <li><a href="https://attack.mitre.org/techniques/T1667/">Email Bombing</a></li>
  <li><a href="https://www.theblock.co/post/395287/uk-sanctions-crypto-linked-marketplace-xinbi-amid-crackdown-on-southeast-asia-scam-centres">UK sanctions crypto-linked marketplace Xinbi amid crackdown on Southeast Asia scam centres</a></li>
  <li><a href="https://therecord.media/xinbi-crypto-marketplace-sanctioned">UK sanctions Chinese crypto marketplace tied to scam compounds</a></li>
  <li><a href="https://www.mpamag.com/us/mortgage-industry/industry-trends/fbi-arrests-11-in-la-over-alleged-17m-real-estate-loan-fraud/569789">FBI arrests 11 in LA over alleged $17m real estate, loan fraud</a></li>
  <li><a href="https://www.idtheftcenter.org/post/new-captcha-scam/">Don’t Press Those Keys! How to Spot the New “Captcha Scam”</a></li>
  <li><a href="https://www.windowscentral.com/microsoft/windows/windows-pc-targeted-by-hackers-in-a-fake-captcha-scam">Windows PCs targeted by hackers in a fake CAPTCHA scam to spread malware — Outlook account credentials are at risk</a></li>
  <li><a href="https://pages.lls.org/voy/ma/ma26/mkellerman">Blood Cancer United</a></li>
</ul>
<p><a href="https://www.ghanaweb.com/GhanaHomePage/business/Inside-the-alleged-2-5-million-Dubai-Crown-Prince-romance-scam-2020297">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a>Have a Catch of the Day you'd like to share? Email it to us at <a href="https://therecord.media/fin6-recruitment-scam-malware-campaign">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a><a href="mailto:hackinghumans@n2k.com">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠hackinghumans@n2k.com⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a>.</p>]]>
      </content:encoded>
      <itunes:duration>2473</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[4ee573aa-cdd5-11ef-8599-affeb58f7f74]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW2511923055.mp3?updated=1775075680" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The evolving face of AI deepfakes.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/379/notes</link>
      <description>This week, hosts of N2K CyberWire ⁠⁠⁠⁠⁠⁠Maria Varmazis⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ and⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Dave Bittner⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ alongside ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Joe Carrigan⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ are discussing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. We start with some follow up on what else? Joe's chickens! Oh Dottie! And he also shares a fun LinkedIn translator from Kagi. Dave shares a site that writes phishing emails to your chosen targets including famous and fictional people to helps users learn what to look for in phishing attempts. 

Maria discusses a new spin on pig butchering scams to recruit people to be AI face models and use them at scale. Joe shares INTERPOL's Global Financial Fraud Assessment and the current trends that AI is enabling at a rapid pace. Dave's story is about the evolving and increasingly more lucrative practices of refund fraud. Our Catch of the Day comes from Reddit about a overly insistent scammer to be. 



Resources and links to stories:


  ⁠⁠⁠⁠Kagi translating service

  The Future of Phishing

  ‘100 Video Calls Per Day’: Models Are Applying to Be the Face of AI Scams

  INTERPOL report warns of increasingly sophisticated global financial fraud threat

  The Refund Fraud Economy: Exploiting Major Retailers and Payment Platforms

  Reddit: Jessica – Sometimes I just can't be bothered with these idiots.


⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Have a Catch of the Day you'd like to share? Email it to us at ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠hackinghumans@n2k.com⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠.</description>
      <pubDate>Thu, 26 Mar 2026 05:00:00 -0000</pubDate>
      <itunes:title>The evolving face of AI deepfakes.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>379</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>This week, hosts of N2K CyberWire ⁠⁠⁠⁠⁠⁠Maria Varmazis⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ and⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Dave Bittner⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ alongside ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Joe Carrigan⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ are discussing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. We start with some follow up on what else? Joe's chickens! Oh Dottie! And he also shares a fun LinkedIn translator from Kagi. Dave shares a site that writes phishing emails to your chosen targets including famous and fictional people to helps users learn what to look for in phishing attempts. 

Maria discusses a new spin on pig butchering scams to recruit people to be AI face models and use them at scale. Joe shares INTERPOL's Global Financial Fraud Assessment and the current trends that AI is enabling at a rapid pace. Dave's story is about the evolving and increasingly more lucrative practices of refund fraud. Our Catch of the Day comes from Reddit about a overly insistent scammer to be. 



Resources and links to stories:


  ⁠⁠⁠⁠Kagi translating service

  The Future of Phishing

  ‘100 Video Calls Per Day’: Models Are Applying to Be the Face of AI Scams

  INTERPOL report warns of increasingly sophisticated global financial fraud threat

  The Refund Fraud Economy: Exploiting Major Retailers and Payment Platforms

  Reddit: Jessica – Sometimes I just can't be bothered with these idiots.


⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Have a Catch of the Day you'd like to share? Email it to us at ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠hackinghumans@n2k.com⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This week, hosts of N2K CyberWire <a href="https://www.linkedin.com/in/varmazis/">⁠⁠⁠⁠⁠⁠Maria Varmazis⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a> and<a href="https://www.linkedin.com/in/dave-bittner-27231a4/">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a> <a href="https://www.linkedin.com/in/dave-bittner-27231a4/">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Dave Bittner⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a> alongside <a href="https://www.linkedin.com/in/joecarrigan/">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Joe Carrigan⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a> are discussing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. We start with some follow up on what else? Joe's chickens! Oh Dottie! And he also shares a fun LinkedIn translator from Kagi. Dave shares a site that writes phishing emails to your chosen targets including famous and fictional people to helps users learn what to look for in phishing attempts. </p>
<p>Maria discusses a new spin on pig butchering scams to recruit people to be AI face models and use them at scale. Joe shares INTERPOL's Global Financial Fraud Assessment and the current trends that AI is enabling at a rapid pace. Dave's story is about the evolving and increasingly more lucrative practices of refund fraud. Our Catch of the Day comes from Reddit about a overly insistent scammer to be. </p>
<p><br></p>
<p><strong>Resources and links to stories:</strong></p>
<ul>
  <li><a href="https://translate.kagi.com/?from=en&amp;to=linkedin">⁠⁠⁠⁠Kagi translating service</a></li>
  <li><a href="https://civai.org/p/email-phishing">The Future of Phishing</a></li>
  <li><a href="https://www.wired.com/story/models-are-applying-to-be-the-face-of-ai-scams/">‘100 Video Calls Per Day’: Models Are Applying to Be the Face of AI Scams</a></li>
  <li><a href="https://www.interpol.int/en/News-and-Events/News/2026/INTERPOL-report-warns-of-increasingly-sophisticated-global-financial-fraud-threat">INTERPOL report warns of increasingly sophisticated global financial fraud threat</a></li>
  <li><a href="https://www.bleepingcomputer.com/news/security/the-refund-fraud-economy-exploiting-major-retailers-and-payment-platforms/">The Refund Fraud Economy: Exploiting Major Retailers and Payment Platforms</a></li>
  <li><a href="https://www.reddit.com/r/scambait/comments/1rrabrd/jessica_sometimes_i_just_cant_be_bothered_with/">Reddit: Jessica – Sometimes I just can't be bothered with these idiots.</a></li>
</ul>
<p><a href="https://www.ghanaweb.com/GhanaHomePage/business/Inside-the-alleged-2-5-million-Dubai-Crown-Prince-romance-scam-2020297">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a>Have a Catch of the Day you'd like to share? Email it to us at <a href="https://therecord.media/fin6-recruitment-scam-malware-campaign">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a><a href="mailto:hackinghumans@n2k.com">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠hackinghumans@n2k.com⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a>.</p>]]>
      </content:encoded>
      <itunes:duration>2882</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[4eb798cc-cdd5-11ef-8599-f3bf48eef0a2]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW7104884702.mp3?updated=1774305023" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>When AI wears a suit and tie.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/378/notes</link>
      <description>This week, hosts of N2K CyberWire ⁠⁠⁠⁠⁠Maria Varmazis⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ and⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Dave Bittner⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ alongside ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Joe Carrigan⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ are discussing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. We start with some follow up on aggravated identity theft and how it ties to crimes like wire fraud, along with a quick look at shared mailboxes and why sharing login credentials can create security risks. Joe’s got the story of a vishing attack on an Ericsson vendor that exposed sensitive data of over 15,000 people, highlighting the risks of third-party security gaps. Dave’s story is on Meta removing millions of scam ads and accounts while facing scrutiny over whether it profits from fraudulent advertising, highlighting the growing scale of social media-driven scams and pressure from lawmakers to crack down. Maria has the story on how scammers are using AI to impersonate government officials through deepfakes, fake websites, and voice cloning, making fraud more convincing and harder to detect while stealing money and personal information. Our Catch of the Day comes from Reddit where a user has an intriguing conversation with Elon Musk, where he professes his love in a very record amount of time.  

Resources and links to stories:


  
⁠Ericsson US Discloses Data Breach as Hackers Steal Employee and Customer Data


  That random call saying “you’ve won a prize” is a scam

  Meta says it culled millions of scam ads amid accusations that it profits from them

  Watch out for AI-generated government impersonators

  Grammarly Is Facing a Class Action Lawsuit Over Its AI ‘Expert Review’ Feature

  Warren Buffett didn’t make this video about Canada-U.S. tensions. It's fake and there will be more

  How to Fix a Sticking Door


⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Have a Catch of the Day you'd like to share? Email it to us at ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠hackinghumans@n2k.com⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠.</description>
      <pubDate>Thu, 19 Mar 2026 05:00:00 -0000</pubDate>
      <itunes:title>When AI wears a suit and tie.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>378</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>This week, hosts of N2K CyberWire ⁠⁠⁠⁠⁠Maria Varmazis⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ and⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Dave Bittner⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ alongside ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Joe Carrigan⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ are discussing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. We start with some follow up on aggravated identity theft and how it ties to crimes like wire fraud, along with a quick look at shared mailboxes and why sharing login credentials can create security risks. Joe’s got the story of a vishing attack on an Ericsson vendor that exposed sensitive data of over 15,000 people, highlighting the risks of third-party security gaps. Dave’s story is on Meta removing millions of scam ads and accounts while facing scrutiny over whether it profits from fraudulent advertising, highlighting the growing scale of social media-driven scams and pressure from lawmakers to crack down. Maria has the story on how scammers are using AI to impersonate government officials through deepfakes, fake websites, and voice cloning, making fraud more convincing and harder to detect while stealing money and personal information. Our Catch of the Day comes from Reddit where a user has an intriguing conversation with Elon Musk, where he professes his love in a very record amount of time.  

Resources and links to stories:


  
⁠Ericsson US Discloses Data Breach as Hackers Steal Employee and Customer Data


  That random call saying “you’ve won a prize” is a scam

  Meta says it culled millions of scam ads amid accusations that it profits from them

  Watch out for AI-generated government impersonators

  Grammarly Is Facing a Class Action Lawsuit Over Its AI ‘Expert Review’ Feature

  Warren Buffett didn’t make this video about Canada-U.S. tensions. It's fake and there will be more

  How to Fix a Sticking Door


⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Have a Catch of the Day you'd like to share? Email it to us at ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠hackinghumans@n2k.com⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This week, hosts of N2K CyberWire <a href="https://www.linkedin.com/in/varmazis/">⁠⁠⁠⁠⁠Maria Varmazis⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a> and<a href="https://www.linkedin.com/in/dave-bittner-27231a4/">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a> <a href="https://www.linkedin.com/in/dave-bittner-27231a4/">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Dave Bittner⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a> alongside <a href="https://www.linkedin.com/in/joecarrigan/">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Joe Carrigan⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a> are discussing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. We start with some follow up on aggravated identity theft and how it ties to crimes like wire fraud, along with a quick look at shared mailboxes and why sharing login credentials can create security risks. Joe’s got the story of a vishing attack on an Ericsson vendor that exposed sensitive data of over 15,000 people, highlighting the risks of third-party security gaps. Dave’s story is on Meta removing millions of scam ads and accounts while facing scrutiny over whether it profits from fraudulent advertising, highlighting the growing scale of social media-driven scams and pressure from lawmakers to crack down. Maria has the story on how scammers are using AI to impersonate government officials through deepfakes, fake websites, and voice cloning, making fraud more convincing and harder to detect while stealing money and personal information. Our Catch of the Day comes from Reddit where a user has an intriguing conversation with Elon Musk, where he professes his love in a very record amount of time.  </p>
<p><strong>Resources and links to stories:</strong></p>
<ul>
  <li>
<a href="https://www.theregister.com/2026/02/11/payroll_pirates_business_social_engineering/">⁠</a><a href="https://cyberpress.org/ericsson-us-discloses-data-breach-as-hackers-steal-employee-and-customer-data/">Ericsson US Discloses Data Breach as Hackers Steal Employee and Customer Data</a>
</li>
  <li><a href="https://consumer.ftc.gov/consumer-alerts/2026/03/random-call-saying-youve-won-prize-scam">That random call saying “you’ve won a prize” is a scam</a></li>
  <li><a href="https://therecord.media/meta-scam-advertising-crackdown">Meta says it culled millions of scam ads amid accusations that it profits from them</a></li>
  <li><a href="https://www.canada.ca/en/competition-bureau/news/2026/03/watch-out-for-ai-generated-government-impersonators.html">Watch out for AI-generated government impersonators</a></li>
  <li><a href="https://www.wired.com/story/grammarly-is-facing-a-class-action-lawsuit-over-its-ai-expert-review-feature/">Grammarly Is Facing a Class Action Lawsuit Over Its AI ‘Expert Review’ Feature</a></li>
  <li><a href="https://www.youtube.com/watch?v=YAzN7CMjHoo">Warren Buffett didn’t make this video about Canada-U.S. tensions. It's fake and there will be more</a></li>
  <li><a href="https://www.youtube.com/watch?v=AzRqVgkjZaY">How to Fix a Sticking Door</a></li>
</ul>
<p><a href="https://www.ghanaweb.com/GhanaHomePage/business/Inside-the-alleged-2-5-million-Dubai-Crown-Prince-romance-scam-2020297">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a>Have a Catch of the Day you'd like to share? Email it to us at <a href="https://therecord.media/fin6-recruitment-scam-malware-campaign">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a><a href="mailto:hackinghumans@n2k.com">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠hackinghumans@n2k.com⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a>.</p>]]>
      </content:encoded>
      <itunes:duration>2957</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[4e8a1654-cdd5-11ef-8599-e3b581efb46e]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW1036259197.mp3?updated=1773765091" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Domain Naming System (DNS) (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/126/notes</link>
      <description>Please enjoy this encore of Word Notes. 

A system that translates text-based URLs to their underlying numerical IP addresses.

CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/domain-name-system-dns⁠

Audio reference link: HistoryHeard. “⁠History Heard: Paul Mockapetris.⁠” YouTube, YouTube, 5 Apr. 2009.</description>
      <pubDate>Tue, 17 Mar 2026 07:00:00 -0000</pubDate>
      <itunes:title>Domain Naming System (DNS) (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>126</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/71995574-220c-11f1-b386-178c942595ed/image/441b0ca2db080b93b935568d381ce462.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle/>
      <itunes:summary>Please enjoy this encore of Word Notes. 

A system that translates text-based URLs to their underlying numerical IP addresses.

CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/domain-name-system-dns⁠

Audio reference link: HistoryHeard. “⁠History Heard: Paul Mockapetris.⁠” YouTube, YouTube, 5 Apr. 2009.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore of Word Notes. </p>
<p>A system that translates text-based URLs to their underlying numerical IP addresses.</p>
<p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/domain-name-system-dns">⁠https://thecyberwire.com/glossary/domain-name-system-dns⁠</a></p>
<p>Audio reference link: HistoryHeard. “<a href="https://www.youtube.com/watch?v=VLahF1zwAog">⁠History Heard: Paul Mockapetris.⁠</a>” <em>YouTube</em>, YouTube, 5 Apr. 2009.</p>]]>
      </content:encoded>
      <itunes:duration>571</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[71995574-220c-11f1-b386-178c942595ed]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW1888593303.mp3?updated=1736193893" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Defending against unlimited penalty shots. [Hacking Humans Live!]</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/377/notes</link>
      <description>This week, hosts of N2K CyberWire ⁠⁠⁠⁠⁠Maria Varmazis⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ and⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Dave Bittner⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ head to Orlando to attend ThreatLocker's Zero Trust World 2026 (ZTW). There, they  discussed the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. Joe Carrigan was unable to join the team, but they have a very special guest, host of the BowTieSecurityGuy After Dark podcast, Rob Whetstine.  He is one of the featured speakers this week at Zero Trust World, and he shared experiences from his career at companies like Disney and highlights from his ZTW presentation on Phishing. 

Maria's story involves a Maine Supreme Court hearing on a case involving a financial advisory firm that was mislead by a client. Dave highlights a malvertising campaign by a threat actor researchers call D-Shortiez. In our Catch of the Day, comes from the Scambait Subreddit where Mavis offers up large sums of money for a $50 Visa Debit card. We thank Rob for joining us as our special guest. 

Resources and links to stories:


  
Maine Law Court hears oral arguments in $1.3M elder scam case.

  
Disrupting 59M Malicious Impressions: Inside D-Shortiez Testing Infrastructure and Campaign Management.

  Rob Whetstine's ⁠BowTieSecurityGuy After Dark⁠ podcast.


⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Have a Catch of the Day you'd like to share? Email it to us at ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠hackinghumans@n2k.com⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠.</description>
      <pubDate>Thu, 12 Mar 2026 05:00:00 -0000</pubDate>
      <itunes:title>Defending against unlimited penalty shots. [Hacking Humans Live!]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>377</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>This week, hosts of N2K CyberWire ⁠⁠⁠⁠⁠Maria Varmazis⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ and⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Dave Bittner⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ head to Orlando to attend ThreatLocker's Zero Trust World 2026 (ZTW). There, they  discussed the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. Joe Carrigan was unable to join the team, but they have a very special guest, host of the BowTieSecurityGuy After Dark podcast, Rob Whetstine.  He is one of the featured speakers this week at Zero Trust World, and he shared experiences from his career at companies like Disney and highlights from his ZTW presentation on Phishing. 

Maria's story involves a Maine Supreme Court hearing on a case involving a financial advisory firm that was mislead by a client. Dave highlights a malvertising campaign by a threat actor researchers call D-Shortiez. In our Catch of the Day, comes from the Scambait Subreddit where Mavis offers up large sums of money for a $50 Visa Debit card. We thank Rob for joining us as our special guest. 

Resources and links to stories:


  
Maine Law Court hears oral arguments in $1.3M elder scam case.

  
Disrupting 59M Malicious Impressions: Inside D-Shortiez Testing Infrastructure and Campaign Management.

  Rob Whetstine's ⁠BowTieSecurityGuy After Dark⁠ podcast.


⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Have a Catch of the Day you'd like to share? Email it to us at ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠hackinghumans@n2k.com⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This week, hosts of N2K CyberWire <a href="https://www.linkedin.com/in/varmazis/">⁠⁠⁠⁠⁠Maria Varmazis⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a> and<a href="https://www.linkedin.com/in/dave-bittner-27231a4/">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a> <a href="https://www.linkedin.com/in/dave-bittner-27231a4/">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Dave Bittner⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a> head to Orlando to attend <a href="https://www.threatlocker.com/">ThreatLocker</a>'s <a href="https://ztw.com/">Zero Trust World 2026</a> (ZTW). There, they  discussed the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. Joe Carrigan was unable to join the team, but they have a very special guest, host of the <a href="https://bowtiesecurityguyafterdark.podbean.com/">BowTieSecurityGuy After Dark</a> podcast, <a href="https://www.linkedin.com/in/bowtiesecurityguy/">Rob Whetstine</a>.  He is one of the featured speakers this week at Zero Trust World, and he shared experiences from his career at companies like Disney and highlights from his ZTW presentation on Phishing. <br></p>
<p>Maria's story involves a Maine Supreme Court hearing on a case involving a financial advisory firm that was mislead by a client. Dave highlights a malvertising campaign by a threat actor researchers call D-Shortiez. In our Catch of the Day, comes from the Scambait Subreddit where Mavis offers up large sums of money for a $50 Visa Debit card. We thank Rob for joining us as our special guest. </p>
<p><strong>Resources and links to stories:</strong></p>
<ul>
  <li>
<a href="https://www.pressherald.com/2026/03/03/maine-law-court-hears-oral-arguments-in-1-3m-elder-scam-case/">Maine Law Court hears oral arguments in $1.3M elder scam case</a>.</li>
  <li>
<a href="https://blog.confiant.com/p/disrupting-59m-malicious-impressions">Disrupting 59M Malicious Impressions: Inside D-Shortiez Testing Infrastructure and Campaign Management</a>.</li>
  <li>Rob Whetstine's <a href="https://bowtiesecurityguyafterdark.podbean.com/">⁠BowTieSecurityGuy After Dark⁠</a> podcast.</li>
</ul>
<p><a href="https://www.ghanaweb.com/GhanaHomePage/business/Inside-the-alleged-2-5-million-Dubai-Crown-Prince-romance-scam-2020297">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a>Have a Catch of the Day you'd like to share? Email it to us at <a href="https://therecord.media/fin6-recruitment-scam-malware-campaign">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a><a href="mailto:hackinghumans@n2k.com">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠hackinghumans@n2k.com⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a>.</p>]]>
      </content:encoded>
      <itunes:duration>3772</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[4e596f9a-cdd5-11ef-8599-c7e3ac8311a6]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW2963312471.mp3?updated=1773089112" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Pretexting (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/125/notes</link>
      <description>Please enjoy this encore of Word Notes. 

A social engineering technique in which a threat actor poses as a trusted person or entity in order to trick the victim into disclosing information or performing an action that benefits the attacker.

CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/pretexting⁠

Audio reference link: “⁠Batch Pin Hurt Charlize Theron Skin | the Italian Job (2003) Movie Scene.⁠” YouTube, YouTube, 22 Nov. 2016. </description>
      <pubDate>Tue, 10 Mar 2026 07:00:00 -0000</pubDate>
      <itunes:title>Pretexting (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>125</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/a5f6d286-1647-11f1-9cc9-fb3ea0a19d86/image/441b0ca2db080b93b935568d381ce462.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle/>
      <itunes:summary>Please enjoy this encore of Word Notes. 

A social engineering technique in which a threat actor poses as a trusted person or entity in order to trick the victim into disclosing information or performing an action that benefits the attacker.

CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/pretexting⁠

Audio reference link: “⁠Batch Pin Hurt Charlize Theron Skin | the Italian Job (2003) Movie Scene.⁠” YouTube, YouTube, 22 Nov. 2016. </itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore of Word Notes. </p>
<p>A social engineering technique in which a threat actor poses as a trusted person or entity in order to trick the victim into disclosing information or performing an action that benefits the attacker.</p>
<p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/pretexting">⁠https://thecyberwire.com/glossary/pretexting⁠</a></p>
<p>Audio reference link: “<a href="https://www.youtube.com/watch?v=Wz6UEWQ9vdI">⁠Batch Pin Hurt Charlize Theron Skin | the Italian Job (2003) Movie Scene.⁠</a>” <em>YouTube</em>, YouTube, 22 Nov. 2016. </p>]]>
      </content:encoded>
      <itunes:duration>367</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[a5f6d286-1647-11f1-9cc9-fb3ea0a19d86]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW8059263176.mp3?updated=1736193893" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Identity theft gets a raise.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/376/notes</link>
      <description>This week, hosts of N2K CyberWire ⁠⁠⁠⁠Maria Varmazis⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ and⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Dave Bittner⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ alongside ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Joe Carrigan⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ are discussing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. For our follow up this week we get an update Merriam-Webster dictionary for Joe, and listener Michael Amezquita suggested that customizable ChatGPT personality settings may explain why Joe and Dave received different responses on Hacking Humans. Dave shares reporting on a Binary Defense case where attackers used social engineering and a help desk reset to hijack a physician’s identity and reroute payroll deposits through a trusted internal system without triggering security alerts. Maria highlights a surge in AI-powered publishing scams targeting authors, where fraudsters use flattery and impersonate legitimate organizations to charge bogus marketing and promotion fees. Joe covers multi-state raids tied to a massive gold bar scam that stole tens of millions from seniors, with stolen gold allegedly melted down through cooperating jewelry stores. In our Catch of the Day, a Reddit scambaiter shared a bizarre ongoing conversation with someone claiming to be “Keanu Reeves from Brokeback Mountain” who reached out to non‑fans in Norway.

Resources and links to stories:


  Payroll pirates are conning help desks to steal workers' identities and redirect paychecks

  What is it like to attend a predatory conference?

  Hungry for Affirmation, Vulnerable to Scams: As a Writer, I Know the Feeling

  Third North Texas jewelry store raided over alleged connections to $74 million gold scam targeting seniors

  Federal and state authorities raid jewelry stores in multi-state $50 million gold bar scam

  Jewelry store raids in Irving, Frisco linked to $55 million gold scam targeting seniors, officials say

  Keanu Reeves from Brokeback Mountain reaches out to non-fans in Norway! - Part 1


⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Have a Catch of the Day you'd like to share? Email it to us at ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠hackinghumans@n2k.com⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠.</description>
      <pubDate>Thu, 05 Mar 2026 06:00:00 -0000</pubDate>
      <itunes:title>Identity theft gets a raise.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>376</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>This week, hosts of N2K CyberWire ⁠⁠⁠⁠Maria Varmazis⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ and⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Dave Bittner⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ alongside ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Joe Carrigan⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ are discussing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. For our follow up this week we get an update Merriam-Webster dictionary for Joe, and listener Michael Amezquita suggested that customizable ChatGPT personality settings may explain why Joe and Dave received different responses on Hacking Humans. Dave shares reporting on a Binary Defense case where attackers used social engineering and a help desk reset to hijack a physician’s identity and reroute payroll deposits through a trusted internal system without triggering security alerts. Maria highlights a surge in AI-powered publishing scams targeting authors, where fraudsters use flattery and impersonate legitimate organizations to charge bogus marketing and promotion fees. Joe covers multi-state raids tied to a massive gold bar scam that stole tens of millions from seniors, with stolen gold allegedly melted down through cooperating jewelry stores. In our Catch of the Day, a Reddit scambaiter shared a bizarre ongoing conversation with someone claiming to be “Keanu Reeves from Brokeback Mountain” who reached out to non‑fans in Norway.

Resources and links to stories:


  Payroll pirates are conning help desks to steal workers' identities and redirect paychecks

  What is it like to attend a predatory conference?

  Hungry for Affirmation, Vulnerable to Scams: As a Writer, I Know the Feeling

  Third North Texas jewelry store raided over alleged connections to $74 million gold scam targeting seniors

  Federal and state authorities raid jewelry stores in multi-state $50 million gold bar scam

  Jewelry store raids in Irving, Frisco linked to $55 million gold scam targeting seniors, officials say

  Keanu Reeves from Brokeback Mountain reaches out to non-fans in Norway! - Part 1


⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Have a Catch of the Day you'd like to share? Email it to us at ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠hackinghumans@n2k.com⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This week, hosts of N2K CyberWire <a href="https://www.linkedin.com/in/varmazis/">⁠⁠⁠⁠Maria Varmazis⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a> and<a href="https://www.linkedin.com/in/dave-bittner-27231a4/">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a> <a href="https://www.linkedin.com/in/dave-bittner-27231a4/">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Dave Bittner⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a> alongside <a href="https://www.linkedin.com/in/joecarrigan/">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Joe Carrigan⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a> are discussing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. For our follow up this week we get an update Merriam-Webster dictionary for Joe, and listener Michael Amezquita suggested that customizable ChatGPT personality settings may explain why Joe and Dave received different responses on Hacking Humans. Dave shares reporting on a Binary Defense case where attackers used social engineering and a help desk reset to hijack a physician’s identity and reroute payroll deposits through a trusted internal system without triggering security alerts. Maria highlights a surge in AI-powered publishing scams targeting authors, where fraudsters use flattery and impersonate legitimate organizations to charge bogus marketing and promotion fees. Joe covers multi-state raids tied to a massive gold bar scam that stole tens of millions from seniors, with stolen gold allegedly melted down through cooperating jewelry stores. In our Catch of the Day, a Reddit scambaiter shared a bizarre ongoing conversation with someone claiming to be “Keanu Reeves from <em>Brokeback Mountain</em>” who reached out to non‑fans in Norway.</p>
<p><strong>Resources and links to stories:</strong></p>
<ul>
  <li><a href="https://www.theregister.com/2026/02/11/payroll_pirates_business_social_engineering/">Payroll pirates are conning help desks to steal workers' identities and redirect paychecks</a></li>
  <li><a href="https://www.nature.com/articles/d41586-024-02358-w">What is it like to attend a predatory conference?</a></li>
  <li><a href="https://www.nytimes.com/2026/02/25/books/review/publishing-scams.html">Hungry for Affirmation, Vulnerable to Scams: As a Writer, I Know the Feeling</a></li>
  <li><a href="https://www.cbsnews.com/texas/news/gold-bar-scam-raid-richardson-jewelry-store/#">Third North Texas jewelry store raided over alleged connections to $74 million gold scam targeting seniors</a></li>
  <li><a href="https://www.cbsnews.com/atlanta/news/federal-and-state-authorities-raid-jewelry-stores-in-multi-state-50-million-gold-bar-scam/">Federal and state authorities raid jewelry stores in multi-state $50 million gold bar scam</a></li>
  <li><a href="https://www.cbsnews.com/texas/news/jewelry-store-raids-in-irving-frisco-linked-to-55-million-gold-scam-targeting-seniors/">Jewelry store raids in Irving, Frisco linked to $55 million gold scam targeting seniors, officials say</a></li>
  <li><a href="https://www.reddit.com/r/scambait/comments/1rf7r9w/keanu_reeves_from_brokeback_mountain_reaches_out/">Keanu Reeves from Brokeback Mountain reaches out to non-fans in Norway! - Part 1</a></li>
</ul>
<p><a href="https://www.ghanaweb.com/GhanaHomePage/business/Inside-the-alleged-2-5-million-Dubai-Crown-Prince-romance-scam-2020297">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a>Have a Catch of the Day you'd like to share? Email it to us at <a href="https://therecord.media/fin6-recruitment-scam-malware-campaign">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a><a href="mailto:hackinghumans@n2k.com">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠hackinghumans@n2k.com⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a>.</p>]]>
      </content:encoded>
      <itunes:duration>3391</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[4e2aac14-cdd5-11ef-8599-9b4dbdc85b25]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW8826993803.mp3?updated=1772576861" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Web Application Firewall (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/124/notes</link>
      <description>Please enjoy this encore of Word Notes. 

A layer seven firewall designed to block threats at the application layer of the open system interconnection model, the OSI model. 

CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/web-application-firewall⁠

Audio reference link: “VCF East 9.1 - Ches' Computer Security Adventures - Bill Cheswick.” YouTube, 29 Dec. 2015, ⁠https://youtu.be/trR1cuBtcPs⁠. </description>
      <pubDate>Tue, 03 Mar 2026 08:00:00 -0000</pubDate>
      <itunes:title>Web Application Firewall (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>124</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/81b1d6b4-1647-11f1-93dc-c3456fa477c7/image/441b0ca2db080b93b935568d381ce462.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle/>
      <itunes:summary>Please enjoy this encore of Word Notes. 

A layer seven firewall designed to block threats at the application layer of the open system interconnection model, the OSI model. 

CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/web-application-firewall⁠

Audio reference link: “VCF East 9.1 - Ches' Computer Security Adventures - Bill Cheswick.” YouTube, 29 Dec. 2015, ⁠https://youtu.be/trR1cuBtcPs⁠. </itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore of Word Notes. </p>
<p>A layer seven firewall designed to block threats at the application layer of the open system interconnection model, the OSI model. </p>
<p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/web-application-firewall">⁠https://thecyberwire.com/glossary/web-application-firewall⁠</a></p>
<p>Audio reference link: “VCF East 9.1 - Ches' Computer Security Adventures - Bill Cheswick.” <em>YouTube</em>, 29 Dec. 2015, <a href="https://www.youtube.com/watch?v=trR1cuBtcPs">⁠https://youtu.be/trR1cuBtcPs⁠</a>. </p>]]>
      </content:encoded>
      <itunes:duration>539</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[81b1d6b4-1647-11f1-93dc-c3456fa477c7]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW7728515123.mp3?updated=1736193892" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>AI ate my homework.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/375/notes</link>
      <description>This week, hosts of N2K CyberWire ⁠⁠⁠Maria Varmazis⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ and⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Dave Bittner⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ alongside ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Joe Carrigan⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ are discussing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. Maria’s story covers a BBC experiment by Thomas Germain showing how easily major AI tools like ChatGPT and Google’s Gemini repeated a completely fabricated claim he posted online, highlighting what experts call a “renaissance for spam” as SEO-style manipulation resurfaces in the age of AI. Dave’s story examines Elizabeth Chamblee Burch’s book The Pain Brokers, which details how women with pelvic mesh implants were allegedly cold-called and steered into surgeries as part of a $40 million mass-tort recruitment scheme fueled by litigation finance and regulatory gaps. Joe’s story reports on an alleged decade-long ticket fraud ring at the Louvre in Paris, where tour guides and museum employees are accused of reusing tickets and bribery, costing more than €10 million before French authorities made multiple arrests. Our catch of the day comes from Reddit, where a user tested the limits of a land developer. 

Resources and links to stories:


  
⁠I hacked ChatGPT and Google's AI - and it only took 20 minutes


  A Terrifying Scam and the System That Made It Possible

  The Pain Brokers: How Con Men, Call Centers, and Rogue Doctors Fuel America's Lawsuit Factory 

  Louvre tour guides accused of orchestrating $16m ticket fraud ring over a decade

  T&amp;T&amp;T Land&amp;Sea


⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Have a Catch of the Day you'd like to share? Email it to us at ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠hackinghumans@n2k.com⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠.</description>
      <pubDate>Thu, 26 Feb 2026 06:00:00 -0000</pubDate>
      <itunes:title>AI ate my homework.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>375</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>This week, hosts of N2K CyberWire ⁠⁠⁠Maria Varmazis⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ and⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Dave Bittner⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ alongside ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Joe Carrigan⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ are discussing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. Maria’s story covers a BBC experiment by Thomas Germain showing how easily major AI tools like ChatGPT and Google’s Gemini repeated a completely fabricated claim he posted online, highlighting what experts call a “renaissance for spam” as SEO-style manipulation resurfaces in the age of AI. Dave’s story examines Elizabeth Chamblee Burch’s book The Pain Brokers, which details how women with pelvic mesh implants were allegedly cold-called and steered into surgeries as part of a $40 million mass-tort recruitment scheme fueled by litigation finance and regulatory gaps. Joe’s story reports on an alleged decade-long ticket fraud ring at the Louvre in Paris, where tour guides and museum employees are accused of reusing tickets and bribery, costing more than €10 million before French authorities made multiple arrests. Our catch of the day comes from Reddit, where a user tested the limits of a land developer. 

Resources and links to stories:


  
⁠I hacked ChatGPT and Google's AI - and it only took 20 minutes


  A Terrifying Scam and the System That Made It Possible

  The Pain Brokers: How Con Men, Call Centers, and Rogue Doctors Fuel America's Lawsuit Factory 

  Louvre tour guides accused of orchestrating $16m ticket fraud ring over a decade

  T&amp;T&amp;T Land&amp;Sea


⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Have a Catch of the Day you'd like to share? Email it to us at ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠hackinghumans@n2k.com⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This week, hosts of N2K CyberWire <a href="https://www.linkedin.com/in/varmazis/">⁠⁠⁠Maria Varmazis⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a> and<a href="https://www.linkedin.com/in/dave-bittner-27231a4/">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a> <a href="https://www.linkedin.com/in/dave-bittner-27231a4/">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Dave Bittner⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a> alongside <a href="https://www.linkedin.com/in/joecarrigan/">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Joe Carrigan⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a> are discussing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. Maria’s story covers a BBC experiment by Thomas Germain showing how easily major AI tools like ChatGPT and Google’s Gemini repeated a completely fabricated claim he posted online, highlighting what experts call a “renaissance for spam” as SEO-style manipulation resurfaces in the age of AI. Dave’s story examines Elizabeth Chamblee Burch’s book <em>The Pain Brokers</em>, which details how women with pelvic mesh implants were allegedly cold-called and steered into surgeries as part of a $40 million mass-tort recruitment scheme fueled by litigation finance and regulatory gaps. Joe’s story reports on an alleged decade-long ticket fraud ring at the Louvre in Paris, where tour guides and museum employees are accused of reusing tickets and bribery, costing more than €10 million before French authorities made multiple arrests. Our catch of the day comes from Reddit, where a user tested the limits of a land developer. </p>
<p><strong>Resources and links to stories:</strong></p>
<ul>
  <li>
<a href="https://www.technadu.com/apple-pay-users-targeted-by-sophisticated-phishing-scam-leveraging-voice-and-email/619646/">⁠</a><a href="https://www.bbc.com/future/article/20260218-i-hacked-chatgpt-and-googles-ai-and-it-only-took-20-minutes">I hacked ChatGPT and Google's AI - and it only took 20 minutes</a>
</li>
  <li><a href="https://www.newyorker.com/books/under-review/a-terrifying-scam-and-the-system-that-made-it-possible">A Terrifying Scam and the System That Made It Possible</a></li>
  <li><a href="https://www.amazon.com/Pain-Brokers-Centers-Doctors-Americas/dp/1668068869">The Pain Brokers: How Con Men, Call Centers, and Rogue Doctors Fuel America's Lawsuit Factory </a></li>
  <li><a href="https://www.abc.net.au/news/2026-02-17/how-louvre-ticket-guides-ran-alleged-ticket-fraud-ring/106353046">Louvre tour guides accused of orchestrating $16m ticket fraud ring over a decade</a></li>
  <li><a href="https://www.reddit.com/r/scambait/comments/1r8ie6x/ttt_landsea/">T&amp;T&amp;T Land&amp;Sea</a></li>
</ul>
<p><a href="https://www.ghanaweb.com/GhanaHomePage/business/Inside-the-alleged-2-5-million-Dubai-Crown-Prince-romance-scam-2020297">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a>Have a Catch of the Day you'd like to share? Email it to us at <a href="https://therecord.media/fin6-recruitment-scam-malware-campaign">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a><a href="mailto:hackinghumans@n2k.com">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠hackinghumans@n2k.com⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a>.</p>]]>
      </content:encoded>
      <itunes:duration>3099</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[4dfc164c-cdd5-11ef-8599-273c684b46b6]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW9898210680.mp3?updated=1771884046" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>COBIT (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/123/notes</link>
      <description>Please enjoy this encore of Word Notes. 

An IT governance framework developed by ISACA. 

CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/cobit⁠

Audio reference link: isacappc. “How Do You Explain Cobit to Your Dad – or Your CEO?” YouTube, YouTube, 24 Aug. 2016, ⁠https://www.youtube.com/watch?v=EYATVkddIyw⁠. </description>
      <pubDate>Tue, 24 Feb 2026 08:00:00 -0000</pubDate>
      <itunes:title>COBIT (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>123</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/facb84d2-10fc-11f1-8871-7f8287750d03/image/441b0ca2db080b93b935568d381ce462.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle/>
      <itunes:summary>Please enjoy this encore of Word Notes. 

An IT governance framework developed by ISACA. 

CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/cobit⁠

Audio reference link: isacappc. “How Do You Explain Cobit to Your Dad – or Your CEO?” YouTube, YouTube, 24 Aug. 2016, ⁠https://www.youtube.com/watch?v=EYATVkddIyw⁠. </itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore of Word Notes. </p>
<p>An IT governance framework developed by ISACA. </p>
<p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/cobit">⁠https://thecyberwire.com/glossary/cobit⁠</a></p>
<p>Audio reference link: isacappc. “How Do You Explain Cobit to Your Dad – or Your CEO?” <em>YouTube</em>, YouTube, 24 Aug. 2016, <a href="https://www.youtube.com/watch?v=EYATVkddIyw">⁠https://www.youtube.com/watch?v=EYATVkddIyw⁠</a>. </p>]]>
      </content:encoded>
      <itunes:duration>426</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[facb84d2-10fc-11f1-8871-7f8287750d03]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW4928979841.mp3?updated=1736193892" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The voice on the other end.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/374/notes</link>
      <description>This week, hosts ⁠⁠Maria Varmazis⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ (also host of the ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠T-Minus⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ Space Daily show),⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Dave Bittner⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ and ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Joe Carrigan⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ are discussing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. We have some follow up where Joe shares a scam call he received. Dave’s got the story on a sophisticated phishing campaign targeting Apple Pay users through fake emails and voice calls impersonating customer support, as well as Australia’s ClickFit initiative warning that romance scammers are exploiting trust online for emotional and financial gain. Joe’s story is about a former Ohio bank employee who used his insider access to steal identities and siphon roughly $2 million from elderly customers, ultimately leading to his arrest in Chicago and federal conviction. Maria’s story is about a daughter who discovers her 84-year-old mother has been financially exploited by trusted professionals and even family members, underscoring how elder fraud often comes from familiar faces. It highlights the rapid rise in elder financial abuse and the urgent need for families to step in early—before cognitive decline makes the losses irreversible. Our catch of the day come's from the "Australian Government" on a tax document being floated around. 

Resources and links to stories:


  Apple Pay Users Targeted by Sophisticated Phishing Scam Leveraging Voice and Email

  ClickFit: Romance scams

  Former Bank Employee Found Guilty of Targeting Elderly Victims in Identity Theft and Fraud Scheme

  Ohio bank’s anti-fraud agent stole $2M from elderly customers: DOJ


⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Have a Catch of the Day you'd like to share? Email it to us at ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠hackinghumans@n2k.com⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠.</description>
      <pubDate>Thu, 19 Feb 2026 06:00:00 -0000</pubDate>
      <itunes:title>The voice on the other end.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>374</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>This week, hosts ⁠⁠Maria Varmazis⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ (also host of the ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠T-Minus⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ Space Daily show),⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Dave Bittner⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ and ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Joe Carrigan⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ are discussing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. We have some follow up where Joe shares a scam call he received. Dave’s got the story on a sophisticated phishing campaign targeting Apple Pay users through fake emails and voice calls impersonating customer support, as well as Australia’s ClickFit initiative warning that romance scammers are exploiting trust online for emotional and financial gain. Joe’s story is about a former Ohio bank employee who used his insider access to steal identities and siphon roughly $2 million from elderly customers, ultimately leading to his arrest in Chicago and federal conviction. Maria’s story is about a daughter who discovers her 84-year-old mother has been financially exploited by trusted professionals and even family members, underscoring how elder fraud often comes from familiar faces. It highlights the rapid rise in elder financial abuse and the urgent need for families to step in early—before cognitive decline makes the losses irreversible. Our catch of the day come's from the "Australian Government" on a tax document being floated around. 

Resources and links to stories:


  Apple Pay Users Targeted by Sophisticated Phishing Scam Leveraging Voice and Email

  ClickFit: Romance scams

  Former Bank Employee Found Guilty of Targeting Elderly Victims in Identity Theft and Fraud Scheme

  Ohio bank’s anti-fraud agent stole $2M from elderly customers: DOJ


⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Have a Catch of the Day you'd like to share? Email it to us at ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠hackinghumans@n2k.com⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This week, hosts <a href="https://www.linkedin.com/in/varmazis/">⁠⁠Maria Varmazis⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a> (also host of the <a href="https://space.n2k.com/podcasts/t-minus?__hstc=223811332.a636bba53840b4700c929fe67723a129.1721054632698.1747145009569.1747159962459.413&amp;__hssc=223811332.2.1747159962459&amp;__hsfp=3690629108">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠T-Minus⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a> Space Daily show),<a href="https://www.linkedin.com/in/dave-bittner-27231a4/">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a> <a href="https://www.linkedin.com/in/dave-bittner-27231a4/">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Dave Bittner⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a> and <a href="https://www.linkedin.com/in/joecarrigan/">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Joe Carrigan⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a> are discussing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. We have some follow up where Joe shares a scam call he received. Dave’s got the story on a sophisticated phishing campaign targeting Apple Pay users through fake emails and voice calls impersonating customer support, as well as Australia’s ClickFit initiative warning that romance scammers are exploiting trust online for emotional and financial gain. Joe’s story is about a former Ohio bank employee who used his insider access to steal identities and siphon roughly $2 million from elderly customers, ultimately leading to his arrest in Chicago and federal conviction. Maria’s story is about a daughter who discovers her 84-year-old mother has been financially exploited by trusted professionals and even family members, underscoring how elder fraud often comes from familiar faces. It highlights the rapid rise in elder financial abuse and the urgent need for families to step in early—before cognitive decline makes the losses irreversible. Our catch of the day come's from the "Australian Government" on a tax document being floated around. </p>
<p><strong>Resources and links to stories:</strong></p>
<ul>
  <li><a href="https://www.technadu.com/apple-pay-users-targeted-by-sophisticated-phishing-scam-leveraging-voice-and-email/619646/">Apple Pay Users Targeted by Sophisticated Phishing Scam Leveraging Voice and Email</a></li>
  <li><a href="https://www.afp.gov.au/news-centre/feature/clickfit-romance-scams">ClickFit: Romance scams</a></li>
  <li><a href="https://www.justice.gov/usao-ndoh/pr/former-bank-employee-found-guilty-targeting-elderly-victims-identity-theft-and-fraud">Former Bank Employee Found Guilty of Targeting Elderly Victims in Identity Theft and Fraud Scheme</a></li>
  <li><a href="https://fox8.com/news/ohio-banks-anti-fraud-agent-stole-2m-from-elderly-customers-doj/">Ohio bank’s anti-fraud agent stole $2M from elderly customers: DOJ</a></li>
</ul>
<p><a href="https://www.ghanaweb.com/GhanaHomePage/business/Inside-the-alleged-2-5-million-Dubai-Crown-Prince-romance-scam-2020297">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a>Have a Catch of the Day you'd like to share? Email it to us at <a href="https://therecord.media/fin6-recruitment-scam-malware-campaign">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a><a href="mailto:hackinghumans@n2k.com">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠hackinghumans@n2k.com⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a>.</p>]]>
      </content:encoded>
      <itunes:duration>2743</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[4dcc47a0-cdd5-11ef-8599-97a5353dc1ba]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW1930412012.mp3?updated=1771434443" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Security Service Edge (SSE) (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/122/notes</link>
      <description>Please enjoy this encore of Word Notes. 

A security architecture that incorporates the cloud shared responsibility model, a vendor provided security stack, and network peering with one or more of the big content providers and their associated fiber networks. 

CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/security-service-edge⁠

Audio reference link: Netskope (2022). What is Security Service Edge (SSE). YouTube. Available at: ⁠https://www.youtube.com/watch?v=Z9H84nvgBqw⁠ [Accessed 21 Oct. 2022].</description>
      <pubDate>Tue, 17 Feb 2026 08:00:00 -0000</pubDate>
      <itunes:title>Security Service Edge (SSE) (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>120</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/f6590c42-0ae1-11f1-86e3-3788698b1844/image/441b0ca2db080b93b935568d381ce462.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle/>
      <itunes:summary>Please enjoy this encore of Word Notes. 

A security architecture that incorporates the cloud shared responsibility model, a vendor provided security stack, and network peering with one or more of the big content providers and their associated fiber networks. 

CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/security-service-edge⁠

Audio reference link: Netskope (2022). What is Security Service Edge (SSE). YouTube. Available at: ⁠https://www.youtube.com/watch?v=Z9H84nvgBqw⁠ [Accessed 21 Oct. 2022].</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore of Word Notes. </p>
<p>A security architecture that incorporates the cloud shared responsibility model, a vendor provided security stack, and network peering with one or more of the big content providers and their associated fiber networks. </p>
<p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/security-service-edge">⁠https://thecyberwire.com/glossary/security-service-edge⁠</a></p>
<p>Audio reference link: Netskope (2022). What is Security Service Edge (SSE). YouTube. Available at: <a href="https://www.youtube.com/watch?v=Z9H84nvgBqw">⁠https://www.youtube.com/watch?v=Z9H84nvgBqw⁠</a> [Accessed 21 Oct. 2022].</p>]]>
      </content:encoded>
      <itunes:duration>497</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[f6590c42-0ae1-11f1-86e3-3788698b1844]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW2944849394.mp3?updated=1736193891" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Love was the hook.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/373/notes</link>
      <description>This week, hosts ⁠Maria Varmazis⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ (also host of the ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠T-Minus⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ Space Daily show),⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Dave Bittner⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ and ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Joe Carrigan⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ are discussing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. Dave sits down with ⁠Simon Horswell⁠, a Senior Fraud Specialist at ⁠Entrust⁠ discussing evolving romance scams for Valentine's Day. We have some follow up on chickens and a listener write-in, with a quick note on the backyard chicken trend and a closer look at a Bank of America fraud text that looked like a phish. Maria’s story follows an alleged “Dubai Crown Prince” scam that drained nearly €3 million from a Romanian businesswoman using fake banks and humanitarian appeals. Joe’s story tells of a handyman-turned-boyfriend who ran multiple dating scams and stole from his partner and her family, now featured on Amazon Prime. Dave’s story features Simon Horswell from Entrust explaining why romance scams hit $4.5 billion in 2024 and how scammers use psychological tricks, AI tools, and celebrity impersonation to manipulate victims. We have two catches of the day this week, one a physical letter from the DOJ and the other is an email from Microsoft.

Resources and links to stories:


  Let's stop shipping baby chickens in the mail

  Inside the alleged $2.5 million Dubai Crown Prince romance scam

  CASHED OUT I fell in love with a handyman who came to fix my kitchen – little did I know my fairytale would cost me £150k


⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Have a Catch of the Day you'd like to share? Email it to us at ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠hackinghumans@n2k.com⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠.</description>
      <pubDate>Thu, 12 Feb 2026 06:00:00 -0000</pubDate>
      <itunes:title>Love was the hook.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>373</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>This week, hosts ⁠Maria Varmazis⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ (also host of the ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠T-Minus⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ Space Daily show),⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Dave Bittner⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ and ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Joe Carrigan⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ are discussing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. Dave sits down with ⁠Simon Horswell⁠, a Senior Fraud Specialist at ⁠Entrust⁠ discussing evolving romance scams for Valentine's Day. We have some follow up on chickens and a listener write-in, with a quick note on the backyard chicken trend and a closer look at a Bank of America fraud text that looked like a phish. Maria’s story follows an alleged “Dubai Crown Prince” scam that drained nearly €3 million from a Romanian businesswoman using fake banks and humanitarian appeals. Joe’s story tells of a handyman-turned-boyfriend who ran multiple dating scams and stole from his partner and her family, now featured on Amazon Prime. Dave’s story features Simon Horswell from Entrust explaining why romance scams hit $4.5 billion in 2024 and how scammers use psychological tricks, AI tools, and celebrity impersonation to manipulate victims. We have two catches of the day this week, one a physical letter from the DOJ and the other is an email from Microsoft.

Resources and links to stories:


  Let's stop shipping baby chickens in the mail

  Inside the alleged $2.5 million Dubai Crown Prince romance scam

  CASHED OUT I fell in love with a handyman who came to fix my kitchen – little did I know my fairytale would cost me £150k


⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Have a Catch of the Day you'd like to share? Email it to us at ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠hackinghumans@n2k.com⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This week, hosts <a href="https://www.linkedin.com/in/varmazis/">⁠Maria Varmazis⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a> (also host of the <a href="https://space.n2k.com/podcasts/t-minus?__hstc=223811332.a636bba53840b4700c929fe67723a129.1721054632698.1747145009569.1747159962459.413&amp;__hssc=223811332.2.1747159962459&amp;__hsfp=3690629108">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠T-Minus⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a> Space Daily show),<a href="https://www.linkedin.com/in/dave-bittner-27231a4/">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a> <a href="https://www.linkedin.com/in/dave-bittner-27231a4/">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Dave Bittner⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a> and <a href="https://www.linkedin.com/in/joecarrigan/">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Joe Carrigan⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a> are discussing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. Dave sits down with <a href="https://538d0b96.streak-link.com/CwmSgoMpaQzgubv8dwEjAYWz/https%3A%2F%2Fwww.linkedin.com%2Fin%2Fsimon-horswell-72b2052a%2F%3ForiginalSubdomain%3Duk">⁠Simon Horswell⁠</a>, a Senior Fraud Specialist at <a href="https://538d0b96.streak-link.com/CwmSgoM1dWw6IlY3Ug-9oKo1/https%3A%2F%2Fwww.entrust.com%2F">⁠Entrust⁠</a> discussing evolving romance scams for Valentine's Day. We have some follow up on chickens and a listener write-in, with a quick note on the backyard chicken trend and a closer look at a Bank of America fraud text that looked like a phish. Maria’s story follows an alleged “Dubai Crown Prince” scam that drained nearly €3 million from a Romanian businesswoman using fake banks and humanitarian appeals. Joe’s story tells of a handyman-turned-boyfriend who ran multiple dating scams and stole from his partner and her family, now featured on Amazon Prime. Dave’s story features Simon Horswell from Entrust explaining why romance scams hit $4.5 billion in 2024 and how scammers use psychological tricks, AI tools, and celebrity impersonation to manipulate victims. We have two catches of the day this week, one a physical letter from the DOJ and the other is an email from Microsoft.</p>
<p><strong>Resources and links to stories:</strong></p>
<ul>
  <li><a href="https://www.wbur.org/cognoscenti/2026/02/03/hatcheries-chicks-backyard-coops-homesteaders-backyard-tove-danovich">Let's stop shipping baby chickens in the mail</a></li>
  <li><a href="https://www.ghanaweb.com/GhanaHomePage/business/Inside-the-alleged-2-5-million-Dubai-Crown-Prince-romance-scam-2020297">Inside the alleged $2.5 million Dubai Crown Prince romance scam</a></li>
  <li><a href="https://www.thesun.co.uk/fabulous/37567733/romance-scammer-jason-porter-amazon-prime-documentary/">CASHED OUT I fell in love with a handyman who came to fix my kitchen – little did I know my fairytale would cost me £150k</a></li>
</ul>
<p><a href="https://www.ghanaweb.com/GhanaHomePage/business/Inside-the-alleged-2-5-million-Dubai-Crown-Prince-romance-scam-2020297">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a>Have a Catch of the Day you'd like to share? Email it to us at <a href="https://therecord.media/fin6-recruitment-scam-malware-campaign">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a><a href="mailto:hackinghumans@n2k.com">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠hackinghumans@n2k.com⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a>.</p>]]>
      </content:encoded>
      <itunes:duration>3972</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[4d9e2438-cdd5-11ef-8599-5f49bfa506a5]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW7901555433.mp3?updated=1770835239" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Domain spoofing (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/121/notes</link>
      <description>Please enjoy this encore of Word Notes. 

A social engineering tactic in which hackers build a malicious domain to mimic a legitimate one.

CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/domain-spoofing⁠

Audio reference link: ⁠“Mission Impossible Fallout - Hospital Scene.”⁠ YouTube, YouTube, 8 Oct. 2018,</description>
      <pubDate>Tue, 10 Feb 2026 08:00:00 -0000</pubDate>
      <itunes:title>Domain spoofing (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>121</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/8cd14546-05e6-11f1-95b8-87089617e4e8/image/441b0ca2db080b93b935568d381ce462.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle/>
      <itunes:summary>Please enjoy this encore of Word Notes. 

A social engineering tactic in which hackers build a malicious domain to mimic a legitimate one.

CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/domain-spoofing⁠

Audio reference link: ⁠“Mission Impossible Fallout - Hospital Scene.”⁠ YouTube, YouTube, 8 Oct. 2018,</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore of Word Notes. </p>
<p>A social engineering tactic in which hackers build a malicious domain to mimic a legitimate one.</p>
<p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/domain-spoofing">⁠https://thecyberwire.com/glossary/domain-spoofing⁠</a></p>
<p>Audio reference link: <a href="https://www.youtube.com/watch?v=SOlmyv1WTBY">⁠“Mission Impossible Fallout - Hospital Scene.”⁠</a> <em>YouTube</em>, YouTube, 8 Oct. 2018,</p>]]>
      </content:encoded>
      <itunes:duration>475</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[8cd14546-05e6-11f1-95b8-87089617e4e8]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW8522790560.mp3?updated=1736193891" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Trust me, I’m legit.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/372/notes</link>
      <description>This week, while ⁠⁠⁠Maria Varmazis⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ (also host of the ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠T-Minus⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ Space Daily show)  is out at a conference, hosts⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Dave Bittner⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ and ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Joe Carrigan⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ are joined by friend of the show Michele Kellerman, as they are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. Our hosts start with some follow-up on Joe’s egg story, including his latest update and a brief detour into unexpected “big chicken news.” Joe’s story is on a massive USDA loan fraud scheme where Nikesh Patel fabricated fake government-backed farm loans, duped investment firms out of hundreds of millions of dollars, and continued running similar scams under aliases and even from prison, ultimately earning decades more in sentencing. Michele’s story is on a breaking report about the ShinyHunters group using targeted voice phishing and custom phishing kits to abuse Okta SSO, steal MFA credentials, and gain privileged access for data theft and extortion. Dave’s story is on LastPass warning users about an active phishing campaign impersonating the company, designed to steal master passwords and potentially expose all credentials stored in affected vaults. Our catch of the day comes from the Reddit, where two people we're approached by scammers through text messaging and both dealt with their scammers in different ways. 

Resources and links to stories:


  Sticky Fingers: USDA Fraudster Steals $200M in Stunning Scam

  Formerly Married Couple Sentenced For Multi-Million Dollar Fraud Schemes

  A new wave of ‘vishing’ attacks is breaking into SSO accounts in real time

  LastPass Warns of Phishing Campaign Attempting to Steal Master Passwords


⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Have a Catch of the Day you'd like to share? Email it to us at ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠hackinghumans@n2k.com⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠.</description>
      <pubDate>Thu, 05 Feb 2026 06:00:00 -0000</pubDate>
      <itunes:title>Trust me, I’m legit.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>372</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>This week, while ⁠⁠⁠Maria Varmazis⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ (also host of the ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠T-Minus⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ Space Daily show)  is out at a conference, hosts⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Dave Bittner⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ and ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Joe Carrigan⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ are joined by friend of the show Michele Kellerman, as they are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. Our hosts start with some follow-up on Joe’s egg story, including his latest update and a brief detour into unexpected “big chicken news.” Joe’s story is on a massive USDA loan fraud scheme where Nikesh Patel fabricated fake government-backed farm loans, duped investment firms out of hundreds of millions of dollars, and continued running similar scams under aliases and even from prison, ultimately earning decades more in sentencing. Michele’s story is on a breaking report about the ShinyHunters group using targeted voice phishing and custom phishing kits to abuse Okta SSO, steal MFA credentials, and gain privileged access for data theft and extortion. Dave’s story is on LastPass warning users about an active phishing campaign impersonating the company, designed to steal master passwords and potentially expose all credentials stored in affected vaults. Our catch of the day comes from the Reddit, where two people we're approached by scammers through text messaging and both dealt with their scammers in different ways. 

Resources and links to stories:


  Sticky Fingers: USDA Fraudster Steals $200M in Stunning Scam

  Formerly Married Couple Sentenced For Multi-Million Dollar Fraud Schemes

  A new wave of ‘vishing’ attacks is breaking into SSO accounts in real time

  LastPass Warns of Phishing Campaign Attempting to Steal Master Passwords


⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Have a Catch of the Day you'd like to share? Email it to us at ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠hackinghumans@n2k.com⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This week, while <a href="https://www.linkedin.com/in/varmazis/">⁠⁠⁠Maria Varmazis⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a> (also host of the <a href="https://space.n2k.com/podcasts/t-minus?__hstc=223811332.a636bba53840b4700c929fe67723a129.1721054632698.1747145009569.1747159962459.413&amp;__hssc=223811332.2.1747159962459&amp;__hsfp=3690629108">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠T-Minus⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a> Space Daily show)  is out at a conference, hosts<a href="https://www.linkedin.com/in/dave-bittner-27231a4/">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a> <a href="https://www.linkedin.com/in/dave-bittner-27231a4/">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Dave Bittner⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a> and <a href="https://www.linkedin.com/in/joecarrigan/">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Joe Carrigan⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a> are joined by friend of the show <a href="https://www.linkedin.com/in/michele-kellerman-cissp-b2933378/">Michele Kellerman</a>, as they are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. Our hosts start with some follow-up on Joe’s egg story, including his latest update and a brief detour into unexpected “big chicken news.” Joe’s story is on a massive USDA loan fraud scheme where Nikesh Patel fabricated fake government-backed farm loans, duped investment firms out of hundreds of millions of dollars, and continued running similar scams under aliases and even from prison, ultimately earning decades more in sentencing. Michele’s story is on a breaking report about the ShinyHunters group using targeted voice phishing and custom phishing kits to abuse Okta SSO, steal MFA credentials, and gain privileged access for data theft and extortion. Dave’s story is on LastPass warning users about an active phishing campaign impersonating the company, designed to steal master passwords and potentially expose all credentials stored in affected vaults. Our catch of the day comes from the Reddit, where two people we're approached by scammers through text messaging and both dealt with their scammers in different ways. </p>
<p><strong>Resources and links to stories:</strong></p>
<ul>
  <li><a href="https://www.agweb.com/news/sticky-fingers-usda-fraudster-steals-200m-stunning-scam">Sticky Fingers: USDA Fraudster Steals $200M in Stunning Scam</a></li>
  <li><a href="https://www.justice.gov/usao-mdfl/pr/formerly-married-couple-sentenced-multi-million-dollar-fraud-schemes">Formerly Married Couple Sentenced For Multi-Million Dollar Fraud Schemes</a></li>
  <li><a href="https://cyberscoop.com/shinyhunters-voice-phishing-sso-okta-mfa-bypass-data-theft/">A new wave of ‘vishing’ attacks is breaking into SSO accounts in real time</a></li>
  <li><a href="https://www.infosecurity-magazine.com/news/lastpass-phishing-master-passwords/">LastPass Warns of Phishing Campaign Attempting to Steal Master Passwords</a></li>
</ul>
<p><a href="https://therecord.media/fin6-recruitment-scam-malware-campaign">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a>⁠⁠⁠Have a Catch of the Day you'd like to share? Email it to us at <a href="https://therecord.media/fin6-recruitment-scam-malware-campaign">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a><a href="mailto:hackinghumans@n2k.com">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠hackinghumans@n2k.com⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a>.</p>]]>
      </content:encoded>
      <itunes:duration>3079</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[4d701ab6-cdd5-11ef-8599-2fe4a886e07d]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW5350732511.mp3?updated=1770226687" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Secure Web Gateway (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/120/notes</link>
      <description>Please enjoy this encore of Word Notes. 

A layer seven firewall that sits in line at the boundary between the internet and an organization's network perimeter that allows security policy enforcement and can perform certain prevention and detection tasks.

CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/secure-web-gateway⁠

Audio reference link: ‌Vintage Computer Federation (2015). VCF East 9.1 - Ches’ Computer Security Adventures - Bill Cheswick. YouTube. Available at: ⁠https://www.youtube.com/watch?v=trR1cuBtcPs.</description>
      <pubDate>Tue, 03 Feb 2026 08:00:00 -0000</pubDate>
      <itunes:title>Secure Web Gateway (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>120</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/8ea0ecb4-0082-11f1-ad03-e3c7ba336422/image/441b0ca2db080b93b935568d381ce462.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle/>
      <itunes:summary>Please enjoy this encore of Word Notes. 

A layer seven firewall that sits in line at the boundary between the internet and an organization's network perimeter that allows security policy enforcement and can perform certain prevention and detection tasks.

CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/secure-web-gateway⁠

Audio reference link: ‌Vintage Computer Federation (2015). VCF East 9.1 - Ches’ Computer Security Adventures - Bill Cheswick. YouTube. Available at: ⁠https://www.youtube.com/watch?v=trR1cuBtcPs.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore of Word Notes. </p>
<p>A layer seven firewall that sits in line at the boundary between the internet and an organization's network perimeter that allows security policy enforcement and can perform certain prevention and detection tasks.</p>
<p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/secure-web-gateway">⁠https://thecyberwire.com/glossary/secure-web-gateway⁠</a></p>
<p>Audio reference link: ‌Vintage Computer Federation (2015). VCF East 9.1 - Ches’ Computer Security Adventures - Bill Cheswick. YouTube. Available at: <a href="https://www.youtube.com/watch?v=trR1cuBtcPs.">⁠https://www.youtube.com/watch?v=trR1cuBtcPs.</a></p>]]>
      </content:encoded>
      <itunes:duration>562</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[8ea0ecb4-0082-11f1-ad03-e3c7ba336422]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW4404359084.mp3?updated=1736193891" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>When legit is the trick: Phishing’s sneaky new moves. [OMITB]</title>
      <link>https://thecyberwire.com/podcasts/only-malware-in-the-building/20/notes</link>
      <description>Welcome in! You’ve entered, Only Malware in the Building. Join us each month to sip tea and solve mysteries about today’s most interesting threats. Your host is ⁠⁠⁠⁠⁠⁠Selena Larson⁠⁠⁠⁠⁠⁠, ⁠⁠⁠⁠⁠⁠Proofpoint⁠⁠⁠⁠⁠⁠ intelligence analyst and host of their podcast ⁠⁠⁠⁠⁠⁠DISCARDED⁠⁠⁠⁠⁠⁠. Inspired by the residents of a building in New York’s exclusive upper west side, Selena is joined by her co-hosts ⁠⁠⁠⁠⁠⁠N2K Networks⁠⁠⁠⁠⁠⁠ ⁠⁠⁠⁠⁠⁠Dave Bittner⁠⁠⁠⁠⁠⁠ and ⁠⁠⁠⁠⁠Keith Mularski⁠⁠⁠⁠⁠, former FBI cybercrime investigator and now Chief Global Ambassador at ⁠⁠⁠⁠⁠Qintel⁠⁠⁠⁠⁠.

Being a security researcher is a bit like being a detective: you gather clues, analyze the evidence, and consult the experts to solve the cyber puzzle. On this episode, our hosts discuss how attackers are increasingly abusing legitimate, trusted Microsoft workflows to make phishing campaigns more convincing and harder to spot. In device code phishing, victims are socially engineered into completing a real Microsoft OAuth login flow, inadvertently granting attackers valid access tokens without ever sharing a password. They also examined abuse of Microsoft 365 Direct Send, which allows threat actors to send phishing emails that appear to originate from inside an organization, reinforcing a broader shift toward weaponizing built-in cloud services rather than relying on obviously malicious infrastructure.</description>
      <pubDate>Tue, 03 Feb 2026 08:00:00 -0000</pubDate>
      <itunes:title>When legit is the trick: Phishing’s sneaky new moves. [OMITB]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>20</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/d0aef40a-0066-11f1-9552-53f3f6498fa7/image/14002263e169460f16ca12e04624eb3a.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle/>
      <itunes:summary>Welcome in! You’ve entered, Only Malware in the Building. Join us each month to sip tea and solve mysteries about today’s most interesting threats. Your host is ⁠⁠⁠⁠⁠⁠Selena Larson⁠⁠⁠⁠⁠⁠, ⁠⁠⁠⁠⁠⁠Proofpoint⁠⁠⁠⁠⁠⁠ intelligence analyst and host of their podcast ⁠⁠⁠⁠⁠⁠DISCARDED⁠⁠⁠⁠⁠⁠. Inspired by the residents of a building in New York’s exclusive upper west side, Selena is joined by her co-hosts ⁠⁠⁠⁠⁠⁠N2K Networks⁠⁠⁠⁠⁠⁠ ⁠⁠⁠⁠⁠⁠Dave Bittner⁠⁠⁠⁠⁠⁠ and ⁠⁠⁠⁠⁠Keith Mularski⁠⁠⁠⁠⁠, former FBI cybercrime investigator and now Chief Global Ambassador at ⁠⁠⁠⁠⁠Qintel⁠⁠⁠⁠⁠.

Being a security researcher is a bit like being a detective: you gather clues, analyze the evidence, and consult the experts to solve the cyber puzzle. On this episode, our hosts discuss how attackers are increasingly abusing legitimate, trusted Microsoft workflows to make phishing campaigns more convincing and harder to spot. In device code phishing, victims are socially engineered into completing a real Microsoft OAuth login flow, inadvertently granting attackers valid access tokens without ever sharing a password. They also examined abuse of Microsoft 365 Direct Send, which allows threat actors to send phishing emails that appear to originate from inside an organization, reinforcing a broader shift toward weaponizing built-in cloud services rather than relying on obviously malicious infrastructure.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Welcome in! You’ve entered, Only Malware in the Building. Join us each month to sip tea and solve mysteries about today’s most interesting threats. Your host is <a href="https://www.linkedin.com/in/selenalarson/">⁠⁠⁠⁠⁠⁠Selena Larson⁠⁠⁠⁠⁠⁠</a>, <a href="https://www.proofpoint.com/">⁠⁠⁠⁠⁠⁠Proofpoint⁠⁠⁠⁠⁠⁠</a> intelligence analyst and host of their podcast <a href="https://www.proofpoint.com/us/podcasts/discarded">⁠⁠⁠⁠⁠⁠DISCARDED⁠⁠⁠⁠⁠⁠</a>. Inspired by the residents of a building in New York’s exclusive upper west side, Selena is joined by her co-hosts <a href="https://www.n2k.com/">⁠⁠⁠⁠⁠⁠N2K Networks⁠⁠⁠⁠⁠⁠</a> <a href="https://www.linkedin.com/in/dave-bittner-27231a4/">⁠⁠⁠⁠⁠⁠Dave Bittner⁠⁠⁠⁠⁠⁠</a> and <a href="https://www.linkedin.com/in/keith-mularski-b737551/">⁠⁠⁠⁠⁠Keith Mularski⁠⁠⁠⁠⁠</a>, former FBI cybercrime investigator and now Chief Global Ambassador at <a href="https://www.linkedin.com/company/qintel/">⁠⁠⁠⁠⁠Qintel⁠⁠⁠⁠⁠</a>.</p>
<p>Being a security researcher is a bit like being a detective: you gather clues, analyze the evidence, and consult the experts to solve the cyber puzzle. On this episode, our hosts discuss how attackers are increasingly abusing legitimate, trusted Microsoft workflows to make phishing campaigns more convincing and harder to spot. In device code phishing, victims are socially engineered into completing a real Microsoft OAuth login flow, inadvertently granting attackers valid access tokens without ever sharing a password. They also examined abuse of Microsoft 365 Direct Send, which allows threat actors to send phishing emails that appear to originate from inside an organization, reinforcing a broader shift toward weaponizing built-in cloud services rather than relying on obviously malicious infrastructure.</p>]]>
      </content:encoded>
      <itunes:duration>2395</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[d0aef40a-0066-11f1-9552-53f3f6498fa7]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW5563831963.mp3?updated=1770057986" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Cold weather, hot scams.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/371/notes</link>
      <description>This week, hosts⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Dave Bittner⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠,⁠⁠ ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Joe Carrigan⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠, and ⁠Maria Varmazis⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ (also host of the ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠T-Minus⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ Space Daily show) are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines.  Joe has two stories this week, starting with scammers cashing in on a Verizon outage by luring customers with fake credits, and ending with a rare cybercrime comeback as a woman who lost nearly $1 million gets her money back and then some. Dave’s story looks at scammers cashing in on the Ozempic and GLP-1 craze, as Wisconsin consumers lose hundreds of dollars to fake weight loss drugs, deepfake ads, and shady online pharmacies exploiting high demand and high prices.  Maria’s story warns that scammers are impersonating electric, gas, and water companies this winter, using urgent threats, fake refunds, and unusual payment demands to steal money and personal information, while officials remind customers to hang up and verify any contacts through official channels. Our catch of the day comes from Reddit where the chief of police is reaching out via text. 

Resources and links to stories:


  
⁠Verizon credit scam targets customers after outage, Georgia sheriff says


  Cyber scam victim who lost nearly $1M gets her money back — and then some

  Surging Cyber Scams Leave Older Vermonters Destitute, Frustrated and Saddled With Tax Debt

  Wisconsin consumers are losing money on Ozempic, weight loss drug scams

  Winter Utilities warning

  Utility company warns customers about scam calls


⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Have a Catch of the Day you'd like to share? Email it to us at ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠hackinghumans@n2k.com⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠.</description>
      <pubDate>Thu, 29 Jan 2026 06:00:00 -0000</pubDate>
      <itunes:title>Cold weather, hot scams.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>371</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>This week, hosts⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Dave Bittner⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠,⁠⁠ ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Joe Carrigan⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠, and ⁠Maria Varmazis⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ (also host of the ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠T-Minus⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ Space Daily show) are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines.  Joe has two stories this week, starting with scammers cashing in on a Verizon outage by luring customers with fake credits, and ending with a rare cybercrime comeback as a woman who lost nearly $1 million gets her money back and then some. Dave’s story looks at scammers cashing in on the Ozempic and GLP-1 craze, as Wisconsin consumers lose hundreds of dollars to fake weight loss drugs, deepfake ads, and shady online pharmacies exploiting high demand and high prices.  Maria’s story warns that scammers are impersonating electric, gas, and water companies this winter, using urgent threats, fake refunds, and unusual payment demands to steal money and personal information, while officials remind customers to hang up and verify any contacts through official channels. Our catch of the day comes from Reddit where the chief of police is reaching out via text. 

Resources and links to stories:


  
⁠Verizon credit scam targets customers after outage, Georgia sheriff says


  Cyber scam victim who lost nearly $1M gets her money back — and then some

  Surging Cyber Scams Leave Older Vermonters Destitute, Frustrated and Saddled With Tax Debt

  Wisconsin consumers are losing money on Ozempic, weight loss drug scams

  Winter Utilities warning

  Utility company warns customers about scam calls


⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Have a Catch of the Day you'd like to share? Email it to us at ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠hackinghumans@n2k.com⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This week, hosts<a href="https://www.linkedin.com/in/dave-bittner-27231a4/">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a> <a href="https://www.linkedin.com/in/dave-bittner-27231a4/">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Dave Bittner⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a>,<a href="https://www.linkedin.com/in/joecarrigan/">⁠⁠ ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Joe Carrigan⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a>, and <a href="https://www.linkedin.com/in/varmazis/">⁠Maria Varmazis⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a> (also host of the <a href="https://space.n2k.com/podcasts/t-minus?__hstc=223811332.a636bba53840b4700c929fe67723a129.1721054632698.1747145009569.1747159962459.413&amp;__hssc=223811332.2.1747159962459&amp;__hsfp=3690629108">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠T-Minus⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a> Space Daily show) are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines.  Joe has two stories this week, starting with scammers cashing in on a Verizon outage by luring customers with fake credits, and ending with a rare cybercrime comeback as a woman who lost nearly $1 million gets her money back and then some. Dave’s story looks at scammers cashing in on the Ozempic and GLP-1 craze, as Wisconsin consumers lose hundreds of dollars to fake weight loss drugs, deepfake ads, and shady online pharmacies exploiting high demand and high prices.  Maria’s story warns that scammers are impersonating electric, gas, and water companies this winter, using urgent threats, fake refunds, and unusual payment demands to steal money and personal information, while officials remind customers to hang up and verify any contacts through official channels. Our catch of the day comes from Reddit where the chief of police is reaching out via text. </p>
<p><strong>Resources and links to stories:</strong></p>
<ul>
  <li>
<a href="https://www.reuters.com/world/china/cambodia-keep-up-crackdown-scam-centres-after-arrest-alleged-mastermind-2026-01-14/">⁠</a><a href="https://www.wsbtv.com/news/local/sheriffs-office-puts-out-warning-about-verizon-credit-scam-impacting-georgia-customers/BMGE6MMNKNETHEJAWZKP7LOC2I/">Verizon credit scam targets customers after outage, Georgia sheriff says</a>
</li>
  <li><a href="https://www.vermontpublic.org/local-news/2026-01-20/cyber-scam-victim-who-lost-nearly-1m-gets-her-money-back-and-then-some">Cyber scam victim who lost nearly $1M gets her money back — and then some</a></li>
  <li><a href="https://www.sevendaysvt.com/news/cyber-scams-are-leaving-older-vermonters-broke-and-bereft-41866534/">Surging Cyber Scams Leave Older Vermonters Destitute, Frustrated and Saddled With Tax Debt</a></li>
  <li><a href="https://www.jsonline.com/story/news/investigations/public-investigator/2026/01/19/wisconsin-consumers-are-losing-money-on-ozempic-glp-1-scams/88166390007/">Wisconsin consumers are losing money on Ozempic, weight loss drug scams</a></li>
  <li><a href="https://www.riverbender.com/news/details/attorney-general-raoul-urges-consumers-to-stay-warm-stay-safe-and-watch-out-for-utility-scams-this-winter-90032.cfm">Winter Utilities warning</a></li>
  <li><a href="https://www.wkyt.com/2026/01/20/utility-company-warns-customers-about-call-scams/">Utility company warns customers about scam calls</a></li>
</ul>
<p><a href="https://therecord.media/fin6-recruitment-scam-malware-campaign">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a>⁠⁠⁠Have a Catch of the Day you'd like to share? Email it to us at <a href="https://therecord.media/fin6-recruitment-scam-malware-campaign">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a><a href="mailto:hackinghumans@n2k.com">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠hackinghumans@n2k.com⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a>.</p>]]>
      </content:encoded>
      <itunes:duration>2772</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[4d40736a-cdd5-11ef-8599-eb7c3afe82d7]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW8536192986.mp3?updated=1769483719" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Indicators of Compromise (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/119/notes</link>
      <description>Please enjoy this encore of Word Notes. 

Digital evidence that a system or network has been breached.

CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/indicator-of-compromise⁠

Audio reference link: ‌”⁠Suicide or Murder? | The Blind Banker | Sherlock⁠,” uploaded by Sherlock, 18 October 2015</description>
      <pubDate>Tue, 27 Jan 2026 08:00:00 -0000</pubDate>
      <itunes:title>Indicators of Compromise (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>119</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/f4681d62-f879-11f0-a0ef-a30dd5f421ac/image/441b0ca2db080b93b935568d381ce462.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle/>
      <itunes:summary>Please enjoy this encore of Word Notes. 

Digital evidence that a system or network has been breached.

CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/indicator-of-compromise⁠

Audio reference link: ‌”⁠Suicide or Murder? | The Blind Banker | Sherlock⁠,” uploaded by Sherlock, 18 October 2015</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore of Word Notes. </p>
<p>Digital evidence that a system or network has been breached.</p>
<p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/indicator-of-compromise">⁠https://thecyberwire.com/glossary/indicator-of-compromise⁠</a></p>
<p>Audio reference link: ‌”<a href="https://www.youtube.com/watch?v=4PKr_BVo4hg">⁠Suicide or Murder? | The Blind Banker | Sherlock⁠</a>,” uploaded by Sherlock, 18 October 2015</p>]]>
      </content:encoded>
      <itunes:duration>419</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[f4681d62-f879-11f0-a0ef-a30dd5f421ac]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW3147640366.mp3?updated=1736193890" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Scammers gonna scam.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/370/notes</link>
      <description>This week, hosts⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Dave Bittner⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠,⁠ ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Joe Carrigan⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠, and Maria Varmazis⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ (also host of the ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠T-Minus⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ Space Daily show) are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. Joe share's another chicken update for us, this time from Werner Herzog. Dave’s got a story from a listener named Tim, an IRS Criminal Investigation agent, who explains that real CI agents may contact people unannounced and can verify themselves in person, but if anyone asks for gift cards or crypto, it’s definitely a scam. Maria has the story on how attackers are abusing real SendGrid accounts to send politically charged phishing emails that look legitimate and trick users into handing over their credentials. Joe has two stories this week, the first on Cambodia’s renewed crackdown on massive Southeast Asian scam networks following the arrest and extradition of alleged kingpin Chen Zhi, signaling deeper international cooperation against fraud operations that have stolen billions worldwide, and the second on a Nashville Uber driver who lost $300 after falling for a convincing phone scam that impersonated Uber Support and falsely accused him of drunk driving. Our catch of the day comes from Reddit scams where one scammer gets put through the ringer, twice. 

Resources and links to stories:


  Cambodia to keep up crackdown on scam centres after arrest of alleged mastermind

  Uber driver describes drunk driving scam that cost him $300

  SendGrid isn’t emailing you about ICE or BLM. It’s a phishing attack.

  Dave Part 1


⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Have a Catch of the Day you'd like to share? Email it to us at ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠hackinghumans@n2k.com⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠.</description>
      <pubDate>Thu, 22 Jan 2026 06:00:00 -0000</pubDate>
      <itunes:title>Scammers gonna scam.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>370</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>This week, hosts⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Dave Bittner⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠,⁠ ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Joe Carrigan⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠, and Maria Varmazis⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ (also host of the ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠T-Minus⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ Space Daily show) are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. Joe share's another chicken update for us, this time from Werner Herzog. Dave’s got a story from a listener named Tim, an IRS Criminal Investigation agent, who explains that real CI agents may contact people unannounced and can verify themselves in person, but if anyone asks for gift cards or crypto, it’s definitely a scam. Maria has the story on how attackers are abusing real SendGrid accounts to send politically charged phishing emails that look legitimate and trick users into handing over their credentials. Joe has two stories this week, the first on Cambodia’s renewed crackdown on massive Southeast Asian scam networks following the arrest and extradition of alleged kingpin Chen Zhi, signaling deeper international cooperation against fraud operations that have stolen billions worldwide, and the second on a Nashville Uber driver who lost $300 after falling for a convincing phone scam that impersonated Uber Support and falsely accused him of drunk driving. Our catch of the day comes from Reddit scams where one scammer gets put through the ringer, twice. 

Resources and links to stories:


  Cambodia to keep up crackdown on scam centres after arrest of alleged mastermind

  Uber driver describes drunk driving scam that cost him $300

  SendGrid isn’t emailing you about ICE or BLM. It’s a phishing attack.

  Dave Part 1


⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Have a Catch of the Day you'd like to share? Email it to us at ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠hackinghumans@n2k.com⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This week, hosts<a href="https://www.linkedin.com/in/dave-bittner-27231a4/">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a> <a href="https://www.linkedin.com/in/dave-bittner-27231a4/">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Dave Bittner⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a>,<a href="https://www.linkedin.com/in/joecarrigan/">⁠ ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Joe Carrigan⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a>, and <a href="https://www.linkedin.com/in/varmazis/">Maria Varmazis⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a> (also host of the <a href="https://space.n2k.com/podcasts/t-minus?__hstc=223811332.a636bba53840b4700c929fe67723a129.1721054632698.1747145009569.1747159962459.413&amp;__hssc=223811332.2.1747159962459&amp;__hsfp=3690629108">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠T-Minus⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a> Space Daily show) are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. Joe share's another chicken update for us, this time from Werner Herzog. Dave’s got a story from a listener named Tim, an IRS Criminal Investigation agent, who explains that real CI agents may contact people unannounced and can verify themselves in person, but if anyone asks for gift cards or crypto, it’s definitely a scam. Maria has the story on how attackers are abusing real SendGrid accounts to send politically charged phishing emails that look legitimate and trick users into handing over their credentials. Joe has two stories this week, the first on Cambodia’s renewed crackdown on massive Southeast Asian scam networks following the arrest and extradition of alleged kingpin Chen Zhi, signaling deeper international cooperation against fraud operations that have stolen billions worldwide, and the second on a Nashville Uber driver who lost $300 after falling for a convincing phone scam that impersonated Uber Support and falsely accused him of drunk driving. Our catch of the day comes from Reddit scams where one scammer gets put through the ringer, twice. </p>
<p><strong>Resources and links to stories:</strong></p>
<ul>
  <li><a href="https://www.reuters.com/world/china/cambodia-keep-up-crackdown-scam-centres-after-arrest-alleged-mastermind-2026-01-14/">Cambodia to keep up crackdown on scam centres after arrest of alleged mastermind</a></li>
  <li><a href="https://www.wsmv.com/2026/01/15/uber-driver-describes-drunk-driving-scam-that-cost-him-300/">Uber driver describes drunk driving scam that cost him $300</a></li>
  <li><a href="https://fredbenenson.com/blog/2026/01/09/sendgrid-isnt-emailing-you-about-ice-or-blm-its-a-phishing-attack/">SendGrid isn’t emailing you about ICE or BLM. It’s a phishing attack.</a></li>
  <li><a href="https://www.reddit.com/r/scambait/comments/1qbxjmd/dave_part_1/">Dave Part 1</a></li>
</ul>
<p><a href="https://therecord.media/fin6-recruitment-scam-malware-campaign">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a>⁠⁠⁠Have a Catch of the Day you'd like to share? Email it to us at <a href="https://therecord.media/fin6-recruitment-scam-malware-campaign">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a><a href="mailto:hackinghumans@n2k.com">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠hackinghumans@n2k.com⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a>.</p>]]>
      </content:encoded>
      <itunes:duration>2822</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[4d12a052-cdd5-11ef-8599-6332673a6c98]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW7020935219.mp3?updated=1769019729" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Intrusion Detection System (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/118/notes</link>
      <description>Please enjoy this encore of Word Notes. 

A system that monitors for malicious or unwanted activity, and either raises alerts when such activity is detected or blocks the traffic from passing to the target.

CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/intrusion-detection-system⁠

Audio reference link: “⁠Network Intrusion Detection and Prevention - CompTIA Security+ SY0-501 - 2.1⁠,” Professor Messer, uploaded 16 November, 2017</description>
      <pubDate>Tue, 20 Jan 2026 08:00:00 -0000</pubDate>
      <itunes:title>Intrusion Detection System (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>118</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/f1c93eb4-f488-11f0-a4b6-7b0a093f056e/image/441b0ca2db080b93b935568d381ce462.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle/>
      <itunes:summary>Please enjoy this encore of Word Notes. 

A system that monitors for malicious or unwanted activity, and either raises alerts when such activity is detected or blocks the traffic from passing to the target.

CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/intrusion-detection-system⁠

Audio reference link: “⁠Network Intrusion Detection and Prevention - CompTIA Security+ SY0-501 - 2.1⁠,” Professor Messer, uploaded 16 November, 2017</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore of Word Notes. </p>
<p>A system that monitors for malicious or unwanted activity, and either raises alerts when such activity is detected or blocks the traffic from passing to the target.</p>
<p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/intrusion-detection-system">⁠https://thecyberwire.com/glossary/intrusion-detection-system⁠</a></p>
<p>Audio reference link: “<a href="https://youtu.be/hEgWPWIuq_s">⁠Network Intrusion Detection and Prevention - CompTIA Security+ SY0-501 - 2.1⁠</a>,” Professor Messer, uploaded 16 November, 2017</p>]]>
      </content:encoded>
      <itunes:duration>467</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[f1c93eb4-f488-11f0-a4b6-7b0a093f056e]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW6425791222.mp3?updated=1736193890" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>When a scammer meets the Force.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/369/notes</link>
      <description>This week, while ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Maria Varmazis⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ (also host of the ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠T-Minus⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ Space Daily show) is out, our hosts⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Dave Bittner⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ and ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Joe Carrigan⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. Joe starts us off with a chicken update. Joe’s story is on CrowdStrike’s 2025 Global Threat Report, which reveals faster-than-ever breakout times, a surge in vishing and initial access attacks, widespread abuse of valid accounts, and a growing shift toward malware-free intrusions as adversaries become more numerous and sophisticated. Dave’s got the story on how “pig-butchering” romance scams are industrialized, detailing Reuters’ reporting on cyberfraud gangs using step-by-step psychological playbooks to groom victims, manufacture emotional attachment, and rapidly funnel them into fake investments that leave lasting financial and emotional damage. Rishika Desai, Threat Researcher and Writer from Bfore.ai, joins Dave and Joe to discuss renting social media ad accounts for scamming purposes. Our catch of the day comes from Reddit, where one user channels their inner Jedi and uses the Force to send a pesky scammer retreating to the dark side.

Resources and links to stories:


  
⁠A scammer’sblueprint




  CROWDSTRIKE 2025 GLOBAL THREAT REPORT


⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Have a Catch of the Day you'd like to share? Email it to us at ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠hackinghumans@n2k.com⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠.</description>
      <pubDate>Thu, 15 Jan 2026 06:00:00 -0000</pubDate>
      <itunes:title>When a scammer meets the Force.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>369</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>This week, while ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Maria Varmazis⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ (also host of the ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠T-Minus⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ Space Daily show) is out, our hosts⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Dave Bittner⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ and ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Joe Carrigan⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. Joe starts us off with a chicken update. Joe’s story is on CrowdStrike’s 2025 Global Threat Report, which reveals faster-than-ever breakout times, a surge in vishing and initial access attacks, widespread abuse of valid accounts, and a growing shift toward malware-free intrusions as adversaries become more numerous and sophisticated. Dave’s got the story on how “pig-butchering” romance scams are industrialized, detailing Reuters’ reporting on cyberfraud gangs using step-by-step psychological playbooks to groom victims, manufacture emotional attachment, and rapidly funnel them into fake investments that leave lasting financial and emotional damage. Rishika Desai, Threat Researcher and Writer from Bfore.ai, joins Dave and Joe to discuss renting social media ad accounts for scamming purposes. Our catch of the day comes from Reddit, where one user channels their inner Jedi and uses the Force to send a pesky scammer retreating to the dark side.

Resources and links to stories:


  
⁠A scammer’sblueprint




  CROWDSTRIKE 2025 GLOBAL THREAT REPORT


⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Have a Catch of the Day you'd like to share? Email it to us at ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠hackinghumans@n2k.com⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This week, while <a href="https://www.linkedin.com/in/varmazis/">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Maria Varmazis⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a> (also host of the <a href="https://space.n2k.com/podcasts/t-minus?__hstc=223811332.a636bba53840b4700c929fe67723a129.1721054632698.1747145009569.1747159962459.413&amp;__hssc=223811332.2.1747159962459&amp;__hsfp=3690629108">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠T-Minus⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a> Space Daily show) is out, our hosts<a href="https://www.linkedin.com/in/dave-bittner-27231a4/">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a> <a href="https://www.linkedin.com/in/dave-bittner-27231a4/">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Dave Bittner⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a> and <a href="https://www.linkedin.com/in/joecarrigan/">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Joe Carrigan⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a> are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. Joe starts us off with a chicken update. Joe’s story is on CrowdStrike’s 2025 Global Threat Report, which reveals faster-than-ever breakout times, a surge in vishing and initial access attacks, widespread abuse of valid accounts, and a growing shift toward malware-free intrusions as adversaries become more numerous and sophisticated. Dave’s got the story on how “pig-butchering” romance scams are industrialized, detailing Reuters’ reporting on cyberfraud gangs using step-by-step psychological playbooks to groom victims, manufacture emotional attachment, and rapidly funnel them into fake investments that leave lasting financial and emotional damage. <a href="https://www.linkedin.com/in/rishika-d-61a765159/">Rishika Desai</a>, Threat Researcher and Writer from <a href="https://www.linkedin.com/company/bforeai/">Bfore.ai</a>, joins Dave and Joe to discuss renting social media ad accounts for scamming purposes. Our catch of the day comes from Reddit, where one user channels their inner Jedi and uses the Force to send a pesky scammer retreating to the dark side.</p>
<p><strong>Resources and links to stories:</strong></p>
<ul>
  <li>
<a href="https://www.jec.senate.gov/public/_cache/files/c1717fa4-9ab4-444e-b6f6-0e9000bfccea/12.2025-holiday-travel-scams-alert.pdf">⁠</a><a href="https://www.reuters.com/graphics/SOUTHEASTASIA-SCAMS/MANUALS/klpyjlqelvg/?utm_source=Sailthru&amp;utm_medium=Newsletter&amp;utm_campaign=Daily-Briefing&amp;utm_term=010826&amp;lctg=64493bdb2c0862838c0ad236">A scammer’sblueprint</a>
</li>
</ul>
<ul>
  <li><a href="https://go.crowdstrike.com/2025-global-threat-report.html">CROWDSTRIKE 2025 GLOBAL THREAT REPORT</a></li>
</ul>
<p><a href="https://therecord.media/fin6-recruitment-scam-malware-campaign">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a>⁠⁠⁠Have a Catch of the Day you'd like to share? Email it to us at <a href="https://therecord.media/fin6-recruitment-scam-malware-campaign">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a><a href="mailto:hackinghumans@n2k.com">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠hackinghumans@n2k.com⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a>.</p>]]>
      </content:encoded>
      <itunes:duration>3073</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[4ce31328-cdd5-11ef-8599-3b630158b9dd]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW7685060499.mp3?updated=1768417679" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>MFA prompt bombing (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/117/notes</link>
      <description>Please enjoy this encore of Word Notes. 

Hackers bypass, multifactor authentication schemes by sending a blizzard of spamming login attempts until the accounts owner accepts the MFA prompt out of desperation to make the spamming stop. 

CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/mfa-prompt-bombing⁠

Audio reference link: movieclips. “⁠Sneakers (2/9) Movie Clip - Defeating the Keypad (1992) HD.⁠” YouTube, YouTube, 29 May 2011, https://www.youtube.com/watch?v=oG5vsPJ5Tos. </description>
      <pubDate>Tue, 13 Jan 2026 08:00:00 -0000</pubDate>
      <itunes:title>MFA prompt bombing (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>117</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/2ad260f8-effe-11f0-90a2-97ff9ea3c64d/image/441b0ca2db080b93b935568d381ce462.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle/>
      <itunes:summary>Please enjoy this encore of Word Notes. 

Hackers bypass, multifactor authentication schemes by sending a blizzard of spamming login attempts until the accounts owner accepts the MFA prompt out of desperation to make the spamming stop. 

CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/mfa-prompt-bombing⁠

Audio reference link: movieclips. “⁠Sneakers (2/9) Movie Clip - Defeating the Keypad (1992) HD.⁠” YouTube, YouTube, 29 May 2011, https://www.youtube.com/watch?v=oG5vsPJ5Tos. </itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore of Word Notes. </p>
<p>Hackers bypass, multifactor authentication schemes by sending a blizzard of spamming login attempts until the accounts owner accepts the MFA prompt out of desperation to make the spamming stop. </p>
<p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/mfa-prompt-bombing">⁠https://thecyberwire.com/glossary/mfa-prompt-bombing⁠</a></p>
<p>Audio reference link: movieclips. “<a href="https://www.youtube.com/watch?v=oG5vsPJ5Tos">⁠Sneakers (2/9) Movie Clip - Defeating the Keypad (1992) HD.⁠</a>” <em>YouTube</em>, YouTube, 29 May 2011, https://www.youtube.com/watch?v=oG5vsPJ5Tos. </p>]]>
      </content:encoded>
      <itunes:duration>407</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[2ad260f8-effe-11f0-90a2-97ff9ea3c64d]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW9902099178.mp3?updated=1736193890" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>It's just too good to be true.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/368/notes</link>
      <description>This week, our hosts⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Dave Bittner⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠, ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Joe Carrigan⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠, and ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Maria Varmazis⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ (also host of the ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠T-Minus⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ Space Daily show) are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. We start with some follow up on a big honor for Dave, recognized by SANS as a Difference Maker in Media—plus a quick chicken update, a newly named rooster, and construction officially getting underway on the new run. Maria has the story on a congressional warning about a surge in winter holiday travel scams, as fake booking sites and airline impersonators drive millions in losses during peak travel season. Dave has two stories this week, one on a friend who received a suspicious email appearing to come from the chair of a nonprofit, and the other on a BBC investigation uncovering how fraudulent crowdfunding campaigns exploited children with cancer and their families, siphoning off millions meant for life-saving treatment. Joe’s story covers a warning from the IRS on how to spot and avoid tax scams, highlighting red flags like too-good-to-be-true refunds, urgent threats, fake websites, and impersonators pressuring victims for money or personal information. For our Catch of the Day, it turns out Aquaman isn’t just ruling the seas — he’s apparently sliding into fans’ texts, proving once again that when a celebrity starts sounding a little too approachable, it’s probably not Hollywood calling. 

Resources and links to stories:


  ALERT: Winter Holidays Travel Scams

  Children with cancer scammed out of millions fundraised for their treatment, BBC finds

  Recognize tax scams and fraud

  How to know it's the IRS


⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Have a Catch of the Day you'd like to share? Email it to us at ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠hackinghumans@n2k.com⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠.</description>
      <pubDate>Thu, 08 Jan 2026 06:00:00 -0000</pubDate>
      <itunes:title>It's just too good to be true.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>368</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>This week, our hosts⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Dave Bittner⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠, ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Joe Carrigan⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠, and ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Maria Varmazis⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ (also host of the ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠T-Minus⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ Space Daily show) are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. We start with some follow up on a big honor for Dave, recognized by SANS as a Difference Maker in Media—plus a quick chicken update, a newly named rooster, and construction officially getting underway on the new run. Maria has the story on a congressional warning about a surge in winter holiday travel scams, as fake booking sites and airline impersonators drive millions in losses during peak travel season. Dave has two stories this week, one on a friend who received a suspicious email appearing to come from the chair of a nonprofit, and the other on a BBC investigation uncovering how fraudulent crowdfunding campaigns exploited children with cancer and their families, siphoning off millions meant for life-saving treatment. Joe’s story covers a warning from the IRS on how to spot and avoid tax scams, highlighting red flags like too-good-to-be-true refunds, urgent threats, fake websites, and impersonators pressuring victims for money or personal information. For our Catch of the Day, it turns out Aquaman isn’t just ruling the seas — he’s apparently sliding into fans’ texts, proving once again that when a celebrity starts sounding a little too approachable, it’s probably not Hollywood calling. 

Resources and links to stories:


  ALERT: Winter Holidays Travel Scams

  Children with cancer scammed out of millions fundraised for their treatment, BBC finds

  Recognize tax scams and fraud

  How to know it's the IRS


⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Have a Catch of the Day you'd like to share? Email it to us at ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠hackinghumans@n2k.com⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This week, our hosts<a href="https://www.linkedin.com/in/dave-bittner-27231a4/">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a> <a href="https://www.linkedin.com/in/dave-bittner-27231a4/">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Dave Bittner⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a>, <a href="https://www.linkedin.com/in/joecarrigan/">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Joe Carrigan⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a>, and <a href="https://www.linkedin.com/in/varmazis/">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Maria Varmazis⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a> (also host of the <a href="https://space.n2k.com/podcasts/t-minus?__hstc=223811332.a636bba53840b4700c929fe67723a129.1721054632698.1747145009569.1747159962459.413&amp;__hssc=223811332.2.1747159962459&amp;__hsfp=3690629108">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠T-Minus⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a> Space Daily show) are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. We start with some follow up on a big honor for Dave, recognized by SANS as a Difference Maker in Media—plus a quick chicken update, a newly named rooster, and construction officially getting underway on the new run. Maria has the story on a congressional warning about a surge in winter holiday travel scams, as fake booking sites and airline impersonators drive millions in losses during peak travel season. Dave has two stories this week, one on a friend who received a suspicious email appearing to come from the chair of a nonprofit, and the other on a BBC investigation uncovering how fraudulent crowdfunding campaigns exploited children with cancer and their families, siphoning off millions meant for life-saving treatment. Joe’s story covers a warning from the IRS on how to spot and avoid tax scams, highlighting red flags like too-good-to-be-true refunds, urgent threats, fake websites, and impersonators pressuring victims for money or personal information. For our Catch of the Day, it turns out Aquaman isn’t just ruling the seas — he’s apparently sliding into fans’ texts, proving once again that when a celebrity starts sounding <em>a little too</em> approachable, it’s probably not Hollywood calling. </p>
<p><strong>Resources and links to stories:</strong></p>
<ul>
  <li><a href="https://www.jec.senate.gov/public/_cache/files/c1717fa4-9ab4-444e-b6f6-0e9000bfccea/12.2025-holiday-travel-scams-alert.pdf">ALERT: Winter Holidays Travel Scams</a></li>
  <li><a href="https://www.bbc.com/news/articles/ckgz318y8elo">Children with cancer scammed out of millions fundraised for their treatment, BBC finds</a></li>
  <li><a href="https://www.irs.gov/help/tax-scams/recognize-tax-scams-and-fraud">Recognize tax scams and fraud</a></li>
  <li><a href="https://www.irs.gov/help/how-to-know-its-the-irs">How to know it's the IRS</a></li>
</ul>
<p><a href="https://therecord.media/fin6-recruitment-scam-malware-campaign">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a>⁠⁠⁠Have a Catch of the Day you'd like to share? Email it to us at <a href="https://therecord.media/fin6-recruitment-scam-malware-campaign">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a><a href="mailto:hackinghumans@n2k.com">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠hackinghumans@n2k.com⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a>.</p>]]>
      </content:encoded>
      <itunes:duration>3185</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[4cb48c60-cdd5-11ef-8599-97ffa3d688f4]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW8029481240.mp3?updated=1767810242" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Poisoned at the source. [OMITB]</title>
      <link>https://thecyberwire.com/podcasts/only-malware-in-the-building/19/notes</link>
      <description>Welcome in! You’ve entered, Only Malware in the Building. Join us each month to sip tea and solve mysteries about today’s most interesting threats. Your host is ⁠⁠⁠⁠⁠Selena Larson⁠⁠⁠⁠⁠, ⁠⁠⁠⁠⁠Proofpoint⁠⁠⁠⁠⁠ intelligence analyst and host of their podcast ⁠⁠⁠⁠⁠DISCARDED⁠⁠⁠⁠⁠. Inspired by the residents of a building in New York’s exclusive upper west side, Selena is joined by her co-hosts ⁠⁠⁠⁠⁠N2K Networks⁠⁠⁠⁠⁠ ⁠⁠⁠⁠⁠Dave Bittner⁠⁠⁠⁠⁠ and ⁠⁠⁠⁠Keith Mularski⁠⁠⁠⁠, former FBI cybercrime investigator and now Chief Global Ambassador at ⁠⁠⁠⁠Qintel⁠⁠⁠⁠.

Being a security researcher is a bit like being a detective: you gather clues, analyze the evidence, and consult the experts to solve the cyber puzzle. On this episode, we dive into supply chain attacks through the lens of a massive Android malware campaign that infects devices before they ever reach users, embedding itself in firmware and reseller-installed system images. We connect the dots to other high-impact supply chain incidents—from SolarWinds to the recent F5 breach—and share new intelligence on Android devices compromised during manufacturing and distribution in China. Together, these cases highlight how attacks at the source can quietly scale, persist, and evade traditional defenses.</description>
      <pubDate>Tue, 06 Jan 2026 08:00:00 -0000</pubDate>
      <itunes:title>Poisoned at the source. [OMITB]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>19</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/79f136b0-ea67-11f0-9851-f3e46ab5d2bd/image/d9f0cdb0dcdd515f0dfd92da4cc68fb2.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle/>
      <itunes:summary>Welcome in! You’ve entered, Only Malware in the Building. Join us each month to sip tea and solve mysteries about today’s most interesting threats. Your host is ⁠⁠⁠⁠⁠Selena Larson⁠⁠⁠⁠⁠, ⁠⁠⁠⁠⁠Proofpoint⁠⁠⁠⁠⁠ intelligence analyst and host of their podcast ⁠⁠⁠⁠⁠DISCARDED⁠⁠⁠⁠⁠. Inspired by the residents of a building in New York’s exclusive upper west side, Selena is joined by her co-hosts ⁠⁠⁠⁠⁠N2K Networks⁠⁠⁠⁠⁠ ⁠⁠⁠⁠⁠Dave Bittner⁠⁠⁠⁠⁠ and ⁠⁠⁠⁠Keith Mularski⁠⁠⁠⁠, former FBI cybercrime investigator and now Chief Global Ambassador at ⁠⁠⁠⁠Qintel⁠⁠⁠⁠.

Being a security researcher is a bit like being a detective: you gather clues, analyze the evidence, and consult the experts to solve the cyber puzzle. On this episode, we dive into supply chain attacks through the lens of a massive Android malware campaign that infects devices before they ever reach users, embedding itself in firmware and reseller-installed system images. We connect the dots to other high-impact supply chain incidents—from SolarWinds to the recent F5 breach—and share new intelligence on Android devices compromised during manufacturing and distribution in China. Together, these cases highlight how attacks at the source can quietly scale, persist, and evade traditional defenses.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Welcome in! You’ve entered, Only Malware in the Building. Join us each month to sip tea and solve mysteries about today’s most interesting threats. Your host is <a href="https://www.linkedin.com/in/selenalarson/">⁠⁠⁠⁠⁠Selena Larson⁠⁠⁠⁠⁠</a>, <a href="https://www.proofpoint.com/">⁠⁠⁠⁠⁠Proofpoint⁠⁠⁠⁠⁠</a> intelligence analyst and host of their podcast <a href="https://www.proofpoint.com/us/podcasts/discarded">⁠⁠⁠⁠⁠DISCARDED⁠⁠⁠⁠⁠</a>. Inspired by the residents of a building in New York’s exclusive upper west side, Selena is joined by her co-hosts <a href="https://www.n2k.com/">⁠⁠⁠⁠⁠N2K Networks⁠⁠⁠⁠⁠</a> <a href="https://www.linkedin.com/in/dave-bittner-27231a4/">⁠⁠⁠⁠⁠Dave Bittner⁠⁠⁠⁠⁠</a> and <a href="https://www.linkedin.com/in/keith-mularski-b737551/">⁠⁠⁠⁠Keith Mularski⁠⁠⁠⁠</a>, former FBI cybercrime investigator and now Chief Global Ambassador at <a href="https://www.linkedin.com/company/qintel/">⁠⁠⁠⁠Qintel⁠⁠⁠⁠</a>.</p>
<p>Being a security researcher is a bit like being a detective: you gather clues, analyze the evidence, and consult the experts to solve the cyber puzzle. On this episode, we dive into supply chain attacks through the lens of a massive Android malware campaign that infects devices before they ever reach users, embedding itself in firmware and reseller-installed system images. We connect the dots to other high-impact supply chain incidents—from SolarWinds to the recent F5 breach—and share new intelligence on Android devices compromised during manufacturing and distribution in China. Together, these cases highlight how attacks at the source can quietly scale, persist, and evade traditional defenses.</p>]]>
      </content:encoded>
      <itunes:duration>2685</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[79f136b0-ea67-11f0-9851-f3e46ab5d2bd]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW8302587816.mp3?updated=1767639058" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Apple Lockdown Mode (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/116/notes</link>
      <description>Please enjoy this encore of Word Notes. 

An optional security mode for macOS and iOS that reduces the attack surface of the operating system by disabling certain commonly attacked features. 

CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/apple-lockdown-mode⁠

Audio reference link: “⁠How NSO Group’s Pegasus Spyware Was Found on Jamal Khashoggi’s Fiancée’s Phone⁠,” FRONTLINE, YouTube, 18 July 2021.</description>
      <pubDate>Tue, 06 Jan 2026 08:00:00 -0000</pubDate>
      <itunes:title>Apple Lockdown Mode (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>116</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/53212e72-ea4f-11f0-8849-33da0b7fc859/image/441b0ca2db080b93b935568d381ce462.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle/>
      <itunes:summary>Please enjoy this encore of Word Notes. 

An optional security mode for macOS and iOS that reduces the attack surface of the operating system by disabling certain commonly attacked features. 

CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/apple-lockdown-mode⁠

Audio reference link: “⁠How NSO Group’s Pegasus Spyware Was Found on Jamal Khashoggi’s Fiancée’s Phone⁠,” FRONTLINE, YouTube, 18 July 2021.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore of Word Notes. </p>
<p>An optional security mode for macOS and iOS that reduces the attack surface of the operating system by disabling certain commonly attacked features. </p>
<p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/apple-lockdown-mode">⁠https://thecyberwire.com/glossary/apple-lockdown-mode⁠</a></p>
<p>Audio reference link: “<a href="https://www.youtube.com/watch?v=a2BIYWHdfTE">⁠How NSO Group’s Pegasus Spyware Was Found on Jamal Khashoggi’s Fiancée’s Phone⁠</a>,” FRONTLINE, YouTube, 18 July 2021.</p>]]>
      </content:encoded>
      <itunes:duration>389</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[53212e72-ea4f-11f0-8849-33da0b7fc859]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW8758643811.mp3?updated=1736193889" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Hot sauce and hot takes: An Only Malware in the Building special.</title>
      <link>https://thecyberwire.com/podcasts/only-malware-in-the-building/15/notes</link>
      <description>While our team is out on winter break, please enjoy this episode of Only Malware in the Building.

Welcome in! You’ve entered, Only Malware in the Building — but this time, it’s not just another episode. This is a special edition you won’t want to miss.

For the first time, our hosts are together in-studio — and they’re turning up the heat. Literally. Join ⁠⁠⁠⁠⁠⁠Selena Larson⁠⁠⁠⁠⁠⁠, ⁠⁠⁠⁠⁠⁠Proofpoint⁠⁠⁠⁠⁠⁠ intelligence analyst and host of their podcast ⁠⁠⁠⁠⁠⁠DISCARDED⁠, along with  ⁠⁠⁠⁠⁠⁠N2K Networks⁠⁠⁠⁠⁠⁠ ⁠⁠⁠⁠⁠⁠Dave Bittner⁠⁠⁠⁠⁠⁠ and ⁠⁠⁠⁠⁠Keith Mularski⁠⁠⁠⁠⁠, former FBI cybercrime investigator and now Chief Global Ambassador at ⁠⁠⁠⁠⁠Qintel⁠⁠⁠⁠⁠⁠⁠⁠⁠, as they take on a fiery hot wings challenge while answering personal questions about themselves, their careers, and the stories that shaped them. Think you’ve seen them tackle malware mysteries before? Wait until you see them sweat. 

This one’s too good for audio alone — you’ll want to watch the full ⁠video⁠ edition to catch every spicy reaction, every laugh, and maybe even a few tears.

So grab your milk, get ready to feel the burn, and come join us for this special hot take on Only Malware in the Building.</description>
      <pubDate>Thu, 01 Jan 2026 06:00:00 -0000</pubDate>
      <itunes:title>Hot sauce and hot takes: An Only Malware in the Building special.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>15</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/4c86bc40-cdd5-11ef-8599-bf2ca6e0f878/image/14002263e169460f16ca12e04624eb3a.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle/>
      <itunes:summary>While our team is out on winter break, please enjoy this episode of Only Malware in the Building.

Welcome in! You’ve entered, Only Malware in the Building — but this time, it’s not just another episode. This is a special edition you won’t want to miss.

For the first time, our hosts are together in-studio — and they’re turning up the heat. Literally. Join ⁠⁠⁠⁠⁠⁠Selena Larson⁠⁠⁠⁠⁠⁠, ⁠⁠⁠⁠⁠⁠Proofpoint⁠⁠⁠⁠⁠⁠ intelligence analyst and host of their podcast ⁠⁠⁠⁠⁠⁠DISCARDED⁠, along with  ⁠⁠⁠⁠⁠⁠N2K Networks⁠⁠⁠⁠⁠⁠ ⁠⁠⁠⁠⁠⁠Dave Bittner⁠⁠⁠⁠⁠⁠ and ⁠⁠⁠⁠⁠Keith Mularski⁠⁠⁠⁠⁠, former FBI cybercrime investigator and now Chief Global Ambassador at ⁠⁠⁠⁠⁠Qintel⁠⁠⁠⁠⁠⁠⁠⁠⁠, as they take on a fiery hot wings challenge while answering personal questions about themselves, their careers, and the stories that shaped them. Think you’ve seen them tackle malware mysteries before? Wait until you see them sweat. 

This one’s too good for audio alone — you’ll want to watch the full ⁠video⁠ edition to catch every spicy reaction, every laugh, and maybe even a few tears.

So grab your milk, get ready to feel the burn, and come join us for this special hot take on Only Malware in the Building.</itunes:summary>
      <content:encoded>
        <![CDATA[<p><em><strong>While our team is out on winter break, please enjoy this episode of Only Malware in the Building.</strong></em></p>
<p>Welcome in! You’ve entered, <em>Only Malware in the Building</em> — but this time, it’s not just another episode. This is a special edition you won’t want to miss.</p>
<p>For the first time, our hosts are together <em>in-studio</em> — and they’re turning up the heat. Literally. Join ⁠⁠⁠⁠⁠<a href="https://www.linkedin.com/in/selenalarson/">⁠Selena Larson⁠⁠⁠⁠⁠⁠</a>, <a href="https://www.proofpoint.com/">⁠⁠⁠⁠⁠⁠Proofpoint⁠⁠⁠⁠⁠⁠</a> intelligence analyst and host of their podcast <a href="https://www.proofpoint.com/us/podcasts/discarded">⁠⁠⁠⁠⁠⁠DISCARDED⁠</a>, along with  <a href="https://www.n2k.com/">⁠⁠⁠⁠⁠⁠N2K Networks⁠⁠⁠⁠⁠⁠</a> <a href="https://www.linkedin.com/in/dave-bittner-27231a4/">⁠⁠⁠⁠⁠⁠Dave Bittner⁠⁠⁠⁠⁠⁠</a> and <a href="https://www.linkedin.com/in/keith-mularski-b737551/">⁠⁠⁠⁠⁠Keith Mularski⁠⁠⁠⁠⁠</a>, former FBI cybercrime investigator and now Chief Global Ambassador at <a href="https://www.linkedin.com/company/qintel/">⁠⁠⁠⁠⁠Qintel⁠⁠⁠⁠⁠</a>⁠⁠⁠⁠, as they take on a fiery hot wings challenge while answering personal questions about themselves, their careers, and the stories that shaped them. Think you’ve seen them tackle malware mysteries before? Wait until you see them sweat. </p>
<p>This one’s too good for audio alone — you’ll want to watch the full <a href="https://youtu.be/HDgLBxEKx28">⁠video⁠</a> edition to catch every spicy reaction, every laugh, and maybe even a few tears.</p>
<p>So grab your milk, get ready to feel the burn, and come join us for this special hot take on <em>Only Malware in the Building.</em></p>]]>
      </content:encoded>
      <itunes:duration>2197</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[4c86bc40-cdd5-11ef-8599-bf2ca6e0f878]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW1890458161.mp3?updated=1765912651" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Simulated Phishing (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/115/notes</link>
      <description>While our team is out on winter break, please enjoy this episode of Word Notes.

A security awareness training technique in which authorized, but fake phishing emails are sent to employees in order to measure and improve their resistance to real phishing attacks. 

CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/simulated-phishing⁠

Audio reference link: ⁠“Blackhat (2014) - Hacking the NSA Scene (4/10) | Movieclips.”⁠ YouTube, YouTube, 19 Apr. 2017.</description>
      <pubDate>Tue, 30 Dec 2025 08:00:00 -0000</pubDate>
      <itunes:title>Simulated Phishing (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>115</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/b43ee966-da1d-11f0-98e4-83bdc639f712/image/441b0ca2db080b93b935568d381ce462.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle/>
      <itunes:summary>While our team is out on winter break, please enjoy this episode of Word Notes.

A security awareness training technique in which authorized, but fake phishing emails are sent to employees in order to measure and improve their resistance to real phishing attacks. 

CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/simulated-phishing⁠

Audio reference link: ⁠“Blackhat (2014) - Hacking the NSA Scene (4/10) | Movieclips.”⁠ YouTube, YouTube, 19 Apr. 2017.</itunes:summary>
      <content:encoded>
        <![CDATA[<p><em><strong>While our team is out on winter break, please enjoy this episode of Word Notes.</strong></em></p>
<p>A security awareness training technique in which authorized, but fake phishing emails are sent to employees in order to measure and improve their resistance to real phishing attacks. </p>
<p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/simulated-phishing">⁠https://thecyberwire.com/glossary/simulated-phishing⁠</a></p>
<p>Audio reference link: <a href="https://www.youtube.com/watch?v=7HWfwLBqSQ4">⁠“Blackhat (2014) - Hacking the NSA Scene (4/10) | Movieclips.”⁠</a> <em>YouTube</em>, YouTube, 19 Apr. 2017.</p>]]>
      </content:encoded>
      <itunes:duration>485</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b43ee966-da1d-11f0-98e4-83bdc639f712]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW3572961725.mp3?updated=1736193889" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Scammers are recruiting.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/355/notes</link>
      <description>While our team is out on winter break, please enjoy this episode of Hacking Humans

This week, our hosts⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Dave Bittner⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠, ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Joe Carrigan⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠, and ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Maria Varmazis⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ (also host of the ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠T-Minus⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ Space Daily show) are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. We start with a scam warning from Michal, who is sharing the latest conference scam. Dave's got the story of a retired federal investigator who mapped out the “Scammer Psychological Kill Chain” and shared rules to help you spot and break it. Maria has the story of job scams surging over 1,000% in 2025, as scammers exploit a slowing labor market and desperate jobseekers with fake offers, texts, and bogus recruiter schemes. Joe follows the story on a $4 million forex scam where two men promised safe, high returns but instead ran a Ponzi scheme that defrauded 20 investors before landing in federal prison. Our catch of the day comes from listener Shannon who writes in to share a message from "Amazon" about a recall notice. 

Resources and links to stories:


  J⁠ob Scams Surge 1,000% As Americans Struggle to Find Work⁠


  ⁠Forex Account: What It Means and How It Works⁠

  ⁠Ex-NYPD Cop Gets 36 Months In $4M Forex Scam That Duped 20 Investors: Feds⁠


⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Have a Catch of the Day you'd like to share? Email it to us at ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠hackinghumans@n2k.com⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠.</description>
      <pubDate>Thu, 25 Dec 2025 06:00:00 -0000</pubDate>
      <itunes:title>Scammers are recruiting.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>355</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>While our team is out on winter break, please enjoy this episode of Hacking Humans

This week, our hosts⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Dave Bittner⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠, ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Joe Carrigan⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠, and ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Maria Varmazis⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ (also host of the ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠T-Minus⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ Space Daily show) are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. We start with a scam warning from Michal, who is sharing the latest conference scam. Dave's got the story of a retired federal investigator who mapped out the “Scammer Psychological Kill Chain” and shared rules to help you spot and break it. Maria has the story of job scams surging over 1,000% in 2025, as scammers exploit a slowing labor market and desperate jobseekers with fake offers, texts, and bogus recruiter schemes. Joe follows the story on a $4 million forex scam where two men promised safe, high returns but instead ran a Ponzi scheme that defrauded 20 investors before landing in federal prison. Our catch of the day comes from listener Shannon who writes in to share a message from "Amazon" about a recall notice. 

Resources and links to stories:


  J⁠ob Scams Surge 1,000% As Americans Struggle to Find Work⁠


  ⁠Forex Account: What It Means and How It Works⁠

  ⁠Ex-NYPD Cop Gets 36 Months In $4M Forex Scam That Duped 20 Investors: Feds⁠


⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Have a Catch of the Day you'd like to share? Email it to us at ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠hackinghumans@n2k.com⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠.</itunes:summary>
      <content:encoded>
        <![CDATA[<p><em><strong>While our team is out on winter break, please enjoy this episode of Hacking Humans</strong></em></p>
<p>This week, our hosts<a href="https://www.linkedin.com/in/dave-bittner-27231a4/">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a> <a href="https://www.linkedin.com/in/dave-bittner-27231a4/">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Dave Bittner⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a>, <a href="https://www.linkedin.com/in/joecarrigan/">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Joe Carrigan⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a>, and <a href="https://www.linkedin.com/in/varmazis/">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Maria Varmazis⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a> (also host of the <a href="https://space.n2k.com/podcasts/t-minus?__hstc=223811332.a636bba53840b4700c929fe67723a129.1721054632698.1747145009569.1747159962459.413&amp;__hssc=223811332.2.1747159962459&amp;__hsfp=3690629108">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠T-Minus⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a> Space Daily show) are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. We start with a scam warning from Michal, who is sharing the latest conference scam. Dave's got the story of a retired federal investigator who mapped out the “Scammer Psychological Kill Chain” and shared rules to help you spot and break it. Maria has the story of job scams surging over 1,000% in 2025, as scammers exploit a slowing labor market and desperate jobseekers with fake offers, texts, and bogus recruiter schemes. Joe follows the story on a $4 million forex scam where two men promised safe, high returns but instead ran a Ponzi scheme that defrauded 20 investors before landing in federal prison. Our catch of the day comes from listener Shannon who writes in to share a message from "Amazon" about a recall notice. </p>
<p><strong>Resources and links to stories:</strong></p>
<ul>
  <li>J<a href="https://www.newsweek.com/job-scams-surge-1000-employment-struggles-2128153">⁠ob Scams Surge 1,000% As Americans Struggle to Find Work⁠</a>
</li>
  <li><a href="https://www.investopedia.com/terms/forex/f/forex-accounts-managed-mini-demo.asp#:~:text=Forex%20accounts%20are%20financial%20accounts,tools%2C%20and%20market%20analysis%20resources">⁠Forex Account: What It Means and How It Works⁠</a></li>
  <li><a href="https://patch.com/new-york/newhydepark/ex-nypd-cop-gets-36-months-4m-forex-scam-duped-20-investors-feds#google_vignette">⁠Ex-NYPD Cop Gets 36 Months In $4M Forex Scam That Duped 20 Investors: Feds⁠</a></li>
</ul>
<p><a href="https://therecord.media/fin6-recruitment-scam-malware-campaign">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a>⁠⁠⁠Have a Catch of the Day you'd like to share? Email it to us at <a href="https://therecord.media/fin6-recruitment-scam-malware-campaign">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a><a href="mailto:hackinghumans@n2k.com">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠hackinghumans@n2k.com⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a>.</p>]]>
      </content:encoded>
      <itunes:duration>2765</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[4c5968d0-cdd5-11ef-8599-5b0da7bace48]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW5303449963.mp3?updated=1765845113" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Sideloading (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/114/notes</link>
      <description>Please enjoy this encore of Word Notes. 

The process of installing applications on a device without the use of official software distribution channels.

CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/sideloading</description>
      <pubDate>Tue, 23 Dec 2025 08:00:00 -0000</pubDate>
      <itunes:title>Sideloading (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>114</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/40d830b2-df5a-11f0-87be-07717df3aba3/image/441b0ca2db080b93b935568d381ce462.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle/>
      <itunes:summary>Please enjoy this encore of Word Notes. 

The process of installing applications on a device without the use of official software distribution channels.

CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/sideloading</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore of Word Notes. </p>
<p>The process of installing applications on a device without the use of official software distribution channels.</p>
<p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/sideloading">⁠https://thecyberwire.com/glossary/sideloading</a></p>]]>
      </content:encoded>
      <itunes:duration>419</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[40d830b2-df5a-11f0-87be-07717df3aba3]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW1822909581.mp3?updated=1736193889" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Trust no link, my darling.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/367/notes</link>
      <description>This week, our hosts⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Dave Bittner⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠, ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Joe Carrigan⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠, and ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Maria Varmazis⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ (also host of the ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠T-Minus⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ Space Daily show) are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. In follow-up this week, we waded into murky legal waters with a fish-demeanor pun that’s now swimming rent-free in our heads, then pivoted to some surprisingly practical home-network wisdom—segregating IoT devices before they take over your Wi-Fi (and your sanity). Joe looks at how Google is taking a dual approach to fighting scams—suing to dismantle the “Lighthouse” phishing operation while backing bipartisan legislation and rolling out AI tools to protect users from smishing, robocalls, and fraud. Maria looks at how seniors are more digitally active than ever—and why caregivers and families play a key role in keeping them safe online, with practical tips ranging from strong passwords and MFA to regular conversations about scams and device security. Dave looks at two very different but increasingly common scam fronts: an FBI warning about AI-powered “virtual kidnapping” extortion schemes using fake proof-of-life images, and a surge in celebrity impersonation scams that used hacked social media accounts to trick music fans out of billions in fake tickets, merch, crypto, and VIP offers. Our catch of the day comes from Reddit where Dave and Joe take on a series of messages that will have you rethinking the way you answer scams. 

Resources and links to stories:


  
⁠⁠⁠⁠A dual strategy: legal action and new legislation to fight scammers


  Empowering Seniors for Safer Online Experiences: 6 Practical Safety Tips for Caregivers and Families

  New FBI alert urges vigilance on virtual kidnapping schemes

  Taylor Swift, Sabrina Carpenter Impersonators Scam Fans Out of $5.3 Billion in 2025: Report


⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Have a Catch of the Day you'd like to share? Email it to us at ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠hackinghumans@n2k.com⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠.</description>
      <pubDate>Thu, 18 Dec 2025 06:00:00 -0000</pubDate>
      <itunes:title>Trust no link, my darling.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>367</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>This week, our hosts⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Dave Bittner⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠, ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Joe Carrigan⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠, and ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Maria Varmazis⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ (also host of the ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠T-Minus⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ Space Daily show) are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. In follow-up this week, we waded into murky legal waters with a fish-demeanor pun that’s now swimming rent-free in our heads, then pivoted to some surprisingly practical home-network wisdom—segregating IoT devices before they take over your Wi-Fi (and your sanity). Joe looks at how Google is taking a dual approach to fighting scams—suing to dismantle the “Lighthouse” phishing operation while backing bipartisan legislation and rolling out AI tools to protect users from smishing, robocalls, and fraud. Maria looks at how seniors are more digitally active than ever—and why caregivers and families play a key role in keeping them safe online, with practical tips ranging from strong passwords and MFA to regular conversations about scams and device security. Dave looks at two very different but increasingly common scam fronts: an FBI warning about AI-powered “virtual kidnapping” extortion schemes using fake proof-of-life images, and a surge in celebrity impersonation scams that used hacked social media accounts to trick music fans out of billions in fake tickets, merch, crypto, and VIP offers. Our catch of the day comes from Reddit where Dave and Joe take on a series of messages that will have you rethinking the way you answer scams. 

Resources and links to stories:


  
⁠⁠⁠⁠A dual strategy: legal action and new legislation to fight scammers


  Empowering Seniors for Safer Online Experiences: 6 Practical Safety Tips for Caregivers and Families

  New FBI alert urges vigilance on virtual kidnapping schemes

  Taylor Swift, Sabrina Carpenter Impersonators Scam Fans Out of $5.3 Billion in 2025: Report


⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Have a Catch of the Day you'd like to share? Email it to us at ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠hackinghumans@n2k.com⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This week, our hosts<a href="https://www.linkedin.com/in/dave-bittner-27231a4/">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a> <a href="https://www.linkedin.com/in/dave-bittner-27231a4/">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Dave Bittner⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a>, <a href="https://www.linkedin.com/in/joecarrigan/">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Joe Carrigan⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a>, and <a href="https://www.linkedin.com/in/varmazis/">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Maria Varmazis⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a> (also host of the <a href="https://space.n2k.com/podcasts/t-minus?__hstc=223811332.a636bba53840b4700c929fe67723a129.1721054632698.1747145009569.1747159962459.413&amp;__hssc=223811332.2.1747159962459&amp;__hsfp=3690629108">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠T-Minus⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a> Space Daily show) are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. In follow-up this week, we waded into murky legal waters with a <em>fish-demeanor</em> pun that’s now swimming rent-free in our heads, then pivoted to some surprisingly practical home-network wisdom—segregating IoT devices before they take over your Wi-Fi (and your sanity). Joe looks at how Google is taking a dual approach to fighting scams—suing to dismantle the “Lighthouse” phishing operation while backing bipartisan legislation and rolling out AI tools to protect users from smishing, robocalls, and fraud. Maria looks at how seniors are more digitally active than ever—and why caregivers and families play a key role in keeping them safe online, with practical tips ranging from strong passwords and MFA to regular conversations about scams and device security. Dave looks at two very different but increasingly common scam fronts: an FBI warning about AI-powered “virtual kidnapping” extortion schemes using fake proof-of-life images, and a surge in celebrity impersonation scams that used hacked social media accounts to trick music fans out of billions in fake tickets, merch, crypto, and VIP offers. Our catch of the day comes from Reddit where Dave and Joe take on a series of messages that will have you rethinking the way you answer scams. </p>
<p><strong>Resources and links to stories:</strong></p>
<ul>
  <li>
<a href="https://en.wikipedia.org/w/index.php?title=Black_neon_tetra&amp;direction=prev&amp;oldid=1323424421">⁠⁠⁠</a><a href="https://www.insanityworks.org/randomtangent/2025/11/14/monotype-font-licencing-shake-down">⁠</a><a href="https://blog.google/outreach-initiatives/public-policy/legal-action-and-legislation-fight-scammers/">A dual strategy: legal action and new legislation to fight scammers</a>
</li>
  <li><a href="https://www.globenewswire.com//news-release/2025/12/03/3199188/0/en/empowering-seniors-for-safer-online-experiences-6-practical-safety-tips-for-caregivers-and-families.html">Empowering Seniors for Safer Online Experiences: 6 Practical Safety Tips for Caregivers and Families</a></li>
  <li><a href="https://www.scworld.com/brief/new-fbi-alert-urges-vigilance-on-virtual-kidnapping-schemes">New FBI alert urges vigilance on virtual kidnapping schemes</a></li>
  <li><a href="https://www.billboard.com/pro/taylor-swift-sabrina-carpenter-impersonators-scam-fans-2025/">Taylor Swift, Sabrina Carpenter Impersonators Scam Fans Out of $5.3 Billion in 2025: Report</a></li>
</ul>
<p><a href="https://therecord.media/fin6-recruitment-scam-malware-campaign">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a>⁠⁠⁠Have a Catch of the Day you'd like to share? Email it to us at <a href="https://therecord.media/fin6-recruitment-scam-malware-campaign">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a><a href="mailto:hackinghumans@n2k.com">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠hackinghumans@n2k.com⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a>.</p>]]>
      </content:encoded>
      <itunes:duration>3175</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[4c2b3f78-cdd5-11ef-8599-5f1966d7cbe3]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW6652228483.mp3?updated=1765996388" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Microsegmentation (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/113/notes</link>
      <description>Please enjoy this encore of Word Notes. 

A zero trust security technique that isolates application workloads from each other, allowing each one to be protected individually.

CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/microsegmentation⁠

Audio reference link: “⁠Micro-Segmentation Masterpieces⁠,” PJ Kirner, Illumio CTO and Co-Founder, Tech Field Day, YouTube, 13 December 2020.</description>
      <pubDate>Tue, 16 Dec 2025 08:00:00 -0000</pubDate>
      <itunes:title>Microsegmentation (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>113</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/7679d512-da01-11f0-a669-c391d51185fc/image/441b0ca2db080b93b935568d381ce462.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle/>
      <itunes:summary>Please enjoy this encore of Word Notes. 

A zero trust security technique that isolates application workloads from each other, allowing each one to be protected individually.

CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/microsegmentation⁠

Audio reference link: “⁠Micro-Segmentation Masterpieces⁠,” PJ Kirner, Illumio CTO and Co-Founder, Tech Field Day, YouTube, 13 December 2020.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore of Word Notes. </p>
<p>A zero trust security technique that isolates application workloads from each other, allowing each one to be protected individually.</p>
<p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/microsegmentation">⁠https://thecyberwire.com/glossary/microsegmentation⁠</a></p>
<p>Audio reference link: “<a href="https://www.youtube.com/watch?v=tJaWZmW_gD4">⁠Micro-Segmentation Masterpieces⁠</a>,” PJ Kirner, Illumio CTO and Co-Founder, Tech Field Day, YouTube, 13 December 2020.</p>]]>
      </content:encoded>
      <itunes:duration>379</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[7679d512-da01-11f0-a669-c391d51185fc]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW4472931532.mp3?updated=1736193888" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Don’t let public ports bite.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/366/notes</link>
      <description>This week, our hosts ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Dave Bittner⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠, ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Joe Carrigan⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠, and ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Maria Varmazis⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ (also host of the ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠T-Minus⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ Space Daily show) are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. We start with another chicken update for everyone. Dave’s got the story of a Monotype font-licensing shakedown that totally backfired — automated claims, mass messages, and scary warnings that all unraveled when a typography-savvy employee proved every allegation was wrong, leaving Monotype empty-handed. Joe’s story is on a massive Walmart robocall scam targeting millions of customers. Fake calls, using AI voices claiming a pricey PlayStation 5 order, tricked people into giving personal info. The FCC is cracking down on SK Teleco, the U.S. voice provider behind the calls, threatening to cut them off from U.S. networks if they don’t act fast to stop the scam. Maria has the story on TSA warnings for travelers: avoid plugging phones into public USB ports and skip unsecured airport Wi-Fi. Hackers can sneak malware through USBs or intercept data over open networks, so TSA and the FCC recommend using portable chargers, charging-only cables, or a VPN to stay safe while traveling. Our catch of the day comes from a Microsoft looking email which says the user has been flagged. 

Resources and links to stories:


  
⁠Monotype font licencing shake-down


  Millions of Walmart customers victims of major scam

  FCC Demands Cessation of Walmart-Impersonation Robocalls

  VIA ELECTRONIC DELIVERY AND CERTIFIED MAIL - RETURN RECEIPT REQUESTED

  Is charging your phone at the airport safe?

  An Open Letter

  Man behind in-flight Evil Twin WiFi attacks gets 7 years in prison


⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Have a Catch of the Day you'd like to share? Email it to us at ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠hackinghumans@n2k.com⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠.</description>
      <pubDate>Thu, 11 Dec 2025 06:00:00 -0000</pubDate>
      <itunes:title>Don’t let public ports bite.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>366</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>This week, our hosts ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Dave Bittner⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠, ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Joe Carrigan⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠, and ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Maria Varmazis⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ (also host of the ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠T-Minus⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ Space Daily show) are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. We start with another chicken update for everyone. Dave’s got the story of a Monotype font-licensing shakedown that totally backfired — automated claims, mass messages, and scary warnings that all unraveled when a typography-savvy employee proved every allegation was wrong, leaving Monotype empty-handed. Joe’s story is on a massive Walmart robocall scam targeting millions of customers. Fake calls, using AI voices claiming a pricey PlayStation 5 order, tricked people into giving personal info. The FCC is cracking down on SK Teleco, the U.S. voice provider behind the calls, threatening to cut them off from U.S. networks if they don’t act fast to stop the scam. Maria has the story on TSA warnings for travelers: avoid plugging phones into public USB ports and skip unsecured airport Wi-Fi. Hackers can sneak malware through USBs or intercept data over open networks, so TSA and the FCC recommend using portable chargers, charging-only cables, or a VPN to stay safe while traveling. Our catch of the day comes from a Microsoft looking email which says the user has been flagged. 

Resources and links to stories:


  
⁠Monotype font licencing shake-down


  Millions of Walmart customers victims of major scam

  FCC Demands Cessation of Walmart-Impersonation Robocalls

  VIA ELECTRONIC DELIVERY AND CERTIFIED MAIL - RETURN RECEIPT REQUESTED

  Is charging your phone at the airport safe?

  An Open Letter

  Man behind in-flight Evil Twin WiFi attacks gets 7 years in prison


⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Have a Catch of the Day you'd like to share? Email it to us at ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠hackinghumans@n2k.com⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This week, our hosts <a href="https://www.linkedin.com/in/dave-bittner-27231a4/">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Dave Bittner⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a>, <a href="https://www.linkedin.com/in/joecarrigan/">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Joe Carrigan⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a>, and <a href="https://www.linkedin.com/in/varmazis/">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Maria Varmazis⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a> (also host of the <a href="https://space.n2k.com/podcasts/t-minus?__hstc=223811332.a636bba53840b4700c929fe67723a129.1721054632698.1747145009569.1747159962459.413&amp;__hssc=223811332.2.1747159962459&amp;__hsfp=3690629108">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠T-Minus⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a> Space Daily show) are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. We start with another chicken update for everyone. Dave’s got the story of a Monotype font-licensing shakedown that totally backfired — automated claims, mass messages, and scary warnings that all unraveled when a typography-savvy employee proved every allegation was wrong, leaving Monotype empty-handed. Joe’s story is on a massive Walmart robocall scam targeting millions of customers. Fake calls, using AI voices claiming a pricey PlayStation 5 order, tricked people into giving personal info. The FCC is cracking down on SK Teleco, the U.S. voice provider behind the calls, threatening to cut them off from U.S. networks if they don’t act fast to stop the scam. Maria has the story on TSA warnings for travelers: avoid plugging phones into public USB ports and skip unsecured airport Wi-Fi. Hackers can sneak malware through USBs or intercept data over open networks, so TSA and the FCC recommend using portable chargers, charging-only cables, or a VPN to stay safe while traveling. Our catch of the day comes from a Microsoft looking email which says the user has been flagged. </p>
<p><strong>Resources and links to stories:</strong></p>
<ul>
  <li>
<a href="https://en.wikipedia.org/w/index.php?title=Black_neon_tetra&amp;direction=prev&amp;oldid=1323424421">⁠</a><a href="https://www.insanityworks.org/randomtangent/2025/11/14/monotype-font-licencing-shake-down">Monotype font licencing shake-down</a>
</li>
  <li><a href="https://www.al.com/news/2025/12/millions-of-walmart-customers-victims-of-major-scam.html">Millions of Walmart customers victims of major scam</a></li>
  <li><a href="https://www.fcc.gov/document/fcc-demands-cessation-walmart-impersonation-robocalls">FCC Demands Cessation of Walmart-Impersonation Robocalls</a></li>
  <li><a href="https://docs.fcc.gov/public/attachments/DOC-415638A1.pdf">VIA ELECTRONIC DELIVERY AND CERTIFIED MAIL - RETURN RECEIPT REQUESTED</a></li>
  <li><a href="https://www.usatoday.com/story/travel/2025/12/03/tsa-airports-safety-usb-wifi/87582007007/">Is charging your phone at the airport safe?</a></li>
  <li><a href="https://www.hacklore.org/letter">An Open Letter</a></li>
  <li><a href="https://www.bleepingcomputer.com/news/security/man-behind-in-flight-evil-twin-wifi-attacks-gets-7-years-in-prison/">Man behind in-flight Evil Twin WiFi attacks gets 7 years in prison</a></li>
</ul>
<p><a href="https://therecord.media/fin6-recruitment-scam-malware-campaign">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a>⁠⁠⁠Have a Catch of the Day you'd like to share? Email it to us at <a href="https://therecord.media/fin6-recruitment-scam-malware-campaign">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a><a href="mailto:hackinghumans@n2k.com">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠hackinghumans@n2k.com⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a>.</p>]]>
      </content:encoded>
      <itunes:duration>3057</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[4bfd7764-cdd5-11ef-8599-27bc4bc2fc56]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW2703908834.mp3?updated=1765307688" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Homograph phishing (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/112/notes</link>
      <description>Please enjoy this encore of Word Notes. 

The use of similar-looking characters in a phishing URL to spoof a legitimate site.

CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/homograph-phishing⁠

Audio reference link: “⁠Mission Impossible III 2006 Masking 01⁠,” uploaded by DISGUISE MASK, 28 July 2018.</description>
      <pubDate>Tue, 09 Dec 2025 08:00:00 -0000</pubDate>
      <itunes:title>Homograph phishing (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>112</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/e2645c40-d46e-11f0-a168-cb92abffe43f/image/441b0ca2db080b93b935568d381ce462.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle/>
      <itunes:summary>Please enjoy this encore of Word Notes. 

The use of similar-looking characters in a phishing URL to spoof a legitimate site.

CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/homograph-phishing⁠

Audio reference link: “⁠Mission Impossible III 2006 Masking 01⁠,” uploaded by DISGUISE MASK, 28 July 2018.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore of Word Notes. </p>
<p>The use of similar-looking characters in a phishing URL to spoof a legitimate site.</p>
<p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/homograph-phishing">⁠https://thecyberwire.com/glossary/homograph-phishing⁠</a></p>
<p>Audio reference link: “<a href="https://youtu.be/8VgscNBhD6g">⁠Mission Impossible III 2006 Masking 01⁠</a>,” uploaded by DISGUISE MASK, 28 July 2018.</p>]]>
      </content:encoded>
      <itunes:duration>368</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[e2645c40-d46e-11f0-a168-cb92abffe43f]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW5800099688.mp3?updated=1736193888" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>A fish commits credit card fraud (inadvertently). </title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/365/notes</link>
      <description>This week, our hosts ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Dave Bittner⁠⁠⁠⁠⁠⁠⁠⁠⁠, ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Joe Carrigan⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠, and ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Maria Varmazis⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ (also host of the ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠T-Minus⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ Space Daily show) are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. We start with some follow up from listener John Helt having some chicken withdrawal, Foghorn Leghorn excluded. You are welcome, John, you now have your chicken updates! And, we share how a fish went shopping. 

Maria shares some research (including her own) on using AI chatbots to phish the elderly. Joe’s got two stories today.  First up, he talks about the Myanmar army continuing their raids on scam centers. Joe also shares a piece on two men found guilty of engaging in an extensive fraud scheme of ACA plan subsidies involving over $233 million from the federal government. Dave's story helps keep scammers out of your stockings this holiday season. Our catch of the day comes from the phishing subreddit about a text a la Strong Bad. 

Resources and links to stories:


  Black neon tetra: Credit card fraud

  
⁠⁠⁠⁠⁠⁠⁠⁠⁠We set out to craft the perfect phishing scam. Major AI chatbots were happy to help.


  Can AI Models be Jailbroken to Phish Elderly Victims? An End-to-End Evaluation

  Can AI Models be Jailbroken to Phish Elderly Victims? An End-to-End Evaluation

  Myanmar’s military launches raid on second major online scam center

  President of Insurance Brokerage Firm and CEO of Marketing Company Convicted in $233M Affordable Care Act Enrollment Fraud Scheme

  Keep scammers out of your stockings this holiday season


⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Have a Catch of the Day you'd like to share? Email it to us at ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠hackinghumans@n2k.com⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠.</description>
      <pubDate>Thu, 04 Dec 2025 06:00:00 -0000</pubDate>
      <itunes:title>A fish commits credit card fraud (inadvertently). </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>365</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>This week, our hosts ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Dave Bittner⁠⁠⁠⁠⁠⁠⁠⁠⁠, ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Joe Carrigan⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠, and ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Maria Varmazis⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ (also host of the ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠T-Minus⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ Space Daily show) are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. We start with some follow up from listener John Helt having some chicken withdrawal, Foghorn Leghorn excluded. You are welcome, John, you now have your chicken updates! And, we share how a fish went shopping. 

Maria shares some research (including her own) on using AI chatbots to phish the elderly. Joe’s got two stories today.  First up, he talks about the Myanmar army continuing their raids on scam centers. Joe also shares a piece on two men found guilty of engaging in an extensive fraud scheme of ACA plan subsidies involving over $233 million from the federal government. Dave's story helps keep scammers out of your stockings this holiday season. Our catch of the day comes from the phishing subreddit about a text a la Strong Bad. 

Resources and links to stories:


  Black neon tetra: Credit card fraud

  
⁠⁠⁠⁠⁠⁠⁠⁠⁠We set out to craft the perfect phishing scam. Major AI chatbots were happy to help.


  Can AI Models be Jailbroken to Phish Elderly Victims? An End-to-End Evaluation

  Can AI Models be Jailbroken to Phish Elderly Victims? An End-to-End Evaluation

  Myanmar’s military launches raid on second major online scam center

  President of Insurance Brokerage Firm and CEO of Marketing Company Convicted in $233M Affordable Care Act Enrollment Fraud Scheme

  Keep scammers out of your stockings this holiday season


⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Have a Catch of the Day you'd like to share? Email it to us at ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠hackinghumans@n2k.com⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This week, our hosts <a href="https://www.linkedin.com/in/dave-bittner-27231a4/">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Dave Bittner⁠⁠⁠⁠⁠⁠⁠⁠⁠</a>, <a href="https://www.linkedin.com/in/joecarrigan/">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Joe Carrigan⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a>, and <a href="https://www.linkedin.com/in/varmazis/">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Maria Varmazis⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a> (also host of the <a href="https://space.n2k.com/podcasts/t-minus?__hstc=223811332.a636bba53840b4700c929fe67723a129.1721054632698.1747145009569.1747159962459.413&amp;__hssc=223811332.2.1747159962459&amp;__hsfp=3690629108">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠T-Minus⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a> Space Daily show) are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. We start with some follow up from listener John Helt having some chicken withdrawal, Foghorn Leghorn excluded. You are welcome, John, you now have your chicken updates! And, we share how a fish went shopping. </p>
<p>Maria shares some research (including her own) on using AI chatbots to phish the elderly. Joe’s got two stories today.  First up, he talks about the Myanmar army continuing their raids on scam centers. Joe also shares a piece on two men found guilty of engaging in an extensive fraud scheme of ACA plan subsidies involving over $233 million from the federal government. Dave's story helps keep scammers out of your stockings this holiday season. Our catch of the day comes from the phishing subreddit about a text a la Strong Bad. </p>
<p><strong>Resources and links to stories:</strong></p>
<ul>
  <li><a href="https://en.wikipedia.org/w/index.php?title=Black_neon_tetra&amp;direction=prev&amp;oldid=1323424421">Black neon tetra: Credit card fraud</a></li>
  <li>
<a href="https://www.linkedin.com/feed/update/urn:li:activity:7389277517540478976/">⁠⁠⁠⁠⁠</a><a href="https://www.reuters.com/investigations/meta-is-earning-fortune-deluge-fraudulent-ads-documents-show-2025-11-06/">⁠⁠⁠</a><a href="https://www.cbsnews.com/news/china-myanmar-thailand-criminal-gangs-fraud-scam-centers-death-sentences/">⁠</a><a href="https://www.reuters.com/investigates/special-report/ai-chatbots-cyber/">We set out to craft the perfect phishing scam. Major AI chatbots were happy to help.</a>
</li>
  <li><a href="https://simonlermen.substack.com/p/can-ai-models-be-jailbroken-to-phish">Can AI Models be Jailbroken to Phish Elderly Victims? An End-to-End Evaluation</a></li>
  <li><a href="https://arxiv.org/pdf/2511.11759">Can AI Models be Jailbroken to Phish Elderly Victims? An End-to-End Evaluation</a></li>
  <li><a href="https://www.politico.com/news/2025/11/20/myanmars-military-launches-raid-on-second-major-online-scam-center-00661367">Myanmar’s military launches raid on second major online scam center</a></li>
  <li><a href="https://www.justice.gov/opa/pr/president-insurance-brokerage-firm-and-ceo-marketing-company-convicted-233m-affordable-care">President of Insurance Brokerage Firm and CEO of Marketing Company Convicted in $233M Affordable Care Act Enrollment Fraud Scheme</a></li>
  <li><a href="https://www.mastercard.com/us/en/news-and-trends/stories/2025/holiday-shopping-scams-cybersecurity-tips.html">Keep scammers out of your stockings this holiday season</a></li>
</ul>
<p><a href="https://therecord.media/fin6-recruitment-scam-malware-campaign">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a>⁠⁠⁠Have a Catch of the Day you'd like to share? Email it to us at <a href="https://therecord.media/fin6-recruitment-scam-malware-campaign">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a><a href="mailto:hackinghumans@n2k.com">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠hackinghumans@n2k.com⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a>.</p>]]>
      </content:encoded>
      <itunes:duration>3091</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[4bcf330e-cdd5-11ef-8599-77429b21ab0a]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW8528080686.mp3?updated=1764784916" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Anti-cheat software (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/111/notes</link>
      <description>Please enjoy this encore of Word Notes. 

Software designed to prevent cheating in video games. 

CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/anti-cheat-software⁠

Audio reference link: “⁠The BIG Problem with Anti-Cheat⁠,” by Techquickie, YouTube, 5 June 2020</description>
      <pubDate>Tue, 02 Dec 2025 08:00:00 -0000</pubDate>
      <itunes:title>Anti-cheat software (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>111</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/4a23e6ca-c966-11f0-934f-9fddad5ee3f6/image/441b0ca2db080b93b935568d381ce462.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle/>
      <itunes:summary>Please enjoy this encore of Word Notes. 

Software designed to prevent cheating in video games. 

CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/anti-cheat-software⁠

Audio reference link: “⁠The BIG Problem with Anti-Cheat⁠,” by Techquickie, YouTube, 5 June 2020</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore of Word Notes. </p>
<p>Software designed to prevent cheating in video games. </p>
<p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/anti-cheat-software">⁠https://thecyberwire.com/glossary/anti-cheat-software⁠</a></p>
<p>Audio reference link: “<a href="https://www.youtube.com/watch?v=aaL7owZmbEA">⁠The BIG Problem with Anti-Cheat⁠</a>,” by Techquickie, YouTube, 5 June 2020</p>]]>
      </content:encoded>
      <itunes:duration>490</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[4a23e6ca-c966-11f0-934f-9fddad5ee3f6]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW7383333431.mp3?updated=1736193887" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Yippee-ki-yay, cybercriminals! [OMITB]</title>
      <link>https://thecyberwire.com/podcasts/only-malware-in-the-building/18/notes</link>
      <description>Welcome in! You’ve entered, Only Malware in the Building. Wrap yourself in a warm blanket, pour your favorite mug of tea, and join us each month as we unwrap the season’s juiciest cyber mysteries.  Your host is ⁠⁠⁠⁠⁠Selena Larson⁠⁠⁠⁠⁠, ⁠⁠⁠⁠⁠Proofpoint⁠⁠⁠⁠⁠ intelligence analyst and host of their podcast ⁠⁠⁠⁠⁠DISCARDED⁠⁠⁠⁠⁠. Inspired by the residents of a building in New York’s exclusive upper west side, Selena is joined by her co-hosts ⁠⁠⁠⁠⁠N2K Networks⁠⁠⁠⁠⁠ ⁠⁠⁠⁠⁠Dave Bittner⁠⁠⁠⁠⁠ and ⁠⁠⁠⁠Keith Mularski⁠⁠⁠⁠, former FBI cybercrime investigator and now Chief Global Ambassador at ⁠⁠⁠⁠Qintel⁠⁠⁠⁠.

Being a security researcher is a bit like being a detective: you gather clues, analyze the evidence, and consult the experts to solve the cyber puzzle. On this episode, we explore Remote access, real cargo: cybercriminals targeting trucking and logistics. From clever schemes to protect shipments to the tools cybercriminals use, our guests discuss how organizations can safeguard physical goods in an increasingly connected world—because even during the season of hustle and bustle, the threats don’t take a holiday.</description>
      <pubDate>Tue, 02 Dec 2025 08:00:00 -0000</pubDate>
      <itunes:title>Yippee-ki-yay, cybercriminals! [OMITB]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>18</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/688b1458-d140-11f0-853e-5f9ca9811b89/image/14002263e169460f16ca12e04624eb3a.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle/>
      <itunes:summary>Welcome in! You’ve entered, Only Malware in the Building. Wrap yourself in a warm blanket, pour your favorite mug of tea, and join us each month as we unwrap the season’s juiciest cyber mysteries.  Your host is ⁠⁠⁠⁠⁠Selena Larson⁠⁠⁠⁠⁠, ⁠⁠⁠⁠⁠Proofpoint⁠⁠⁠⁠⁠ intelligence analyst and host of their podcast ⁠⁠⁠⁠⁠DISCARDED⁠⁠⁠⁠⁠. Inspired by the residents of a building in New York’s exclusive upper west side, Selena is joined by her co-hosts ⁠⁠⁠⁠⁠N2K Networks⁠⁠⁠⁠⁠ ⁠⁠⁠⁠⁠Dave Bittner⁠⁠⁠⁠⁠ and ⁠⁠⁠⁠Keith Mularski⁠⁠⁠⁠, former FBI cybercrime investigator and now Chief Global Ambassador at ⁠⁠⁠⁠Qintel⁠⁠⁠⁠.

Being a security researcher is a bit like being a detective: you gather clues, analyze the evidence, and consult the experts to solve the cyber puzzle. On this episode, we explore Remote access, real cargo: cybercriminals targeting trucking and logistics. From clever schemes to protect shipments to the tools cybercriminals use, our guests discuss how organizations can safeguard physical goods in an increasingly connected world—because even during the season of hustle and bustle, the threats don’t take a holiday.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Welcome in! You’ve entered, Only Malware in the Building. Wrap yourself in a warm blanket, pour your favorite mug of tea, and join us each month as we unwrap the season’s juiciest cyber mysteries.  Your host is <a href="https://www.linkedin.com/in/selenalarson/">⁠⁠⁠⁠⁠Selena Larson⁠⁠⁠⁠⁠</a>, <a href="https://www.proofpoint.com/">⁠⁠⁠⁠⁠Proofpoint⁠⁠⁠⁠⁠</a> intelligence analyst and host of their podcast <a href="https://www.proofpoint.com/us/podcasts/discarded">⁠⁠⁠⁠⁠DISCARDED⁠⁠⁠⁠⁠</a>. Inspired by the residents of a building in New York’s exclusive upper west side, Selena is joined by her co-hosts <a href="https://www.n2k.com/">⁠⁠⁠⁠⁠N2K Networks⁠⁠⁠⁠⁠</a> <a href="https://www.linkedin.com/in/dave-bittner-27231a4/">⁠⁠⁠⁠⁠Dave Bittner⁠⁠⁠⁠⁠</a> and <a href="https://www.linkedin.com/in/keith-mularski-b737551/">⁠⁠⁠⁠Keith Mularski⁠⁠⁠⁠</a>, former FBI cybercrime investigator and now Chief Global Ambassador at <a href="https://www.linkedin.com/company/qintel/">⁠⁠⁠⁠Qintel⁠⁠⁠⁠</a>.</p>
<p>Being a security researcher is a bit like being a detective: you gather clues, analyze the evidence, and consult the experts to solve the cyber puzzle. On this episode, we explore Remote access, real cargo: cybercriminals targeting trucking and logistics. From clever schemes to protect shipments to the tools cybercriminals use, our guests discuss how organizations can safeguard physical goods in an increasingly connected world—because even during the season of hustle and bustle, the threats don’t take a holiday.</p>]]>
      </content:encoded>
      <itunes:duration>2418</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[688b1458-d140-11f0-853e-5f9ca9811b89]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW4431243378.mp3?updated=1764608822" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Nice to meet you, I'm a scammer.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/320/notes</link>
      <description>Please enjoy this encore of Hacking Humans. 

On Hacking Humans, ⁠Dave Bittner⁠, ⁠Joe Carrigan⁠, and ⁠Maria Varmazis⁠ (also host of N2K's daily space podcast, T-Minus), are once again sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines to help our audience become aware of what is out there. Our hosts discuss and ponder whether or not diamonds are the original cryptocurrency, as well as diving further into Yubikeys for organizations. Maria shares the story of a 66-year-old woman who lost her $2 million retirement savings to a romance scam on Match.com, highlighting the rise in such scams and efforts to pass the Online Dating Safety Act to protect users. Joe's story is on the Madoff Victim Fund's final $131.4 million payout, bringing total recoveries to $4.3 billion for victims of Bernard Madoff's infamous Ponzi scheme, which collapsed during the 2008 financial crisis. Dave's got the story on allegations that the PayPal Honey browser extension not only fails to deliver the best deals but also hijacks affiliate revenue from influencers by replacing their links with its own, sparking backlash and controversy. Our catch of the day comes from Reddit and Dave and Maria do their best impressions yet, as a scammer chats up an unsuspecting victim. 

Resources and links to stories: 


  ⁠Online dating scammers bilk more money each year. A bipartisan bill seeks to stop them at the source.⁠

  ⁠Madoff fraud victims get $4.3bn as fund completes payouts⁠

  ⁠Honey’s deal-hunting browser extension is accused of ripping off customers and YouTubers⁠


You can hear more from the T-Minus space daily show ⁠here⁠.

Have a Catch of the Day you'd like to share? Email it to us at ⁠hackinghumans@n2k.com⁠.</description>
      <pubDate>Thu, 27 Nov 2025 06:00:00 -0000</pubDate>
      <itunes:title>Nice to meet you, I'm a scammer.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>320</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Please enjoy this encore of Hacking Humans. 

On Hacking Humans, ⁠Dave Bittner⁠, ⁠Joe Carrigan⁠, and ⁠Maria Varmazis⁠ (also host of N2K's daily space podcast, T-Minus), are once again sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines to help our audience become aware of what is out there. Our hosts discuss and ponder whether or not diamonds are the original cryptocurrency, as well as diving further into Yubikeys for organizations. Maria shares the story of a 66-year-old woman who lost her $2 million retirement savings to a romance scam on Match.com, highlighting the rise in such scams and efforts to pass the Online Dating Safety Act to protect users. Joe's story is on the Madoff Victim Fund's final $131.4 million payout, bringing total recoveries to $4.3 billion for victims of Bernard Madoff's infamous Ponzi scheme, which collapsed during the 2008 financial crisis. Dave's got the story on allegations that the PayPal Honey browser extension not only fails to deliver the best deals but also hijacks affiliate revenue from influencers by replacing their links with its own, sparking backlash and controversy. Our catch of the day comes from Reddit and Dave and Maria do their best impressions yet, as a scammer chats up an unsuspecting victim. 

Resources and links to stories: 


  ⁠Online dating scammers bilk more money each year. A bipartisan bill seeks to stop them at the source.⁠

  ⁠Madoff fraud victims get $4.3bn as fund completes payouts⁠

  ⁠Honey’s deal-hunting browser extension is accused of ripping off customers and YouTubers⁠


You can hear more from the T-Minus space daily show ⁠here⁠.

Have a Catch of the Day you'd like to share? Email it to us at ⁠hackinghumans@n2k.com⁠.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore of Hacking Humans. </p>
<p>On Hacking Humans, <a href="https://www.linkedin.com/in/dave-bittner-27231a4/">⁠Dave Bittner⁠</a>, <a href="https://www.linkedin.com/in/joecarrigan/">⁠Joe Carrigan⁠</a>, and <a href="https://www.linkedin.com/in/varmazis/">⁠Maria Varmazis⁠</a> (also host of N2K's daily space podcast, T-Minus), are once again sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines to help our audience become aware of what is out there. Our hosts discuss and ponder whether or not diamonds are the original cryptocurrency, as well as diving further into Yubikeys for organizations. Maria shares the story of a 66-year-old woman who lost her $2 million retirement savings to a romance scam on Match.com, highlighting the rise in such scams and efforts to pass the Online Dating Safety Act to protect users. Joe's story is on the Madoff Victim Fund's final $131.4 million payout, bringing total recoveries to $4.3 billion for victims of Bernard Madoff's infamous Ponzi scheme, which collapsed during the 2008 financial crisis. Dave's got the story on allegations that the PayPal Honey browser extension not only fails to deliver the best deals but also hijacks affiliate revenue from influencers by replacing their links with its own, sparking backlash and controversy. Our catch of the day comes from Reddit and Dave and Maria do their best impressions yet, as a scammer chats up an unsuspecting victim. </p>
<p>Resources and links to stories: </p>
<ul>
  <li><a href="https://www.cbsnews.com/news/online-dating-scams-bipartisan-bill-congress/">⁠Online dating scammers bilk more money each year. A bipartisan bill seeks to stop them at the source.⁠</a></li>
  <li><a href="https://www.bbc.com/news/articles/c140yjm5znzo">⁠Madoff fraud victims get $4.3bn as fund completes payouts⁠</a></li>
  <li><a href="https://www.theverge.com/2024/12/23/24328268/honey-coupon-code-browser-extension-scam-influencers-affiliate-marketing">⁠Honey’s deal-hunting browser extension is accused of ripping off customers and YouTubers⁠</a></li>
</ul>
<p>You can hear more from the T-Minus space daily show <a href="https://space.n2k.com/podcasts/t-minus">⁠here⁠</a>.</p>
<p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@n2k.com">⁠hackinghumans@n2k.com⁠</a>. </p>]]>
      </content:encoded>
      <itunes:duration>3178</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[4ba0e4e0-cdd5-11ef-8599-c7d620112810]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW3093185496.mp3?updated=1763663312" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Pseudoransomware (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/110/notes</link>
      <description>Please enjoy this encore of Word Notes. 

Malware, in the guise of ransomware, that destroys data rather than encrypts.

CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/pseudoransomware⁠

Audio reference link: “⁠Some Men Just Want to Watch the World Burn | the Dark Knight⁠,” by YouTube, 2 November 2019.</description>
      <pubDate>Tue, 25 Nov 2025 08:00:00 -0000</pubDate>
      <itunes:title>Pseudoransomware (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>110</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/2588f1ca-c966-11f0-b900-9737e0743c1c/image/441b0ca2db080b93b935568d381ce462.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle/>
      <itunes:summary>Please enjoy this encore of Word Notes. 

Malware, in the guise of ransomware, that destroys data rather than encrypts.

CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/pseudoransomware⁠

Audio reference link: “⁠Some Men Just Want to Watch the World Burn | the Dark Knight⁠,” by YouTube, 2 November 2019.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore of Word Notes. </p>
<p>Malware, in the guise of ransomware, that destroys data rather than encrypts.</p>
<p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/pseudoransomware">⁠https://thecyberwire.com/glossary/pseudoransomware⁠</a></p>
<p>Audio reference link: “<a href="https://www.youtube.com/watch?v=oCIsI7EUYL8">⁠Some Men Just Want to Watch the World Burn | the Dark Knight⁠</a>,” by YouTube, 2 November 2019.</p>]]>
      </content:encoded>
      <itunes:duration>447</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[2588f1ca-c966-11f0-b900-9737e0743c1c]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW6882448348.mp3?updated=1736193887" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Lost iPhone, found trouble.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/364/notes</link>
      <description>This week, our hosts ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Dave Bittner⁠⁠⁠⁠⁠⁠⁠⁠, ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Joe Carrigan⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠, and ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Maria Varmazis⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ (also host of the ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠T-Minus⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ Space Daily show) are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. We start with some follow up on China sentencing five members of a violent Kokang-based gang to death for running brutal scam compounds in Myanmar. And in related news, China has also extradited alleged scam kingpin She Zhijiang, a major figure behind one of Southeast Asia’s largest fraud hubs, as Beijing intensifies its crackdown on global cyber-fraud networks. Listener Jon reports a new twist on sextortion, where scammers used an unsolicited FaceTime call to capture an image, generate an AI-manipulated obscene photo, and then extort an employee using publicly scraped contact lists. Joe’s story is on Anthropic’s claim that attackers jailbroke its Claude model to carry out what it calls the first AI-orchestrated cyber-espionage campaign, a narrative now being challenged by researchers like Dan Goodin and Dan Tentler, who argue the attack was far less “autonomous” than advertised and comparable to long-standing hacking tools rather than a breakthrough in offensive AI. Dave’s story is on a new phishing scam where attackers use the contact info displayed on a lost iPhone’s lock screen to send fake “Find My” texts claiming the device was found, luring victims to a spoofed Apple login page to steal their Apple ID and bypass Activation Lock. Maria has the story on Zimperium’s Mobile Shopping Report, which shows that during the holiday season mobile threats surge across mishing, fake retail and payment apps, and app-level vulnerabilities—making this the peak time for scammers to exploit shoppers with spoofed texts, malicious apps, and insecure SDKs hidden inside legitimate shopping tools. Our catch of the day comes from the phishing subreddit as someone is impersonating a woman who is sick with cancer asking for the victim to take care of their money. 

Resources and links to stories:


  
⁠⁠⁠⁠China sentences 5 to death for building, running criminal gang fraud centers in Myanmar's lawless borderlands


  Man Accused of Running Southeast Asia Scam Compound Is Extradited to China

  Disrupting the first reported AI-orchestrated cyber espionage campaign

  Researchers question Anthropic claim that AI-assisted attack was 90% autonomous

  Lost iPhone? Don’t fall for phishing texts saying it was found


⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Have a Catch of the Day you'd like to share? Email it to us at ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠hackinghumans@n2k.com⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠.</description>
      <pubDate>Thu, 20 Nov 2025 06:00:00 -0000</pubDate>
      <itunes:title>Lost iPhone, found trouble.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>364</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>This week, our hosts ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Dave Bittner⁠⁠⁠⁠⁠⁠⁠⁠, ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Joe Carrigan⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠, and ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Maria Varmazis⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ (also host of the ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠T-Minus⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ Space Daily show) are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. We start with some follow up on China sentencing five members of a violent Kokang-based gang to death for running brutal scam compounds in Myanmar. And in related news, China has also extradited alleged scam kingpin She Zhijiang, a major figure behind one of Southeast Asia’s largest fraud hubs, as Beijing intensifies its crackdown on global cyber-fraud networks. Listener Jon reports a new twist on sextortion, where scammers used an unsolicited FaceTime call to capture an image, generate an AI-manipulated obscene photo, and then extort an employee using publicly scraped contact lists. Joe’s story is on Anthropic’s claim that attackers jailbroke its Claude model to carry out what it calls the first AI-orchestrated cyber-espionage campaign, a narrative now being challenged by researchers like Dan Goodin and Dan Tentler, who argue the attack was far less “autonomous” than advertised and comparable to long-standing hacking tools rather than a breakthrough in offensive AI. Dave’s story is on a new phishing scam where attackers use the contact info displayed on a lost iPhone’s lock screen to send fake “Find My” texts claiming the device was found, luring victims to a spoofed Apple login page to steal their Apple ID and bypass Activation Lock. Maria has the story on Zimperium’s Mobile Shopping Report, which shows that during the holiday season mobile threats surge across mishing, fake retail and payment apps, and app-level vulnerabilities—making this the peak time for scammers to exploit shoppers with spoofed texts, malicious apps, and insecure SDKs hidden inside legitimate shopping tools. Our catch of the day comes from the phishing subreddit as someone is impersonating a woman who is sick with cancer asking for the victim to take care of their money. 

Resources and links to stories:


  
⁠⁠⁠⁠China sentences 5 to death for building, running criminal gang fraud centers in Myanmar's lawless borderlands


  Man Accused of Running Southeast Asia Scam Compound Is Extradited to China

  Disrupting the first reported AI-orchestrated cyber espionage campaign

  Researchers question Anthropic claim that AI-assisted attack was 90% autonomous

  Lost iPhone? Don’t fall for phishing texts saying it was found


⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Have a Catch of the Day you'd like to share? Email it to us at ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠hackinghumans@n2k.com⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This week, our hosts <a href="https://www.linkedin.com/in/dave-bittner-27231a4/">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Dave Bittner⁠⁠⁠⁠⁠⁠⁠⁠</a>, <a href="https://www.linkedin.com/in/joecarrigan/">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Joe Carrigan⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a>, and <a href="https://www.linkedin.com/in/varmazis/">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Maria Varmazis⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a> (also host of the <a href="https://space.n2k.com/podcasts/t-minus?__hstc=223811332.a636bba53840b4700c929fe67723a129.1721054632698.1747145009569.1747159962459.413&amp;__hssc=223811332.2.1747159962459&amp;__hsfp=3690629108">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠T-Minus⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a> Space Daily show) are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. We start with some follow up on China sentencing five members of a violent Kokang-based gang to death for running brutal scam compounds in Myanmar. And in related news, China has also extradited alleged scam kingpin She Zhijiang, a major figure behind one of Southeast Asia’s largest fraud hubs, as Beijing intensifies its crackdown on global cyber-fraud networks. Listener Jon reports a new twist on sextortion, where scammers used an unsolicited FaceTime call to capture an image, generate an AI-manipulated obscene photo, and then extort an employee using publicly scraped contact lists. Joe’s story is on Anthropic’s claim that attackers jailbroke its Claude model to carry out what it calls the first AI-orchestrated cyber-espionage campaign, a narrative now being challenged by researchers like Dan Goodin and Dan Tentler, who argue the attack was far less “autonomous” than advertised and comparable to long-standing hacking tools rather than a breakthrough in offensive AI. Dave’s story is on a new phishing scam where attackers use the contact info displayed on a lost iPhone’s lock screen to send fake “Find My” texts claiming the device was found, luring victims to a spoofed Apple login page to steal their Apple ID and bypass Activation Lock. Maria has the story on Zimperium’s Mobile Shopping Report, which shows that during the holiday season mobile threats surge across mishing, fake retail and payment apps, and app-level vulnerabilities—making this the peak time for scammers to exploit shoppers with spoofed texts, malicious apps, and insecure SDKs hidden inside legitimate shopping tools. Our catch of the day comes from the phishing subreddit as someone is impersonating a woman who is sick with cancer asking for the victim to take care of their money. </p>
<p><strong>Resources and links to stories:</strong></p>
<ul>
  <li>
<a href="https://www.linkedin.com/feed/update/urn:li:activity:7389277517540478976/">⁠⁠⁠</a><a href="https://www.reuters.com/investigations/meta-is-earning-fortune-deluge-fraudulent-ads-documents-show-2025-11-06/">⁠</a><a href="https://www.cbsnews.com/news/china-myanmar-thailand-criminal-gangs-fraud-scam-centers-death-sentences/">China sentences 5 to death for building, running criminal gang fraud centers in Myanmar's lawless borderlands</a>
</li>
  <li><a href="https://www.nytimes.com/2025/11/13/world/asia/scam-center-she-zhijiang-extradited-china.html">Man Accused of Running Southeast Asia Scam Compound Is Extradited to China</a></li>
  <li><a href="https://www.anthropic.com/news/disrupting-AI-espionage">Disrupting the first reported AI-orchestrated cyber espionage campaign</a></li>
  <li><a href="https://arstechnica.com/security/2025/11/researchers-question-anthropic-claim-that-ai-assisted-attack-was-90-autonomous/">Researchers question Anthropic claim that AI-assisted attack was 90% autonomous</a></li>
  <li><a href="https://www.bleepingcomputer.com/news/security/lost-iphone-dont-fall-for-phishing-texts-saying-it-was-found/">Lost iPhone? Don’t fall for phishing texts saying it was found</a></li>
</ul>
<p><a href="https://therecord.media/fin6-recruitment-scam-malware-campaign">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a>⁠⁠⁠Have a Catch of the Day you'd like to share? Email it to us at <a href="https://therecord.media/fin6-recruitment-scam-malware-campaign">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a><a href="mailto:hackinghumans@n2k.com">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠hackinghumans@n2k.com⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a>.</p>]]>
      </content:encoded>
      <itunes:duration>3359</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[4b717fe8-cdd5-11ef-8599-6b19d258cf8a]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW6068782450.mp3?updated=1763572692" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Trusted Platform Module (TPM) (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/109/notes</link>
      <description>Please enjoy this encore of Word Notes. 

A browser configuration control that prevents accessing resources within a private network.

CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/trusted-platform-module⁠

Audio reference link: “⁠TPM (Trusted Platform Module) - Computerphile⁠,” Computerphile, 23 July 2021</description>
      <pubDate>Tue, 18 Nov 2025 08:00:00 -0000</pubDate>
      <itunes:title>Trusted Platform Module (TPM) (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>109</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/04ebb08c-c3e5-11f0-98f1-7323e66cca69/image/441b0ca2db080b93b935568d381ce462.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle/>
      <itunes:summary>Please enjoy this encore of Word Notes. 

A browser configuration control that prevents accessing resources within a private network.

CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/trusted-platform-module⁠

Audio reference link: “⁠TPM (Trusted Platform Module) - Computerphile⁠,” Computerphile, 23 July 2021</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore of Word Notes. </p>
<p>A browser configuration control that prevents accessing resources within a private network.</p>
<p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/trusted-platform-module">⁠https://thecyberwire.com/glossary/trusted-platform-module⁠</a></p>
<p>Audio reference link: “<a href="https://youtu.be/RW2zHvVO09g">⁠TPM (Trusted Platform Module) - Computerphile⁠</a>,” Computerphile, 23 July 2021</p>]]>
      </content:encoded>
      <itunes:duration>398</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[04ebb08c-c3e5-11f0-98f1-7323e66cca69]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW7932278124.mp3?updated=1736193887" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Tap, pay…and prey.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/363/notes</link>
      <description>This week, our hosts ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Dave Bittner⁠⁠⁠⁠⁠⁠⁠, ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Joe Carrigan⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠, and ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Maria Varmazis⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ (also host of the ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠T-Minus⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ Space Daily show) are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines.  We start with some big chicken news from Joe! Dave’s story is on Meta’s internal documents revealing it projected up to 10% of its 2024 revenue, worth billions, would come from fraudulent or banned ads across its platforms. Maria has the story on how Howler Cell at Cyderes uncovered a systemic “Bring Your Own Updates” risk in Windows updaters, where attackers can hijack trusted, signed update clients like Advanced Installer to deliver malicious code that evades detection and could lead to large-scale supply-chain attacks. Joe has the story on a new scam called “ghost tapping,” where fraudsters use near-field communication devices to secretly charge tap-to-pay cards and mobile wallets in crowded places. Victims often don’t notice until small, unauthorized withdrawals add up, prompting the BBB to warn consumers to use RFID-blocking wallets, verify charges before tapping, and monitor accounts for suspicious activity. Our catch of the day is on an application to the Council of the Ecliptic. 

Resources and links to stories:


  
⁠Meta is earning a fortune on a deluge of fraudulent ads, documents show


  Ghost-tapping scam targets tap-to-pay users


⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Have a Catch of the Day you'd like to share? Email it to us at ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠hackinghumans@n2k.com⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠.</description>
      <pubDate>Thu, 13 Nov 2025 06:00:00 -0000</pubDate>
      <itunes:title>Tap, pay…and prey.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>363</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>This week, our hosts ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Dave Bittner⁠⁠⁠⁠⁠⁠⁠, ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Joe Carrigan⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠, and ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Maria Varmazis⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ (also host of the ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠T-Minus⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ Space Daily show) are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines.  We start with some big chicken news from Joe! Dave’s story is on Meta’s internal documents revealing it projected up to 10% of its 2024 revenue, worth billions, would come from fraudulent or banned ads across its platforms. Maria has the story on how Howler Cell at Cyderes uncovered a systemic “Bring Your Own Updates” risk in Windows updaters, where attackers can hijack trusted, signed update clients like Advanced Installer to deliver malicious code that evades detection and could lead to large-scale supply-chain attacks. Joe has the story on a new scam called “ghost tapping,” where fraudsters use near-field communication devices to secretly charge tap-to-pay cards and mobile wallets in crowded places. Victims often don’t notice until small, unauthorized withdrawals add up, prompting the BBB to warn consumers to use RFID-blocking wallets, verify charges before tapping, and monitor accounts for suspicious activity. Our catch of the day is on an application to the Council of the Ecliptic. 

Resources and links to stories:


  
⁠Meta is earning a fortune on a deluge of fraudulent ads, documents show


  Ghost-tapping scam targets tap-to-pay users


⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Have a Catch of the Day you'd like to share? Email it to us at ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠hackinghumans@n2k.com⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This week, our hosts <a href="https://www.linkedin.com/in/dave-bittner-27231a4/">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Dave Bittner⁠⁠⁠⁠⁠⁠⁠</a>, <a href="https://www.linkedin.com/in/joecarrigan/">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Joe Carrigan⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a>, and <a href="https://www.linkedin.com/in/varmazis/">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Maria Varmazis⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a> (also host of the <a href="https://space.n2k.com/podcasts/t-minus?__hstc=223811332.a636bba53840b4700c929fe67723a129.1721054632698.1747145009569.1747159962459.413&amp;__hssc=223811332.2.1747159962459&amp;__hsfp=3690629108">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠T-Minus⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a> Space Daily show) are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines.  We start with some big chicken news from Joe! Dave’s story is on Meta’s internal documents revealing it projected up to 10% of its 2024 revenue, worth billions, would come from fraudulent or banned ads across its platforms. Maria has the story on how Howler Cell at Cyderes uncovered a systemic “Bring Your Own Updates” risk in Windows updaters, where attackers can hijack trusted, signed update clients like Advanced Installer to deliver malicious code that evades detection and could lead to large-scale supply-chain attacks. Joe has the story on a new scam called “ghost tapping,” where fraudsters use near-field communication devices to secretly charge tap-to-pay cards and mobile wallets in crowded places. Victims often don’t notice until small, unauthorized withdrawals add up, prompting the BBB to warn consumers to use RFID-blocking wallets, verify charges before tapping, and monitor accounts for suspicious activity. Our catch of the day is on an application to the Council of the Ecliptic. </p>
<p><strong>Resources and links to stories:</strong></p>
<ul>
  <li>
<a href="https://www.linkedin.com/feed/update/urn:li:activity:7389277517540478976/">⁠</a><a href="https://www.reuters.com/investigations/meta-is-earning-fortune-deluge-fraudulent-ads-documents-show-2025-11-06/">Meta is earning a fortune on a deluge of fraudulent ads, documents show</a>
</li>
  <li><a href="https://www.foxnews.com/tech/ghost-tapping-scam-targets-tap-to-pay-users">Ghost-tapping scam targets tap-to-pay users</a></li>
</ul>
<p><a href="https://therecord.media/fin6-recruitment-scam-malware-campaign">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a>⁠⁠⁠Have a Catch of the Day you'd like to share? Email it to us at <a href="https://therecord.media/fin6-recruitment-scam-malware-campaign">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a><a href="mailto:hackinghumans@n2k.com">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠hackinghumans@n2k.com⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a>.</p>]]>
      </content:encoded>
      <itunes:duration>3169</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[4b442b1a-cdd5-11ef-8599-3f15cdde1ecf]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW8138425202.mp3?updated=1762964809" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Private Network Access (PNA) (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/108/notes</link>
      <description>Please enjoy this encore of Word Notes. 

A browser configuration control that prevents accessing resources within a private network.

CyberWire Glossary ⁠link⁠.

Audio reference link: “⁠Chrome Limits Access to Private Networks⁠,” by Daniel Lowrie, ITProTV, YouTube, 19 January 2022.</description>
      <pubDate>Tue, 11 Nov 2025 08:00:00 -0000</pubDate>
      <itunes:title>Private Network Access (PNA) (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>108</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/bc70ee96-be6f-11f0-87f4-9f553d42a371/image/441b0ca2db080b93b935568d381ce462.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle/>
      <itunes:summary>Please enjoy this encore of Word Notes. 

A browser configuration control that prevents accessing resources within a private network.

CyberWire Glossary ⁠link⁠.

Audio reference link: “⁠Chrome Limits Access to Private Networks⁠,” by Daniel Lowrie, ITProTV, YouTube, 19 January 2022.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore of Word Notes. </p>
<p>A browser configuration control that prevents accessing resources within a private network.</p>
<p>CyberWire Glossary <a href="https://thecyberwire.com/glossary/private-network-access">⁠link⁠</a>.</p>
<p>Audio reference link: “<a href="https://www.youtube.com/watch?v=GACsiZWyMbs">⁠Chrome Limits Access to Private Networks⁠</a>,” by Daniel Lowrie, ITProTV, YouTube, 19 January 2022.</p>]]>
      </content:encoded>
      <itunes:duration>336</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[bc70ee96-be6f-11f0-87f4-9f553d42a371]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW9905500058.mp3?updated=1736193886" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Seniors in scam crosshairs.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/362/notes</link>
      <description>This week, our hosts ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Dave Bittner⁠⁠⁠⁠⁠⁠, ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Joe Carrigan⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠, and ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Maria Varmazis⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ (also host of the ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠T-Minus⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ Space Daily show) are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. We start with some follow-up, listener Jay shared how Robinhood tackled a $25.4 billion phone scam problem with a simple fix—a bright yellow in-call banner that warns users, “We’re not calling you. If the caller says they’re from Robinhood, they’re not—hang up.” Meanwhile, Myanmar’s military blew up a major online scam center at KK Park, forcing over 1,500 people to flee into Thailand. Listener JJ reminds us it’s “CAC cards,” not just “CAC,” and Shannon reports from Scooter’s Coffee, where customers are now bringing chickens for pup cups—proving some pets really do rule the roost. Maria’s story is on Bitdefender and NETGEAR’s 2025 IoT Security Report, which found smart homes now face triple the attacks of last year—about 29 a day. Dave’s story is on a cloud architect who exposed his AWS keys online, letting attackers hijack his account for crypto-mining and phishing. His takeaway: secure keys, limit privileges, and assume it can happen to you. Joe’s got the story of scammers posing as banks or the FTC, using fake security alerts to trick older adults into draining their savings. The FTC says losses are skyrocketing—so don’t move money or trust surprise calls or pop-ups. Our catch of the day comes from the Scams SubReddit, where a scammer got way more than what they signed up for in a text chain. 

Resources and links to stories:


  Robinhood LinkedIn post.

  Stragglers from Myanmar scam center raided by army cross into Thailand as buildings are blown up

  My AWS Account Got Hacked - Here Is What Happened

  False alarm, real scam: how scammers are stealing older adults’ life savings

  Trying to scam the scammer


⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Have a Catch of the Day you'd like to share? Email it to us at ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠hackinghumans@n2k.com⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠.</description>
      <pubDate>Thu, 06 Nov 2025 06:00:00 -0000</pubDate>
      <itunes:title>Seniors in scam crosshairs.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>362</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>This week, our hosts ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Dave Bittner⁠⁠⁠⁠⁠⁠, ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Joe Carrigan⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠, and ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Maria Varmazis⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ (also host of the ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠T-Minus⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ Space Daily show) are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. We start with some follow-up, listener Jay shared how Robinhood tackled a $25.4 billion phone scam problem with a simple fix—a bright yellow in-call banner that warns users, “We’re not calling you. If the caller says they’re from Robinhood, they’re not—hang up.” Meanwhile, Myanmar’s military blew up a major online scam center at KK Park, forcing over 1,500 people to flee into Thailand. Listener JJ reminds us it’s “CAC cards,” not just “CAC,” and Shannon reports from Scooter’s Coffee, where customers are now bringing chickens for pup cups—proving some pets really do rule the roost. Maria’s story is on Bitdefender and NETGEAR’s 2025 IoT Security Report, which found smart homes now face triple the attacks of last year—about 29 a day. Dave’s story is on a cloud architect who exposed his AWS keys online, letting attackers hijack his account for crypto-mining and phishing. His takeaway: secure keys, limit privileges, and assume it can happen to you. Joe’s got the story of scammers posing as banks or the FTC, using fake security alerts to trick older adults into draining their savings. The FTC says losses are skyrocketing—so don’t move money or trust surprise calls or pop-ups. Our catch of the day comes from the Scams SubReddit, where a scammer got way more than what they signed up for in a text chain. 

Resources and links to stories:


  Robinhood LinkedIn post.

  Stragglers from Myanmar scam center raided by army cross into Thailand as buildings are blown up

  My AWS Account Got Hacked - Here Is What Happened

  False alarm, real scam: how scammers are stealing older adults’ life savings

  Trying to scam the scammer


⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Have a Catch of the Day you'd like to share? Email it to us at ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠hackinghumans@n2k.com⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This week, our hosts <a href="https://www.linkedin.com/in/dave-bittner-27231a4/">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Dave Bittner⁠⁠⁠⁠⁠⁠</a>, <a href="https://www.linkedin.com/in/joecarrigan/">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Joe Carrigan⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a>, and <a href="https://www.linkedin.com/in/varmazis/">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Maria Varmazis⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a> (also host of the <a href="https://space.n2k.com/podcasts/t-minus?__hstc=223811332.a636bba53840b4700c929fe67723a129.1721054632698.1747145009569.1747159962459.413&amp;__hssc=223811332.2.1747159962459&amp;__hsfp=3690629108">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠T-Minus⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a> Space Daily show) are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. We start with some follow-up, listener Jay shared how Robinhood tackled a $25.4 billion phone scam problem with a simple fix—a bright yellow in-call banner that warns users, <em>“We’re not calling you. If the caller says they’re from Robinhood, they’re not—hang up.”</em> Meanwhile, Myanmar’s military blew up a major online scam center at KK Park, forcing over 1,500 people to flee into Thailand. Listener JJ reminds us it’s “CAC cards,” not just “CAC,” and Shannon reports from Scooter’s Coffee, where customers are now bringing chickens for pup cups—proving some pets really do rule the roost. Maria’s story is on Bitdefender and NETGEAR’s 2025 IoT Security Report, which found smart homes now face triple the attacks of last year—about 29 a day. Dave’s story is on a cloud architect who exposed his AWS keys online, letting attackers hijack his account for crypto-mining and phishing. His takeaway: secure keys, limit privileges, and assume it <em>can</em> happen to you. Joe’s got the story of scammers posing as banks or the FTC, using fake security alerts to trick older adults into draining their savings. The FTC says losses are skyrocketing—so don’t move money or trust surprise calls or pop-ups. Our catch of the day comes from the Scams SubReddit, where a scammer got way more than what they signed up for in a text chain. </p>
<p><strong>Resources and links to stories:</strong></p>
<ul>
  <li><a href="https://www.linkedin.com/feed/update/urn:li:activity:7389277517540478976/">Robinhood LinkedIn post.</a></li>
  <li><a href="https://apnews.com/article/myanmar-scam-centers-cybercrime-thailand-border-daa90f481ea4207e7d7a891dda1161c8">Stragglers from Myanmar scam center raided by army cross into Thailand as buildings are blown up</a></li>
  <li><a href="https://zviwex.com/posts/aws-account-hacked">My AWS Account Got Hacked - Here Is What Happened</a></li>
  <li><a href="https://www.ftc.gov/news-events/data-visualizations/data-spotlight/2025/08/false-alarm-real-scam-how-scammers-are-stealing-older-adults-life-savings">False alarm, real scam: how scammers are stealing older adults’ life savings</a></li>
  <li><a href="https://www.reddit.com/r/scambait/comments/1o2aisx/trying_to_scam_the_scammer/">Trying to scam the scammer</a></li>
</ul>
<p><a href="https://therecord.media/fin6-recruitment-scam-malware-campaign">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a>⁠⁠⁠Have a Catch of the Day you'd like to share? Email it to us at <a href="https://therecord.media/fin6-recruitment-scam-malware-campaign">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a><a href="mailto:hackinghumans@n2k.com">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠hackinghumans@n2k.com⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a>.</p>]]>
      </content:encoded>
      <itunes:duration>2989</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[4b166540-cdd5-11ef-8599-bf3e14a84faa]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW2050597574.mp3?updated=1762362858" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Pass the intel, please. [OMITB]</title>
      <link>https://thecyberwire.com/podcasts/only-malware-in-the-building/17/notes</link>
      <description>Welcome in! You’ve entered, Only Malware in the Building. Join us each month to sip tea and solve mysteries about today’s most interesting threats. Your host is ⁠⁠⁠⁠Selena Larson⁠⁠⁠⁠, ⁠⁠⁠⁠Proofpoint⁠⁠⁠⁠ intelligence analyst and host of their podcast ⁠⁠⁠⁠DISCARDED⁠⁠⁠⁠. Inspired by the residents of a building in New York’s exclusive upper west side, Selena is joined by her co-hosts ⁠⁠⁠⁠N2K Networks⁠⁠⁠⁠ ⁠⁠⁠⁠Dave Bittner⁠⁠⁠⁠ and ⁠⁠⁠Keith Mularski⁠⁠⁠, former FBI cybercrime investigator and now Chief Global Ambassador at ⁠⁠⁠Qintel⁠⁠⁠.

Being a security researcher is a bit like being a detective: you gather clues, analyze the evidence, and consult the experts to solve the cyber puzzle. On this episode, we explore what makes information sharing actually work. From public-private partnerships to actionable intelligence, our guests discuss how organizations can prioritize, process, and operationalize shared cyber threat data to stay ahead of emerging risks.

Plus, catch Dave, Selena, and Keith on their road trip adventure in our video on ⁠YouTube⁠ — full of laughs, unexpected detours, and plenty of sleuthing!</description>
      <pubDate>Tue, 04 Nov 2025 08:00:00 -0000</pubDate>
      <itunes:title>Pass the intel, please. [OMITB]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>17</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/c22338d4-b8ee-11f0-af2e-53b024d7a3ba/image/14002263e169460f16ca12e04624eb3a.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle/>
      <itunes:summary>Welcome in! You’ve entered, Only Malware in the Building. Join us each month to sip tea and solve mysteries about today’s most interesting threats. Your host is ⁠⁠⁠⁠Selena Larson⁠⁠⁠⁠, ⁠⁠⁠⁠Proofpoint⁠⁠⁠⁠ intelligence analyst and host of their podcast ⁠⁠⁠⁠DISCARDED⁠⁠⁠⁠. Inspired by the residents of a building in New York’s exclusive upper west side, Selena is joined by her co-hosts ⁠⁠⁠⁠N2K Networks⁠⁠⁠⁠ ⁠⁠⁠⁠Dave Bittner⁠⁠⁠⁠ and ⁠⁠⁠Keith Mularski⁠⁠⁠, former FBI cybercrime investigator and now Chief Global Ambassador at ⁠⁠⁠Qintel⁠⁠⁠.

Being a security researcher is a bit like being a detective: you gather clues, analyze the evidence, and consult the experts to solve the cyber puzzle. On this episode, we explore what makes information sharing actually work. From public-private partnerships to actionable intelligence, our guests discuss how organizations can prioritize, process, and operationalize shared cyber threat data to stay ahead of emerging risks.

Plus, catch Dave, Selena, and Keith on their road trip adventure in our video on ⁠YouTube⁠ — full of laughs, unexpected detours, and plenty of sleuthing!</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Welcome in! You’ve entered, Only Malware in the Building. Join us each month to sip tea and solve mysteries about today’s most interesting threats. Your host is <a href="https://www.linkedin.com/in/selenalarson/">⁠⁠⁠⁠Selena Larson⁠⁠⁠⁠</a>, <a href="https://www.proofpoint.com/">⁠⁠⁠⁠Proofpoint⁠⁠⁠⁠</a> intelligence analyst and host of their podcast <a href="https://www.proofpoint.com/us/podcasts/discarded">⁠⁠⁠⁠DISCARDED⁠⁠⁠⁠</a>. Inspired by the residents of a building in New York’s exclusive upper west side, Selena is joined by her co-hosts <a href="https://www.n2k.com/">⁠⁠⁠⁠N2K Networks⁠⁠⁠⁠</a> <a href="https://www.linkedin.com/in/dave-bittner-27231a4/">⁠⁠⁠⁠Dave Bittner⁠⁠⁠⁠</a> and <a href="https://www.linkedin.com/in/keith-mularski-b737551/">⁠⁠⁠Keith Mularski⁠⁠⁠</a>, former FBI cybercrime investigator and now Chief Global Ambassador at <a href="https://www.linkedin.com/company/qintel/">⁠⁠⁠Qintel⁠⁠⁠</a>.</p>
<p>Being a security researcher is a bit like being a detective: you gather clues, analyze the evidence, and consult the experts to solve the cyber puzzle. On this episode, we explore what makes information sharing actually work. From public-private partnerships to actionable intelligence, our guests discuss how organizations can prioritize, process, and operationalize shared cyber threat data to stay ahead of emerging risks.</p>
<p>Plus, catch Dave, Selena, and Keith on their road trip adventure in our video on ⁠<a href="https://youtu.be/AZImtg04hGk">YouTube</a>⁠ — full of laughs, unexpected detours, and plenty of sleuthing!</p>]]>
      </content:encoded>
      <itunes:duration>2286</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c22338d4-b8ee-11f0-af2e-53b024d7a3ba]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW4463025608.mp3?updated=1762190479" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Web 3.0 (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/107/notes</link>
      <description>Please enjoy this encore of Word Notes. 

The potential next evolution of the worldwide web that decentralizes interaction between users and content away from the big silicon valley social media platforms like Twitter, Facebook, and YouTube, and towards peer-to-peer interaction using blockchain as the underlying technology. 

CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/web-30⁠

Audio reference link: “⁠What Elon Musk Just Said about Metaverse, Web3 and Neuralink⁠,” By Clayton Morris, Crypto News Daily, YouTube. 2 December 2021.</description>
      <pubDate>Tue, 04 Nov 2025 08:00:00 -0000</pubDate>
      <itunes:title>Web 3.0 (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>107</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/380601d8-b8fb-11f0-bf7b-8fbc2fea6026/image/441b0ca2db080b93b935568d381ce462.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle/>
      <itunes:summary>Please enjoy this encore of Word Notes. 

The potential next evolution of the worldwide web that decentralizes interaction between users and content away from the big silicon valley social media platforms like Twitter, Facebook, and YouTube, and towards peer-to-peer interaction using blockchain as the underlying technology. 

CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/web-30⁠

Audio reference link: “⁠What Elon Musk Just Said about Metaverse, Web3 and Neuralink⁠,” By Clayton Morris, Crypto News Daily, YouTube. 2 December 2021.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore of Word Notes. </p>
<p>The potential next evolution of the worldwide web that decentralizes interaction between users and content away from the big silicon valley social media platforms like Twitter, Facebook, and YouTube, and towards peer-to-peer interaction using blockchain as the underlying technology. </p>
<p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/web-30">⁠https://thecyberwire.com/glossary/web-30⁠</a></p>
<p>Audio reference link: “<a href="https://www.youtube.com/watch?v=ESjUgb_ZakA">⁠What Elon Musk Just Said about Metaverse, Web3 and Neuralink⁠</a>,” By Clayton Morris, Crypto News Daily, YouTube. 2 December 2021.</p>]]>
      </content:encoded>
      <itunes:duration>420</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[380601d8-b8fb-11f0-bf7b-8fbc2fea6026]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW2802258503.mp3?updated=1736193886" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The Malware Mash!</title>
      <description>Happy Halloween from the team at N2K Networks! 

We hope you share in our Halloween tradition of listening to the Malware Mash. You can check out our video ⁠here⁠.  



Lyrics

I was coding in the lab late one night

when my eyes beheld an eerie sight 

for my malware threat score began to rise 

and suddenly to my surprise...



It did the Mash 

It did the Malware Mash 

The Malware Mash 

It was a botnet smash 

It did the Mash 

It caught on 'cause of Flash 

The Malware Mash 

It did the Malware Mash



From the Stuxnet worm squirming toward the near east 

to the dark web souqs where the script kiddies feast 

the APTs left their humble abodes 

to get installed from rootkit payloads. 



They did the Mash 

They did the Malware Mash 

The Malware Mash 

It was an adware smash 

They did the Mash 

It caught on 'cause of Flash 

The Malware Mash 

They did the Malware Mash



The botnets were having fun 

The DDoS had just begun 

The viruses hit the darknet, 

with ransomware yet to come. 

The keys were logging, phishing emails abound, 

Snowden on chains, backed by his Russian hounds. 

The Shadow Brokers were about to arrive 

with their vocal group, "The NotPetya Five."



They did the Mash 

They played the Malware Mash

The Malware Mash 

It was a botnet smash 

They did the Mash 

It caught on 'cause of Flash 

The Malware Mash 

They played the Malware Mash



Somewhere in Moscow Vlad's voice did ring 

Seems he was troubled by just one thing. 

He opened a shell then shook his fist 

and said, "Whatever happened to my Turla Trojan twist." 



It's now the Mash 

It's now the Malware Mash 

The Malware Mash 

And it's a botnet smash 

It's now the Mash 

It caught on 'cause of Flash 

The Malware Mash 

It's now the Malware Mash



Now everything's cool, Vlad's a part of the band 

And the Malware Mash is the hit of the land. 

For you, defenders, this mash was meant to 

when you get to my door, tell them Creeper sent you.



Then you can Mash 

Then you can Malware Mash 

The Malware Mash 

And be a botnet smash 

It is the Mash 

Don't you dare download Flash 

The Malware Mash 

Just do the Malware Mash</description>
      <pubDate>Fri, 31 Oct 2025 07:00:00 -0000</pubDate>
      <itunes:title>The Malware Mash!</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/38f2c69e-b5c7-11f0-a0f3-6f2052c859e6/image/a7bd2dc42eefee62cd5572fe3881cc20.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Happy Halloween from the team at N2K Networks! 

We hope you share in our Halloween tradition of listening to the Malware Mash. You can check out our video ⁠here⁠.  



Lyrics

I was coding in the lab late one night

when my eyes beheld an eerie sight 

for my malware threat score began to rise 

and suddenly to my surprise...



It did the Mash 

It did the Malware Mash 

The Malware Mash 

It was a botnet smash 

It did the Mash 

It caught on 'cause of Flash 

The Malware Mash 

It did the Malware Mash



From the Stuxnet worm squirming toward the near east 

to the dark web souqs where the script kiddies feast 

the APTs left their humble abodes 

to get installed from rootkit payloads. 



They did the Mash 

They did the Malware Mash 

The Malware Mash 

It was an adware smash 

They did the Mash 

It caught on 'cause of Flash 

The Malware Mash 

They did the Malware Mash



The botnets were having fun 

The DDoS had just begun 

The viruses hit the darknet, 

with ransomware yet to come. 

The keys were logging, phishing emails abound, 

Snowden on chains, backed by his Russian hounds. 

The Shadow Brokers were about to arrive 

with their vocal group, "The NotPetya Five."



They did the Mash 

They played the Malware Mash

The Malware Mash 

It was a botnet smash 

They did the Mash 

It caught on 'cause of Flash 

The Malware Mash 

They played the Malware Mash



Somewhere in Moscow Vlad's voice did ring 

Seems he was troubled by just one thing. 

He opened a shell then shook his fist 

and said, "Whatever happened to my Turla Trojan twist." 



It's now the Mash 

It's now the Malware Mash 

The Malware Mash 

And it's a botnet smash 

It's now the Mash 

It caught on 'cause of Flash 

The Malware Mash 

It's now the Malware Mash



Now everything's cool, Vlad's a part of the band 

And the Malware Mash is the hit of the land. 

For you, defenders, this mash was meant to 

when you get to my door, tell them Creeper sent you.



Then you can Mash 

Then you can Malware Mash 

The Malware Mash 

And be a botnet smash 

It is the Mash 

Don't you dare download Flash 

The Malware Mash 

Just do the Malware Mash</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Happy Halloween from the team at N2K Networks! </p>
<p>We hope you share in our Halloween tradition of listening to the Malware Mash. You can check out our video <a href="https://youtu.be/QBpAAhbPOk0">⁠here⁠</a>.  </p>
<p><br></p>
<p><strong>Lyrics</strong></p>
<p>I was coding in the lab late one night</p>
<p>when my eyes beheld an eerie sight </p>
<p>for my malware threat score began to rise </p>
<p>and suddenly to my surprise...</p>
<p><br></p>
<p>It did the Mash </p>
<p>It did the Malware Mash </p>
<p>The Malware Mash </p>
<p>It was a botnet smash </p>
<p>It did the Mash </p>
<p>It caught on 'cause of Flash </p>
<p>The Malware Mash </p>
<p>It did the Malware Mash</p>
<p><br></p>
<p>From the Stuxnet worm squirming toward the near east </p>
<p>to the dark web souqs where the script kiddies feast </p>
<p>the APTs left their humble abodes </p>
<p>to get installed from rootkit payloads. </p>
<p><br></p>
<p>They did the Mash </p>
<p>They did the Malware Mash </p>
<p>The Malware Mash </p>
<p>It was an adware smash </p>
<p>They did the Mash </p>
<p>It caught on 'cause of Flash </p>
<p>The Malware Mash </p>
<p>They did the Malware Mash</p>
<p><br></p>
<p>The botnets were having fun </p>
<p>The DDoS had just begun </p>
<p>The viruses hit the darknet, </p>
<p>with ransomware yet to come. </p>
<p>The keys were logging, phishing emails abound, </p>
<p>Snowden on chains, backed by his Russian hounds. </p>
<p>The Shadow Brokers were about to arrive </p>
<p>with their vocal group, "The NotPetya Five."</p>
<p><br></p>
<p>They did the Mash </p>
<p>They played the Malware Mash</p>
<p>The Malware Mash </p>
<p>It was a botnet smash </p>
<p>They did the Mash </p>
<p>It caught on 'cause of Flash </p>
<p>The Malware Mash </p>
<p>They played the Malware Mash</p>
<p><br></p>
<p>Somewhere in Moscow Vlad's voice did ring </p>
<p>Seems he was troubled by just one thing. </p>
<p>He opened a shell then shook his fist </p>
<p>and said, "Whatever happened to my Turla Trojan twist." </p>
<p><br></p>
<p>It's now the Mash </p>
<p>It's now the Malware Mash </p>
<p>The Malware Mash </p>
<p>And it's a botnet smash </p>
<p>It's now the Mash </p>
<p>It caught on 'cause of Flash </p>
<p>The Malware Mash </p>
<p>It's now the Malware Mash</p>
<p><br></p>
<p>Now everything's cool, Vlad's a part of the band </p>
<p>And the Malware Mash is the hit of the land. </p>
<p>For you, defenders, this mash was meant to </p>
<p>when you get to my door, tell them Creeper sent you.</p>
<p><br></p>
<p>Then you can Mash </p>
<p>Then you can Malware Mash </p>
<p>The Malware Mash </p>
<p>And be a botnet smash </p>
<p>It is the Mash </p>
<p>Don't you dare download Flash </p>
<p>The Malware Mash </p>
<p>Just do the Malware Mash</p>]]>
      </content:encoded>
      <itunes:duration>186</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[38f2c69e-b5c7-11f0-a0f3-6f2052c859e6]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW6505241164.mp3?updated=1761853049" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Beware the boo-gus giveaway.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/361/notes</link>
      <description>This week, our hosts ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Dave Bittner⁠⁠⁠⁠⁠, ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Joe Carrigan⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠, and ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Maria Varmazis⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ (also host of the ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠T-Minus⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ Space Daily show) are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. In our follow up, our hosts respond to a listener who wrote in with an insightful question about the role of wealth in scam susceptibility. Joe's story covers how a fake AI recruiter lures developers with a GitHub “technical assessment” that, when run, unleashes a five-stage malware chain to steal credentials, wallets, and install persistent backdoors. Maria has the story on a Halloween-themed phishing scam that lured victims with a fake Home Depot giveaway, using obfuscated code, stolen email threads, and tracking pixels to trick users into handing over personal and payment information. Dave’s story is on a convincing phishing email claiming Dashlane was hacked, showing how fear and urgency—even in obvious scams—can make anyone second-guess before thinking twice. Our catch of the day is from the scams sub-Reddit thread, and is how one user received a message from their "aunt" who wanted to be nice and grab the user a present. 

Resources and links to stories:


  
⁠How a fake AI recruiter delivers five staged malware disguised as a dream job


  Home Depot Halloween phish gives users a fright, not a freebie

  Why the Obviously Fake Dashlane Hack Phishing Email Still Made Me Jump

  


⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Have a Catch of the Day you'd like to share? Email it to us at ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠hackinghumans@n2k.com⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠.</description>
      <pubDate>Thu, 30 Oct 2025 05:00:00 -0000</pubDate>
      <itunes:title>Beware the boo-gus giveaway.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>361</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>This week, our hosts ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Dave Bittner⁠⁠⁠⁠⁠, ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Joe Carrigan⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠, and ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Maria Varmazis⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ (also host of the ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠T-Minus⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ Space Daily show) are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. In our follow up, our hosts respond to a listener who wrote in with an insightful question about the role of wealth in scam susceptibility. Joe's story covers how a fake AI recruiter lures developers with a GitHub “technical assessment” that, when run, unleashes a five-stage malware chain to steal credentials, wallets, and install persistent backdoors. Maria has the story on a Halloween-themed phishing scam that lured victims with a fake Home Depot giveaway, using obfuscated code, stolen email threads, and tracking pixels to trick users into handing over personal and payment information. Dave’s story is on a convincing phishing email claiming Dashlane was hacked, showing how fear and urgency—even in obvious scams—can make anyone second-guess before thinking twice. Our catch of the day is from the scams sub-Reddit thread, and is how one user received a message from their "aunt" who wanted to be nice and grab the user a present. 

Resources and links to stories:


  
⁠How a fake AI recruiter delivers five staged malware disguised as a dream job


  Home Depot Halloween phish gives users a fright, not a freebie

  Why the Obviously Fake Dashlane Hack Phishing Email Still Made Me Jump

  


⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Have a Catch of the Day you'd like to share? Email it to us at ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠hackinghumans@n2k.com⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This week, our hosts <a href="https://www.linkedin.com/in/dave-bittner-27231a4/">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Dave Bittner⁠⁠⁠⁠⁠</a>, <a href="https://www.linkedin.com/in/joecarrigan/">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Joe Carrigan⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a>, and <a href="https://www.linkedin.com/in/varmazis/">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Maria Varmazis⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a> (also host of the <a href="https://space.n2k.com/podcasts/t-minus?__hstc=223811332.a636bba53840b4700c929fe67723a129.1721054632698.1747145009569.1747159962459.413&amp;__hssc=223811332.2.1747159962459&amp;__hsfp=3690629108">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠T-Minus⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a> Space Daily show) are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. In our follow up, our hosts respond to a listener who wrote in with an insightful question about the role of wealth in scam susceptibility. Joe's story covers how a fake AI recruiter lures developers with a GitHub “technical assessment” that, when run, unleashes a five-stage malware chain to steal credentials, wallets, and install persistent backdoors. Maria has the story on a Halloween-themed phishing scam that lured victims with a fake Home Depot giveaway, using obfuscated code, stolen email threads, and tracking pixels to trick users into handing over personal and payment information. Dave’s story is on a convincing phishing email claiming Dashlane was hacked, showing how fear and urgency—even in obvious scams—can make anyone second-guess before thinking twice. Our catch of the day is from the scams sub-Reddit thread, and is how one user received a message from their "aunt" who wanted to be nice and grab the user a present. </p>
<p><strong>Resources and links to stories:</strong></p>
<ul>
  <li>
<a href="https://www.nytimes.com/2025/10/15/world/asia/cambodia-south-korea-scams.html">⁠</a><a href="https://medium.com/deriv-tech/how-a-fake-ai-recruiter-delivers-five-staged-malware-disguised-as-a-dream-job-64cc68fec263">How a fake AI recruiter delivers five staged malware disguised as a dream job</a>
</li>
  <li><a href="https://www.malwarebytes.com/blog/news/2025/10/home-depot-halloween-phish-gives-users-a-fright-not-a-freebie">Home Depot Halloween phish gives users a fright, not a freebie</a></li>
  <li><a href="https://www.techlicious.com/blog/why-the-obviously-fake-dashlane-hack-phishing-email-still-made-me-panic/">Why the Obviously Fake Dashlane Hack Phishing Email Still Made Me Jump</a></li>
  <li><br></li>
</ul>
<p><a href="https://therecord.media/fin6-recruitment-scam-malware-campaign">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a>⁠⁠⁠Have a Catch of the Day you'd like to share? Email it to us at <a href="https://therecord.media/fin6-recruitment-scam-malware-campaign">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a><a href="mailto:hackinghumans@n2k.com">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠hackinghumans@n2k.com⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a>.</p>]]>
      </content:encoded>
      <itunes:duration>2408</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[4ae74882-cdd5-11ef-8599-f74ca1fc3787]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW4309265056.mp3?updated=1761670581" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Identity access management (IAM) (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/106/notes</link>
      <description>Please enjoy this encore of Word Notes. 

A set of solutions for ensuring that the right users can only access the appropriate resources.

CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/identity-and-access-management⁠

Audio reference link: “⁠The Wrath of Khan (1982) ‘Kirk’s Response⁠,’” by Russell, YouTube, 16 May 2017.</description>
      <pubDate>Tue, 28 Oct 2025 07:00:00 -0000</pubDate>
      <itunes:title>Identity access management (IAM) (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>106</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/2c81a004-b376-11f0-9be4-13508f9476a7/image/441b0ca2db080b93b935568d381ce462.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle/>
      <itunes:summary>Please enjoy this encore of Word Notes. 

A set of solutions for ensuring that the right users can only access the appropriate resources.

CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/identity-and-access-management⁠

Audio reference link: “⁠The Wrath of Khan (1982) ‘Kirk’s Response⁠,’” by Russell, YouTube, 16 May 2017.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore of Word Notes. </p>
<p>A set of solutions for ensuring that the right users can only access the appropriate resources.</p>
<p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/identity-and-access-management">⁠https://thecyberwire.com/glossary/identity-and-access-management⁠</a></p>
<p>Audio reference link: “<a href="https://www.youtube.com/watch?v=gl_y5wTeJtk">⁠The Wrath of Khan (1982) ‘Kirk’s Response⁠</a>,’” by Russell, YouTube, 16 May 2017.</p>]]>
      </content:encoded>
      <itunes:duration>715</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[2c81a004-b376-11f0-9be4-13508f9476a7]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW1290116723.mp3?updated=1736193886" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Liar, liar, AI on fire.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/360/notes</link>
      <description>This week, while ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Dave Bittner⁠⁠⁠⁠ is on vacation, hosts ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Joe Carrigan⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠, and ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Maria Varmazis⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ (also host of the ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠T-Minus⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ Space Daily show) are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines.  Users are reporting a potential new Signal scam involving fake in-app messages posing as official support, though Signal confirms it never contacts users first and only communicates via Signal email addresses. Joe’s story is on South Korea targeting Cambodia’s scam industry after reports of kidnappings, torture, and a death, as officials crack down on criminal groups luring citizens into forced online fraud operations across Southeast Asia. Maria has the story on how AI-driven scams like deepfakes and virtual kidnappings are increasingly targeting Gen Z, using fake voices and videos to power extortion schemes that exploit their mobile-first, always-online lives. Listener DarkProphet6 shares a clever phishing attempt disguised as a fake Cloudflare “I’m not a robot” check, which tried to trick users into pasting malicious code into their terminal — a move that could have created a remote shell for attackers.

Resources and links to stories:


  South Korea Targets Cambodia’s Scam Industry After Kidnappings, Torture and a Death

  Feds seize $15 billion in bitcoin after busting alleged global crypto scam

  China sentences 11 members of mafia family to death

  AI-driven scams are preying on Gen Z’s digital lives​


⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Have a Catch of the Day you'd like to share? Email it to us at ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠hackinghumans@n2k.com⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠.</description>
      <pubDate>Thu, 23 Oct 2025 05:00:00 -0000</pubDate>
      <itunes:title>Liar, liar, AI on fire.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>360</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>This week, while ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Dave Bittner⁠⁠⁠⁠ is on vacation, hosts ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Joe Carrigan⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠, and ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Maria Varmazis⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ (also host of the ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠T-Minus⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ Space Daily show) are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines.  Users are reporting a potential new Signal scam involving fake in-app messages posing as official support, though Signal confirms it never contacts users first and only communicates via Signal email addresses. Joe’s story is on South Korea targeting Cambodia’s scam industry after reports of kidnappings, torture, and a death, as officials crack down on criminal groups luring citizens into forced online fraud operations across Southeast Asia. Maria has the story on how AI-driven scams like deepfakes and virtual kidnappings are increasingly targeting Gen Z, using fake voices and videos to power extortion schemes that exploit their mobile-first, always-online lives. Listener DarkProphet6 shares a clever phishing attempt disguised as a fake Cloudflare “I’m not a robot” check, which tried to trick users into pasting malicious code into their terminal — a move that could have created a remote shell for attackers.

Resources and links to stories:


  South Korea Targets Cambodia’s Scam Industry After Kidnappings, Torture and a Death

  Feds seize $15 billion in bitcoin after busting alleged global crypto scam

  China sentences 11 members of mafia family to death

  AI-driven scams are preying on Gen Z’s digital lives​


⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Have a Catch of the Day you'd like to share? Email it to us at ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠hackinghumans@n2k.com⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This week, while <a href="https://www.linkedin.com/in/dave-bittner-27231a4/">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Dave Bittner⁠⁠⁠⁠</a> is on vacation, hosts <a href="https://www.linkedin.com/in/joecarrigan/">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Joe Carrigan⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a>, and <a href="https://www.linkedin.com/in/varmazis/">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Maria Varmazis⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a> (also host of the <a href="https://space.n2k.com/podcasts/t-minus?__hstc=223811332.a636bba53840b4700c929fe67723a129.1721054632698.1747145009569.1747159962459.413&amp;__hssc=223811332.2.1747159962459&amp;__hsfp=3690629108">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠T-Minus⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a> Space Daily show) are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines.  Users are reporting a potential new Signal scam involving fake in-app messages posing as official support, though Signal confirms it never contacts users first and only communicates via Signal email addresses. Joe’s story is on South Korea targeting Cambodia’s scam industry after reports of kidnappings, torture, and a death, as officials crack down on criminal groups luring citizens into forced online fraud operations across Southeast Asia. Maria has the story on how AI-driven scams like deepfakes and virtual kidnappings are increasingly targeting Gen Z, using fake voices and videos to power extortion schemes that exploit their mobile-first, always-online lives. Listener DarkProphet6 shares a clever phishing attempt disguised as a fake Cloudflare “I’m not a robot” check, which tried to trick users into pasting malicious code into their terminal — a move that could have created a remote shell for attackers.</p>
<p><strong>Resources and links to stories:</strong></p>
<ul>
  <li><a href="https://www.nytimes.com/2025/10/15/world/asia/cambodia-south-korea-scams.html">South Korea Targets Cambodia’s Scam Industry After Kidnappings, Torture and a Death</a></li>
  <li><a href="https://www.cbsnews.com/news/bitcoin-seizure-chen-zhi-pam-bondi-cambodia/">Feds seize $15 billion in bitcoin after busting alleged global crypto scam</a></li>
  <li><a href="https://www.bbc.com/news/articles/c78nrx309kzo">China sentences 11 members of mafia family to death</a></li>
  <li><a href="https://www.malwarebytes.com/blog/news/2025/10/ai-driven-scams-are-preying-on-gen-zs-digital-lives">AI-driven scams are preying on Gen Z’s digital lives​</a></li>
</ul>
<p><a href="https://therecord.media/fin6-recruitment-scam-malware-campaign">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a>⁠⁠⁠Have a Catch of the Day you'd like to share? Email it to us at <a href="https://therecord.media/fin6-recruitment-scam-malware-campaign">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a><a href="mailto:hackinghumans@n2k.com">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠hackinghumans@n2k.com⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a>.</p>]]>
      </content:encoded>
      <itunes:duration>2716</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[4ab7d570-cdd5-11ef-8599-b7fbfde3998b]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW9130779265.mp3?updated=1761150371" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Policy Orchestration (noun)  [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/105/notes</link>
      <description>Please enjoy this encore of Word Notes. 

The deployment of rules to the security stack across all data islands, cloud, SaaS applications, data centers, and mobile devices designed to manifest an organization's cybersecurity first principle strategies of zero trust, intrusion kill chain prevention, resilience, and risk forecasting. 

CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/policy-orchestration⁠

Audio reference link: “⁠The Value of Using Security Policy Orchestration and Automation⁠,” by David Monahan, uploaded by EMAResearch, 3 April, 2018</description>
      <pubDate>Tue, 21 Oct 2025 07:00:00 -0000</pubDate>
      <itunes:title>Policy Orchestration (noun)  [Word Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>105</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/c68265ca-adc8-11f0-b68d-dfcd3abb910e/image/441b0ca2db080b93b935568d381ce462.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle/>
      <itunes:summary>Please enjoy this encore of Word Notes. 

The deployment of rules to the security stack across all data islands, cloud, SaaS applications, data centers, and mobile devices designed to manifest an organization's cybersecurity first principle strategies of zero trust, intrusion kill chain prevention, resilience, and risk forecasting. 

CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/policy-orchestration⁠

Audio reference link: “⁠The Value of Using Security Policy Orchestration and Automation⁠,” by David Monahan, uploaded by EMAResearch, 3 April, 2018</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore of Word Notes. </p>
<p>The deployment of rules to the security stack across all data islands, cloud, SaaS applications, data centers, and mobile devices designed to manifest an organization's cybersecurity first principle strategies of zero trust, intrusion kill chain prevention, resilience, and risk forecasting. </p>
<p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/policy-orchestration">⁠https://thecyberwire.com/glossary/policy-orchestration⁠</a></p>
<p>Audio reference link: “<a href="https://www.youtube.com/watch?v=mXJggqI0-uY">⁠The Value of Using Security Policy Orchestration and Automation⁠</a>,” by David Monahan, uploaded by EMAResearch, 3 April, 2018</p>]]>
      </content:encoded>
      <itunes:duration>383</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c68265ca-adc8-11f0-b68d-dfcd3abb910e]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW8555762529.mp3?updated=1736193885" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Scams that steal more than money.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/359/notes</link>
      <description>This week, our hosts ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Dave Bittner⁠⁠⁠ , ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Joe Carrigan⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠, and ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Maria Varmazis⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ (also host of the ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠T-Minus⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ Space Daily show) are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. Dave's story is on how older aspiring models like Judy were scammed into paying hundreds for fake photoshoots, and how to avoid falling for similar tricks. Joe’s got the story of how Bitcoin ATMs are being exploited by scammers, costing Americans millions and targeting mostly older victims. Maria's got the story of a rapidly spreading WhatsApp “Vote for My Child” scam across Europe that hijacks accounts and extorts money through emotional trickery. Our catch of the day comes from Reddit, where a user is messaged by the one and only Barack Obama. 

Resources and links to stories:


  I was fooled into paying £500 to be a model. Here's how to avoid my mistake

  Bitcoin ATMs increasingly used by scammers to target victims, critics say

  WhatsApp ‘Vote for My Child’ Scams Are Rapidly Spreading Across Europe, Bitdefender Lab Warns


⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Have a Catch of the Day you'd like to share? Email it to us at ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠hackinghumans@n2k.com⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠.</description>
      <pubDate>Thu, 16 Oct 2025 05:00:00 -0000</pubDate>
      <itunes:title>Scams that steal more than money.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>359</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>This week, our hosts ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Dave Bittner⁠⁠⁠ , ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Joe Carrigan⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠, and ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Maria Varmazis⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ (also host of the ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠T-Minus⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ Space Daily show) are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. Dave's story is on how older aspiring models like Judy were scammed into paying hundreds for fake photoshoots, and how to avoid falling for similar tricks. Joe’s got the story of how Bitcoin ATMs are being exploited by scammers, costing Americans millions and targeting mostly older victims. Maria's got the story of a rapidly spreading WhatsApp “Vote for My Child” scam across Europe that hijacks accounts and extorts money through emotional trickery. Our catch of the day comes from Reddit, where a user is messaged by the one and only Barack Obama. 

Resources and links to stories:


  I was fooled into paying £500 to be a model. Here's how to avoid my mistake

  Bitcoin ATMs increasingly used by scammers to target victims, critics say

  WhatsApp ‘Vote for My Child’ Scams Are Rapidly Spreading Across Europe, Bitdefender Lab Warns


⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Have a Catch of the Day you'd like to share? Email it to us at ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠hackinghumans@n2k.com⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This week, our hosts <a href="https://www.linkedin.com/in/dave-bittner-27231a4/">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Dave Bittner⁠⁠⁠</a> , <a href="https://www.linkedin.com/in/joecarrigan/">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Joe Carrigan⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a>, and <a href="https://www.linkedin.com/in/varmazis/">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Maria Varmazis⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a> (also host of the <a href="https://space.n2k.com/podcasts/t-minus?__hstc=223811332.a636bba53840b4700c929fe67723a129.1721054632698.1747145009569.1747159962459.413&amp;__hssc=223811332.2.1747159962459&amp;__hsfp=3690629108">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠T-Minus⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a> Space Daily show) are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. Dave's story is on how older aspiring models like Judy were scammed into paying hundreds for fake photoshoots, and how to avoid falling for similar tricks. Joe’s got the story of how Bitcoin ATMs are being exploited by scammers, costing Americans millions and targeting mostly older victims. Maria's got the story of a rapidly spreading WhatsApp “Vote for My Child” scam across Europe that hijacks accounts and extorts money through emotional trickery. Our catch of the day comes from Reddit, where a user is messaged by the one and only Barack Obama. </p>
<p><strong>Resources and links to stories:</strong></p>
<ul>
  <li><a href="https://www.bbc.com/news/articles/ckg3w2n8nx7o">I was fooled into paying £500 to be a model. Here's how to avoid my mistake</a></li>
  <li><a href="https://abcnews.go.com/US/bitcoin-atms-increasingly-scammers-target-victims-critics/story?id=126305810">Bitcoin ATMs increasingly used by scammers to target victims, critics say</a></li>
  <li><a href="https://www.bitdefender.com/en-us/blog/hotforsecurity/whatsapp-enabled-vote-for-my-child-scams-are-rapidly-spreading-across-europe-bitdefender-lab-warns">WhatsApp ‘Vote for My Child’ Scams Are Rapidly Spreading Across Europe, Bitdefender Lab Warns</a></li>
</ul>
<p><a href="https://therecord.media/fin6-recruitment-scam-malware-campaign">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a>⁠⁠⁠Have a Catch of the Day you'd like to share? Email it to us at <a href="https://therecord.media/fin6-recruitment-scam-malware-campaign">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a><a href="mailto:hackinghumans@n2k.com">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠hackinghumans@n2k.com⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a>.</p>]]>
      </content:encoded>
      <itunes:duration>2630</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[4a8a5186-cdd5-11ef-8599-839b265eb786]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW6068579606.mp3?updated=1760547210" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Abstraction layer (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/104/notes</link>
      <description>Please enjoy this encore of Word Notes. 

A process of hiding the complexity of a system by providing an interface that eases its manipulation.

CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/abstraction-layer⁠

Audio reference link: “⁠What Is Abstraction in Computer Science,⁠” by Codexpanse, YouTube, 29 October 2018.</description>
      <pubDate>Tue, 14 Oct 2025 07:00:00 -0000</pubDate>
      <itunes:title>Abstraction layer (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>104</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/499b0182-a550-11f0-9d0e-7b36ba442c25/image/441b0ca2db080b93b935568d381ce462.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle/>
      <itunes:summary>Please enjoy this encore of Word Notes. 

A process of hiding the complexity of a system by providing an interface that eases its manipulation.

CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/abstraction-layer⁠

Audio reference link: “⁠What Is Abstraction in Computer Science,⁠” by Codexpanse, YouTube, 29 October 2018.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore of Word Notes. </p>
<p>A process of hiding the complexity of a system by providing an interface that eases its manipulation.</p>
<p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/abstraction-layer">⁠https://thecyberwire.com/glossary/abstraction-layer⁠</a></p>
<p>Audio reference link: “<a href="https://www.youtube.com/watch?v=_y-5nZAbgt4">⁠What Is Abstraction in Computer Science,⁠</a>” by Codexpanse, YouTube, 29 October 2018.</p>]]>
      </content:encoded>
      <itunes:duration>336</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[499b0182-a550-11f0-9d0e-7b36ba442c25]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW3379555193.mp3?updated=1736193885" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The text trap tightens.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/358/notes</link>
      <description>This week, our hosts ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Dave Bittner⁠⁠ , ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Joe Carrigan⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠, and ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Maria Varmazis⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ (also host of the ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠T-Minus⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ Space Daily show) are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. Listener Chad wrote in after hearing an episode to share that he received a suspicious call that sounded like a prison-related scam. Maria’s story is on a new Consumer Reports study revealing a surge in texting and messaging scams, with young adults hit hardest and major disparities in who loses money. Joe covers the story on YouTuber Tai Lopez — famous for his “here in my garage” videos — being charged by the SEC for running a $112 million Ponzi-like investment scheme. Dave’s got the story on a new Android trojan called Datzbro that targets seniors with AI-generated Facebook travel events, leading to device takeovers and financial fraud. Our catch of the day comes from listener Cameron, who shares an "urgent message from Union Bank."

Resources and links to stories:


  
⁠Consumer Reports study finds surge in texting and messaging scams


  SEC Says ‘Here in My Garage’ YouTuber Tai Lopez Ran a Ponzi Scheme

  New Android Trojan "Datzbro" Tricking Elderly with AI-Generated Facebook Travel Events


⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Have a Catch of the Day you'd like to share? Email it to us at ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠hackinghumans@n2k.com⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠.</description>
      <pubDate>Thu, 09 Oct 2025 05:00:00 -0000</pubDate>
      <itunes:title>The text trap tightens.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>358</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>This week, our hosts ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Dave Bittner⁠⁠ , ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Joe Carrigan⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠, and ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Maria Varmazis⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ (also host of the ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠T-Minus⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ Space Daily show) are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. Listener Chad wrote in after hearing an episode to share that he received a suspicious call that sounded like a prison-related scam. Maria’s story is on a new Consumer Reports study revealing a surge in texting and messaging scams, with young adults hit hardest and major disparities in who loses money. Joe covers the story on YouTuber Tai Lopez — famous for his “here in my garage” videos — being charged by the SEC for running a $112 million Ponzi-like investment scheme. Dave’s got the story on a new Android trojan called Datzbro that targets seniors with AI-generated Facebook travel events, leading to device takeovers and financial fraud. Our catch of the day comes from listener Cameron, who shares an "urgent message from Union Bank."

Resources and links to stories:


  
⁠Consumer Reports study finds surge in texting and messaging scams


  SEC Says ‘Here in My Garage’ YouTuber Tai Lopez Ran a Ponzi Scheme

  New Android Trojan "Datzbro" Tricking Elderly with AI-Generated Facebook Travel Events


⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Have a Catch of the Day you'd like to share? Email it to us at ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠hackinghumans@n2k.com⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This week, our hosts <a href="https://www.linkedin.com/in/dave-bittner-27231a4/">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Dave Bittner⁠⁠</a> , <a href="https://www.linkedin.com/in/joecarrigan/">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Joe Carrigan⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a>, and <a href="https://www.linkedin.com/in/varmazis/">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Maria Varmazis⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a> (also host of the <a href="https://space.n2k.com/podcasts/t-minus?__hstc=223811332.a636bba53840b4700c929fe67723a129.1721054632698.1747145009569.1747159962459.413&amp;__hssc=223811332.2.1747159962459&amp;__hsfp=3690629108">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠T-Minus⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a> Space Daily show) are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. Listener Chad wrote in after hearing an episode to share that he received a suspicious call that sounded like a prison-related scam. Maria’s story is on a new Consumer Reports study revealing a surge in texting and messaging scams, with young adults hit hardest and major disparities in who loses money. Joe covers the story on YouTuber Tai Lopez — famous for his “here in my garage” videos — being charged by the SEC for running a $112 million Ponzi-like investment scheme. Dave’s got the story on a new Android trojan called Datzbro that targets seniors with AI-generated Facebook travel events, leading to device takeovers and financial fraud. Our catch of the day comes from listener Cameron, who shares an "urgent message from Union Bank."</p>
<p><strong>Resources and links to stories:</strong></p>
<ul>
  <li>
<a href="https://www.bbc.com/news/articles/c1kzg1nwwk1o">⁠</a><a href="https://www.consumerreports.org/media-room/press-releases/2025/10/consumer-reports-study-finds-surge-in-texting-and-messaging-scams">Consumer Reports study finds surge in texting and messaging scams</a>
</li>
  <li><a href="https://www.thedrive.com/news/sec-says-here-in-my-garage-youtuber-tai-lopez-ran-a-ponzi-scheme">SEC Says ‘Here in My Garage’ YouTuber Tai Lopez Ran a Ponzi Scheme</a></li>
  <li><a href="https://thehackernews.com/2025/09/new-android-trojan-datzbro-tricking.html">New Android Trojan "Datzbro" Tricking Elderly with AI-Generated Facebook Travel Events</a></li>
</ul>
<p><a href="https://therecord.media/fin6-recruitment-scam-malware-campaign">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a>⁠⁠⁠Have a Catch of the Day you'd like to share? Email it to us at <a href="https://therecord.media/fin6-recruitment-scam-malware-campaign">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a><a href="mailto:hackinghumans@n2k.com">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠hackinghumans@n2k.com⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a>.</p>]]>
      </content:encoded>
      <itunes:duration>2844</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[4a5da7da-cdd5-11ef-8599-f71efe97e0c7]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW9639909400.mp3?updated=1759940648" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>When malware goes bump in the night.</title>
      <link>https://thecyberwire.com/podcasts/only-malware-in-the-building/16/notes</link>
      <description>Welcome in! You’ve entered, Only Malware in the Building. Join us each month to sip tea and solve mysteries about today’s most interesting threats. Your host is ⁠⁠⁠⁠Selena Larson⁠⁠⁠⁠, ⁠⁠⁠⁠Proofpoint⁠⁠⁠⁠ intelligence analyst and host of their podcast ⁠⁠⁠⁠DISCARDED⁠⁠⁠⁠. Inspired by the residents of a building in New York’s exclusive upper west side, Selena is joined by her co-hosts ⁠⁠⁠⁠N2K Networks⁠⁠⁠⁠ ⁠⁠⁠⁠Dave Bittner⁠⁠⁠⁠ and ⁠⁠⁠Keith Mularski⁠⁠⁠, former FBI cybercrime investigator and now Chief Global Ambassador at ⁠⁠⁠Qintel⁠⁠⁠.

Being a security researcher is a bit like being a detective: you gather clues, analyze the evidence, and consult the experts to solve the cyber puzzle. On this spooky special episode, our hosts ponder which threat actor, malware, or campaign name would be the most terrifying — from the spectral stealth of GhostRAT silently haunting your systems, to the deceptively sweet lure of ILoveYou that once spread chaos across the globe. Along the way, they share some of their favorite “ghost stories” from the cyber underworld — legendary incidents and infamous operations that still haunt defenders today — and explore why these names and their real-world impacts have left such lasting scars on the digital landscape.

Plus, we’ve cooked up a fun, mystery-solving video to accompany this episode — complete with spooky clues, masked sleuths, and a few laugh-out-loud moments that fans of classic cartoon detectives will appreciate. Check it out on YouTube and see if you can unmask the culprit!</description>
      <pubDate>Tue, 07 Oct 2025 07:00:00 -0000</pubDate>
      <itunes:title>When malware goes bump in the night.</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>16</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/87f0f5f2-a2e6-11f0-a236-0b97b84a2119/image/142c116f618a6142ad09813506952aa5.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle/>
      <itunes:summary>Welcome in! You’ve entered, Only Malware in the Building. Join us each month to sip tea and solve mysteries about today’s most interesting threats. Your host is ⁠⁠⁠⁠Selena Larson⁠⁠⁠⁠, ⁠⁠⁠⁠Proofpoint⁠⁠⁠⁠ intelligence analyst and host of their podcast ⁠⁠⁠⁠DISCARDED⁠⁠⁠⁠. Inspired by the residents of a building in New York’s exclusive upper west side, Selena is joined by her co-hosts ⁠⁠⁠⁠N2K Networks⁠⁠⁠⁠ ⁠⁠⁠⁠Dave Bittner⁠⁠⁠⁠ and ⁠⁠⁠Keith Mularski⁠⁠⁠, former FBI cybercrime investigator and now Chief Global Ambassador at ⁠⁠⁠Qintel⁠⁠⁠.

Being a security researcher is a bit like being a detective: you gather clues, analyze the evidence, and consult the experts to solve the cyber puzzle. On this spooky special episode, our hosts ponder which threat actor, malware, or campaign name would be the most terrifying — from the spectral stealth of GhostRAT silently haunting your systems, to the deceptively sweet lure of ILoveYou that once spread chaos across the globe. Along the way, they share some of their favorite “ghost stories” from the cyber underworld — legendary incidents and infamous operations that still haunt defenders today — and explore why these names and their real-world impacts have left such lasting scars on the digital landscape.

Plus, we’ve cooked up a fun, mystery-solving video to accompany this episode — complete with spooky clues, masked sleuths, and a few laugh-out-loud moments that fans of classic cartoon detectives will appreciate. Check it out on YouTube and see if you can unmask the culprit!</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Welcome in! You’ve entered, Only Malware in the Building. Join us each month to sip tea and solve mysteries about today’s most interesting threats. Your host is <a href="https://www.linkedin.com/in/selenalarson/">⁠⁠⁠⁠Selena Larson⁠⁠⁠⁠</a>, <a href="https://www.proofpoint.com/">⁠⁠⁠⁠Proofpoint⁠⁠⁠⁠</a> intelligence analyst and host of their podcast <a href="https://www.proofpoint.com/us/podcasts/discarded">⁠⁠⁠⁠DISCARDED⁠⁠⁠⁠</a>. Inspired by the residents of a building in New York’s exclusive upper west side, Selena is joined by her co-hosts <a href="https://www.n2k.com/">⁠⁠⁠⁠N2K Networks⁠⁠⁠⁠</a> <a href="https://www.linkedin.com/in/dave-bittner-27231a4/">⁠⁠⁠⁠Dave Bittner⁠⁠⁠⁠</a> and <a href="https://www.linkedin.com/in/keith-mularski-b737551/">⁠⁠⁠Keith Mularski⁠⁠⁠</a>, former FBI cybercrime investigator and now Chief Global Ambassador at <a href="https://www.linkedin.com/company/qintel/">⁠⁠⁠Qintel⁠⁠⁠</a>.</p>
<p>Being a security researcher is a bit like being a detective: you gather clues, analyze the evidence, and consult the experts to solve the cyber puzzle. On this spooky special episode, our hosts ponder which threat actor, malware, or campaign name would be the most terrifying — from the spectral stealth of <em>GhostRAT</em> silently haunting your systems, to the deceptively sweet lure of <em>ILoveYou</em> that once spread chaos across the globe. Along the way, they share some of their favorite “ghost stories” from the cyber underworld — legendary incidents and infamous operations that still haunt defenders today — and explore why these names and their real-world impacts have left such lasting scars on the digital landscape.</p>
<p>Plus, we’ve cooked up a fun, mystery-solving video to accompany this episode — complete with spooky clues, masked sleuths, and a few laugh-out-loud moments that fans of classic cartoon detectives will appreciate. Check it out on <a href="https://youtu.be/SdI0r05O74I">YouTube</a> and see if you can unmask the culprit!</p>]]>
      </content:encoded>
      <itunes:duration>2978</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[87f0f5f2-a2e6-11f0-a236-0b97b84a2119]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW4837966138.mp3?updated=1759438961" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Identity Fabric (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/102/notes</link>
      <description>Please enjoy this encore of Word Notes. 

A set of services for managing identity and access management, or IAM across all of an organization's data islands.

CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/identity-fabric⁠

Audio reference link: “⁠Leadership Compass Identity Fabrics - Analyst Chat 126⁠,” by KuppingerCole, YouTube, 30 May 2022.</description>
      <pubDate>Tue, 07 Oct 2025 07:00:00 -0000</pubDate>
      <itunes:title>Identity Fabric (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>102</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/733a4468-9faf-11f0-be7f-93710ca3b958/image/441b0ca2db080b93b935568d381ce462.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle/>
      <itunes:summary>Please enjoy this encore of Word Notes. 

A set of services for managing identity and access management, or IAM across all of an organization's data islands.

CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/identity-fabric⁠

Audio reference link: “⁠Leadership Compass Identity Fabrics - Analyst Chat 126⁠,” by KuppingerCole, YouTube, 30 May 2022.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore of Word Notes. </p>
<p>A set of services for managing identity and access management, or IAM across all of an organization's data islands.</p>
<p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/identity-fabric">⁠https://thecyberwire.com/glossary/identity-fabric⁠</a></p>
<p>Audio reference link: “<a href="https://www.youtube.com/watch?v=z5t3-HHMp-w">⁠Leadership Compass Identity Fabrics - Analyst Chat 126⁠</a>,” by KuppingerCole, YouTube, 30 May 2022.</p>]]>
      </content:encoded>
      <itunes:duration>466</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[733a4468-9faf-11f0-be7f-93710ca3b958]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW3268574679.mp3?updated=1736193885" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Lock your doors and check your URLs.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/357/notes</link>
      <description>This week, our hosts ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Dave Bittner⁠ , ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Joe Carrigan⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠, and ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Maria Varmazis⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ (also host of the ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠T-Minus⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ Space Daily show) are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. We start off with a celebration of Cybersecurity Awareness Month. Joe's story is on how the North Wales Police are warning cryptocurrency holders after a victim lost £2.1 million in Bitcoin to a highly targeted scam, where criminals posing as police used a fake security breach story to trick them into entering their password on a fraudulent site. Dave has two stories this week, the first one from a Reddit user being targeted by the classic "White Van Scam," where scammers tried to sell cheap projectors as high-end equipment using a fake story and forged receipt. In his second story, the FBI is warning that cybercriminals are spoofing its official IC3 website to steal personal information and scam victims, urging users to type the URL directly and avoid suspicious links or fake social media pages. Maria has the story on two U.S. senators pressing Tinder parent company Match Group to step up efforts against romance scams, demanding details on how it detects fraud and protects users from criminals exploiting trust on its platforms. Our catch of the day comes from Reddit where a user was targeted by a scammer, but cleverly was able to get them to retreat. 

Resources and links to stories:


  Police issue warning after £2.1m Bitcoin 'scam'

  FBI Says Threat Actors Are Spoofing its IC3 Site

  Someone hit me with the "White Van Scam" - in this day and age!

  Two US senators urge Tinder parent to act against dating scams on its apps

  Sister died


⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Have a Catch of the Day you'd like to share? Email it to us at ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠hackinghumans@n2k.com⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠.</description>
      <pubDate>Thu, 02 Oct 2025 05:00:00 -0000</pubDate>
      <itunes:title>Lock your doors and check your URLs.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>357</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>This week, our hosts ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Dave Bittner⁠ , ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Joe Carrigan⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠, and ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Maria Varmazis⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ (also host of the ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠T-Minus⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ Space Daily show) are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. We start off with a celebration of Cybersecurity Awareness Month. Joe's story is on how the North Wales Police are warning cryptocurrency holders after a victim lost £2.1 million in Bitcoin to a highly targeted scam, where criminals posing as police used a fake security breach story to trick them into entering their password on a fraudulent site. Dave has two stories this week, the first one from a Reddit user being targeted by the classic "White Van Scam," where scammers tried to sell cheap projectors as high-end equipment using a fake story and forged receipt. In his second story, the FBI is warning that cybercriminals are spoofing its official IC3 website to steal personal information and scam victims, urging users to type the URL directly and avoid suspicious links or fake social media pages. Maria has the story on two U.S. senators pressing Tinder parent company Match Group to step up efforts against romance scams, demanding details on how it detects fraud and protects users from criminals exploiting trust on its platforms. Our catch of the day comes from Reddit where a user was targeted by a scammer, but cleverly was able to get them to retreat. 

Resources and links to stories:


  Police issue warning after £2.1m Bitcoin 'scam'

  FBI Says Threat Actors Are Spoofing its IC3 Site

  Someone hit me with the "White Van Scam" - in this day and age!

  Two US senators urge Tinder parent to act against dating scams on its apps

  Sister died


⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Have a Catch of the Day you'd like to share? Email it to us at ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠hackinghumans@n2k.com⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This week, our hosts <a href="https://www.linkedin.com/in/dave-bittner-27231a4/">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Dave Bittner⁠</a> , <a href="https://www.linkedin.com/in/joecarrigan/">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Joe Carrigan⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a>, and <a href="https://www.linkedin.com/in/varmazis/">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Maria Varmazis⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a> (also host of the <a href="https://space.n2k.com/podcasts/t-minus?__hstc=223811332.a636bba53840b4700c929fe67723a129.1721054632698.1747145009569.1747159962459.413&amp;__hssc=223811332.2.1747159962459&amp;__hsfp=3690629108">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠T-Minus⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a> Space Daily show) are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. We start off with a celebration of Cybersecurity Awareness Month. Joe's story is on how the North Wales Police are warning cryptocurrency holders after a victim lost £2.1 million in Bitcoin to a highly targeted scam, where criminals posing as police used a fake security breach story to trick them into entering their password on a fraudulent site. Dave has two stories this week, the first one from a Reddit user being targeted by the classic "White Van Scam," where scammers tried to sell cheap projectors as high-end equipment using a fake story and forged receipt. In his second story, the FBI is warning that cybercriminals are spoofing its official IC3 website to steal personal information and scam victims, urging users to type the URL directly and avoid suspicious links or fake social media pages. Maria has the story on two U.S. senators pressing Tinder parent company Match Group to step up efforts against romance scams, demanding details on how it detects fraud and protects users from criminals exploiting trust on its platforms. Our catch of the day comes from Reddit where a user was targeted by a scammer, but cleverly was able to get them to retreat. </p>
<p><strong>Resources and links to stories:</strong></p>
<ul>
  <li><a href="https://www.bbc.com/news/articles/c1kzg1nwwk1o">Police issue warning after £2.1m Bitcoin 'scam'</a></li>
  <li><a href="https://www.infosecurity-magazine.com/news/fbi-says-threat-actors-are/">FBI Says Threat Actors Are Spoofing its IC3 Site</a></li>
  <li><a href="https://www.reddit.com/r/Scams/comments/1nl3js8/someone_hit_me_with_the_white_van_scam_in_this/">Someone hit me with the "White Van Scam" - in this day and age!</a></li>
  <li><a href="https://www.reuters.com/world/us/two-us-senators-urge-tinder-parent-act-against-dating-scams-its-apps-2025-09-24/">Two US senators urge Tinder parent to act against dating scams on its apps</a></li>
  <li><a href="https://www.reddit.com/r/scambait/comments/1myiplc/sister_died/">Sister died</a></li>
</ul>
<p><a href="https://therecord.media/fin6-recruitment-scam-malware-campaign">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a>⁠⁠⁠Have a Catch of the Day you'd like to share? Email it to us at <a href="https://therecord.media/fin6-recruitment-scam-malware-campaign">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a><a href="mailto:hackinghumans@n2k.com">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠hackinghumans@n2k.com⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a>.</p>]]>
      </content:encoded>
      <itunes:duration>2576</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[4a2eccb2-cdd5-11ef-8599-03af21c63d08]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW5351004889.mp3?updated=1759253632" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Intrusion Kill Chain (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/102/notes</link>
      <description>Please enjoy this encore of Word Notes. 

A cybersecurity first principle strategy focused on disrupting known adversary activity at one of several phases of an attack sequence.

CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/intrusion-kill-chain⁠

Audio reference link: "⁠Cybersecurity Days: A Network Defender's Future⁠," by Rick Howard, Integrated Cyber Conference, Integrated Adaptive Cyber Defense (IACD), YouTube, 26 October 2018.</description>
      <pubDate>Tue, 30 Sep 2025 07:00:00 -0000</pubDate>
      <itunes:title>Intrusion Kill Chain (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>102</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/4710fdb4-9d75-11f0-968f-bbb567f6822f/image/441b0ca2db080b93b935568d381ce462.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle/>
      <itunes:summary>Please enjoy this encore of Word Notes. 

A cybersecurity first principle strategy focused on disrupting known adversary activity at one of several phases of an attack sequence.

CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/intrusion-kill-chain⁠

Audio reference link: "⁠Cybersecurity Days: A Network Defender's Future⁠," by Rick Howard, Integrated Cyber Conference, Integrated Adaptive Cyber Defense (IACD), YouTube, 26 October 2018.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore of Word Notes. </p>
<p>A cybersecurity first principle strategy focused on disrupting known adversary activity at one of several phases of an attack sequence.</p>
<p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/intrusion-kill-chain">⁠https://thecyberwire.com/glossary/intrusion-kill-chain⁠</a></p>
<p>Audio reference link: "<a href="https://www.youtube.com/watch?v=K9WD1-ftTWo">⁠Cybersecurity Days: A Network Defender's Future⁠</a>," by Rick Howard, Integrated Cyber Conference, Integrated Adaptive Cyber Defense (IACD), YouTube, 26 October 2018.</p>]]>
      </content:encoded>
      <itunes:duration>466</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[4710fdb4-9d75-11f0-968f-bbb567f6822f]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW7434351593.mp3?updated=1736193884" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The new weapon in text scams.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/356/notes</link>
      <description>This week, while⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Dave Bittner is out, ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Joe Carrigan⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠, and ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Maria Varmazis⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ (also host of the ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠T-Minus⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ Space Daily show) are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. Listener Daniel shares a follow-up where scammers exploited details from a Texas car accident to pose as claim assistants, highlighting the importance of working only with your insurance or official state agencies. Joe follows the story of Iowa authorities uncovering a nationwide texting scam run from inside a Georgia prison, and a Cincinnati man pleading guilty to stealing over $2 million through dating app fraud. Maria covers two stories this week, one on how human trafficking victims are being forced to run online scams across Southeast Asia’s billion-dollar fraud industry, and another on cybercriminals using “SMS blasters” to push mass scam texts directly to nearby phones by impersonating cell towers. Our catch of the day comes from Reddit where a user received a deceiving letter by mail. 

Resources and links to stories:


  Crash reports and records

  Fredericksburg Texas Police Department's post

  Iowa judge sentences four for text scam run from Georgia prison

  Cincinnati man pleads guilty to scamming dozens out of over $2 million in dating app fraud

  Scammed into scamming

  Cybercriminals Have a Weird New Way to Target You With Scam Texts


⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Have a Catch of the Day you'd like to share? Email it to us at ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠hackinghumans@n2k.com⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠.</description>
      <pubDate>Thu, 25 Sep 2025 05:00:00 -0000</pubDate>
      <itunes:title>The new weapon in text scams.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>356</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>This week, while⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Dave Bittner is out, ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Joe Carrigan⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠, and ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Maria Varmazis⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ (also host of the ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠T-Minus⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ Space Daily show) are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. Listener Daniel shares a follow-up where scammers exploited details from a Texas car accident to pose as claim assistants, highlighting the importance of working only with your insurance or official state agencies. Joe follows the story of Iowa authorities uncovering a nationwide texting scam run from inside a Georgia prison, and a Cincinnati man pleading guilty to stealing over $2 million through dating app fraud. Maria covers two stories this week, one on how human trafficking victims are being forced to run online scams across Southeast Asia’s billion-dollar fraud industry, and another on cybercriminals using “SMS blasters” to push mass scam texts directly to nearby phones by impersonating cell towers. Our catch of the day comes from Reddit where a user received a deceiving letter by mail. 

Resources and links to stories:


  Crash reports and records

  Fredericksburg Texas Police Department's post

  Iowa judge sentences four for text scam run from Georgia prison

  Cincinnati man pleads guilty to scamming dozens out of over $2 million in dating app fraud

  Scammed into scamming

  Cybercriminals Have a Weird New Way to Target You With Scam Texts


⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Have a Catch of the Day you'd like to share? Email it to us at ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠hackinghumans@n2k.com⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This week, while<a href="https://www.linkedin.com/in/dave-bittner-27231a4/">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a> <a href="https://www.linkedin.com/in/dave-bittner-27231a4/">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Dave Bittner</a> is out, <a href="https://www.linkedin.com/in/joecarrigan/">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Joe Carrigan⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a>, and <a href="https://www.linkedin.com/in/varmazis/">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Maria Varmazis⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a> (also host of the <a href="https://space.n2k.com/podcasts/t-minus?__hstc=223811332.a636bba53840b4700c929fe67723a129.1721054632698.1747145009569.1747159962459.413&amp;__hssc=223811332.2.1747159962459&amp;__hsfp=3690629108">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠T-Minus⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a> Space Daily show) are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. Listener Daniel shares a follow-up where scammers exploited details from a Texas car accident to pose as claim assistants, highlighting the importance of working only with your insurance or official state agencies. Joe follows the story of Iowa authorities uncovering a nationwide texting scam run from inside a Georgia prison, and a Cincinnati man pleading guilty to stealing over $2 million through dating app fraud. Maria covers two stories this week, one on how human trafficking victims are being forced to run online scams across Southeast Asia’s billion-dollar fraud industry, and another on cybercriminals using “SMS blasters” to push mass scam texts directly to nearby phones by impersonating cell towers. Our catch of the day comes from Reddit where a user received a deceiving letter by mail. </p>
<p><strong>Resources and links to stories:</strong></p>
<ul>
  <li><a href="https://www.txdot.gov/data-maps/crash-reports-records.html">Crash reports and records</a></li>
  <li><a href="https://www.facebook.com/story.php/?story_fbid=928139259350299&amp;id=100064627004907">Fredericksburg Texas Police Department's post</a></li>
  <li><a href="https://www.radioiowa.com/2025/09/18/iowa-judge-sentences-four-for-text-scam-run-from-georgia-prison/">Iowa judge sentences four for text scam run from Georgia prison</a></li>
  <li><a href="https://www.wcpo.com/news/crime/cincinnati-man-pleads-guilty-to-scamming-dozens-out-of-over-2-million-in-dating-app-fraud">Cincinnati man pleads guilty to scamming dozens out of over $2 million in dating app fraud</a></li>
  <li><a href="https://www.reuters.com/graphics/SOUTHEASTASIA-SCAMS/mypmxwdwwvr/">Scammed into scamming</a></li>
  <li><a href="https://www.wired.com/story/sms-blasters-scam-texts/">Cybercriminals Have a Weird New Way to Target You With Scam Texts</a></li>
</ul>
<p><a href="https://therecord.media/fin6-recruitment-scam-malware-campaign">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a>⁠⁠⁠Have a Catch of the Day you'd like to share? Email it to us at <a href="https://therecord.media/fin6-recruitment-scam-malware-campaign">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a><a href="mailto:hackinghumans@n2k.com">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠hackinghumans@n2k.com⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a>.</p>]]>
      </content:encoded>
      <itunes:duration>2500</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[4a005e68-cdd5-11ef-8599-87e26436e0ec]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW2333817130.mp3?updated=1758733878" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Identity Orchestration (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/101/notes</link>
      <description>Please enjoy this encore of Word Notes.

A subset of security orchestration, the management of identities across an organization's set of digital islands. 

CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/identity-orchestration</description>
      <pubDate>Tue, 23 Sep 2025 07:00:00 -0000</pubDate>
      <itunes:title>Identity Orchestration (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>101</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/343f42cc-97d5-11f0-ad41-533c2fd4fba7/image/441b0ca2db080b93b935568d381ce462.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle/>
      <itunes:summary>Please enjoy this encore of Word Notes.

A subset of security orchestration, the management of identities across an organization's set of digital islands. 

CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/identity-orchestration</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore of Word Notes.</p>
<p>A subset of security orchestration, the management of identities across an organization's set of digital islands. </p>
<p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/identity-orchestration">⁠https://thecyberwire.com/glossary/identity-orchestration</a></p>]]>
      </content:encoded>
      <itunes:duration>376</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[343f42cc-97d5-11f0-ad41-533c2fd4fba7]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW9114306466.mp3?updated=1736193884" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Scammers are recruiting.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/355/notes</link>
      <description>This week, our hosts⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Dave Bittner⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠, ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Joe Carrigan⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠, and ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Maria Varmazis⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ (also host of the ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠T-Minus⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ Space Daily show) are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. We start with a scam warning from Michal, who is sharing the latest conference scam. Dave's got the story of a retired federal investigator who mapped out the “Scammer Psychological Kill Chain” and shared rules to help you spot and break it. Maria has the story of job scams surging over 1,000% in 2025, as scammers exploit a slowing labor market and desperate jobseekers with fake offers, texts, and bogus recruiter schemes. Joe follows the story on a $4 million forex scam where two men promised safe, high returns but instead ran a Ponzi scheme that defrauded 20 investors before landing in federal prison. Our catch of the day comes from listener Shannon who writes in to share a message from "Amazon" about a recall notice. 

Resources and links to stories:


  Job Scams Surge 1,000% As Americans Struggle to Find Work


  Forex Account: What It Means and How It Works

  Ex-NYPD Cop Gets 36 Months In $4M Forex Scam That Duped 20 Investors: Feds


⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Have a Catch of the Day you'd like to share? Email it to us at ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠hackinghumans@n2k.com⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠.</description>
      <pubDate>Thu, 18 Sep 2025 05:00:00 -0000</pubDate>
      <itunes:title>Scammers are recruiting.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>355</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>This week, our hosts⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Dave Bittner⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠, ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Joe Carrigan⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠, and ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Maria Varmazis⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ (also host of the ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠T-Minus⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ Space Daily show) are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. We start with a scam warning from Michal, who is sharing the latest conference scam. Dave's got the story of a retired federal investigator who mapped out the “Scammer Psychological Kill Chain” and shared rules to help you spot and break it. Maria has the story of job scams surging over 1,000% in 2025, as scammers exploit a slowing labor market and desperate jobseekers with fake offers, texts, and bogus recruiter schemes. Joe follows the story on a $4 million forex scam where two men promised safe, high returns but instead ran a Ponzi scheme that defrauded 20 investors before landing in federal prison. Our catch of the day comes from listener Shannon who writes in to share a message from "Amazon" about a recall notice. 

Resources and links to stories:


  Job Scams Surge 1,000% As Americans Struggle to Find Work


  Forex Account: What It Means and How It Works

  Ex-NYPD Cop Gets 36 Months In $4M Forex Scam That Duped 20 Investors: Feds


⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Have a Catch of the Day you'd like to share? Email it to us at ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠hackinghumans@n2k.com⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This week, our hosts<a href="https://www.linkedin.com/in/dave-bittner-27231a4/">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a> <a href="https://www.linkedin.com/in/dave-bittner-27231a4/">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Dave Bittner⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a>, <a href="https://www.linkedin.com/in/joecarrigan/">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Joe Carrigan⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a>, and <a href="https://www.linkedin.com/in/varmazis/">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Maria Varmazis⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a> (also host of the <a href="https://space.n2k.com/podcasts/t-minus?__hstc=223811332.a636bba53840b4700c929fe67723a129.1721054632698.1747145009569.1747159962459.413&amp;__hssc=223811332.2.1747159962459&amp;__hsfp=3690629108">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠T-Minus⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a> Space Daily show) are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. We start with a scam warning from Michal, who is sharing the latest conference scam. Dave's got the story of a retired federal investigator who mapped out the “Scammer Psychological Kill Chain” and shared rules to help you spot and break it. Maria has the story of job scams surging over 1,000% in 2025, as scammers exploit a slowing labor market and desperate jobseekers with fake offers, texts, and bogus recruiter schemes. Joe follows the story on a $4 million forex scam where two men promised safe, high returns but instead ran a Ponzi scheme that defrauded 20 investors before landing in federal prison. Our catch of the day comes from listener Shannon who writes in to share a message from "Amazon" about a recall notice. </p>
<p><strong>Resources and links to stories:</strong></p>
<ul>
  <li>J<a href="https://www.newsweek.com/job-scams-surge-1000-employment-struggles-2128153">ob Scams Surge 1,000% As Americans Struggle to Find Work</a>
</li>
  <li><a href="https://www.investopedia.com/terms/forex/f/forex-accounts-managed-mini-demo.asp#:~:text=Forex%20accounts%20are%20financial%20accounts,tools%2C%20and%20market%20analysis%20resources">Forex Account: What It Means and How It Works</a></li>
  <li><a href="https://patch.com/new-york/newhydepark/ex-nypd-cop-gets-36-months-4m-forex-scam-duped-20-investors-feds#google_vignette">Ex-NYPD Cop Gets 36 Months In $4M Forex Scam That Duped 20 Investors: Feds</a></li>
</ul>
<p><a href="https://therecord.media/fin6-recruitment-scam-malware-campaign">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a>⁠⁠⁠Have a Catch of the Day you'd like to share? Email it to us at <a href="https://therecord.media/fin6-recruitment-scam-malware-campaign">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a><a href="mailto:hackinghumans@n2k.com">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠hackinghumans@n2k.com⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a>.</p>]]>
      </content:encoded>
      <itunes:duration>2765</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[49d2c340-cdd5-11ef-8599-eb6462cbca7f]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW2396854561.mp3?updated=1758127470" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Diamond Model (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/100/notes</link>
      <description>Please enjoy this encore of Word Notes. 

A cyber threat intelligence analysis model that defines relationship pairs between four core components in the shape of a diamond of adversary playbook activity across the intrusion kill chain: the adversary, their capability, the infrastructure used or attacked, and the victim.

CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/diamond-model ⁠

Audio reference link: “⁠Diamond Presentation v2 0: Diamond Model for Intrusion Analysis – Applied to Star Wars’ Battles⁠,” Andy Pendergrast and Wade Baker, ThreatConnect, YouTube, 4 February 2020.</description>
      <pubDate>Tue, 16 Sep 2025 07:00:00 -0000</pubDate>
      <itunes:title>Diamond Model (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>100</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/26aeda9a-9259-11f0-86e9-8764a82ca195/image/441b0ca2db080b93b935568d381ce462.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle/>
      <itunes:summary>Please enjoy this encore of Word Notes. 

A cyber threat intelligence analysis model that defines relationship pairs between four core components in the shape of a diamond of adversary playbook activity across the intrusion kill chain: the adversary, their capability, the infrastructure used or attacked, and the victim.

CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/diamond-model ⁠

Audio reference link: “⁠Diamond Presentation v2 0: Diamond Model for Intrusion Analysis – Applied to Star Wars’ Battles⁠,” Andy Pendergrast and Wade Baker, ThreatConnect, YouTube, 4 February 2020.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore of Word Notes. </p>
<p>A cyber threat intelligence analysis model that defines relationship pairs between four core components in the shape of a diamond of adversary playbook activity across the intrusion kill chain: the adversary, their capability, the infrastructure used or attacked, and the victim.</p>
<p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/diamond-model">⁠https://thecyberwire.com/glossary/diamond-model ⁠</a></p>
<p>Audio reference link: “<a href="https://www.youtube.com/watch?v=0QHUS8SNTNc">⁠Diamond Presentation v2 0: Diamond Model for Intrusion Analysis – Applied to Star Wars’ Battles⁠</a>,” Andy Pendergrast and Wade Baker, ThreatConnect, YouTube, 4 February 2020.</p>]]>
      </content:encoded>
      <itunes:duration>467</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[26aeda9a-9259-11f0-86e9-8764a82ca195]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW7565279553.mp3?updated=1736193884" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>How little data reveals a lot.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/354/notes</link>
      <description>This week, our hosts⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Dave Bittner⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠, ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Joe Carrigan⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠, and ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Maria Varmazis⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ (also host of the ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠T-Minus⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ Space Daily show) are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines.  Maria's story is on her recent close encounter with a Facebook scam. Dave's story is on a new strain of spyware that automates sextortion by detecting when users watch pornography, then secretly capturing both browser screenshots and webcam photos to blackmail victims. Joe's story is on the power of metadata, sharing how even limited browsing data from his machine learning class revealed personal details like daily routines, house hunting, and financial institutions. Our catch of the day comes from the Scams subreddit, featuring a phony Illuminati recruitment email promising power, wealth, and recognition in exchange for personal information.

Resources and links to stories:


  Automated Sextortion Spyware Takes Webcam Pics of Victims Watching Porn


⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Have a Catch of the Day you'd like to share? Email it to us at ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠hackinghumans@n2k.com⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠.</description>
      <pubDate>Thu, 11 Sep 2025 05:00:00 -0000</pubDate>
      <itunes:title>How little data reveals a lot.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>354</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>This week, our hosts⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Dave Bittner⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠, ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Joe Carrigan⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠, and ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Maria Varmazis⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ (also host of the ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠T-Minus⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ Space Daily show) are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines.  Maria's story is on her recent close encounter with a Facebook scam. Dave's story is on a new strain of spyware that automates sextortion by detecting when users watch pornography, then secretly capturing both browser screenshots and webcam photos to blackmail victims. Joe's story is on the power of metadata, sharing how even limited browsing data from his machine learning class revealed personal details like daily routines, house hunting, and financial institutions. Our catch of the day comes from the Scams subreddit, featuring a phony Illuminati recruitment email promising power, wealth, and recognition in exchange for personal information.

Resources and links to stories:


  Automated Sextortion Spyware Takes Webcam Pics of Victims Watching Porn


⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Have a Catch of the Day you'd like to share? Email it to us at ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠hackinghumans@n2k.com⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This week, our hosts<a href="https://www.linkedin.com/in/dave-bittner-27231a4/">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a> <a href="https://www.linkedin.com/in/dave-bittner-27231a4/">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Dave Bittner⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a>, <a href="https://www.linkedin.com/in/joecarrigan/">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Joe Carrigan⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a>, and <a href="https://www.linkedin.com/in/varmazis/">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Maria Varmazis⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a> (also host of the <a href="https://space.n2k.com/podcasts/t-minus?__hstc=223811332.a636bba53840b4700c929fe67723a129.1721054632698.1747145009569.1747159962459.413&amp;__hssc=223811332.2.1747159962459&amp;__hsfp=3690629108">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠T-Minus⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a> Space Daily show) are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines.  Maria's story is on her recent close encounter with a Facebook scam. Dave's story is on a new strain of spyware that automates sextortion by detecting when users watch pornography, then secretly capturing both browser screenshots and webcam photos to blackmail victims. Joe's story is on the power of metadata, sharing how even limited browsing data from his machine learning class revealed personal details like daily routines, house hunting, and financial institutions. Our catch of the day comes from the Scams subreddit, featuring a phony Illuminati recruitment email promising power, wealth, and recognition in exchange for personal information.</p>
<p><strong>Resources and links to stories:</strong></p>
<ul>
  <li><a href="https://www.wired.com/story/stealerium-infostealer-porn-sextortion/">Automated Sextortion Spyware Takes Webcam Pics of Victims Watching Porn</a></li>
</ul>
<p><a href="https://therecord.media/fin6-recruitment-scam-malware-campaign">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a>⁠⁠⁠Have a Catch of the Day you'd like to share? Email it to us at <a href="https://therecord.media/fin6-recruitment-scam-malware-campaign">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a><a href="mailto:hackinghumans@n2k.com">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠hackinghumans@n2k.com⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a>.</p>]]>
      </content:encoded>
      <itunes:duration>2927</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[49a3770c-cdd5-11ef-8599-7be679fee2e9]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW3597314100.mp3?updated=1757435840" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>MITRE ATT&amp;CK (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/99/notes</link>
      <description>Please enjoy this encore of Word Notes. 

A knowledge base of adversary tactics, techniques, and procedures established and maintained by the MITRE Corporation. 

CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/mitre-attck⁠

Audio reference link: “⁠Attack Frameworks - SY0-601 CompTIA Security+ : 4.2⁠,” Professor Messer, YouTube, 29 April 2021.</description>
      <pubDate>Tue, 09 Sep 2025 07:00:00 -0000</pubDate>
      <itunes:title>MITRE ATT&amp;CK (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>99</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/8d325978-8cd1-11f0-af86-e31f137e0f3d/image/441b0ca2db080b93b935568d381ce462.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle/>
      <itunes:summary>Please enjoy this encore of Word Notes. 

A knowledge base of adversary tactics, techniques, and procedures established and maintained by the MITRE Corporation. 

CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/mitre-attck⁠

Audio reference link: “⁠Attack Frameworks - SY0-601 CompTIA Security+ : 4.2⁠,” Professor Messer, YouTube, 29 April 2021.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore of Word Notes. </p>
<p>A knowledge base of adversary tactics, techniques, and procedures established and maintained by the MITRE Corporation. </p>
<p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/mitre-attck">⁠https://thecyberwire.com/glossary/mitre-attck⁠</a></p>
<p>Audio reference link: “<a href="https://www.youtube.com/watch?v=-eFIVE5j834">⁠Attack Frameworks - SY0-601 CompTIA Security+ : 4.2⁠</a>,” Professor Messer, YouTube, 29 April 2021.</p>]]>
      </content:encoded>
      <itunes:duration>463</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[8d325978-8cd1-11f0-af86-e31f137e0f3d]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW4367182500.mp3?updated=1736193883" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>When your AI gets scammed.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/353/notes</link>
      <description>This week, our hosts⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Dave Bittner⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠, ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Joe Carrigan⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠, and ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Maria Varmazis⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ (also host of the ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠T-Minus⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ Space Daily show) are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. This week’s follow-up brings two gems: a smart tip from a listener on handling suspicious “bank calls” by asking the caller to leave a note on your account, then verifying directly with your bank. Plus, a delightful story about “Chicken Camp,” where trainers hone their skills by teaching chickens tricks—proof that maybe one day a chicken-driven tractor isn’t such a far-fetched idea! Joe's story is on YouTube scam-baiters who helped expose a $65 million fraud ring that preyed on vulnerable victims, including a Holocaust survivor’s widow. Maria's got the story of how agentic AI browsers, designed to shop and click for you, proved alarmingly easy to trick into scams and phishing schemes—ushering in a new era of “Scamlexity.” Dave's story covers a growing luggage tag scam where discarded tags give scammers enough personal info to file false baggage claims against travelers. The catch of the day comes from listener Chad, who spotted a suspicious message likely aiming to hijack his Facebook account—but wisely didn’t take the bait.

Resources and links to stories:


  YouTube ‘scambaiters' expose ring that left Holocaust survivor's widow penniless: DA

  “Scamlexity” We Put Agentic AI Browsers to the Test - They Clicked, They Paid, They Failed

  Airport Worker Reveals Growing Luggage Tag Scam Targeting Travelers


⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Have a Catch of the Day you'd like to share? Email it to us at ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠hackinghumans@n2k.com⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠.</description>
      <pubDate>Thu, 04 Sep 2025 05:00:00 -0000</pubDate>
      <itunes:title>When your AI gets scammed.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>353</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>This week, our hosts⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Dave Bittner⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠, ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Joe Carrigan⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠, and ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Maria Varmazis⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ (also host of the ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠T-Minus⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ Space Daily show) are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. This week’s follow-up brings two gems: a smart tip from a listener on handling suspicious “bank calls” by asking the caller to leave a note on your account, then verifying directly with your bank. Plus, a delightful story about “Chicken Camp,” where trainers hone their skills by teaching chickens tricks—proof that maybe one day a chicken-driven tractor isn’t such a far-fetched idea! Joe's story is on YouTube scam-baiters who helped expose a $65 million fraud ring that preyed on vulnerable victims, including a Holocaust survivor’s widow. Maria's got the story of how agentic AI browsers, designed to shop and click for you, proved alarmingly easy to trick into scams and phishing schemes—ushering in a new era of “Scamlexity.” Dave's story covers a growing luggage tag scam where discarded tags give scammers enough personal info to file false baggage claims against travelers. The catch of the day comes from listener Chad, who spotted a suspicious message likely aiming to hijack his Facebook account—but wisely didn’t take the bait.

Resources and links to stories:


  YouTube ‘scambaiters' expose ring that left Holocaust survivor's widow penniless: DA

  “Scamlexity” We Put Agentic AI Browsers to the Test - They Clicked, They Paid, They Failed

  Airport Worker Reveals Growing Luggage Tag Scam Targeting Travelers


⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Have a Catch of the Day you'd like to share? Email it to us at ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠hackinghumans@n2k.com⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This week, our hosts<a href="https://www.linkedin.com/in/dave-bittner-27231a4/">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a> <a href="https://www.linkedin.com/in/dave-bittner-27231a4/">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Dave Bittner⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a>, <a href="https://www.linkedin.com/in/joecarrigan/">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Joe Carrigan⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a>, and <a href="https://www.linkedin.com/in/varmazis/">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Maria Varmazis⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a> (also host of the <a href="https://space.n2k.com/podcasts/t-minus?__hstc=223811332.a636bba53840b4700c929fe67723a129.1721054632698.1747145009569.1747159962459.413&amp;__hssc=223811332.2.1747159962459&amp;__hsfp=3690629108">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠T-Minus⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a> Space Daily show) are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. This week’s follow-up brings two gems: a smart tip from a listener on handling suspicious “bank calls” by asking the caller to leave a note on your account, then verifying directly with your bank. Plus, a delightful story about “Chicken Camp,” where trainers hone their skills by teaching chickens tricks—proof that maybe one day a chicken-driven tractor isn’t such a far-fetched idea! Joe's story is on YouTube scam-baiters who helped expose a $65 million fraud ring that preyed on vulnerable victims, including a Holocaust survivor’s widow. Maria's got the story of how agentic AI browsers, designed to shop and click for you, proved alarmingly easy to trick into scams and phishing schemes—ushering in a new era of “Scamlexity.” Dave's story covers a growing luggage tag scam where discarded tags give scammers enough personal info to file false baggage claims against travelers. The catch of the day comes from listener Chad, who spotted a suspicious message likely aiming to hijack his Facebook account—but wisely didn’t take the bait.</p>
<p><strong>Resources and links to stories:</strong></p>
<ul>
  <li><a href="https://www.nbcsandiego.com/news/local/scammers-stole-life-savings-of-san-diego-holocaust-survivors-97-year-old-widow-da/3892773/">YouTube ‘scambaiters' expose ring that left Holocaust survivor's widow penniless: DA</a></li>
  <li><a href="https://guard.io/labs/scamlexity-we-put-agentic-ai-browsers-to-the-test-they-clicked-they-paid-they-failed">“Scamlexity” We Put Agentic AI Browsers to the Test - They Clicked, They Paid, They Failed</a></li>
  <li><a href="https://travelnoire.com/luggage-tag-scam">Airport Worker Reveals Growing Luggage Tag Scam Targeting Travelers</a></li>
</ul>
<p><a href="https://therecord.media/fin6-recruitment-scam-malware-campaign">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a>⁠⁠⁠Have a Catch of the Day you'd like to share? Email it to us at <a href="https://therecord.media/fin6-recruitment-scam-malware-campaign">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a><a href="mailto:hackinghumans@n2k.com">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠hackinghumans@n2k.com⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a>.</p>]]>
      </content:encoded>
      <itunes:duration>2637</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[49754d5a-cdd5-11ef-8599-073e23a71ef3]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW7248785896.mp3?updated=1756922340" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Hot sauce and hot takes: An Only Malware in the Building special. [OMITB]</title>
      <link>https://thecyberwire.com/podcasts/only-malware-in-the-building/15/notes</link>
      <description>Welcome in! You’ve entered, Only Malware in the Building — but this time, it’s not just another episode. This is a special edition you won’t want to miss.

For the first time, our hosts are together in-studio — and they’re turning up the heat. Literally. Join ⁠⁠⁠⁠⁠⁠Selena Larson⁠⁠⁠⁠⁠⁠, ⁠⁠⁠⁠⁠⁠Proofpoint⁠⁠⁠⁠⁠⁠ intelligence analyst and host of their podcast ⁠⁠⁠⁠⁠⁠DISCARDED⁠, along with ⁠⁠⁠⁠⁠⁠N2K Networks⁠⁠⁠⁠⁠⁠ ⁠⁠⁠⁠⁠⁠Dave Bittner⁠⁠⁠⁠⁠⁠ and ⁠⁠⁠⁠⁠Keith Mularski⁠⁠⁠⁠⁠, former FBI cybercrime investigator and now Chief Global Ambassador at ⁠⁠⁠⁠⁠Qintel⁠⁠⁠⁠⁠⁠⁠⁠⁠, as they take on a fiery hot wings challenge while answering personal questions about themselves, their careers, and the stories that shaped them. Think you’ve seen them tackle malware mysteries before? Wait until you see them sweat. 

This one’s too good for audio alone — you’ll want to watch the full ⁠video⁠ edition to catch every spicy reaction, every laugh, and maybe even a few tears.

So grab your milk, get ready to feel the burn, and come join us for this special hot take on Only Malware in the Building.</description>
      <pubDate>Tue, 02 Sep 2025 07:00:00 -0000</pubDate>
      <itunes:title>Hot sauce and hot takes: An Only Malware in the Building special. [OMITB]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>15</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/aa258880-850a-11f0-8430-c724c8a3617c/image/c9e03c2780f2971756311ea6bbed3d9a.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle/>
      <itunes:summary>Welcome in! You’ve entered, Only Malware in the Building — but this time, it’s not just another episode. This is a special edition you won’t want to miss.

For the first time, our hosts are together in-studio — and they’re turning up the heat. Literally. Join ⁠⁠⁠⁠⁠⁠Selena Larson⁠⁠⁠⁠⁠⁠, ⁠⁠⁠⁠⁠⁠Proofpoint⁠⁠⁠⁠⁠⁠ intelligence analyst and host of their podcast ⁠⁠⁠⁠⁠⁠DISCARDED⁠, along with ⁠⁠⁠⁠⁠⁠N2K Networks⁠⁠⁠⁠⁠⁠ ⁠⁠⁠⁠⁠⁠Dave Bittner⁠⁠⁠⁠⁠⁠ and ⁠⁠⁠⁠⁠Keith Mularski⁠⁠⁠⁠⁠, former FBI cybercrime investigator and now Chief Global Ambassador at ⁠⁠⁠⁠⁠Qintel⁠⁠⁠⁠⁠⁠⁠⁠⁠, as they take on a fiery hot wings challenge while answering personal questions about themselves, their careers, and the stories that shaped them. Think you’ve seen them tackle malware mysteries before? Wait until you see them sweat. 

This one’s too good for audio alone — you’ll want to watch the full ⁠video⁠ edition to catch every spicy reaction, every laugh, and maybe even a few tears.

So grab your milk, get ready to feel the burn, and come join us for this special hot take on Only Malware in the Building.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Welcome in! You’ve entered, <em>Only Malware in the Building</em> — but this time, it’s not just another episode. This is a special edition you won’t want to miss.</p>
<p>For the first time, our hosts are together <em>in-studio</em> — and they’re turning up the heat. Literally. Join ⁠⁠⁠⁠⁠<a href="https://www.linkedin.com/in/selenalarson/">⁠Selena Larson⁠⁠⁠⁠⁠⁠</a>, <a href="https://www.proofpoint.com/">⁠⁠⁠⁠⁠⁠Proofpoint⁠⁠⁠⁠⁠⁠</a> intelligence analyst and host of their podcast <a href="https://www.proofpoint.com/us/podcasts/discarded">⁠⁠⁠⁠⁠⁠DISCARDED⁠</a>, along with <a href="https://www.n2k.com/">⁠⁠⁠⁠⁠⁠N2K Networks⁠⁠⁠⁠⁠⁠</a> <a href="https://www.linkedin.com/in/dave-bittner-27231a4/">⁠⁠⁠⁠⁠⁠Dave Bittner⁠⁠⁠⁠⁠⁠</a> and <a href="https://www.linkedin.com/in/keith-mularski-b737551/">⁠⁠⁠⁠⁠Keith Mularski⁠⁠⁠⁠⁠</a>, former FBI cybercrime investigator and now Chief Global Ambassador at <a href="https://www.linkedin.com/company/qintel/">⁠⁠⁠⁠⁠Qintel⁠⁠⁠⁠⁠</a>⁠⁠⁠⁠, as they take on a fiery hot wings challenge while answering personal questions about themselves, their careers, and the stories that shaped them. Think you’ve seen them tackle malware mysteries before? Wait until you see them sweat. </p>
<p>This one’s too good for audio alone — you’ll want to watch the full <a href="https://youtu.be/HDgLBxEKx28">⁠video⁠</a> edition to catch every spicy reaction, every laugh, and maybe even a few tears.</p>
<p>So grab your milk, get ready to feel the burn, and come join us for this special hot take on <em>Only Malware in the Building.</em></p>]]>
      </content:encoded>
      <itunes:duration>2197</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[aa258880-850a-11f0-8430-c724c8a3617c]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW1297959431.mp3?updated=1756494533" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>DevOps (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/98/notes</link>
      <description>Please enjoy this encore of Word Notes. 

The set of people, process, technology, and cultural norms that integrates software development and IT operations into a system-of-systems.

CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/devops⁠

Audio reference link: "⁠10+ Deploys Per Day: Dev and Ops Cooperation at Flickr⁠," by John Allspaw and Paul Hammond, Velocity 09, 25 July 2009.</description>
      <pubDate>Tue, 02 Sep 2025 07:00:00 -0000</pubDate>
      <itunes:title>DevOps (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>98</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/046b3736-84e8-11f0-8dba-17230bb32ed7/image/441b0ca2db080b93b935568d381ce462.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle/>
      <itunes:summary>Please enjoy this encore of Word Notes. 

The set of people, process, technology, and cultural norms that integrates software development and IT operations into a system-of-systems.

CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/devops⁠

Audio reference link: "⁠10+ Deploys Per Day: Dev and Ops Cooperation at Flickr⁠," by John Allspaw and Paul Hammond, Velocity 09, 25 July 2009.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore of Word Notes. </p>
<p>The set of people, process, technology, and cultural norms that integrates software development and IT operations into a system-of-systems.</p>
<p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/devops">⁠https://thecyberwire.com/glossary/devops⁠</a></p>
<p>Audio reference link: "<a href="https://www.youtube.com/watch?v=LdOe18KhtT4">⁠10+ Deploys Per Day: Dev and Ops Cooperation at Flickr⁠</a>," by John Allspaw and Paul Hammond, Velocity 09, 25 July 2009.</p>]]>
      </content:encoded>
      <itunes:duration>450</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[046b3736-84e8-11f0-8dba-17230bb32ed7]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW5379136833.mp3?updated=1736193883" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Social engineering served sunny-side up.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/352/notes</link>
      <description>This week, our hosts⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Dave Bittner⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠, ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Joe Carrigan⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠, and ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Maria Varmazis⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ (also host of the ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠T-Minus⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ Space Daily show) are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. We start with some follow up, this time involving a surprising new flock of chickens and a listener note from Belgium. Via Peter Janssen, as he’s seen the same fake “employee discount” scams we covered, only this time targeting backpacks and other products. Dave's story is on a new “podcast imposter” scam, where fake invites trick business owners and influencers into giving remote access so attackers can hijack their accounts. Joe's got a story on Workday disclosing a breach after attackers used social engineering to infiltrate a third-party CRM system, and why this matters given Workday’s wide use as the front end for so many companies’ HR departments. Maria brings two quick hits this week: a fake FedEx text scam making the rounds, and a look at whether covering kids’ faces with emojis in photos really protects their privacy — or if it’s more illusion than protection. On today's catch of the day, Dave got a text claiming he’s been recommended for a high-paying, no-experience-needed YouTube job—classic signs of a scam promising easy money and “free training.”

Complete our annual ⁠⁠⁠⁠⁠⁠⁠⁠audience survey⁠⁠⁠⁠⁠⁠⁠⁠ before August 31. 

Resources and links to stories:


  
⁠⁠Dumbest Friend Just Bought 20 Chickens


  Executives Warned About Celebrity Podcast Scams

  Workday Discloses Data Breach Following CRM-Targeted Social Engineering Attack

  Will covering your child’s face with an emoji actually protect their privacy?


⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Have a Catch of the Day you'd like to share? Email it to us at ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠hackinghumans@n2k.com⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠.</description>
      <pubDate>Thu, 28 Aug 2025 05:00:00 -0000</pubDate>
      <itunes:title>Social engineering served sunny-side up.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>352</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>This week, our hosts⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Dave Bittner⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠, ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Joe Carrigan⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠, and ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Maria Varmazis⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ (also host of the ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠T-Minus⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ Space Daily show) are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. We start with some follow up, this time involving a surprising new flock of chickens and a listener note from Belgium. Via Peter Janssen, as he’s seen the same fake “employee discount” scams we covered, only this time targeting backpacks and other products. Dave's story is on a new “podcast imposter” scam, where fake invites trick business owners and influencers into giving remote access so attackers can hijack their accounts. Joe's got a story on Workday disclosing a breach after attackers used social engineering to infiltrate a third-party CRM system, and why this matters given Workday’s wide use as the front end for so many companies’ HR departments. Maria brings two quick hits this week: a fake FedEx text scam making the rounds, and a look at whether covering kids’ faces with emojis in photos really protects their privacy — or if it’s more illusion than protection. On today's catch of the day, Dave got a text claiming he’s been recommended for a high-paying, no-experience-needed YouTube job—classic signs of a scam promising easy money and “free training.”

Complete our annual ⁠⁠⁠⁠⁠⁠⁠⁠audience survey⁠⁠⁠⁠⁠⁠⁠⁠ before August 31. 

Resources and links to stories:


  
⁠⁠Dumbest Friend Just Bought 20 Chickens


  Executives Warned About Celebrity Podcast Scams

  Workday Discloses Data Breach Following CRM-Targeted Social Engineering Attack

  Will covering your child’s face with an emoji actually protect their privacy?


⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Have a Catch of the Day you'd like to share? Email it to us at ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠hackinghumans@n2k.com⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This week, our hosts<a href="https://www.linkedin.com/in/dave-bittner-27231a4/">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a> <a href="https://www.linkedin.com/in/dave-bittner-27231a4/">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Dave Bittner⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a>, <a href="https://www.linkedin.com/in/joecarrigan/">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Joe Carrigan⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a>, and <a href="https://www.linkedin.com/in/varmazis/">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Maria Varmazis⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a> (also host of the <a href="https://space.n2k.com/podcasts/t-minus?__hstc=223811332.a636bba53840b4700c929fe67723a129.1721054632698.1747145009569.1747159962459.413&amp;__hssc=223811332.2.1747159962459&amp;__hsfp=3690629108">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠T-Minus⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a> Space Daily show) are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. We start with some follow up, this time involving a surprising new flock of chickens and a listener note from Belgium. Via Peter Janssen, as he’s seen the same fake “employee discount” scams we covered, only this time targeting backpacks and other products. Dave's story is on a new “podcast imposter” scam, where fake invites trick business owners and influencers into giving remote access so attackers can hijack their accounts. Joe's got a story on Workday disclosing a breach after attackers used social engineering to infiltrate a third-party CRM system, and why this matters given Workday’s wide use as the front end for so many companies’ HR departments. Maria brings two quick hits this week: a fake FedEx text scam making the rounds, and a look at whether covering kids’ faces with emojis in photos really protects their privacy — or if it’s more illusion than protection. On today's catch of the day, Dave got a text claiming he’s been recommended for a high-paying, no-experience-needed YouTube job—classic signs of a scam promising easy money and “free training.”</p>
<p>Complete our annual <a href="https://www.surveymonkey.com/r/JD7JFL2">⁠⁠⁠⁠⁠⁠⁠⁠audience survey⁠⁠⁠⁠⁠⁠⁠</a>⁠ before August 31. </p>
<p><strong>Resources and links to stories:</strong></p>
<ul>
  <li>
<a href="https://www.reddit.com/r/Scams/comments/1l7doa0/us_spotify_job_recruitment_scam/">⁠⁠</a><a href="https://theonion.com/dumbest-friend-just-bought-20-chickens/">Dumbest Friend Just Bought 20 Chickens</a>
</li>
  <li><a href="https://www.infosecurity-magazine.com/news/experts-warn-executives-celebrity/">Executives Warned About Celebrity Podcast Scams</a></li>
  <li><a href="https://www.itsecurityguru.org/2025/08/20/workday-discloses-data-breach-following-crm-targeted-social-engineering-attack/">Workday Discloses Data Breach Following CRM-Targeted Social Engineering Attack</a></li>
  <li><a href="https://www.the-independent.com/life-style/instagram-child-face-emoji-is-it-worth-it-b2777571.html">Will covering your child’s face with an emoji actually protect their privacy?</a></li>
</ul>
<p><a href="https://therecord.media/fin6-recruitment-scam-malware-campaign">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a>⁠⁠⁠Have a Catch of the Day you'd like to share? Email it to us at <a href="https://therecord.media/fin6-recruitment-scam-malware-campaign">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a><a href="mailto:hackinghumans@n2k.com">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠hackinghumans@n2k.com⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a>.</p>]]>
      </content:encoded>
      <itunes:duration>2937</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[4916b09c-cdd5-11ef-8599-1f700b85c1cc]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW9166495327.mp3?updated=1756226815" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Waterfall Software Development Method (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/97/notes</link>
      <description>Please enjoy this encore of Word Notes.

A software development model that relies on a series of sequential steps that flow into each other, like a series of waterfalls. 

CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/waterfall-software-development⁠

Audio reference link: “⁠Creating Video Games - Agile Software Development,⁠” by Sara Verrilli, MIT OpenCourseWare, YouTube, 10 December 2015</description>
      <pubDate>Tue, 26 Aug 2025 07:00:00 -0000</pubDate>
      <itunes:title>Waterfall Software Development Method (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>97</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/48eaab40-81c7-11f0-970c-c3dd00d05167/image/441b0ca2db080b93b935568d381ce462.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle/>
      <itunes:summary>Please enjoy this encore of Word Notes.

A software development model that relies on a series of sequential steps that flow into each other, like a series of waterfalls. 

CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/waterfall-software-development⁠

Audio reference link: “⁠Creating Video Games - Agile Software Development,⁠” by Sara Verrilli, MIT OpenCourseWare, YouTube, 10 December 2015</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore of Word Notes.</p>
<p>A software development model that relies on a series of sequential steps that flow into each other, like a series of waterfalls. </p>
<p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/waterfall-software-development">⁠https://thecyberwire.com/glossary/waterfall-software-development⁠</a></p>
<p>Audio reference link: “<a href="https://www.youtube.com/watch?v=UxMpn92vGXs">⁠Creating Video Games - Agile Software Development,⁠</a>” by Sara Verrilli, MIT OpenCourseWare, YouTube, 10 December 2015</p>]]>
      </content:encoded>
      <itunes:duration>385</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[48eaab40-81c7-11f0-970c-c3dd00d05167]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW4648304070.mp3?updated=1736193882" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Scammers hit the right notes in the wrong way. </title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/351/notes</link>
      <description>This week, our hosts⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ ⁠⁠⁠⁠⁠⁠⁠⁠Dave Bittner⁠⁠⁠⁠⁠⁠⁠⁠, ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Joe Carrigan⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠, and ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Maria Varmazis⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ (also host of the ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠T-Minus⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ Space Daily show) are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. We start with some follow up from Chris Martin, a long-time listener and fan of the show. Chris shares that his employer uses Hoxhunt for cybersecurity awareness training and came across a fun gem worth mentioning. Next, Jay writes in with a heads-up about a scam running in large cities. Criminals are reportedly sticking phones to desirable cars and then using the tracking features to show up at victims’ homes to steal the vehicles. Joe has more info on his chickens. Maria shares the story of a Spotify job recruitment scam and the email she received, where scammers used a convincing fake site to mimic Spotify’s real careers page in an attempt to steal logins. Joe has two stories this week, the first on federal investigators charging 13 people in a $5 million “grandparent scam” that targeted hundreds of elderly victims, a scheme uncovered after Uber flagged suspicious activity to the FBI when its drivers were unknowingly used to move cash. His second story looks at Northern California, where two suspects were arrested in a “cash drop scam” linked to more than 40 cases across six states, after a sharp-eyed loss prevention agent recognized the scheme and alerted police. Dave’s story this week covers federal investigators charging 13 people in a $5 million “grandparent scam” that targeted hundreds of elderly victims, uncovered after Uber flagged suspicious activity to the FBI when its drivers were unknowingly used to move cash. Our Catch of the Day comes from Patrick, who shared a scam email claiming to be from the IMF offering a $9.8 million “compensation fund” paid out in daily $5,000 MoneyGram transfers—if the recipient just hands over all their personal details.

Complete our annual ⁠⁠⁠⁠⁠⁠⁠audience survey⁠⁠⁠⁠⁠⁠⁠ before August 31. 

Resources and links to stories:


  ⁠Spotify Job Recruitment scam

  Uber drivers help end scam targeting hundreds of grandparents, U.S. attorney says

  ‘Cash drop scam’ in Northern California leads to two arrests, linked to 40 cases

  Good Morning Britain Correspondent Noel Phillips Loses Life Savings in Elaborate Phone Scam. How Can Your Stay Safe

  living nightmare Good Morning Britain host loses ‘whole life savings’ to phone scam and admits ‘the shame is devastating’


⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Have a Catch of the Day you'd like to share? Email it to us at ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠hackinghumans@n2k.com⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠.</description>
      <pubDate>Thu, 21 Aug 2025 05:00:00 -0000</pubDate>
      <itunes:title>Scammers hit the right notes in the wrong way. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>351</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>This week, our hosts⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ ⁠⁠⁠⁠⁠⁠⁠⁠Dave Bittner⁠⁠⁠⁠⁠⁠⁠⁠, ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Joe Carrigan⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠, and ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Maria Varmazis⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ (also host of the ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠T-Minus⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ Space Daily show) are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. We start with some follow up from Chris Martin, a long-time listener and fan of the show. Chris shares that his employer uses Hoxhunt for cybersecurity awareness training and came across a fun gem worth mentioning. Next, Jay writes in with a heads-up about a scam running in large cities. Criminals are reportedly sticking phones to desirable cars and then using the tracking features to show up at victims’ homes to steal the vehicles. Joe has more info on his chickens. Maria shares the story of a Spotify job recruitment scam and the email she received, where scammers used a convincing fake site to mimic Spotify’s real careers page in an attempt to steal logins. Joe has two stories this week, the first on federal investigators charging 13 people in a $5 million “grandparent scam” that targeted hundreds of elderly victims, a scheme uncovered after Uber flagged suspicious activity to the FBI when its drivers were unknowingly used to move cash. His second story looks at Northern California, where two suspects were arrested in a “cash drop scam” linked to more than 40 cases across six states, after a sharp-eyed loss prevention agent recognized the scheme and alerted police. Dave’s story this week covers federal investigators charging 13 people in a $5 million “grandparent scam” that targeted hundreds of elderly victims, uncovered after Uber flagged suspicious activity to the FBI when its drivers were unknowingly used to move cash. Our Catch of the Day comes from Patrick, who shared a scam email claiming to be from the IMF offering a $9.8 million “compensation fund” paid out in daily $5,000 MoneyGram transfers—if the recipient just hands over all their personal details.

Complete our annual ⁠⁠⁠⁠⁠⁠⁠audience survey⁠⁠⁠⁠⁠⁠⁠ before August 31. 

Resources and links to stories:


  ⁠Spotify Job Recruitment scam

  Uber drivers help end scam targeting hundreds of grandparents, U.S. attorney says

  ‘Cash drop scam’ in Northern California leads to two arrests, linked to 40 cases

  Good Morning Britain Correspondent Noel Phillips Loses Life Savings in Elaborate Phone Scam. How Can Your Stay Safe

  living nightmare Good Morning Britain host loses ‘whole life savings’ to phone scam and admits ‘the shame is devastating’


⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Have a Catch of the Day you'd like to share? Email it to us at ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠hackinghumans@n2k.com⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This week, our hosts<a href="https://www.linkedin.com/in/dave-bittner-27231a4/">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a> <a href="https://www.linkedin.com/in/dave-bittner-27231a4/">⁠⁠⁠⁠⁠⁠⁠⁠Dave Bittner⁠⁠⁠⁠⁠⁠⁠⁠</a>, <a href="https://www.linkedin.com/in/joecarrigan/">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Joe Carrigan⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a>, and <a href="https://www.linkedin.com/in/varmazis/">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Maria Varmazis⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a> (also host of the <a href="https://space.n2k.com/podcasts/t-minus?__hstc=223811332.a636bba53840b4700c929fe67723a129.1721054632698.1747145009569.1747159962459.413&amp;__hssc=223811332.2.1747159962459&amp;__hsfp=3690629108">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠T-Minus⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a> Space Daily show) are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. We start with some follow up from Chris Martin, a long-time listener and fan of the show. Chris shares that his employer uses Hoxhunt for cybersecurity awareness training and came across a fun gem worth mentioning. Next, Jay writes in with a heads-up about a scam running in large cities. Criminals are reportedly sticking phones to desirable cars and then using the tracking features to show up at victims’ homes to steal the vehicles. Joe has more info on his chickens. Maria shares the story of a Spotify job recruitment scam and the email she received, where scammers used a convincing fake site to mimic Spotify’s real careers page in an attempt to steal logins. Joe has two stories this week, the first on federal investigators charging 13 people in a $5 million “grandparent scam” that targeted hundreds of elderly victims, a scheme uncovered after Uber flagged suspicious activity to the FBI when its drivers were unknowingly used to move cash. His second story looks at Northern California, where two suspects were arrested in a “cash drop scam” linked to more than 40 cases across six states, after a sharp-eyed loss prevention agent recognized the scheme and alerted police. Dave’s story this week covers federal investigators charging 13 people in a $5 million “grandparent scam” that targeted hundreds of elderly victims, uncovered after Uber flagged suspicious activity to the FBI when its drivers were unknowingly used to move cash. Our Catch of the Day comes from Patrick, who shared a scam email claiming to be from the IMF offering a $9.8 million “compensation fund” paid out in daily $5,000 MoneyGram transfers—if the recipient just hands over all their personal details.</p>
<p>Complete our annual <a href="https://www.surveymonkey.com/r/JD7JFL2">⁠⁠⁠⁠⁠⁠⁠audience survey⁠⁠⁠⁠⁠⁠</a>⁠ before August 31. </p>
<p><strong>Resources and links to stories:</strong></p>
<ul>
  <li><a href="https://www.reddit.com/r/Scams/comments/1l7doa0/us_spotify_job_recruitment_scam/">⁠Spotify Job Recruitment scam</a></li>
  <li><a href="https://www.cbsnews.com/boston/news/massachusetts-grandparent-scam-charges-us-attorney-leah-foley/">Uber drivers help end scam targeting hundreds of grandparents, U.S. attorney says</a></li>
  <li><a href="https://fox40.com/news/local-news/cash-drop-scam-in-northern-california-leads-to-two-arrests-linked-to-40-cases/">‘Cash drop scam’ in Northern California leads to two arrests, linked to 40 cases</a></li>
  <li><a href="https://www.bitdefender.com/en-us/blog/hotforsecurity/good-morning-britain-correspondent-noel-phillips-loses-life-savings-in-elaborate-phone-scam-how-can-your-stay-safe">Good Morning Britain Correspondent Noel Phillips Loses Life Savings in Elaborate Phone Scam. How Can Your Stay Safe</a></li>
  <li><a href="https://www.thesun.co.uk/tv/36170763/gmb-noel-phillips-loses-life-savings-scam-fraud-bank/">living nightmare Good Morning Britain host loses ‘whole life savings’ to phone scam and admits ‘the shame is devastating’</a></li>
</ul>
<p><a href="https://therecord.media/fin6-recruitment-scam-malware-campaign">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a>⁠⁠⁠Have a Catch of the Day you'd like to share? Email it to us at <a href="https://therecord.media/fin6-recruitment-scam-malware-campaign">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a><a href="mailto:hackinghumans@n2k.com">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠hackinghumans@n2k.com⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a>.</p>]]>
      </content:encoded>
      <itunes:duration>2946</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[48e75360-cdd5-11ef-8599-ff1bb105b13d]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW2851992122.mp3?updated=1755709873" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Agile Software Development Method (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/96/notes</link>
      <description>Please enjoy this encore of Word Notes. 

A software development philosophy that emphasizes incremental delivery, team collaboration, continual planning, and continual learning 

CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/agile-software-development⁠

Audio reference link: "⁠Velocity 09: John Allspaw and Paul Hammond, "10+ Deploys Pe,⁠" John Allspaw and Paul Hammond, 2009 Velocity Conference, YouTube, 25 June 2009.</description>
      <pubDate>Tue, 19 Aug 2025 07:00:00 -0000</pubDate>
      <itunes:title>Agile Software Development Method (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>96</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/31cbfa00-7c58-11f0-b038-6bdeffca97b0/image/441b0ca2db080b93b935568d381ce462.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle/>
      <itunes:summary>Please enjoy this encore of Word Notes. 

A software development philosophy that emphasizes incremental delivery, team collaboration, continual planning, and continual learning 

CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/agile-software-development⁠

Audio reference link: "⁠Velocity 09: John Allspaw and Paul Hammond, "10+ Deploys Pe,⁠" John Allspaw and Paul Hammond, 2009 Velocity Conference, YouTube, 25 June 2009.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore of Word Notes. </p>
<p>A software development philosophy that emphasizes incremental delivery, team collaboration, continual planning, and continual learning </p>
<p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/agile-software-development">⁠https://thecyberwire.com/glossary/agile-software-development⁠</a></p>
<p>Audio reference link: "<a href="https://www.youtube.com/watch?v=LdOe18KhtT4">⁠Velocity 09: John Allspaw and Paul Hammond, "10+ Deploys Pe,⁠</a>" John Allspaw and Paul Hammond, 2009 Velocity Conference, YouTube, 25 June 2009.</p>]]>
      </content:encoded>
      <itunes:duration>465</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[31cbfa00-7c58-11f0-b038-6bdeffca97b0]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW9771646905.mp3?updated=1736193883" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>This scam is now in session.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/350/notes</link>
      <description>This week, our hosts⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ ⁠⁠⁠⁠⁠⁠⁠Dave Bittner⁠⁠⁠⁠⁠⁠⁠, ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Joe Carrigan⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠, and ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Maria Varmazis⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ (also host of the ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠T-Minus⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ Space Daily show) are back sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. Joe's story is on WhatsApp rolling out new anti-scam tools, disrupting over 6.8 million scam-linked accounts, and partnering with experts to share tips on spotting and avoiding sophisticated cross-platform scams run by organized crime networks. Dave's got the story of how “PharmaFraud” — a global network of fake online pharmacies — scams consumers with counterfeit or dangerous medications, stealing money and personal data while putting health and safety at serious risk. Maria dives into the story on a new twist to jury duty scams, where callers posing as police direct victims to fake government websites to steal personal data and money, often demanding payment through cryptocurrency or other untraceable methods. Our catch of the day comes from listener Adam who shares a SiriusXM payment scam they received through an email. 

Complete our annual ⁠⁠⁠⁠⁠⁠audience survey⁠⁠⁠⁠⁠⁠ before August 31.

Resources and links to stories:


  New WhatsApp Tools and Tips to Beat Messaging Scams

  Disrupting malicious uses of AI: June 2025

  PharmaFraud: how illegal online pharmacies endanger your health and your wallet

  Scammers are using fake websites in a twist on jury duty scams


⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Have a Catch of the Day you'd like to share? Email it to us at ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠hackinghumans@n2k.com⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠.</description>
      <pubDate>Thu, 14 Aug 2025 05:00:00 -0000</pubDate>
      <itunes:title>This scam is now in session.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>350</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>This week, our hosts⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ ⁠⁠⁠⁠⁠⁠⁠Dave Bittner⁠⁠⁠⁠⁠⁠⁠, ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Joe Carrigan⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠, and ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Maria Varmazis⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ (also host of the ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠T-Minus⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ Space Daily show) are back sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. Joe's story is on WhatsApp rolling out new anti-scam tools, disrupting over 6.8 million scam-linked accounts, and partnering with experts to share tips on spotting and avoiding sophisticated cross-platform scams run by organized crime networks. Dave's got the story of how “PharmaFraud” — a global network of fake online pharmacies — scams consumers with counterfeit or dangerous medications, stealing money and personal data while putting health and safety at serious risk. Maria dives into the story on a new twist to jury duty scams, where callers posing as police direct victims to fake government websites to steal personal data and money, often demanding payment through cryptocurrency or other untraceable methods. Our catch of the day comes from listener Adam who shares a SiriusXM payment scam they received through an email. 

Complete our annual ⁠⁠⁠⁠⁠⁠audience survey⁠⁠⁠⁠⁠⁠ before August 31.

Resources and links to stories:


  New WhatsApp Tools and Tips to Beat Messaging Scams

  Disrupting malicious uses of AI: June 2025

  PharmaFraud: how illegal online pharmacies endanger your health and your wallet

  Scammers are using fake websites in a twist on jury duty scams


⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Have a Catch of the Day you'd like to share? Email it to us at ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠hackinghumans@n2k.com⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This week, our hosts<a href="https://www.linkedin.com/in/dave-bittner-27231a4/">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a> <a href="https://www.linkedin.com/in/dave-bittner-27231a4/">⁠⁠⁠⁠⁠⁠⁠Dave Bittner⁠⁠⁠⁠⁠⁠⁠</a>, <a href="https://www.linkedin.com/in/joecarrigan/">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Joe Carrigan⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a>, and <a href="https://www.linkedin.com/in/varmazis/">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Maria Varmazis⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a> (also host of the <a href="https://space.n2k.com/podcasts/t-minus?__hstc=223811332.a636bba53840b4700c929fe67723a129.1721054632698.1747145009569.1747159962459.413&amp;__hssc=223811332.2.1747159962459&amp;__hsfp=3690629108">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠T-Minus⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a> Space Daily show) are back sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. Joe's story is on WhatsApp rolling out new anti-scam tools, disrupting over 6.8 million scam-linked accounts, and partnering with experts to share tips on spotting and avoiding sophisticated cross-platform scams run by organized crime networks. Dave's got the story of how “PharmaFraud” — a global network of fake online pharmacies — scams consumers with counterfeit or dangerous medications, stealing money and personal data while putting health and safety at serious risk. Maria dives into the story on a new twist to jury duty scams, where callers posing as police direct victims to fake government websites to steal personal data and money, often demanding payment through cryptocurrency or other untraceable methods. Our catch of the day comes from listener Adam who shares a SiriusXM payment scam they received through an email. </p>
<p>Complete our annual <a href="https://www.surveymonkey.com/r/JD7JFL2">⁠⁠⁠⁠⁠⁠audience survey⁠⁠⁠⁠⁠</a>⁠ before August 31.</p>
<p><strong>Resources and links to stories:</strong></p>
<ul>
  <li><a href="https://about.fb.com/news/2025/08/new-whatsapp-tools-tips-beat-messaging-scams/">New WhatsApp Tools and Tips to Beat Messaging Scams</a></li>
  <li><a href="https://cdn.openai.com/threat-intelligence-reports/5f73af09-a3a3-4a55-992e-069237681620/disrupting-malicious-uses-of-ai-june-2025.pdf">Disrupting malicious uses of AI: June 2025</a></li>
  <li><a href="https://blog.avast.com/pharmafraud-fake-pharmacies">PharmaFraud: how illegal online pharmacies endanger your health and your wallet</a></li>
  <li><a href="https://consumer.ftc.gov/consumer-alerts/2025/08/scammers-are-using-fake-websites-twist-jury-duty-scams">Scammers are using fake websites in a twist on jury duty scams</a></li>
</ul>
<p><a href="https://therecord.media/fin6-recruitment-scam-malware-campaign">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a>⁠⁠⁠Have a Catch of the Day you'd like to share? Email it to us at <a href="https://therecord.media/fin6-recruitment-scam-malware-campaign">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a><a href="mailto:hackinghumans@n2k.com">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠hackinghumans@n2k.com⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a>.</p>]]>
      </content:encoded>
      <itunes:duration>2705</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[4945a168-cdd5-11ef-8599-dfaa9dcf47f8]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW1524120746.mp3?updated=1755007252" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Pegasus (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/95/notes</link>
      <description>Please enjoy this encore of Word Notes.

The flagship product of the controversial Israeli spyware vendor, the NSO Group, use for remotely hacking mobile devices, most notably iPhones, via zero-click exploits.

CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/pegasus⁠

Audio reference link:⁠“Cybersecurity beyond the Headlines: A Conversation with Journalist Nicole Perlroth⁠,” Kristen Eichensehr, and Nicole Perlroth, University of Virginia School of Law, YouTube, 14 February 2022</description>
      <pubDate>Tue, 12 Aug 2025 07:00:00 -0000</pubDate>
      <itunes:title>Pegasus (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>95</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/5d21d8c8-76b8-11f0-9d2d-1bcad4ea49d1/image/441b0ca2db080b93b935568d381ce462.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle/>
      <itunes:summary>Please enjoy this encore of Word Notes.

The flagship product of the controversial Israeli spyware vendor, the NSO Group, use for remotely hacking mobile devices, most notably iPhones, via zero-click exploits.

CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/pegasus⁠

Audio reference link:⁠“Cybersecurity beyond the Headlines: A Conversation with Journalist Nicole Perlroth⁠,” Kristen Eichensehr, and Nicole Perlroth, University of Virginia School of Law, YouTube, 14 February 2022</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore of Word Notes.</p>
<p>The flagship product of the controversial Israeli spyware vendor, the NSO Group, use for remotely hacking mobile devices, most notably iPhones, via zero-click exploits.</p>
<p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/pegasus">⁠https://thecyberwire.com/glossary/pegasus⁠</a></p>
<p>Audio reference link:<a href="https://www.youtube.com/watch?v=qeCTmEqnKnU">⁠“Cybersecurity beyond the Headlines: A Conversation with Journalist Nicole Perlroth⁠</a>,” Kristen Eichensehr, and Nicole Perlroth, University of Virginia School of Law, YouTube, 14 February 2022</p>]]>
      </content:encoded>
      <itunes:duration>525</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[5d21d8c8-76b8-11f0-9d2d-1bcad4ea49d1]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW5002881513.mp3?updated=1736193882" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Yeti or not, it’s a scam.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/349/notes</link>
      <description>This week, our hosts⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ ⁠⁠⁠⁠⁠⁠Dave Bittner⁠⁠⁠⁠⁠⁠, ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Joe Carrigan⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠, and ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Maria Varmazis⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ (also host of the ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠T-Minus⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ Space Daily show) are back sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. We start with some follow-up on an Arizona woman sentenced to over eight years in prison for running a “laptop farm” that helped North Korean IT workers pose as U.S. employees at hundreds of American companies, funneling over $17 million to Pyongyang through stolen identities and remote access. We also share an update on Joe's Profile picture. We start with Dave’s story on a Facebook scam falsely claiming insider access to a secret Yeti cooler deal from Dick’s Sporting Goods, using a fake emotional backstory to lure users into clicking a malicious link under the guise of an employee-only loophole. Maria’s story is on escalating violence at the Thailand-Cambodia border, where a long-standing territorial dispute has reignited after a leaked phone call between leaders fractured a decades-old political friendship, sparking deadly clashes, diplomatic fallout, and rising tensions fueled by personal betrayal, political instability, and mutual economic pressures. Joe’s story follows the indictment of a former Tri-Cities pastor who allegedly used his position and a fake cryptocurrency scheme called “Solano Fi” to defraud his congregation and others out of millions, promising risk-free returns while siphoning the funds for himself and his co-conspirators. Our catch of the day comes from Joe who shares an interesting email from "Xfinity."

Complete our annual ⁠⁠⁠⁠⁠audience survey⁠⁠⁠⁠⁠ before August 31.

Resources and links to stories:


  
⁠⁠⁠⁠⁠Arizona woman sentenced over $17 million North Korea worker fraud scheme⁠


  
Facebook: Ava Davis 

  Facebook

  Facebook

  Facebook

  The fractured friendship behind the fight at the Thailand-Cambodia border

  Lethal Cambodia-Thailand border clash linked to cyber-scam slave camps

  Beneath the Border: Scam Centers and the Thailand–Cambodia Conflict

  Grand Jury Charges Pastor, Wife in Alleged Multi-Million Dollar Cryptocurrency Scam

  Former Tri-Cities Pastor Indicted for Multi-Million Dollar Cryptocurrency Scam


⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Have a Catch of the Day you'd like to share? Email it to us at ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠hackinghumans@n2k.com⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠.</description>
      <pubDate>Thu, 07 Aug 2025 05:00:00 -0000</pubDate>
      <itunes:title>Yeti or not, it’s a scam.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>349</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>This week, our hosts⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ ⁠⁠⁠⁠⁠⁠Dave Bittner⁠⁠⁠⁠⁠⁠, ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Joe Carrigan⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠, and ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Maria Varmazis⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ (also host of the ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠T-Minus⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ Space Daily show) are back sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. We start with some follow-up on an Arizona woman sentenced to over eight years in prison for running a “laptop farm” that helped North Korean IT workers pose as U.S. employees at hundreds of American companies, funneling over $17 million to Pyongyang through stolen identities and remote access. We also share an update on Joe's Profile picture. We start with Dave’s story on a Facebook scam falsely claiming insider access to a secret Yeti cooler deal from Dick’s Sporting Goods, using a fake emotional backstory to lure users into clicking a malicious link under the guise of an employee-only loophole. Maria’s story is on escalating violence at the Thailand-Cambodia border, where a long-standing territorial dispute has reignited after a leaked phone call between leaders fractured a decades-old political friendship, sparking deadly clashes, diplomatic fallout, and rising tensions fueled by personal betrayal, political instability, and mutual economic pressures. Joe’s story follows the indictment of a former Tri-Cities pastor who allegedly used his position and a fake cryptocurrency scheme called “Solano Fi” to defraud his congregation and others out of millions, promising risk-free returns while siphoning the funds for himself and his co-conspirators. Our catch of the day comes from Joe who shares an interesting email from "Xfinity."

Complete our annual ⁠⁠⁠⁠⁠audience survey⁠⁠⁠⁠⁠ before August 31.

Resources and links to stories:


  
⁠⁠⁠⁠⁠Arizona woman sentenced over $17 million North Korea worker fraud scheme⁠


  
Facebook: Ava Davis 

  Facebook

  Facebook

  Facebook

  The fractured friendship behind the fight at the Thailand-Cambodia border

  Lethal Cambodia-Thailand border clash linked to cyber-scam slave camps

  Beneath the Border: Scam Centers and the Thailand–Cambodia Conflict

  Grand Jury Charges Pastor, Wife in Alleged Multi-Million Dollar Cryptocurrency Scam

  Former Tri-Cities Pastor Indicted for Multi-Million Dollar Cryptocurrency Scam


⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Have a Catch of the Day you'd like to share? Email it to us at ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠hackinghumans@n2k.com⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This week, our hosts<a href="https://www.linkedin.com/in/dave-bittner-27231a4/">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a> <a href="https://www.linkedin.com/in/dave-bittner-27231a4/">⁠⁠⁠⁠⁠⁠Dave Bittner⁠⁠⁠⁠⁠⁠</a>, <a href="https://www.linkedin.com/in/joecarrigan/">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Joe Carrigan⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a>, and <a href="https://www.linkedin.com/in/varmazis/">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Maria Varmazis⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a> (also host of the <a href="https://space.n2k.com/podcasts/t-minus?__hstc=223811332.a636bba53840b4700c929fe67723a129.1721054632698.1747145009569.1747159962459.413&amp;__hssc=223811332.2.1747159962459&amp;__hsfp=3690629108">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠T-Minus⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a> Space Daily show) are back sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. We start with some follow-up on an Arizona woman sentenced to over eight years in prison for running a “laptop farm” that helped North Korean IT workers pose as U.S. employees at hundreds of American companies, funneling over $17 million to Pyongyang through stolen identities and remote access. We also share an update on Joe's Profile picture. We start with Dave’s story on a Facebook scam falsely claiming insider access to a secret Yeti cooler deal from Dick’s Sporting Goods, using a fake emotional backstory to lure users into clicking a malicious link under the guise of an employee-only loophole. Maria’s story is on escalating violence at the Thailand-Cambodia border, where a long-standing territorial dispute has reignited after a leaked phone call between leaders fractured a decades-old political friendship, sparking deadly clashes, diplomatic fallout, and rising tensions fueled by personal betrayal, political instability, and mutual economic pressures. Joe’s story follows the indictment of a former Tri-Cities pastor who allegedly used his position and a fake cryptocurrency scheme called “Solano Fi” to defraud his congregation and others out of millions, promising risk-free returns while siphoning the funds for himself and his co-conspirators. Our catch of the day comes from Joe who shares an interesting email from "Xfinity."</p>
<p>Complete our annual <a href="https://www.surveymonkey.com/r/JD7JFL2">⁠⁠⁠⁠⁠audience survey⁠⁠⁠⁠</a>⁠ before August 31.</p>
<p><strong>Resources and links to stories:</strong></p>
<ul>
  <li>
<a href="https://arstechnica.com/ai/2025/07/ai-therapy-bots-fuel-delusions-and-give-dangerous-advice-stanford-study-finds/">⁠⁠⁠⁠</a><a href="https://cyberscoop.com/scattered-spider-social-engineering-cybercrime/">⁠</a><a href="https://www.msn.com/en-us/news/us/arizona-woman-sentenced-over-17-million-north-korea-worker-fraud-scheme/ar-AA1Jgvu4?ocid=msedgntp&amp;pc=U531&amp;cvid=f9d07f38138743619d4b3947212eeb7b&amp;ei=40">Arizona woman sentenced over $17 million North Korea worker fraud scheme⁠</a>
</li>
  <li>
<a href="https://www.facebook.com/people/Ava-Davis/61578715620935/">Facebook: Ava Davis</a> </li>
  <li><a href="https://www.facebook.com/people/Charity-Allen/61577012990629/">Facebook</a></li>
  <li><a href="https://www.facebook.com/people/Wanda-Hartmann/61576350054223/">Facebook</a></li>
  <li><a href="https://www.facebook.com/people/Emily-Katherine/61578235037728/">Facebook</a></li>
  <li><a href="https://www.bbc.com/news/articles/cvg1gdgy2pyo">The fractured friendship behind the fight at the Thailand-Cambodia border</a></li>
  <li><a href="https://www.theregister.com/2025/07/31/thai_cambodia_war_cyberscam_links/">Lethal Cambodia-Thailand border clash linked to cyber-scam slave camps</a></li>
  <li><a href="https://www.btl-research.com/p/beneath-the-border-scam-centers-and">Beneath the Border: Scam Centers and the Thailand–Cambodia Conflict</a></li>
  <li><a href="https://finance.yahoo.com/news/grand-jury-charges-pastor-wife-164325987.html?guccounter=1&amp;guce_referrer=aHR0cHM6Ly93d3cuZ29vZ2xlLmNvbS8&amp;guce_referrer_sig=AQAAACoO7q4vRhd33ftG3Ak2pN42Aw23uyziwT35V0ggRRHVx1EEkH46nZkEOoHn8vaeSYg_8jknuCkpTYYilp5WPyGjngMUZAO_VtrltdU4LNsMCULF_RUqpv98tSe5S0GDER8kHHa_1Rmpyjh9fRrbJSPr9Kr5IIxrlLLzbAYFn6Gv">Grand Jury Charges Pastor, Wife in Alleged Multi-Million Dollar Cryptocurrency Scam</a></li>
  <li><a href="https://www.justice.gov/usao-edwa/pr/former-tri-cities-pastor-indicted-multi-million-dollar-cryptocurrency-scam">Former Tri-Cities Pastor Indicted for Multi-Million Dollar Cryptocurrency Scam</a></li>
</ul>
<p><a href="https://therecord.media/fin6-recruitment-scam-malware-campaign">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a>⁠⁠⁠Have a Catch of the Day you'd like to share? Email it to us at <a href="https://therecord.media/fin6-recruitment-scam-malware-campaign">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a><a href="mailto:hackinghumans@n2k.com">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠hackinghumans@n2k.com⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a>.</p>]]>
      </content:encoded>
      <itunes:duration>3020</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[48af4678-cdd5-11ef-8599-3f87d77ef621]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW4754780925.mp3?updated=1754496824" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Domain-based Message Authentication Reporting Conformance (DMARC) (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/94/notes</link>
      <description>Please enjoy this encore of Word Notes. 

An open source email authentication protocol designed to prevent emails, spoofing in phishing, business email compromise or BEC, and other email-based attacks. 

CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/pegasus⁠

Audio reference link:"⁠Global Cyber Alliance's Phil Reitinger talks DMARC adoption⁠" “Global Cyber Alliance’s Phil Reitinger Talks DMARC Adoption.” YouTube Video. YouTube, April 27, 2018</description>
      <pubDate>Tue, 05 Aug 2025 07:00:00 -0000</pubDate>
      <itunes:title>Domain-based Message Authentication Reporting Conformance (DMARC) (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>94</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/a0ea60c4-715f-11f0-a2c4-63ede32d2fe3/image/441b0ca2db080b93b935568d381ce462.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle/>
      <itunes:summary>Please enjoy this encore of Word Notes. 

An open source email authentication protocol designed to prevent emails, spoofing in phishing, business email compromise or BEC, and other email-based attacks. 

CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/pegasus⁠

Audio reference link:"⁠Global Cyber Alliance's Phil Reitinger talks DMARC adoption⁠" “Global Cyber Alliance’s Phil Reitinger Talks DMARC Adoption.” YouTube Video. YouTube, April 27, 2018</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore of Word Notes. </p>
<p>An open source email authentication protocol designed to prevent emails, spoofing in phishing, business email compromise or BEC, and other email-based attacks. </p>
<p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/pegasus">⁠https://thecyberwire.com/glossary/pegasus⁠</a></p>
<p>Audio reference link:"<a href="https://www.youtube.com/watch?v=6FASdg1xqVQ">⁠Global Cyber Alliance's Phil Reitinger talks DMARC adoption⁠</a>" “Global Cyber Alliance’s Phil Reitinger Talks DMARC Adoption.” YouTube Video. YouTube, April 27, 2018</p>]]>
      </content:encoded>
      <itunes:duration>507</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[a0ea60c4-715f-11f0-a2c4-63ede32d2fe3]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW7988275793.mp3?updated=1736193881" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Work from home, malware included. [OMITB]</title>
      <link>https://thecyberwire.com/podcasts/only-malware-in-the-building/14/notes</link>
      <description>Welcome in! You’ve entered, Only Malware in the Building. Join us each month to sip tea and solve mysteries about today’s most interesting threats. Your host is ⁠⁠⁠Selena Larson⁠⁠⁠, ⁠⁠⁠Proofpoint⁠⁠⁠ intelligence analyst and host of their podcast ⁠⁠⁠DISCARDED⁠⁠⁠. Inspired by the residents of a building in New York’s exclusive upper west side, Selena is joined by her co-hosts ⁠⁠⁠N2K Networks⁠⁠⁠ ⁠⁠⁠Dave Bittner⁠⁠⁠ and ⁠⁠Keith Mularski⁠⁠, former FBI cybercrime investigator and now Chief Global Ambassador at ⁠⁠Qintel⁠⁠.

Being a security researcher is a bit like being a detective: you gather clues, analyze the evidence, and consult the experts to solve the cyber puzzle. On this episode, our three hosts discuss several articles covering a new wave of social engineering attacks tied to the so-called Contagious Interview campaign. In this operation, threat actors linked to North Korea are reportedly posing as tech recruiters to trick job seekers into downloading malware. The discussion highlights updates to two malware strains—BeaverTail and InvisibleFerret—that have been retooled with cross-platform capabilities and new data theft features, raising fresh concerns about how targeted individuals could become a gateway into larger organizational networks.

You can find the links to the stories here:


  Lazarus Group Infostealer Malwares Attacking Developers In New Campaign

  Contagious Interview: DPRK Threat Actors Lure Tech Industry Job Seekers to Install New Variants of BeaverTail and InvisibleFerret Malware

  North Korean State Sponsored Supply Chain Attack on Tech Innovation

  Lazarus Group Targets Organizations with Sophisticated LinkedIn Recruiting Scam</description>
      <pubDate>Tue, 05 Aug 2025 07:00:00 -0000</pubDate>
      <itunes:title>Work from home, malware included. [OMITB]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>14</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/ce2b77ce-7152-11f0-ad7e-3bcef9fd89dd/image/14002263e169460f16ca12e04624eb3a.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle/>
      <itunes:summary>Welcome in! You’ve entered, Only Malware in the Building. Join us each month to sip tea and solve mysteries about today’s most interesting threats. Your host is ⁠⁠⁠Selena Larson⁠⁠⁠, ⁠⁠⁠Proofpoint⁠⁠⁠ intelligence analyst and host of their podcast ⁠⁠⁠DISCARDED⁠⁠⁠. Inspired by the residents of a building in New York’s exclusive upper west side, Selena is joined by her co-hosts ⁠⁠⁠N2K Networks⁠⁠⁠ ⁠⁠⁠Dave Bittner⁠⁠⁠ and ⁠⁠Keith Mularski⁠⁠, former FBI cybercrime investigator and now Chief Global Ambassador at ⁠⁠Qintel⁠⁠.

Being a security researcher is a bit like being a detective: you gather clues, analyze the evidence, and consult the experts to solve the cyber puzzle. On this episode, our three hosts discuss several articles covering a new wave of social engineering attacks tied to the so-called Contagious Interview campaign. In this operation, threat actors linked to North Korea are reportedly posing as tech recruiters to trick job seekers into downloading malware. The discussion highlights updates to two malware strains—BeaverTail and InvisibleFerret—that have been retooled with cross-platform capabilities and new data theft features, raising fresh concerns about how targeted individuals could become a gateway into larger organizational networks.

You can find the links to the stories here:


  Lazarus Group Infostealer Malwares Attacking Developers In New Campaign

  Contagious Interview: DPRK Threat Actors Lure Tech Industry Job Seekers to Install New Variants of BeaverTail and InvisibleFerret Malware

  North Korean State Sponsored Supply Chain Attack on Tech Innovation

  Lazarus Group Targets Organizations with Sophisticated LinkedIn Recruiting Scam</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Welcome in! You’ve entered, Only Malware in the Building. Join us each month to sip tea and solve mysteries about today’s most interesting threats. Your host is <a href="https://www.linkedin.com/in/selenalarson/">⁠⁠⁠Selena Larson⁠⁠⁠</a>, <a href="https://www.proofpoint.com/">⁠⁠⁠Proofpoint⁠⁠⁠</a> intelligence analyst and host of their podcast <a href="https://www.proofpoint.com/us/podcasts/discarded">⁠⁠⁠DISCARDED⁠⁠⁠</a>. Inspired by the residents of a building in New York’s exclusive upper west side, Selena is joined by her co-hosts <a href="https://www.n2k.com/">⁠⁠⁠N2K Networks⁠⁠⁠</a> <a href="https://www.linkedin.com/in/dave-bittner-27231a4/">⁠⁠⁠Dave Bittner⁠⁠⁠</a> and <a href="https://www.linkedin.com/in/keith-mularski-b737551/">⁠⁠Keith Mularski⁠⁠</a>, former FBI cybercrime investigator and now Chief Global Ambassador at <a href="https://www.linkedin.com/company/qintel/">⁠⁠Qintel⁠⁠</a>.</p>
<p>Being a security researcher is a bit like being a detective: you gather clues, analyze the evidence, and consult the experts to solve the cyber puzzle. On this episode, our three hosts discuss several articles covering a new wave of social engineering attacks tied to the so-called <em>Contagious Interview</em> campaign. In this operation, threat actors linked to North Korea are reportedly posing as tech recruiters to trick job seekers into downloading malware. The discussion highlights updates to two malware strains—<em>BeaverTail</em> and <em>InvisibleFerret</em>—that have been retooled with cross-platform capabilities and new data theft features, raising fresh concerns about how targeted individuals could become a gateway into larger organizational networks.</p>
<p>You can find the links to the stories here:</p>
<ul>
  <li><a href="https://cybersecuritynews.com/lazarus-group-infostealer-malwares-attacking-developers/#google_vignette">Lazarus Group Infostealer Malwares Attacking Developers In New Campaign</a></li>
  <li><a href="https://unit42.paloaltonetworks.com/north-korean-threat-actors-lure-tech-job-seekers-as-fake-recruiters/">Contagious Interview: DPRK Threat Actors Lure Tech Industry Job Seekers to Install New Variants of BeaverTail and InvisibleFerret Malware</a></li>
  <li><a href="https://securityscorecard.com/wp-content/uploads/2025/01/Report_011325_Strike_Operation99.pdf">North Korean State Sponsored Supply Chain Attack on Tech Innovation</a></li>
  <li><a href="https://www.bitdefender.com/en-us/blog/labs/lazarus-group-targets-organizations-with-sophisticated-linkedin-recruiting-scam">Lazarus Group Targets Organizations with Sophisticated LinkedIn Recruiting Scam</a></li>
</ul>]]>
      </content:encoded>
      <itunes:duration>1934</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[ce2b77ce-7152-11f0-ad7e-3bcef9fd89dd]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW1291951918.mp3?updated=1754325963" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Click for a pay bump?</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/348/notes</link>
      <description>In this special episode of Hacking Humans, while Joe and Maria take a well-earned summer break, we’re joined by a special guest host: Rob Allen, Chief Product Officer at ThreatLocker. Rob dives into the tactics and profile of the cybercriminal group known as Scattered Spider—a crew that’s gained notoriety for its cunning use of social engineering over traditional hacking techniques. Known for being young, agile, and highly manipulative, Scattered Spider has successfully bypassed security measures not by breaking systems, but by fooling the people who use them. Tune in for a fascinating breakdown of how this group operates and what you can do to defend against them. A listener caught this catch of the day on campus—an email claiming a “salary increase” and urging them to click a sketchy link. It came from outside the company, was riddled with grammar issues, and asked for info HR should already have. 

Complete our annual ⁠⁠⁠⁠audience survey⁠⁠⁠⁠ before August 31.

Resources and links to stories:


  
⁠⁠Scattered Spider weaves web of social-engineered destruction



⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Have a Catch of the Day you'd like to share? Email it to us at ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠hackinghumans@n2k.com⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠.</description>
      <pubDate>Thu, 31 Jul 2025 05:00:00 -0000</pubDate>
      <itunes:title>Click for a pay bump?</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>348</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>In this special episode of Hacking Humans, while Joe and Maria take a well-earned summer break, we’re joined by a special guest host: Rob Allen, Chief Product Officer at ThreatLocker. Rob dives into the tactics and profile of the cybercriminal group known as Scattered Spider—a crew that’s gained notoriety for its cunning use of social engineering over traditional hacking techniques. Known for being young, agile, and highly manipulative, Scattered Spider has successfully bypassed security measures not by breaking systems, but by fooling the people who use them. Tune in for a fascinating breakdown of how this group operates and what you can do to defend against them. A listener caught this catch of the day on campus—an email claiming a “salary increase” and urging them to click a sketchy link. It came from outside the company, was riddled with grammar issues, and asked for info HR should already have. 

Complete our annual ⁠⁠⁠⁠audience survey⁠⁠⁠⁠ before August 31.

Resources and links to stories:


  
⁠⁠Scattered Spider weaves web of social-engineered destruction



⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Have a Catch of the Day you'd like to share? Email it to us at ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠hackinghumans@n2k.com⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In this special episode of <em>Hacking Humans</em>, while Joe and Maria take a well-earned summer break, we’re joined by a special guest host: <a href="https://www.linkedin.com/in/threatlockerrob/">Rob Allen</a>, Chief Product Officer at <a href="https://www.linkedin.com/company/threatlockerinc/">ThreatLocker</a>. Rob dives into the tactics and profile of the cybercriminal group known as Scattered Spider—a crew that’s gained notoriety for its cunning use of social engineering over traditional hacking techniques. Known for being young, agile, and highly manipulative, Scattered Spider has successfully bypassed security measures not by breaking systems, but by fooling the people who use them. Tune in for a fascinating breakdown of how this group operates and what you can do to defend against them. A listener caught this catch of the day on campus—an email claiming a “salary increase” and urging them to click a sketchy link. It came from outside the company, was riddled with grammar issues, and asked for info HR should already have. </p>
<p>Complete our annual <a href="https://www.surveymonkey.com/r/JD7JFL2">⁠⁠⁠⁠audience survey⁠⁠⁠</a>⁠ before August 31.</p>
<p><strong>Resources and links to stories:</strong></p>
<ul>
  <li>
<a href="https://arstechnica.com/ai/2025/07/ai-therapy-bots-fuel-delusions-and-give-dangerous-advice-stanford-study-finds/">⁠⁠</a><a href="https://cyberscoop.com/scattered-spider-social-engineering-cybercrime/">Scattered Spider weaves web of social-engineered destruction</a>
</li>
</ul>
<p><a href="https://therecord.media/fin6-recruitment-scam-malware-campaign">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a>⁠⁠⁠Have a Catch of the Day you'd like to share? Email it to us at <a href="https://therecord.media/fin6-recruitment-scam-malware-campaign">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a><a href="mailto:hackinghumans@n2k.com">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠hackinghumans@n2k.com⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a>.</p>]]>
      </content:encoded>
      <itunes:duration>1817</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[48808734-cdd5-11ef-8599-f739a7b8f54a]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW3886957879.mp3?updated=1753924212" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Shields Up (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/93/notes</link>
      <description>Please enjoy this encore of Word Notes. 

A condition announced by the US Cybersecurity and Infrastructure Security Agency (CISA) to draw attention to a temporary period of high alert, associated with expectation of a connected wave of cyberattacks prompted by either a widespread vulnerability or an unusually active and capable threat actor.

CyberWire Glossary link: ⁠⁠https://thecyberwire.com/glossary/shields-up⁠⁠

Audio reference link: “⁠⁠Star Trek II Wrath of Khan - Reliant vs Enterprise; First Clash⁠⁠” YouTube, YouTube, 11 Apr. 2015,  </description>
      <pubDate>Tue, 29 Jul 2025 07:00:00 -0000</pubDate>
      <itunes:title>Shields Up (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>93</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/ca3e31d6-6bf0-11f0-98ed-03d3fe89df91/image/441b0ca2db080b93b935568d381ce462.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Please enjoy this encore of Word Notes. 

A condition announced by the US Cybersecurity and Infrastructure Security Agency (CISA) to draw attention to a temporary period of high alert, associated with expectation of a connected wave of cyberattacks prompted by either a widespread vulnerability or an unusually active and capable threat actor.

CyberWire Glossary link: ⁠⁠https://thecyberwire.com/glossary/shields-up⁠⁠

Audio reference link: “⁠⁠Star Trek II Wrath of Khan - Reliant vs Enterprise; First Clash⁠⁠” YouTube, YouTube, 11 Apr. 2015,  </itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore of Word Notes. </p>
<p>A condition announced by the US Cybersecurity and Infrastructure Security Agency (CISA) to draw attention to a temporary period of high alert, associated with expectation of a connected wave of cyberattacks prompted by either a widespread vulnerability or an unusually active and capable threat actor.</p>
<p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/shields-up">⁠⁠https://thecyberwire.com/glossary/shields-up⁠⁠</a></p>
<p>Audio reference link: “<a href="https://www.youtube.com/watch?v=WCpYqWAIwFA.">⁠⁠Star Trek II Wrath of Khan - Reliant vs Enterprise; First Clash⁠⁠</a>” <em>YouTube</em>, YouTube, 11 Apr. 2015,  </p>]]>
      </content:encoded>
      <itunes:duration>466</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[ca3e31d6-6bf0-11f0-98ed-03d3fe89df91]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW6259578425.mp3?updated=1753939749" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The delusional side of AI therapy.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/347/notes</link>
      <description>This week, our hosts⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ ⁠⁠⁠⁠⁠Dave Bittner⁠⁠⁠⁠⁠, ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Joe Carrigan⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠, and ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Maria Varmazis⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ (also host of the ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠T-Minus⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ Space Daily show) are back sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. We've got some follow-up from listener Kajetan, who recalled a run-in with a scammer in Paris posing as a mute fundraiser—and says he performed a "miracle" by crossing out his name, prompting the supposedly mute woman to suddenly start yelling at him. Maria has the story on how small businesses in Toronto, like the family-run Souvlaki Hut and Pippins Tea Company, were shocked to discover that thieves exploited vulnerabilities in their point of sale terminals to issue themselves thousands in fraudulent refunds—exposing serious flaws in how these machines are secured. Dave's story is on a Stanford-led study that found popular AI therapy bots, including ChatGPT and commercial mental health platforms, often respond inappropriately to serious mental health issues—fueling delusions, validating harmful thoughts, and failing to follow basic therapeutic guidelines—raising urgent concerns about their use as replacements for human therapists. Joe follows the story on a sweeping federal investigation into Minnesota's Housing Stabilization Services program, where agents raided homes and businesses tied to an alleged multi-million-dollar Medicaid fraud scheme that exploited vulnerable residents and billed taxpayers for housing support services that were never provided. Our catch of the day is on a patient scammer who spent five months building trust before claiming to send a $700K inheritance payout locked in a lawsuit—complete with a fake video of a safe and a shady tracking number—only to demand €15,000 in "customs fees," a scam the Redditor thankfully saw through before handing over any money.

Complete our annual ⁠⁠⁠audience survey⁠⁠⁠ before August 31.

Resources and links to stories:


  ⁠AI therapy bots fuel delusions and give dangerous advice, Stanford study finds

  ‘It was a shock’: Toronto business owner says customer used point of sale terminal to issue himself $2,000 refund

  KARE 11 Investigates: Federal agents raid homes &amp; businesses seizing evidence in housing fraud investigation


⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Have a Catch of the Day you'd like to share? Email it to us at ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠hackinghumans@n2k.com⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠.</description>
      <pubDate>Thu, 24 Jul 2025 05:00:00 -0000</pubDate>
      <itunes:title>The delusional side of AI therapy.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>347</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>This week, our hosts⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ ⁠⁠⁠⁠⁠Dave Bittner⁠⁠⁠⁠⁠, ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Joe Carrigan⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠, and ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Maria Varmazis⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ (also host of the ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠T-Minus⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ Space Daily show) are back sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. We've got some follow-up from listener Kajetan, who recalled a run-in with a scammer in Paris posing as a mute fundraiser—and says he performed a "miracle" by crossing out his name, prompting the supposedly mute woman to suddenly start yelling at him. Maria has the story on how small businesses in Toronto, like the family-run Souvlaki Hut and Pippins Tea Company, were shocked to discover that thieves exploited vulnerabilities in their point of sale terminals to issue themselves thousands in fraudulent refunds—exposing serious flaws in how these machines are secured. Dave's story is on a Stanford-led study that found popular AI therapy bots, including ChatGPT and commercial mental health platforms, often respond inappropriately to serious mental health issues—fueling delusions, validating harmful thoughts, and failing to follow basic therapeutic guidelines—raising urgent concerns about their use as replacements for human therapists. Joe follows the story on a sweeping federal investigation into Minnesota's Housing Stabilization Services program, where agents raided homes and businesses tied to an alleged multi-million-dollar Medicaid fraud scheme that exploited vulnerable residents and billed taxpayers for housing support services that were never provided. Our catch of the day is on a patient scammer who spent five months building trust before claiming to send a $700K inheritance payout locked in a lawsuit—complete with a fake video of a safe and a shady tracking number—only to demand €15,000 in "customs fees," a scam the Redditor thankfully saw through before handing over any money.

Complete our annual ⁠⁠⁠audience survey⁠⁠⁠ before August 31.

Resources and links to stories:


  ⁠AI therapy bots fuel delusions and give dangerous advice, Stanford study finds

  ‘It was a shock’: Toronto business owner says customer used point of sale terminal to issue himself $2,000 refund

  KARE 11 Investigates: Federal agents raid homes &amp; businesses seizing evidence in housing fraud investigation


⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Have a Catch of the Day you'd like to share? Email it to us at ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠hackinghumans@n2k.com⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This week, our hosts<a href="https://www.linkedin.com/in/dave-bittner-27231a4/">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a> <a href="https://www.linkedin.com/in/dave-bittner-27231a4/">⁠⁠⁠⁠⁠Dave Bittner⁠⁠⁠⁠⁠</a>, <a href="https://www.linkedin.com/in/joecarrigan/">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Joe Carrigan⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a>, and <a href="https://www.linkedin.com/in/varmazis/">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Maria Varmazis⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a> (also host of the <a href="https://space.n2k.com/podcasts/t-minus?__hstc=223811332.a636bba53840b4700c929fe67723a129.1721054632698.1747145009569.1747159962459.413&amp;__hssc=223811332.2.1747159962459&amp;__hsfp=3690629108">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠T-Minus⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a> Space Daily show) are back sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. We've got some follow-up from listener Kajetan, who recalled a run-in with a scammer in Paris posing as a mute fundraiser—and says he performed a "miracle" by crossing out his name, prompting the supposedly mute woman to suddenly start yelling at him. Maria has the story on how small businesses in Toronto, like the family-run Souvlaki Hut and Pippins Tea Company, were shocked to discover that thieves exploited vulnerabilities in their point of sale terminals to issue themselves thousands in fraudulent refunds—exposing serious flaws in how these machines are secured. Dave's story is on a Stanford-led study that found popular AI therapy bots, including ChatGPT and commercial mental health platforms, often respond inappropriately to serious mental health issues—fueling delusions, validating harmful thoughts, and failing to follow basic therapeutic guidelines—raising urgent concerns about their use as replacements for human therapists. Joe follows the story on a sweeping federal investigation into Minnesota's Housing Stabilization Services program, where agents raided homes and businesses tied to an alleged multi-million-dollar Medicaid fraud scheme that exploited vulnerable residents and billed taxpayers for housing support services that were never provided. Our catch of the day is on a patient scammer who spent five months building trust before claiming to send a $700K inheritance payout locked in a lawsuit—complete with a fake video of a safe and a shady tracking number—only to demand €15,000 in "customs fees," a scam the Redditor thankfully saw through before handing over any money.</p>
<p>Complete our annual <a href="https://www.surveymonkey.com/r/JD7JFL2">⁠⁠⁠audience survey⁠⁠</a>⁠ before August 31.</p>
<p><strong>Resources and links to stories:</strong></p>
<ul>
  <li><a href="https://arstechnica.com/ai/2025/07/ai-therapy-bots-fuel-delusions-and-give-dangerous-advice-stanford-study-finds/">⁠AI therapy bots fuel delusions and give dangerous advice, Stanford study finds</a></li>
  <li><a href="https://www.ctvnews.ca/toronto/article/it-was-a-shock-toronto-business-owner-says-customer-used-point-of-sale-terminal-to-issue-himself-2000-refund/">‘It was a shock’: Toronto business owner says customer used point of sale terminal to issue himself $2,000 refund</a></li>
  <li><a href="https://www.kare11.com/article/news/investigations/kare-11-investigates-federal-agents-raid-homes-businesses-housing-fraud-investigation/89-3d56042b-ce46-414b-b004-76f1a16bebf0">KARE 11 Investigates: Federal agents raid homes &amp; businesses seizing evidence in housing fraud investigation</a></li>
</ul>
<p><a href="https://therecord.media/fin6-recruitment-scam-malware-campaign">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a>⁠⁠⁠Have a Catch of the Day you'd like to share? Email it to us at <a href="https://therecord.media/fin6-recruitment-scam-malware-campaign">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a><a href="mailto:hackinghumans@n2k.com">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠hackinghumans@n2k.com⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a>.</p>]]>
      </content:encoded>
      <itunes:duration>3114</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[4851a392-cdd5-11ef-8599-47684b9731d2]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW5586204569.mp3?updated=1753924178" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Software Assurance Maturity Model (SAMM) (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/92/notes</link>
      <description>Please enjoy this encore of Word Notes.

A prescriptive open source software security maturity model designed to guide strategies tailored to an organization’s specific risks.

Audio reference link: "⁠⁠OWASPMSP - Pravir Chandra: Software Assurance Maturity Model (OpenSAMM)⁠⁠." by Pravir Chandra, OWASP MSP, 2009.</description>
      <pubDate>Tue, 22 Jul 2025 05:00:00 -0000</pubDate>
      <itunes:title>Software Assurance Maturity Model (SAMM) (noun)</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>92</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Please enjoy this encore of Word Notes.

A prescriptive open source software security maturity model designed to guide strategies tailored to an organization’s specific risks.

Audio reference link: "⁠⁠OWASPMSP - Pravir Chandra: Software Assurance Maturity Model (OpenSAMM)⁠⁠." by Pravir Chandra, OWASP MSP, 2009.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore of Word Notes.</p>
<p>A prescriptive open source software security maturity model designed to guide strategies tailored to an organization’s specific risks.</p>
<p>Audio reference link: "<a href="https://vimeo.com/6495398">⁠⁠OWASPMSP - Pravir Chandra: Software Assurance Maturity Model (OpenSAMM)⁠⁠</a>." by Pravir Chandra, OWASP MSP, 2009.</p>]]>
      </content:encoded>
      <itunes:duration>343</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[94b639fa-6650-11f0-abad-ef72419782fc]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW8691909941.mp3?updated=1753934154" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>It’s all glitter, no gold.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/346/notes</link>
      <description>This week, our hosts⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ ⁠⁠⁠⁠Dave Bittner⁠⁠⁠⁠, ⁠⁠⁠⁠⁠⁠⁠⁠⁠Joe Carrigan⁠⁠⁠⁠⁠⁠⁠⁠⁠, and ⁠⁠⁠⁠⁠⁠⁠⁠⁠Maria Varmazis⁠⁠⁠⁠⁠⁠⁠⁠⁠ (also host of the ⁠⁠⁠⁠⁠⁠⁠⁠⁠T-Minus⁠⁠⁠⁠⁠⁠⁠⁠⁠ Space Daily show) are back sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. Our hosts share some follow-up, including a Rick Roll after the last episode. They also highlight a listener note from Evaldas in Lithuania, who explains that companies often use alternate domains for marketing emails to protect their main domain’s reputation—so marking them as spam is actually expected. Joe’s got a story of a billion-dollar AI-fueled scam where criminals impersonate celebrities like Keanu Reeves and Kevin Costner to exploit lonely fans—convincing them to send money, fall in love, and keep the relationship secret, all while Hollywood scrambles to fight back. Maria has the story of how a federal court blocked the FTC’s new “click-to-cancel” rule—meant to make canceling subscriptions easier—due to a procedural misstep, just days before it was set to take effect. Dave shares a story from Reddit about a disturbing extortion scam where a victim received a fake photo of their car outside a strip club—with their real license plate—demanding $1,000 to keep it quiet, raising questions about data scraping and AI manipulation. Our catch of the day comes from the scams subreddit, where a user shares a tale of a scammer promising big returns for investing in gold and diamonds—spoiler alert: it’s all glitter, no gold.

Complete our annual ⁠⁠audience survey⁠⁠ before August 31.

Resources and links to stories:


  This Is Not Keanu: Inside the Billion-Dollar Celebrity Impersonation Bitcoin Scam

  A ‘click-to-cancel’ rule, intended to make canceling subscriptions easier, is blocked

  [US] Extortion text message with fake strip club photo but real license plate – how did they get my info?


⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Have a Catch of the Day you'd like to share? Email it to us at ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠hackinghumans@n2k.com⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠.</description>
      <pubDate>Thu, 17 Jul 2025 05:00:00 -0000</pubDate>
      <itunes:title>It’s all glitter, no gold.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>346</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>This week, our hosts⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ ⁠⁠⁠⁠Dave Bittner⁠⁠⁠⁠, ⁠⁠⁠⁠⁠⁠⁠⁠⁠Joe Carrigan⁠⁠⁠⁠⁠⁠⁠⁠⁠, and ⁠⁠⁠⁠⁠⁠⁠⁠⁠Maria Varmazis⁠⁠⁠⁠⁠⁠⁠⁠⁠ (also host of the ⁠⁠⁠⁠⁠⁠⁠⁠⁠T-Minus⁠⁠⁠⁠⁠⁠⁠⁠⁠ Space Daily show) are back sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. Our hosts share some follow-up, including a Rick Roll after the last episode. They also highlight a listener note from Evaldas in Lithuania, who explains that companies often use alternate domains for marketing emails to protect their main domain’s reputation—so marking them as spam is actually expected. Joe’s got a story of a billion-dollar AI-fueled scam where criminals impersonate celebrities like Keanu Reeves and Kevin Costner to exploit lonely fans—convincing them to send money, fall in love, and keep the relationship secret, all while Hollywood scrambles to fight back. Maria has the story of how a federal court blocked the FTC’s new “click-to-cancel” rule—meant to make canceling subscriptions easier—due to a procedural misstep, just days before it was set to take effect. Dave shares a story from Reddit about a disturbing extortion scam where a victim received a fake photo of their car outside a strip club—with their real license plate—demanding $1,000 to keep it quiet, raising questions about data scraping and AI manipulation. Our catch of the day comes from the scams subreddit, where a user shares a tale of a scammer promising big returns for investing in gold and diamonds—spoiler alert: it’s all glitter, no gold.

Complete our annual ⁠⁠audience survey⁠⁠ before August 31.

Resources and links to stories:


  This Is Not Keanu: Inside the Billion-Dollar Celebrity Impersonation Bitcoin Scam

  A ‘click-to-cancel’ rule, intended to make canceling subscriptions easier, is blocked

  [US] Extortion text message with fake strip club photo but real license plate – how did they get my info?


⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Have a Catch of the Day you'd like to share? Email it to us at ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠hackinghumans@n2k.com⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This week, our hosts<a href="https://www.linkedin.com/in/dave-bittner-27231a4/">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a> <a href="https://www.linkedin.com/in/dave-bittner-27231a4/">⁠⁠⁠⁠Dave Bittner⁠⁠⁠⁠</a>, <a href="https://www.linkedin.com/in/joecarrigan/">⁠⁠⁠⁠⁠⁠⁠⁠⁠Joe Carrigan⁠⁠⁠⁠⁠⁠⁠⁠⁠</a>, and <a href="https://www.linkedin.com/in/varmazis/">⁠⁠⁠⁠⁠⁠⁠⁠⁠Maria Varmazis⁠⁠⁠⁠⁠⁠⁠⁠⁠</a> (also host of the <a href="https://space.n2k.com/podcasts/t-minus?__hstc=223811332.a636bba53840b4700c929fe67723a129.1721054632698.1747145009569.1747159962459.413&amp;__hssc=223811332.2.1747159962459&amp;__hsfp=3690629108">⁠⁠⁠⁠⁠⁠⁠⁠⁠T-Minus⁠⁠⁠⁠⁠⁠⁠⁠⁠</a> Space Daily show) are back sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. Our hosts share some follow-up, including a Rick Roll after the last episode. They also highlight a listener note from Evaldas in Lithuania, who explains that companies often use alternate domains for marketing emails to protect their main domain’s reputation—so marking them as spam is actually expected. Joe’s got a story of a billion-dollar AI-fueled scam where criminals impersonate celebrities like Keanu Reeves and Kevin Costner to exploit lonely fans—convincing them to send money, fall in love, and keep the relationship secret, all while Hollywood scrambles to fight back. Maria has the story of how a federal court blocked the FTC’s new “click-to-cancel” rule—meant to make canceling subscriptions easier—due to a procedural misstep, just days before it was set to take effect. Dave shares a story from Reddit about a disturbing extortion scam where a victim received a fake photo of their car outside a strip club—with their real license plate—demanding $1,000 to keep it quiet, raising questions about data scraping and AI manipulation. Our catch of the day comes from the scams subreddit, where a user shares a tale of a scammer promising big returns for investing in gold and diamonds—spoiler alert: it’s all glitter, no gold.</p>
<p>Complete our annual <a href="https://www.surveymonkey.com/r/JD7JFL2">⁠⁠audience survey⁠</a>⁠ before August 31.</p>
<p><strong>Resources and links to stories:</strong></p>
<ul>
  <li><a href="https://www.hollywoodreporter.com/business/digital/hollywood-celebrity-impersonation-scam-1236309121/">This Is Not Keanu: Inside the Billion-Dollar Celebrity Impersonation Bitcoin Scam</a></li>
  <li><a href="https://apnews.com/article/ftc-click-to-cancel-30db2be07fdcb8aefd0d4835abdb116a">A ‘click-to-cancel’ rule, intended to make canceling subscriptions easier, is blocked</a></li>
  <li><a href="https://www.reddit.com/r/Scams/comments/1lwpm09/us_extortion_text_message_with_fake_strip_club/">[US] Extortion text message with fake strip club photo but real license plate – how did they get my info?</a></li>
</ul>
<p><a href="https://therecord.media/fin6-recruitment-scam-malware-campaign">⁠⁠⁠⁠⁠⁠⁠⁠</a>⁠⁠⁠Have a Catch of the Day you'd like to share? Email it to us at <a href="https://therecord.media/fin6-recruitment-scam-malware-campaign">⁠⁠⁠⁠⁠⁠⁠⁠</a><a href="mailto:hackinghumans@n2k.com">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠hackinghumans@n2k.com⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a>.</p>]]>
      </content:encoded>
      <itunes:duration>2833</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[482219f6-cdd5-11ef-8599-b39690e5f9e4]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW6046987244.mp3?updated=1752596984" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Universal 2nd Factor (U2F) (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/91/notes</link>
      <description>Please enjoy this encore of Word Notes. 

An open standard for hardware authentication tokens that use the universal serial bus, or USB, near-field communications, or NFCs, or Bluetooth to communicate one factor in a two-factor authentication exchange.

Cyberwire Glossary link: ⁠⁠https://thecyberwire.com/glossary/u2f⁠⁠

Audio reference link: “⁠⁠Rise of the Machines: A Cybernetic History⁠⁠,” by Thomas Rid, Published by W. W. Norton Company, 21 November 2017.</description>
      <pubDate>Tue, 15 Jul 2025 07:00:00 -0000</pubDate>
      <itunes:title>Universal 2nd Factor (U2F) (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>91</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/0a4975aa-60c6-11f0-a45c-abbf8318f75c/image/441b0ca2db080b93b935568d381ce462.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Please enjoy this encore of Word Notes. 

An open standard for hardware authentication tokens that use the universal serial bus, or USB, near-field communications, or NFCs, or Bluetooth to communicate one factor in a two-factor authentication exchange.

Cyberwire Glossary link: ⁠⁠https://thecyberwire.com/glossary/u2f⁠⁠

Audio reference link: “⁠⁠Rise of the Machines: A Cybernetic History⁠⁠,” by Thomas Rid, Published by W. W. Norton Company, 21 November 2017.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore of Word Notes. </p>
<p>An open standard for hardware authentication tokens that use the universal serial bus, or USB, near-field communications, or NFCs, or Bluetooth to communicate one factor in a two-factor authentication exchange.</p>
<p>Cyberwire Glossary link: <a href="https://thecyberwire.com/glossary/u2f">⁠⁠https://thecyberwire.com/glossary/u2f⁠⁠</a></p>
<p>Audio reference link: “<a href="https://www.goodreads.com/book/show/34068514-rise-of-the-machines?from_search=true&amp;from_srp=true&amp;qid=Ds7LixXwaX&amp;rank=3">⁠⁠Rise of the Machines: A Cybernetic History⁠⁠</a>,” by Thomas Rid, Published by W. W. Norton Company, 21 November 2017.</p>]]>
      </content:encoded>
      <itunes:duration>437</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[0a4975aa-60c6-11f0-a45c-abbf8318f75c]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW4434910511.mp3?updated=1752596819" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Convinced, compromised, and confirmed.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/345/notes</link>
      <description>This week, our hosts⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ ⁠⁠⁠Dave Bittner⁠⁠⁠, ⁠⁠⁠⁠⁠⁠⁠⁠Joe Carrigan⁠⁠⁠⁠⁠⁠⁠⁠, and ⁠⁠⁠⁠⁠⁠⁠⁠Maria Varmazis⁠⁠⁠⁠⁠⁠⁠⁠ (also host of the ⁠⁠⁠⁠⁠⁠⁠⁠T-Minus⁠⁠⁠⁠⁠⁠⁠⁠ Space Daily show) are back sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. We start with a ton of follow-up—from a sextortion scam that triggered a bot frenzy on Facebook, to sandboxed scam-baiting with fake credit cards, to a surprise magazine subscription that may or may not involve chicken gods. Plus, one listener wonders: do people really know what a strong password is? Dave’s story is on a massive China-linked scam where hackers are spoofing big-name retail websites—like Apple, PayPal, and Hermes—to trick shoppers into handing over their payment info on convincing fake storefronts, with thousands of fraudulent sites still live and targeting victims worldwide. Joe's got the story of a sneaky spear-phishing campaign targeting financial execs with fake job offers that ultimately install a legit remote access tool, NetBird, to gain stealthy, persistent access—part of a growing trend where attackers use real software and clever social engineering to fly under the radar. Maria's got the story of a young homebuyer who lost $109,000 to a payment redirection scam, prompting Australian banks to finally roll out a “Confirmation of Payee” system to prevent similar fraud—though critics say the fix still puts too much blame on victims. Our catch of the day comes from the Scams sub-Reddit, where we hear about a scam getting people to click on a fake job that's too good to be true. 

Complete our annual ⁠audience survey⁠ before August 31.

Resources and links to stories:


  
⁠China-linked hackers spoof big-name brand websites to steal shoppers' payment info


  Fake Recruiter Emails Target CFOs Using Legit NetBird Tool Across 6 Global Regions

  
After Louis lost $109k to scammers, banks are finally combatting the 'flaw' the scammers used 


⁠⁠⁠⁠⁠⁠⁠⁠⁠Have a Catch of the Day you'd like to share? Email it to us at ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠hackinghumans@n2k.com⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠.</description>
      <pubDate>Thu, 10 Jul 2025 05:00:00 -0000</pubDate>
      <itunes:title>Convinced, compromised, and confirmed.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>345</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>This week, our hosts⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ ⁠⁠⁠Dave Bittner⁠⁠⁠, ⁠⁠⁠⁠⁠⁠⁠⁠Joe Carrigan⁠⁠⁠⁠⁠⁠⁠⁠, and ⁠⁠⁠⁠⁠⁠⁠⁠Maria Varmazis⁠⁠⁠⁠⁠⁠⁠⁠ (also host of the ⁠⁠⁠⁠⁠⁠⁠⁠T-Minus⁠⁠⁠⁠⁠⁠⁠⁠ Space Daily show) are back sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. We start with a ton of follow-up—from a sextortion scam that triggered a bot frenzy on Facebook, to sandboxed scam-baiting with fake credit cards, to a surprise magazine subscription that may or may not involve chicken gods. Plus, one listener wonders: do people really know what a strong password is? Dave’s story is on a massive China-linked scam where hackers are spoofing big-name retail websites—like Apple, PayPal, and Hermes—to trick shoppers into handing over their payment info on convincing fake storefronts, with thousands of fraudulent sites still live and targeting victims worldwide. Joe's got the story of a sneaky spear-phishing campaign targeting financial execs with fake job offers that ultimately install a legit remote access tool, NetBird, to gain stealthy, persistent access—part of a growing trend where attackers use real software and clever social engineering to fly under the radar. Maria's got the story of a young homebuyer who lost $109,000 to a payment redirection scam, prompting Australian banks to finally roll out a “Confirmation of Payee” system to prevent similar fraud—though critics say the fix still puts too much blame on victims. Our catch of the day comes from the Scams sub-Reddit, where we hear about a scam getting people to click on a fake job that's too good to be true. 

Complete our annual ⁠audience survey⁠ before August 31.

Resources and links to stories:


  
⁠China-linked hackers spoof big-name brand websites to steal shoppers' payment info


  Fake Recruiter Emails Target CFOs Using Legit NetBird Tool Across 6 Global Regions

  
After Louis lost $109k to scammers, banks are finally combatting the 'flaw' the scammers used 


⁠⁠⁠⁠⁠⁠⁠⁠⁠Have a Catch of the Day you'd like to share? Email it to us at ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠hackinghumans@n2k.com⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This week, our hosts<a href="https://www.linkedin.com/in/dave-bittner-27231a4/">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a> <a href="https://www.linkedin.com/in/dave-bittner-27231a4/">⁠⁠⁠Dave Bittner⁠⁠⁠</a>, <a href="https://www.linkedin.com/in/joecarrigan/">⁠⁠⁠⁠⁠⁠⁠⁠Joe Carrigan⁠⁠⁠⁠⁠⁠⁠⁠</a>, and <a href="https://www.linkedin.com/in/varmazis/">⁠⁠⁠⁠⁠⁠⁠⁠Maria Varmazis⁠⁠⁠⁠⁠⁠⁠⁠</a> (also host of the <a href="https://space.n2k.com/podcasts/t-minus?__hstc=223811332.a636bba53840b4700c929fe67723a129.1721054632698.1747145009569.1747159962459.413&amp;__hssc=223811332.2.1747159962459&amp;__hsfp=3690629108">⁠⁠⁠⁠⁠⁠⁠⁠T-Minus⁠⁠⁠⁠⁠⁠⁠⁠</a> Space Daily show) are back sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. We start with a ton of follow-up—from a sextortion scam that triggered a bot frenzy on Facebook, to sandboxed scam-baiting with fake credit cards, to a surprise magazine subscription that may or may not involve chicken gods. Plus, one listener wonders: do people <em>really</em> know what a strong password is? Dave’s story is on a massive China-linked scam where hackers are spoofing big-name retail websites—like Apple, PayPal, and Hermes—to trick shoppers into handing over their payment info on convincing fake storefronts, with thousands of fraudulent sites still live and targeting victims worldwide. Joe's got the story of a sneaky spear-phishing campaign targeting financial execs with fake job offers that ultimately install a legit remote access tool, NetBird, to gain stealthy, persistent access—part of a growing trend where attackers use real software and clever social engineering to fly under the radar. Maria's got the story of a young homebuyer who lost $109,000 to a payment redirection scam, prompting Australian banks to finally roll out a “Confirmation of Payee” system to prevent similar fraud—though critics say the fix still puts too much blame on victims. Our catch of the day comes from the Scams sub-Reddit, where we hear about a scam getting people to click on a fake job that's too good to be true. </p>
<p>Complete our annual <a href="https://www.surveymonkey.com/r/JD7JFL2">⁠audience survey</a>⁠ before August 31.</p>
<p><strong>Resources and links to stories:</strong></p>
<ul>
  <li>
<a href="https://www.businesswire.com/news/home/20250626244192/en/New-McAfee-Report-Finds-Young-Adults-Fall-for-Travel-Scams-More-Often-Than-Older-Generations">⁠</a><a href="https://therecord.media/china-linked-hackers-website-phishing">China-linked hackers spoof big-name brand websites to steal shoppers' payment info</a>
</li>
  <li><a href="https://thehackernews.com/2025/06/fake-recruiter-emails-target-cfos-using.html">Fake Recruiter Emails Target CFOs Using Legit NetBird Tool Across 6 Global Regions</a></li>
  <li>
<a href="https://www.abc.net.au/news/2025-07-03/banks-to-roll-out-confirmation-of-payee-system-to-combat-scams/105485526">After Louis lost $109k to scammers, banks are finally combatting the 'flaw' the scammers used</a> </li>
</ul>
<p><a href="https://therecord.media/fin6-recruitment-scam-malware-campaign">⁠⁠⁠⁠⁠⁠</a>⁠⁠⁠Have a Catch of the Day you'd like to share? Email it to us at <a href="https://therecord.media/fin6-recruitment-scam-malware-campaign">⁠⁠⁠⁠⁠⁠</a><a href="mailto:hackinghumans@n2k.com">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠hackinghumans@n2k.com⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠</a>.</p>]]>
      </content:encoded>
      <itunes:duration>3076</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[47f2aa7c-cdd5-11ef-8599-fb3ceecbb8a3]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW4078395630.mp3?updated=1752242309" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>adversary group naming (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/90/notes</link>
      <description>Please enjoy this encore of Word Notes.

A cyber threat intelligence best practice of assigning arbitrary labels to collections of hacker activity across the intrusion kill chain.</description>
      <pubDate>Tue, 08 Jul 2025 07:00:00 -0000</pubDate>
      <itunes:title>adversary group naming (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>90</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Please enjoy this encore of Word Notes.

A cyber threat intelligence best practice of assigning arbitrary labels to collections of hacker activity across the intrusion kill chain.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore of Word Notes.</p>
<p>A cyber threat intelligence best practice of assigning arbitrary labels to collections of hacker activity across the intrusion kill chain.</p>]]>
      </content:encoded>
      <itunes:duration>617</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[77f7212a-5b70-11f0-84aa-b743c3a39347]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW4470176424.mp3?updated=1751920472" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Brushed aside: The subtle scam you didn't order.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/344/notes</link>
      <description>This week, our hosts⁠⁠⁠⁠⁠⁠⁠⁠⁠ ⁠⁠Dave Bittner⁠⁠, ⁠⁠⁠⁠⁠⁠⁠Joe Carrigan⁠⁠⁠⁠⁠⁠⁠, and ⁠⁠⁠⁠⁠⁠⁠Maria Varmazis⁠⁠⁠⁠⁠⁠⁠ (also host of the ⁠⁠⁠⁠⁠⁠⁠T-Minus⁠⁠⁠⁠⁠⁠⁠ Space Daily show) are back sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. We start with some follow up, as Joe shares with us a complaint he has with Vanguard. Maria’s story is on McAfee’s latest research revealing that one in five Americans has fallen for a travel scam—often losing hundreds of dollars—despite many trying to stay vigilant, as scammers use fake websites, AI-altered photos, and phishing links to exploit deal-seeking travelers. Joe’s got two stories this week: the first one is from Rachel Tobac on LinkedIn, breaking down how attackers like Scattered Spider are using phone-based impersonation, fake domains, and social engineering to breach insurance companies, and the second is on Aflac confirming it was hit in a cyberattack believed to be part of a broader campaign targeting the insurance sector, likely tied to the same threat group. Dave’s story is on brushing scams, a scheme the United States Postal Service is warning about, where scammers send unordered packages—often low-cost items—to people’s addresses so they can fraudulently post fake “verified” reviews online using the recipient’s name and address to boost product rankings. Our catch of the day is from the scams sub-Reddit, where someone shared text messages from a scammer asking for only a small favor. 

Complete our annual audience survey before August 31.

Resources and links to stories:


  New McAfee Report Finds Young Adults Fall for Travel Scams More Often Than Older Generations

  Rachel Tobac LinkedIn

  Aflac Latest Insurer to Suffer Cyberattack and Data Breach

  Brushing Scam - Unexpected Package

  US Postal Inspection Service


⁠⁠⁠⁠⁠⁠⁠Have a Catch of the Day you'd like to share? Email it to us at ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠hackinghumans@n2k.com⁠⁠⁠⁠⁠⁠⁠⁠⁠.</description>
      <pubDate>Thu, 03 Jul 2025 05:00:00 -0000</pubDate>
      <itunes:title>Brushed aside: The subtle scam you didn't order.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>344</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>This week, our hosts⁠⁠⁠⁠⁠⁠⁠⁠⁠ ⁠⁠Dave Bittner⁠⁠, ⁠⁠⁠⁠⁠⁠⁠Joe Carrigan⁠⁠⁠⁠⁠⁠⁠, and ⁠⁠⁠⁠⁠⁠⁠Maria Varmazis⁠⁠⁠⁠⁠⁠⁠ (also host of the ⁠⁠⁠⁠⁠⁠⁠T-Minus⁠⁠⁠⁠⁠⁠⁠ Space Daily show) are back sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. We start with some follow up, as Joe shares with us a complaint he has with Vanguard. Maria’s story is on McAfee’s latest research revealing that one in five Americans has fallen for a travel scam—often losing hundreds of dollars—despite many trying to stay vigilant, as scammers use fake websites, AI-altered photos, and phishing links to exploit deal-seeking travelers. Joe’s got two stories this week: the first one is from Rachel Tobac on LinkedIn, breaking down how attackers like Scattered Spider are using phone-based impersonation, fake domains, and social engineering to breach insurance companies, and the second is on Aflac confirming it was hit in a cyberattack believed to be part of a broader campaign targeting the insurance sector, likely tied to the same threat group. Dave’s story is on brushing scams, a scheme the United States Postal Service is warning about, where scammers send unordered packages—often low-cost items—to people’s addresses so they can fraudulently post fake “verified” reviews online using the recipient’s name and address to boost product rankings. Our catch of the day is from the scams sub-Reddit, where someone shared text messages from a scammer asking for only a small favor. 

Complete our annual audience survey before August 31.

Resources and links to stories:


  New McAfee Report Finds Young Adults Fall for Travel Scams More Often Than Older Generations

  Rachel Tobac LinkedIn

  Aflac Latest Insurer to Suffer Cyberattack and Data Breach

  Brushing Scam - Unexpected Package

  US Postal Inspection Service


⁠⁠⁠⁠⁠⁠⁠Have a Catch of the Day you'd like to share? Email it to us at ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠hackinghumans@n2k.com⁠⁠⁠⁠⁠⁠⁠⁠⁠.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This week, our hosts<a href="https://www.linkedin.com/in/dave-bittner-27231a4/">⁠⁠⁠⁠⁠⁠⁠⁠⁠</a> <a href="https://www.linkedin.com/in/dave-bittner-27231a4/">⁠⁠Dave Bittner⁠⁠</a>, <a href="https://www.linkedin.com/in/joecarrigan/">⁠⁠⁠⁠⁠⁠⁠Joe Carrigan⁠⁠⁠⁠⁠⁠⁠</a>, and <a href="https://www.linkedin.com/in/varmazis/">⁠⁠⁠⁠⁠⁠⁠Maria Varmazis⁠⁠⁠⁠⁠⁠⁠</a> (also host of the <a href="https://space.n2k.com/podcasts/t-minus?__hstc=223811332.a636bba53840b4700c929fe67723a129.1721054632698.1747145009569.1747159962459.413&amp;__hssc=223811332.2.1747159962459&amp;__hsfp=3690629108">⁠⁠⁠⁠⁠⁠⁠T-Minus⁠⁠⁠⁠⁠⁠⁠</a> Space Daily show) are back sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. We start with some follow up, as Joe shares with us a complaint he has with Vanguard. Maria’s story is on McAfee’s latest research revealing that one in five Americans has fallen for a travel scam—often losing hundreds of dollars—despite many trying to stay vigilant, as scammers use fake websites, AI-altered photos, and phishing links to exploit deal-seeking travelers. Joe’s got two stories this week: the first one is from Rachel Tobac on LinkedIn, breaking down how attackers like Scattered Spider are using phone-based impersonation, fake domains, and social engineering to breach insurance companies, and the second is on Aflac confirming it was hit in a cyberattack believed to be part of a broader campaign targeting the insurance sector, likely tied to the same threat group. Dave’s story is on brushing scams, a scheme the United States Postal Service is warning about, where scammers send unordered packages—often low-cost items—to people’s addresses so they can fraudulently post fake “verified” reviews online using the recipient’s name and address to boost product rankings. Our catch of the day is from the scams sub-Reddit, where someone shared text messages from a scammer asking for only a small favor. </p>
<p>Complete our annual <a href="https://www.surveymonkey.com/r/JD7JFL2%E2%81%A0">audience survey</a> before August 31.</p>
<p><strong>Resources and links to stories:</strong></p>
<ul>
  <li><a href="https://www.businesswire.com/news/home/20250626244192/en/New-McAfee-Report-Finds-Young-Adults-Fall-for-Travel-Scams-More-Often-Than-Older-Generations">New McAfee Report Finds Young Adults Fall for Travel Scams More Often Than Older Generations</a></li>
  <li><a href="https://www.linkedin.com/posts/racheltobac_my-favorite-way-to-hack-in-my-ethical-hacking-activity-7341870148137439234-h6Mo/?utm_source=share&amp;utm_medium=member_desktop&amp;rcm=ACoAAABolDgBa1OkcRIevOVLL65vUF8SOgJfvpI">Rachel Tobac LinkedIn</a></li>
  <li><a href="https://www.hipaajournal.com/aflac-data-breach/">Aflac Latest Insurer to Suffer Cyberattack and Data Breach</a></li>
  <li><a href="https://www.youtube.com/watch?v=PMgdv-Lyohs">Brushing Scam - Unexpected Package</a></li>
  <li><a href="https://www.youtube.com/@USPISpressroom/playlists">US Postal Inspection Service</a></li>
</ul>
<p><a href="https://therecord.media/fin6-recruitment-scam-malware-campaign">⁠⁠⁠⁠</a>⁠⁠⁠Have a Catch of the Day you'd like to share? Email it to us at <a href="https://therecord.media/fin6-recruitment-scam-malware-campaign">⁠⁠⁠⁠</a><a href="mailto:hackinghumans@n2k.com">⁠⁠⁠⁠⁠⁠⁠⁠⁠hackinghumans@n2k.com⁠⁠⁠⁠⁠⁠⁠⁠⁠</a>.</p>]]>
      </content:encoded>
      <itunes:duration>2640</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[47c1b3f4-cdd5-11ef-8599-8388b627af09]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW1294361366.mp3?updated=1751477243" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>BSIMM (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/89/notes</link>
      <description>Please enjoy this encore of Word Notes. 

A descriptive model that provides a baseline of observed software security initiatives and activities from a collection of volunteer software development shops. 

CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/bsimm⁠

Audio reference link: “⁠OWASP AppSecUSA 2014 - Keynote: Gary McGraw - BSIMM: A Decade of Software Security⁠.” YouTube Video. YouTube, September 19, 2014.</description>
      <pubDate>Tue, 01 Jul 2025 07:00:00 -0000</pubDate>
      <itunes:title>BSIMM (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>89</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/d26aaa48-538a-11f0-9bf9-33118e745bdf/image/441b0ca2db080b93b935568d381ce462.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Please enjoy this encore of Word Notes. 

A descriptive model that provides a baseline of observed software security initiatives and activities from a collection of volunteer software development shops. 

CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/bsimm⁠

Audio reference link: “⁠OWASP AppSecUSA 2014 - Keynote: Gary McGraw - BSIMM: A Decade of Software Security⁠.” YouTube Video. YouTube, September 19, 2014.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore of Word Notes. </p>
<p>A descriptive model that provides a baseline of observed software security initiatives and activities from a collection of volunteer software development shops. </p>
<p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/bsimm">⁠https://thecyberwire.com/glossary/bsimm⁠</a></p>
<p>Audio reference link: “<a href="https://www.youtube.com/watch?v=GnlFrXPb4Qw">⁠OWASP AppSecUSA 2014 - Keynote: Gary McGraw - BSIMM: A Decade of Software Security⁠</a>.” YouTube Video. YouTube, September 19, 2014. </p>]]>
      </content:encoded>
      <itunes:duration>369</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[d26aaa48-538a-11f0-9bf9-33118e745bdf]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW4707040411.mp3?updated=1751052036" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The RMM protocol: Remote, risky, and ready to strike. [Only Malware in the Building]</title>
      <link>https://thecyberwire.com/podcasts/only-malware-in-the-building/12/notes</link>
      <description>Please enjoy this encore of Only Malware in the Building.

Welcome in! You’ve entered, Only Malware in the Building. Join us each month to sip tea and solve mysteries about today’s most interesting threats. Your host is ⁠⁠Selena Larson⁠⁠, ⁠⁠Proofpoint⁠⁠ intelligence analyst and host of their podcast ⁠⁠DISCARDED⁠⁠. Inspired by the residents of a building in New York’s exclusive upper west side, Selena is joined by ⁠⁠N2K Networks⁠⁠ ⁠⁠Dave Bittner⁠⁠ and our newest co-host, ⁠Keith Mularski⁠, former FBI cybercrime investigator and now Chief Global Ambassador at ⁠Qintel⁠.

Being a security researcher is a bit like being a detective: you gather clues, analyze the evidence, and consult the experts to solve the cyber puzzle. On this episode, our hosts discuss the growing trend of cybercriminals using legitimate remote monitoring and management (RMM) tools in email campaigns as a first-stage payload. They explore how these tools are being leveraged for data theft, financial fraud, and lateral movement within networks. With the decline of traditional malware delivery methods, including loaders and botnets, the shift toward RMMs marks a significant change in attack strategies. Tune in to learn more about this evolving threat landscape and how to stay ahead of these tactics.</description>
      <pubDate>Tue, 01 Jul 2025 07:00:00 -0000</pubDate>
      <itunes:title>The RMM protocol: Remote, risky, and ready to strike. [Only Malware in the Building]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>12</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/a8d93330-55c8-11f0-801d-b7247f00ed4b/image/14002263e169460f16ca12e04624eb3a.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Please enjoy this encore of Only Malware in the Building.

Welcome in! You’ve entered, Only Malware in the Building. Join us each month to sip tea and solve mysteries about today’s most interesting threats. Your host is ⁠⁠Selena Larson⁠⁠, ⁠⁠Proofpoint⁠⁠ intelligence analyst and host of their podcast ⁠⁠DISCARDED⁠⁠. Inspired by the residents of a building in New York’s exclusive upper west side, Selena is joined by ⁠⁠N2K Networks⁠⁠ ⁠⁠Dave Bittner⁠⁠ and our newest co-host, ⁠Keith Mularski⁠, former FBI cybercrime investigator and now Chief Global Ambassador at ⁠Qintel⁠.

Being a security researcher is a bit like being a detective: you gather clues, analyze the evidence, and consult the experts to solve the cyber puzzle. On this episode, our hosts discuss the growing trend of cybercriminals using legitimate remote monitoring and management (RMM) tools in email campaigns as a first-stage payload. They explore how these tools are being leveraged for data theft, financial fraud, and lateral movement within networks. With the decline of traditional malware delivery methods, including loaders and botnets, the shift toward RMMs marks a significant change in attack strategies. Tune in to learn more about this evolving threat landscape and how to stay ahead of these tactics.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore of Only Malware in the Building.</p>
<p>Welcome in! You’ve entered, Only Malware in the Building. Join us each month to sip tea and solve mysteries about today’s most interesting threats. Your host is <a href="https://www.linkedin.com/in/selenalarson/">⁠⁠Selena Larson⁠⁠</a>, <a href="https://www.proofpoint.com/">⁠⁠Proofpoint⁠⁠</a> intelligence analyst and host of their podcast <a href="https://www.proofpoint.com/us/podcasts/discarded">⁠⁠DISCARDED⁠⁠</a>. Inspired by the residents of a building in New York’s exclusive upper west side, Selena is joined by <a href="https://www.n2k.com/">⁠⁠N2K Networks⁠⁠</a> <a href="https://www.linkedin.com/in/dave-bittner-27231a4/">⁠⁠Dave Bittner⁠⁠</a> and our newest co-host, <a href="https://www.linkedin.com/in/keith-mularski-b737551/">⁠Keith Mularski⁠</a>, former FBI cybercrime investigator and now Chief Global Ambassador at <a href="https://www.linkedin.com/company/qintel/">⁠Qintel⁠</a>.</p>
<p>Being a security researcher is a bit like being a detective: you gather clues, analyze the evidence, and consult the experts to solve the cyber puzzle. On this episode, our hosts discuss the growing trend of cybercriminals using legitimate remote monitoring and management (RMM) tools in email campaigns as a first-stage payload. They explore how these tools are being leveraged for data theft, financial fraud, and lateral movement within networks. With the decline of traditional malware delivery methods, including loaders and botnets, the shift toward RMMs marks a significant change in attack strategies. Tune in to learn more about this evolving threat landscape and how to stay ahead of these tactics.</p>]]>
      </content:encoded>
      <itunes:duration>2365</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[a8d93330-55c8-11f0-801d-b7247f00ed4b]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW2598155190.mp3?updated=1751388723" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The many faces of fraud.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/343/notes</link>
      <description>This week, our hosts⁠⁠⁠⁠⁠⁠⁠ ⁠Dave Bittner⁠, ⁠⁠⁠⁠⁠⁠Joe Carrigan⁠⁠⁠⁠⁠⁠, and ⁠⁠⁠⁠⁠⁠Maria Varmazis⁠⁠⁠⁠⁠⁠ (also host of the ⁠⁠⁠⁠⁠⁠T-Minus⁠⁠⁠⁠⁠⁠ Space Daily show) are back sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. We start with some follow-up from listener Abdussobur, who wonders if a pair of suspicious text messages—one sent to his wife and another to him with a nearby address—could be the result of a data breach. Joe's story is on a surge of financial aid fraud where identity thieves, often using AI chatbots as “ghost students,” are enrolling in online college courses to steal federal funds—leaving real people like Heather Brady and Wayne Chaw with fake loans and months of bureaucratic cleanup. Dave's got the story on how the FIN6 cybercriminal group is posing as job seekers on LinkedIn to trick recruiters into opening malware-laced resumes, using deceptive tactics like fake portfolio sites and the MoreEggs backdoor to steal credentials and launch ransomware attacks. Maria's story is on a Pennsylvania woman who scammed over $800,000—nearly $466,000 from a Cedar Rapids church—by hacking emails and rerouting payments, claiming she did it under the direction of a famous British actor she was allegedly dating. Our catch of the day is on a convincing but bogus text claiming an overdue traffic fine under a fake regulation—complete with threats of license suspension and credit damage—all designed to trick recipients into clicking a malicious link.



Resources and links to stories:


  
⁠⁠⁠⁠⁠⁠How scammers are using AI to steal college financial aid


  FIN6 cybercriminals pose as job seekers on LinkedIn to hack recruiters

  Woman scams church out of over $450,000, says famous British actor told her to do it


⁠⁠⁠⁠⁠Have a Catch of the Day you'd like to share? Email it to us at ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠hackinghumans@n2k.com⁠⁠⁠⁠⁠⁠⁠⁠.</description>
      <pubDate>Thu, 26 Jun 2025 05:00:00 -0000</pubDate>
      <itunes:title>The many faces of fraud.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>343</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>This week, our hosts⁠⁠⁠⁠⁠⁠⁠ ⁠Dave Bittner⁠, ⁠⁠⁠⁠⁠⁠Joe Carrigan⁠⁠⁠⁠⁠⁠, and ⁠⁠⁠⁠⁠⁠Maria Varmazis⁠⁠⁠⁠⁠⁠ (also host of the ⁠⁠⁠⁠⁠⁠T-Minus⁠⁠⁠⁠⁠⁠ Space Daily show) are back sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. We start with some follow-up from listener Abdussobur, who wonders if a pair of suspicious text messages—one sent to his wife and another to him with a nearby address—could be the result of a data breach. Joe's story is on a surge of financial aid fraud where identity thieves, often using AI chatbots as “ghost students,” are enrolling in online college courses to steal federal funds—leaving real people like Heather Brady and Wayne Chaw with fake loans and months of bureaucratic cleanup. Dave's got the story on how the FIN6 cybercriminal group is posing as job seekers on LinkedIn to trick recruiters into opening malware-laced resumes, using deceptive tactics like fake portfolio sites and the MoreEggs backdoor to steal credentials and launch ransomware attacks. Maria's story is on a Pennsylvania woman who scammed over $800,000—nearly $466,000 from a Cedar Rapids church—by hacking emails and rerouting payments, claiming she did it under the direction of a famous British actor she was allegedly dating. Our catch of the day is on a convincing but bogus text claiming an overdue traffic fine under a fake regulation—complete with threats of license suspension and credit damage—all designed to trick recipients into clicking a malicious link.



Resources and links to stories:


  
⁠⁠⁠⁠⁠⁠How scammers are using AI to steal college financial aid


  FIN6 cybercriminals pose as job seekers on LinkedIn to hack recruiters

  Woman scams church out of over $450,000, says famous British actor told her to do it


⁠⁠⁠⁠⁠Have a Catch of the Day you'd like to share? Email it to us at ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠hackinghumans@n2k.com⁠⁠⁠⁠⁠⁠⁠⁠.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This week, our hosts<a href="https://www.linkedin.com/in/dave-bittner-27231a4/">⁠⁠⁠⁠⁠⁠⁠</a> <a href="https://www.linkedin.com/in/dave-bittner-27231a4/">⁠Dave Bittner⁠</a>, <a href="https://www.linkedin.com/in/joecarrigan/">⁠⁠⁠⁠⁠⁠Joe Carrigan⁠⁠⁠⁠⁠⁠</a>, and <a href="https://www.linkedin.com/in/varmazis/">⁠⁠⁠⁠⁠⁠Maria Varmazis⁠⁠⁠⁠⁠⁠</a> (also host of the <a href="https://space.n2k.com/podcasts/t-minus?__hstc=223811332.a636bba53840b4700c929fe67723a129.1721054632698.1747145009569.1747159962459.413&amp;__hssc=223811332.2.1747159962459&amp;__hsfp=3690629108">⁠⁠⁠⁠⁠⁠T-Minus⁠⁠⁠⁠⁠⁠</a> Space Daily show) are back sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. We start with some follow-up from listener Abdussobur, who wonders if a pair of suspicious text messages—one sent to his wife and another to him with a nearby address—could be the result of a data breach. Joe's story is on a surge of financial aid fraud where identity thieves, often using AI chatbots as “ghost students,” are enrolling in online college courses to steal federal funds—leaving real people like Heather Brady and Wayne Chaw with fake loans and months of bureaucratic cleanup. Dave's got the story on how the FIN6 cybercriminal group is posing as job seekers on LinkedIn to trick recruiters into opening malware-laced resumes, using deceptive tactics like fake portfolio sites and the MoreEggs backdoor to steal credentials and launch ransomware attacks. Maria's story is on a Pennsylvania woman who scammed over $800,000—nearly $466,000 from a Cedar Rapids church—by hacking emails and rerouting payments, claiming she did it under the direction of a famous British actor she was allegedly dating. Our catch of the day is on a convincing but bogus text claiming an overdue traffic fine under a fake regulation—complete with threats of license suspension and credit damage—all designed to trick recipients into clicking a malicious link.</p>
<p><br></p>
<p><strong>Resources and links to stories:</strong></p>
<ul>
  <li>
<a href="https://www.cnbc.com/2025/05/19/tariff-scams-red-flags.html">⁠⁠⁠⁠⁠</a><a href="https://spacecoastdaily.com/2025/06/alert-brevard-based-health-first-health-plans-joins-fbi-to-expose-medical-insurance-scam/">⁠</a><a href="https://apnews.com/article/ai-scam-college-financial-aid-identity-theft-aa1bc8bcb4c368ee6bafcf6a523c5fb2">How scammers are using AI to steal college financial aid</a>
</li>
  <li><a href="https://therecord.media/fin6-recruitment-scam-malware-campaign">FIN6 cybercriminals pose as job seekers on LinkedIn to hack recruiters</a></li>
  <li><a href="https://www.kcrg.com/2025/06/11/woman-scams-cedar-rapids-church-out-over-450000-says-famous-british-actor-told-her-do-it/">Woman scams church out of over $450,000, says famous British actor told her to do it</a></li>
</ul>
<p><a href="https://therecord.media/fin6-recruitment-scam-malware-campaign">⁠⁠</a>⁠⁠⁠Have a Catch of the Day you'd like to share? Email it to us at <a href="https://therecord.media/fin6-recruitment-scam-malware-campaign">⁠⁠</a><a href="mailto:hackinghumans@n2k.com">⁠⁠⁠⁠⁠⁠⁠⁠hackinghumans@n2k.com⁠⁠⁠⁠⁠⁠⁠⁠</a>.</p>]]>
      </content:encoded>
      <itunes:duration>2518</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[47909c06-cdd5-11ef-8599-83c2b540a3b7]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW2272233611.mp3?updated=1750868125" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>OWASP vulnerable and outdated components (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/88/notes</link>
      <description>Please enjoy this encore of Word Notes. 

Software libraries, frameworks, packages, and other components, and their dependencies (third-party code that each component uses) that have inherent security weaknesses, either through newly discovered vulnerabilities or because newer versions have superseded the deployed version. 



Audio reference Link: "⁠The Panama Papers: A Closer Look⁠," Late Night with Seth Meyers, YouTube, 12 April 2016</description>
      <pubDate>Tue, 24 Jun 2025 07:00:00 -0000</pubDate>
      <itunes:title>OWASP vulnerable and outdated components (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>88</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/3f5c117e-5074-11f0-83f8-1fe20debebb2/image/441b0ca2db080b93b935568d381ce462.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle/>
      <itunes:summary>Please enjoy this encore of Word Notes. 

Software libraries, frameworks, packages, and other components, and their dependencies (third-party code that each component uses) that have inherent security weaknesses, either through newly discovered vulnerabilities or because newer versions have superseded the deployed version. 



Audio reference Link: "⁠The Panama Papers: A Closer Look⁠," Late Night with Seth Meyers, YouTube, 12 April 2016</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore of Word Notes. </p>
<p>Software libraries, frameworks, packages, and other components, and their dependencies (third-party code that each component uses) that have inherent security weaknesses, either through newly discovered vulnerabilities or because newer versions have superseded the deployed version. </p>
<p><br></p>
<p>Audio reference Link: "<a href="https://www.youtube.com/watch?v=CdvZ4mV31Ic">⁠The Panama Papers: A Closer Look⁠</a>," Late Night with Seth Meyers, YouTube, 12 April 2016</p>]]>
      </content:encoded>
      <itunes:duration>484</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[3f5c117e-5074-11f0-83f8-1fe20debebb2]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW2488233912.mp3?updated=1750712279" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Gold bars and bold lies.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/318/notes</link>
      <description>Please enjoy this encore of Hacking Humans.

On Hacking Humans, ⁠Dave Bittner⁠, ⁠Joe Carrigan⁠, and ⁠Maria Varmazis⁠ (also host of N2K's daily space podcast, T-Minus), are once again sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines to help our audience become aware of what is out there. First we start off with some follow up, our hosts share some more information on VIN swapping, and a clarification on bank participation in FinCEN. Maria shares a telling tale about a Bethesda couple loosing $367,000 in gold bars to a sophisticated scam involving fake officials and elaborate deceptions, but a police sting led to the arrest of a suspect, highlighting a growing nationwide trend of elderly victims targeted by gold bar fraud. Joe's story comes from KnowBe4 and is on DavidB, their VP of Asia Pacific, thwarting a sophisticated social engineering attack via WhatsApp by recognizing inconsistencies in the impersonator’s behavior and verifying directly with the colleague they claimed to be. Dave's story comes from the FBI on how criminals are exploiting generative AI to enhance fraud schemes, including using AI-generated text, images, audio, and video to create convincing social engineering attacks, phishing scams, and identity fraud, while offering tips to protect against these threats. Our catch of the day comes from a listener who received an urgent email from someone claiming to be an FBI agent with a rather dramatic tale about intercepted consignment boxes, missing documents, and a ticking clock—but let's just say this "agent" might need some better training in both law enforcement and grammar.

Resources and links to stories: 


  ⁠“VIN swap scam costs Las Vegas man $50K, new truck"⁠

  ⁠FinCEN⁠

  ⁠Gold bar scammers claimed hackers could fund Russian missiles, police say⁠

  ⁠Real Social Engineering Attack on KnowBe4 Employee Foiled⁠

  ⁠Criminals Use Generative Artificial Intelligence to Facilitate Financial Fraud⁠




You can hear more from the T-Minus space daily show ⁠here⁠.



Have a Catch of the Day you'd like to share? Email it to us at ⁠hackinghumans@n2k.com⁠.</description>
      <pubDate>Thu, 19 Jun 2025 05:00:00 -0000</pubDate>
      <itunes:title>Gold bars and bold lies.</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>318</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Please enjoy this encore of Hacking Humans.

On Hacking Humans, ⁠Dave Bittner⁠, ⁠Joe Carrigan⁠, and ⁠Maria Varmazis⁠ (also host of N2K's daily space podcast, T-Minus), are once again sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines to help our audience become aware of what is out there. First we start off with some follow up, our hosts share some more information on VIN swapping, and a clarification on bank participation in FinCEN. Maria shares a telling tale about a Bethesda couple loosing $367,000 in gold bars to a sophisticated scam involving fake officials and elaborate deceptions, but a police sting led to the arrest of a suspect, highlighting a growing nationwide trend of elderly victims targeted by gold bar fraud. Joe's story comes from KnowBe4 and is on DavidB, their VP of Asia Pacific, thwarting a sophisticated social engineering attack via WhatsApp by recognizing inconsistencies in the impersonator’s behavior and verifying directly with the colleague they claimed to be. Dave's story comes from the FBI on how criminals are exploiting generative AI to enhance fraud schemes, including using AI-generated text, images, audio, and video to create convincing social engineering attacks, phishing scams, and identity fraud, while offering tips to protect against these threats. Our catch of the day comes from a listener who received an urgent email from someone claiming to be an FBI agent with a rather dramatic tale about intercepted consignment boxes, missing documents, and a ticking clock—but let's just say this "agent" might need some better training in both law enforcement and grammar.

Resources and links to stories: 


  ⁠“VIN swap scam costs Las Vegas man $50K, new truck"⁠

  ⁠FinCEN⁠

  ⁠Gold bar scammers claimed hackers could fund Russian missiles, police say⁠

  ⁠Real Social Engineering Attack on KnowBe4 Employee Foiled⁠

  ⁠Criminals Use Generative Artificial Intelligence to Facilitate Financial Fraud⁠




You can hear more from the T-Minus space daily show ⁠here⁠.



Have a Catch of the Day you'd like to share? Email it to us at ⁠hackinghumans@n2k.com⁠.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore of Hacking Humans.</p>
<p>On Hacking Humans, <a href="https://www.linkedin.com/in/dave-bittner-27231a4/">⁠Dave Bittner⁠</a>, <a href="https://www.linkedin.com/in/joecarrigan/">⁠Joe Carrigan⁠</a>, and <a href="https://www.linkedin.com/in/varmazis/">⁠Maria Varmazis⁠</a> (also host of N2K's daily space podcast, T-Minus), are once again sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines to help our audience become aware of what is out there. First we start off with some follow up, our hosts share some more information on VIN swapping, and a clarification on bank participation in FinCEN. Maria shares a telling tale about a Bethesda couple loosing $367,000 in gold bars to a sophisticated scam involving fake officials and elaborate deceptions, but a police sting led to the arrest of a suspect, highlighting a growing nationwide trend of elderly victims targeted by gold bar fraud. Joe's story comes from KnowBe4 and is on DavidB, their VP of Asia Pacific, thwarting a sophisticated social engineering attack via WhatsApp by recognizing inconsistencies in the impersonator’s behavior and verifying directly with the colleague they claimed to be. Dave's story comes from the FBI on how criminals are exploiting generative AI to enhance fraud schemes, including using AI-generated text, images, audio, and video to create convincing social engineering attacks, phishing scams, and identity fraud, while offering tips to protect against these threats. Our catch of the day comes from a listener who received an urgent email from someone claiming to be an FBI agent with a rather dramatic tale about intercepted consignment boxes, missing documents, and a ticking clock—but let's just say this "agent" might need some better training in both law enforcement and grammar.</p>
<p>Resources and links to stories: </p>
<ul>
  <li><a href="https://www.8newsnow.com/news/local-news/vin-swap-scam-costs-las-vegas-man-50k-new-truck/">⁠“VIN swap scam costs Las Vegas man $50K, new truck"⁠</a></li>
  <li><a href="https://infosec.exchange/@lippard/113602552863611173">⁠FinCEN⁠</a></li>
  <li><a href="https://www.washingtonpost.com/dc-md-va/2024/12/09/gold-bar-scam-maryland-russia/">⁠Gold bar scammers claimed hackers could fund Russian missiles, police say⁠</a></li>
  <li><a href="https://blog.knowbe4.com/real-social-engineering-attack-on-knowbe4-employee-foiled">⁠Real Social Engineering Attack on KnowBe4 Employee Foiled⁠</a></li>
  <li><a href="https://www.ic3.gov/PSA/2024/PSA241203">⁠Criminals Use Generative Artificial Intelligence to Facilitate Financial Fraud⁠</a></li>
</ul>
<p><br></p>
<p>You can hear more from the T-Minus space daily show <a href="https://space.n2k.com/podcasts/t-minus">⁠here⁠</a>.</p>
<p><br></p>
<p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@n2k.com">⁠hackinghumans@n2k.com⁠</a>. </p>]]>
      </content:encoded>
      <itunes:duration>2757</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[475f21f8-cdd5-11ef-8599-0f3583fbe2ae]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW4153993968.mp3?updated=1750265785" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Managing online security throughout the decades. </title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/342/notes</link>
      <description>This week, our hosts⁠⁠⁠⁠⁠ Dave Bittner, ⁠⁠⁠⁠⁠Joe Carrigan⁠⁠⁠⁠⁠, and ⁠⁠⁠⁠⁠Maria Varmazis⁠⁠⁠⁠⁠ (also host of the ⁠⁠⁠⁠⁠T-Minus⁠⁠⁠⁠⁠ Space Daily show) are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines.  We start off with some more chicken follow up, this week, delving into malware-related chicken names. Dave’s got the story of Brevard-based Health First Health Plans teaming up with the FBI to warn consumers about a nationwide medical insurance scam where victims pay upfront for fake coverage and end up stuck with huge medical bills. Maria shares the story on how a recent April 2025 survey reveals that while most US consumers feel confident identifying scams and rely on traditional security measures like strong passwords and two-factor authentication, many still experience scam attempts and data breaches, with real-time threat detection emerging as the most valued feature in security products. Joe shares a personal story about how he was mildly got, got—tricked, that is—he thought he was filling out a quick survey for a waiter, but it actually ended up as a Google review. It's a reminder of how AI and tech are blurring the lines in everyday interactions, and how easily people can get tripped up by these evolving processes. The catch of the day this week is from the Scams sub-Reddit, and Dave reads a text from a scammer claiming to have information on his doing drugs at his old work place. 

Resources and links to stories:


  
⁠⁠⁠ALERT! Brevard-Based Health First Health Plans Joins FBI to Expose Medical Insurance Scam


  Scams and Protections US Report: April 2025

  We make building an app so easy, anyone can do it

  '700 Indian engineers posed as AI': The London startup that took Microsoft for a ride

  Artificial Intelligence stories 


⁠Have a Catch of the Day you'd like to share? Email it to us at ⁠⁠⁠⁠⁠⁠⁠⁠hackinghumans@n2k.com⁠⁠⁠⁠⁠⁠⁠.</description>
      <pubDate>Thu, 12 Jun 2025 05:00:00 -0000</pubDate>
      <itunes:title>Managing online security throughout the decades. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>342</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>This week, our hosts⁠⁠⁠⁠⁠ Dave Bittner, ⁠⁠⁠⁠⁠Joe Carrigan⁠⁠⁠⁠⁠, and ⁠⁠⁠⁠⁠Maria Varmazis⁠⁠⁠⁠⁠ (also host of the ⁠⁠⁠⁠⁠T-Minus⁠⁠⁠⁠⁠ Space Daily show) are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines.  We start off with some more chicken follow up, this week, delving into malware-related chicken names. Dave’s got the story of Brevard-based Health First Health Plans teaming up with the FBI to warn consumers about a nationwide medical insurance scam where victims pay upfront for fake coverage and end up stuck with huge medical bills. Maria shares the story on how a recent April 2025 survey reveals that while most US consumers feel confident identifying scams and rely on traditional security measures like strong passwords and two-factor authentication, many still experience scam attempts and data breaches, with real-time threat detection emerging as the most valued feature in security products. Joe shares a personal story about how he was mildly got, got—tricked, that is—he thought he was filling out a quick survey for a waiter, but it actually ended up as a Google review. It's a reminder of how AI and tech are blurring the lines in everyday interactions, and how easily people can get tripped up by these evolving processes. The catch of the day this week is from the Scams sub-Reddit, and Dave reads a text from a scammer claiming to have information on his doing drugs at his old work place. 

Resources and links to stories:


  
⁠⁠⁠ALERT! Brevard-Based Health First Health Plans Joins FBI to Expose Medical Insurance Scam


  Scams and Protections US Report: April 2025

  We make building an app so easy, anyone can do it

  '700 Indian engineers posed as AI': The London startup that took Microsoft for a ride

  Artificial Intelligence stories 


⁠Have a Catch of the Day you'd like to share? Email it to us at ⁠⁠⁠⁠⁠⁠⁠⁠hackinghumans@n2k.com⁠⁠⁠⁠⁠⁠⁠.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This week, our hosts<a href="https://www.linkedin.com/in/dave-bittner-27231a4/">⁠⁠⁠⁠⁠</a> <a href="https://www.linkedin.com/in/dave-bittner-27231a4/">Dave Bittner</a>, <a href="https://www.linkedin.com/in/joecarrigan/">⁠⁠⁠⁠⁠Joe Carrigan⁠⁠⁠⁠⁠</a>, and <a href="https://www.linkedin.com/in/varmazis/">⁠⁠⁠⁠⁠Maria Varmazis⁠⁠⁠⁠⁠</a> (also host of the <a href="https://space.n2k.com/podcasts/t-minus?__hstc=223811332.a636bba53840b4700c929fe67723a129.1721054632698.1747145009569.1747159962459.413&amp;__hssc=223811332.2.1747159962459&amp;__hsfp=3690629108">⁠⁠⁠⁠⁠T-Minus⁠⁠⁠⁠⁠</a> Space Daily show) are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines.  We start off with some more chicken follow up, this week, delving into malware-related chicken names. Dave’s got the story of Brevard-based Health First Health Plans teaming up with the FBI to warn consumers about a nationwide medical insurance scam where victims pay upfront for fake coverage and end up stuck with huge medical bills. Maria shares the story on how a recent April 2025 survey reveals that while most US consumers feel confident identifying scams and rely on traditional security measures like strong passwords and two-factor authentication, many still experience scam attempts and data breaches, with real-time threat detection emerging as the most valued feature in security products. Joe shares a personal story about how he was mildly got, got—tricked, that is—he thought he was filling out a quick survey for a waiter, but it actually ended up as a Google review. It's a reminder of how AI and tech are blurring the lines in everyday interactions, and how easily people can get tripped up by these evolving processes. The catch of the day this week is from the Scams sub-Reddit, and Dave reads a text from a scammer claiming to have information on his doing drugs at his old work place. </p>
<p><strong>Resources and links to stories:</strong></p>
<ul>
  <li>
<a href="https://www.cnbc.com/2025/05/19/tariff-scams-red-flags.html">⁠⁠⁠</a><a href="https://spacecoastdaily.com/2025/06/alert-brevard-based-health-first-health-plans-joins-fbi-to-expose-medical-insurance-scam/">ALERT! Brevard-Based Health First Health Plans Joins FBI to Expose Medical Insurance Scam</a>
</li>
  <li><a href="https://pro-assets.morningconsult.com/wp-uploads/2025/06/Google-x-Morning-Consult-US-Consumer-Scams-and-Protections-Blog-Report.pdf">Scams and Protections US Report: April 2025</a></li>
  <li><a href="https://www.builder.ai/">We make building an app so easy, anyone can do it</a></li>
  <li><a href="https://www.businesstoday.in/technology/news/story/700-indian-engineers-posed-as-ai-the-london-startup-that-took-microsoft-for-a-ride-478514-2025-05-31">'700 Indian engineers posed as AI': The London startup that took Microsoft for a ride</a></li>
  <li><a href="https://sifted.eu/">Artificial Intelligence stories </a></li>
</ul>
<p><a href="https://x.com/javilopen/status/1925495026903380358">⁠Have a Catch of the Day you'd like to share? Email it to us at ⁠</a><a href="mailto:hackinghumans@n2k.com">⁠⁠⁠⁠⁠⁠⁠hackinghumans@n2k.com⁠⁠⁠⁠⁠⁠⁠</a>.</p>]]>
      </content:encoded>
      <itunes:duration>2589</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[472d383c-cdd5-11ef-8599-dbca89aa8a69]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW2593061665.mp3?updated=1749570941" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>OWASP software and data integrity failures (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/87/notes</link>
      <description>Please enjoy this encore of Word Notes. 

Code and data repositories that don't protect against unauthorized changes.</description>
      <pubDate>Tue, 10 Jun 2025 07:00:00 -0000</pubDate>
      <itunes:title>OWASP software and data integrity failures (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>87</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Please enjoy this encore of Word Notes. 

Code and data repositories that don't protect against unauthorized changes.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore of Word Notes. </p>
<p>Code and data repositories that don't protect against unauthorized changes.</p>]]>
      </content:encoded>
      <itunes:duration>507</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[8bdfeb90-453b-11f0-ba80-df9eda684d95]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW8618047585.mp3?updated=1749478359" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>No cameras, no crew—just code.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/341/notes</link>
      <description>This week, our hosts⁠⁠⁠ ⁠⁠⁠⁠Joe Carrigan⁠⁠⁠⁠, and ⁠⁠⁠⁠Maria Varmazis⁠⁠⁠⁠ (also host of the ⁠⁠⁠⁠T-Minus⁠⁠⁠⁠ Space Daily show) are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. We start with some follow-up from a listener on class action settlements: they’re a class action attorney and shared that the best way to verify a notice is to contact the law firm listed in the court documents—plus, unclaimed funds don’t go to the attorneys, but are redistributed to claimants. Maria's story is on a listener dealing with phishing calendar invites that auto-add to their calendar—she shares tips like avoiding the “decline” button, adjusting settings to prevent automatic invite processing, and contacting email admins to help block these pesky requests. Joe's got the story on a film made almost entirely with AI tools like Google Veo and Runway—while the results are stunning, the process was chaotic, proving that human creativity, direction, and a lot of trial and error are still essential behind the scenes. Our cluck of the day is from listener Clayton, who writes in with a scam email sharing a fake job about a virtual interview. 

Resources and links to stories:


  
⁠We Made a Film With AI. You’ll Be Blown Away—and Freaked Out.


  AI Will Smith eating spaghetti pasta (AI footage and audio)

  Just got access to Veo 3 and the first thing I did was try the Will Smith spaghetti test.

  AI video just took a startling leap in realism. Are we doomed?

  Impossible Challenges (Google Veo 3 )


Have a Catch of the Day you'd like to share? Email it to us at ⁠⁠⁠⁠⁠⁠hackinghumans@n2k.com⁠⁠⁠⁠⁠⁠.</description>
      <pubDate>Thu, 05 Jun 2025 05:00:00 -0000</pubDate>
      <itunes:title>No cameras, no crew—just code.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>341</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>This week, our hosts⁠⁠⁠ ⁠⁠⁠⁠Joe Carrigan⁠⁠⁠⁠, and ⁠⁠⁠⁠Maria Varmazis⁠⁠⁠⁠ (also host of the ⁠⁠⁠⁠T-Minus⁠⁠⁠⁠ Space Daily show) are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. We start with some follow-up from a listener on class action settlements: they’re a class action attorney and shared that the best way to verify a notice is to contact the law firm listed in the court documents—plus, unclaimed funds don’t go to the attorneys, but are redistributed to claimants. Maria's story is on a listener dealing with phishing calendar invites that auto-add to their calendar—she shares tips like avoiding the “decline” button, adjusting settings to prevent automatic invite processing, and contacting email admins to help block these pesky requests. Joe's got the story on a film made almost entirely with AI tools like Google Veo and Runway—while the results are stunning, the process was chaotic, proving that human creativity, direction, and a lot of trial and error are still essential behind the scenes. Our cluck of the day is from listener Clayton, who writes in with a scam email sharing a fake job about a virtual interview. 

Resources and links to stories:


  
⁠We Made a Film With AI. You’ll Be Blown Away—and Freaked Out.


  AI Will Smith eating spaghetti pasta (AI footage and audio)

  Just got access to Veo 3 and the first thing I did was try the Will Smith spaghetti test.

  AI video just took a startling leap in realism. Are we doomed?

  Impossible Challenges (Google Veo 3 )


Have a Catch of the Day you'd like to share? Email it to us at ⁠⁠⁠⁠⁠⁠hackinghumans@n2k.com⁠⁠⁠⁠⁠⁠.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This week, our hosts<a href="https://www.linkedin.com/in/dave-bittner-27231a4/">⁠⁠⁠</a> <a href="https://www.linkedin.com/in/joecarrigan/">⁠⁠⁠⁠Joe Carrigan⁠⁠⁠⁠</a>, and <a href="https://www.linkedin.com/in/varmazis/">⁠⁠⁠⁠Maria Varmazis⁠⁠⁠⁠</a> (also host of the <a href="https://space.n2k.com/podcasts/t-minus?__hstc=223811332.a636bba53840b4700c929fe67723a129.1721054632698.1747145009569.1747159962459.413&amp;__hssc=223811332.2.1747159962459&amp;__hsfp=3690629108">⁠⁠⁠⁠T-Minus⁠⁠⁠⁠</a> Space Daily show) are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. We start with some follow-up from a listener on class action settlements: they’re a class action attorney and shared that the best way to verify a notice is to contact the law firm listed in the court documents—plus, unclaimed funds don’t go to the attorneys, but are redistributed to claimants. Maria's story is on a listener dealing with phishing calendar invites that auto-add to their calendar—she shares tips like avoiding the “decline” button, adjusting settings to prevent automatic invite processing, and contacting email admins to help block these pesky requests. Joe's got the story on a film made almost entirely with AI tools like Google Veo and Runway—while the results are stunning, the process was chaotic, proving that human creativity, direction, and a lot of trial and error are still essential behind the scenes. Our cluck of the day is from listener Clayton, who writes in with a scam email sharing a fake job about a virtual interview. </p>
<p><strong>Resources and links to stories:</strong></p>
<ul>
  <li>
<a href="https://www.cnbc.com/2025/05/19/tariff-scams-red-flags.html">⁠</a><a href="https://www.wsj.com/tech/ai/ai-film-google-veo-runway-3918ae28?st=boj8Ns&amp;reflink=desktopwebshare_permalink">We Made a Film With AI. You’ll Be Blown Away—and Freaked Out.</a>
</li>
  <li><a href="https://www.youtube.com/watch?v=XQr4Xklqzw8">AI Will Smith eating spaghetti pasta (AI footage and audio)</a></li>
  <li><a href="https://x.com/javilopen/status/1925495026903380358">Just got access to Veo 3 and the first thing I did was try the Will Smith spaghetti test.</a></li>
  <li><a href="https://arstechnica.com/ai/2025/05/ai-video-just-took-a-startling-leap-in-realism-are-we-doomed/">AI video just took a startling leap in realism. Are we doomed?</a></li>
  <li><a href="https://www.youtube.com/watch?v=CxX92BBhHBw">Impossible Challenges (Google Veo 3 )</a></li>
</ul>
<p><a href="https://x.com/javilopen/status/1925495026903380358">Have a Catch of the Day you'd like to share? Email it to us at </a><a href="mailto:hackinghumans@n2k.com">⁠⁠⁠⁠⁠⁠hackinghumans@n2k.com⁠⁠⁠⁠⁠⁠</a>.</p>]]>
      </content:encoded>
      <itunes:duration>2793</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[46f97e66-cdd5-11ef-8599-9b060fa5c9e9]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW1662831864.mp3?updated=1749056564" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>OWASP server-side request forgery (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/86/notes</link>
      <description>Please enjoy this encore of Word Notes. 

An attack technique that leverages an unprotected web server as a proxy for attackers to send commands through to other computers. </description>
      <pubDate>Tue, 03 Jun 2025 07:00:00 -0000</pubDate>
      <itunes:title>OWASP server-side request forgery (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>86</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/859be63c-3fee-11f0-9912-4fde48a7cd93/image/441b0ca2db080b93b935568d381ce462.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Please enjoy this encore of Word Notes. 

An attack technique that leverages an unprotected web server as a proxy for attackers to send commands through to other computers. </itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore of Word Notes. </p>
<p>An attack technique that leverages an unprotected web server as a proxy for attackers to send commands through to other computers. </p>]]>
      </content:encoded>
      <itunes:duration>458</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[859be63c-3fee-11f0-9912-4fde48a7cd93]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW3771689515.mp3?updated=1748895753" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The great CoGUI caper. [OMITB]</title>
      <link>https://thecyberwire.com/podcasts/only-malware-in-the-building/13/notes</link>
      <description>Welcome in! You’ve entered, Only Malware in the Building. Join us each month to sip tea and solve mysteries about today’s most interesting threats. Your host is ⁠⁠Selena Larson⁠⁠, ⁠⁠Proofpoint⁠⁠ intelligence analyst and host of their podcast ⁠⁠DISCARDED⁠⁠. Inspired by the residents of a building in New York’s exclusive upper west side, Selena is joined by her co-hosts ⁠⁠N2K Networks⁠⁠ ⁠⁠Dave Bittner⁠⁠ and ⁠Keith Mularski⁠, former FBI cybercrime investigator and now Chief Global Ambassador at ⁠Qintel⁠.

Being a security researcher is a bit like being a detective: you gather clues, analyze the evidence, and consult the experts to solve the cyber puzzle. On this episode, our hosts discuss Chinese-speaking threat actors are targeting Japan with a massive phishing campaign using a sneaky new kit called CoGUI, which has hit organizations with over 170 million messages in a single month. The campaign mimics trusted brands like Amazon, PayPay, and Rakuten to steal login and payment info—lining up with warnings from Japan’s Financial Services Agency about attackers cashing out and buying Chinese stocks. While the CoGUI kit is slick with its evasion tricks and browser profiling, your hosts are hot on its trail with new detections to help stop the phishing frenzy.</description>
      <pubDate>Tue, 03 Jun 2025 07:00:00 -0000</pubDate>
      <itunes:title>The great CoGUI caper. [OMITB]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>13</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/3c81d952-3fee-11f0-a080-0fd988e705e6/image/14002263e169460f16ca12e04624eb3a.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Welcome in! You’ve entered, Only Malware in the Building. Join us each month to sip tea and solve mysteries about today’s most interesting threats. Your host is ⁠⁠Selena Larson⁠⁠, ⁠⁠Proofpoint⁠⁠ intelligence analyst and host of their podcast ⁠⁠DISCARDED⁠⁠. Inspired by the residents of a building in New York’s exclusive upper west side, Selena is joined by her co-hosts ⁠⁠N2K Networks⁠⁠ ⁠⁠Dave Bittner⁠⁠ and ⁠Keith Mularski⁠, former FBI cybercrime investigator and now Chief Global Ambassador at ⁠Qintel⁠.

Being a security researcher is a bit like being a detective: you gather clues, analyze the evidence, and consult the experts to solve the cyber puzzle. On this episode, our hosts discuss Chinese-speaking threat actors are targeting Japan with a massive phishing campaign using a sneaky new kit called CoGUI, which has hit organizations with over 170 million messages in a single month. The campaign mimics trusted brands like Amazon, PayPay, and Rakuten to steal login and payment info—lining up with warnings from Japan’s Financial Services Agency about attackers cashing out and buying Chinese stocks. While the CoGUI kit is slick with its evasion tricks and browser profiling, your hosts are hot on its trail with new detections to help stop the phishing frenzy.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Welcome in! You’ve entered, Only Malware in the Building. Join us each month to sip tea and solve mysteries about today’s most interesting threats. Your host is <a href="https://www.linkedin.com/in/selenalarson/">⁠⁠Selena Larson⁠⁠</a>, <a href="https://www.proofpoint.com/">⁠⁠Proofpoint⁠⁠</a> intelligence analyst and host of their podcast <a href="https://www.proofpoint.com/us/podcasts/discarded">⁠⁠DISCARDED⁠⁠</a>. Inspired by the residents of a building in New York’s exclusive upper west side, Selena is joined by her co-hosts <a href="https://www.n2k.com/">⁠⁠N2K Networks⁠⁠</a> <a href="https://www.linkedin.com/in/dave-bittner-27231a4/">⁠⁠Dave Bittner⁠⁠</a> and <a href="https://www.linkedin.com/in/keith-mularski-b737551/">⁠Keith Mularski⁠</a>, former FBI cybercrime investigator and now Chief Global Ambassador at <a href="https://www.linkedin.com/company/qintel/">⁠Qintel⁠</a>.</p>
<p>Being a security researcher is a bit like being a detective: you gather clues, analyze the evidence, and consult the experts to solve the cyber puzzle. On this episode, our hosts discuss Chinese-speaking threat actors are targeting Japan with a massive phishing campaign using a sneaky new kit called CoGUI, which has hit organizations with over 170 million messages in a single month. The campaign mimics trusted brands like Amazon, PayPay, and Rakuten to steal login and payment info—lining up with warnings from Japan’s Financial Services Agency about attackers cashing out and buying Chinese stocks. While the CoGUI kit is slick with its evasion tricks and browser profiling, your hosts are hot on its trail with new detections to help stop the phishing frenzy.</p>]]>
      </content:encoded>
      <itunes:duration>2120</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[3c81d952-3fee-11f0-a080-0fd988e705e6]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW1491070440.mp3?updated=1748878518" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Lights, camera, scam!</title>
      <description>This week, our three hosts ⁠⁠⁠Dave Bittner⁠⁠⁠, ⁠⁠⁠Joe Carrigan⁠⁠⁠, and ⁠⁠⁠Maria Varmazis⁠⁠⁠ (also host of the ⁠⁠⁠T-Minus⁠⁠⁠ Space Daily show) are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. We start with a bit of follow up, one from listener Aaron, who shares some safety tips for chickens, and from listener Shannon, who writes in with a new fashion statement. Maria’s got the story on how Trump’s sweeping new tariffs are creating the “perfect storm” for scams, as cybercriminals exploit consumer confusion with fake fee requests, shady links, and urgent messages—three red flags experts say to watch for. Joe shares the story of a new FBI warning about an AI-driven phone scam targeting iPhone and Android users, where scammers impersonate senior U.S. officials through fake texts and voice messages to steal personal information via malicious links. Dave shares the story of a classic Hollywood pitch deck scam, where fake agents from bogus production companies like "Hollywood Talent Agency" and "Writer’s Edge Production" lure authors into paying for useless film services with promises of big-screen adaptations. We have our new Cluck of the Day, and this week, Jonathan Webster shares a classic scam attempt: a fake PayPal invoice PDF designed to trick recipients into calling a fraudulent support number or paying a bogus charge. 

Resources and links to stories:


  Trump tariffs create the ‘perfect storm’ for scams, cybersecurity expert says — 3 red flags to watch out for

  FBI warns of new phone scam targeting iPhone, Android users, advises not to answer these messages

  Senior US Officials Impersonated in Malicious Messaging Campaign

  The Hollywood Talent Agency / Writers Edge Production Scam


Have a Catch of the Day you'd like to share? Email it to us at ⁠⁠⁠⁠⁠hackinghumans@n2k.com⁠⁠⁠⁠⁠.</description>
      <pubDate>Thu, 29 May 2025 05:00:00 -0000</pubDate>
      <itunes:title>Lights, camera, scam!</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>340</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle>https://thecyberwire.com/podcasts/hacking-humans/340/notes</itunes:subtitle>
      <itunes:summary>This week, our three hosts ⁠⁠⁠Dave Bittner⁠⁠⁠, ⁠⁠⁠Joe Carrigan⁠⁠⁠, and ⁠⁠⁠Maria Varmazis⁠⁠⁠ (also host of the ⁠⁠⁠T-Minus⁠⁠⁠ Space Daily show) are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. We start with a bit of follow up, one from listener Aaron, who shares some safety tips for chickens, and from listener Shannon, who writes in with a new fashion statement. Maria’s got the story on how Trump’s sweeping new tariffs are creating the “perfect storm” for scams, as cybercriminals exploit consumer confusion with fake fee requests, shady links, and urgent messages—three red flags experts say to watch for. Joe shares the story of a new FBI warning about an AI-driven phone scam targeting iPhone and Android users, where scammers impersonate senior U.S. officials through fake texts and voice messages to steal personal information via malicious links. Dave shares the story of a classic Hollywood pitch deck scam, where fake agents from bogus production companies like "Hollywood Talent Agency" and "Writer’s Edge Production" lure authors into paying for useless film services with promises of big-screen adaptations. We have our new Cluck of the Day, and this week, Jonathan Webster shares a classic scam attempt: a fake PayPal invoice PDF designed to trick recipients into calling a fraudulent support number or paying a bogus charge. 

Resources and links to stories:


  Trump tariffs create the ‘perfect storm’ for scams, cybersecurity expert says — 3 red flags to watch out for

  FBI warns of new phone scam targeting iPhone, Android users, advises not to answer these messages

  Senior US Officials Impersonated in Malicious Messaging Campaign

  The Hollywood Talent Agency / Writers Edge Production Scam


Have a Catch of the Day you'd like to share? Email it to us at ⁠⁠⁠⁠⁠hackinghumans@n2k.com⁠⁠⁠⁠⁠.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This week, our three hosts <a href="https://www.linkedin.com/in/dave-bittner-27231a4/">⁠⁠⁠Dave Bittner⁠⁠⁠</a>, <a href="https://www.linkedin.com/in/joecarrigan/">⁠⁠⁠Joe Carrigan⁠⁠⁠</a>, and <a href="https://www.linkedin.com/in/varmazis/">⁠⁠⁠Maria Varmazis⁠⁠⁠</a> (also host of the <a href="https://space.n2k.com/podcasts/t-minus?__hstc=223811332.a636bba53840b4700c929fe67723a129.1721054632698.1747145009569.1747159962459.413&amp;__hssc=223811332.2.1747159962459&amp;__hsfp=3690629108">⁠⁠⁠T-Minus⁠⁠⁠</a> Space Daily show) are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. We start with a bit of follow up, one from listener Aaron, who shares some safety tips for chickens, and from listener Shannon, who writes in with a new fashion statement. Maria’s got the story on how Trump’s sweeping new tariffs are creating the “perfect storm” for scams, as cybercriminals exploit consumer confusion with fake fee requests, shady links, and urgent messages—three red flags experts say to watch for. Joe shares the story of a new FBI warning about an AI-driven phone scam targeting iPhone and Android users, where scammers impersonate senior U.S. officials through fake texts and voice messages to steal personal information via malicious links. Dave shares the story of a classic Hollywood pitch deck scam, where fake agents from bogus production companies like "Hollywood Talent Agency" and "Writer’s Edge Production" lure authors into paying for useless film services with promises of big-screen adaptations. We have our new Cluck of the Day, and this week, Jonathan Webster shares a classic scam attempt: a fake PayPal invoice PDF designed to trick recipients into calling a fraudulent support number or paying a bogus charge. </p>
<p><strong>Resources and links to stories:</strong></p>
<ul>
  <li><a href="https://www.cnbc.com/2025/05/19/tariff-scams-red-flags.html">Trump tariffs create the ‘perfect storm’ for scams, cybersecurity expert says — 3 red flags to watch out for</a></li>
  <li><a href="https://www.mlive.com/news/2025/05/fbi-warns-of-new-phone-scam-targeting-iphone-android-users-advises-not-to-answer-these-messages.html">FBI warns of new phone scam targeting iPhone, Android users, advises not to answer these messages</a></li>
  <li><a href="https://www.ic3.gov/PSA/2025/PSA250515">Senior US Officials Impersonated in Malicious Messaging Campaign</a></li>
  <li><a href="https://leegoldberg.com/the-hollywood-talent-agency-writers-edge-production-scam/">The Hollywood Talent Agency / Writers Edge Production Scam</a></li>
</ul>
<p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@n2k.com">⁠⁠⁠⁠⁠hackinghumans@n2k.com⁠⁠⁠⁠⁠</a>.</p>]]>
      </content:encoded>
      <itunes:duration>2509</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[46c6c6e2-cdd5-11ef-8599-7b798ada4bcc]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW3341289675.mp3?updated=1748445486" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>OWASP security logging and monitoring failures (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/85/notes</link>
      <description>Please enjoy this encore of Word Notes. 

The absence of telemetry that could help network defenders detect and respond to hostile attempts to compromise a system. </description>
      <pubDate>Tue, 27 May 2025 07:00:00 -0000</pubDate>
      <itunes:title>OWASP security logging and monitoring failures (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>85</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/1eb3d200-373c-11f0-a844-032b2db7a062/image/441b0ca2db080b93b935568d381ce462.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle/>
      <itunes:summary>Please enjoy this encore of Word Notes. 

The absence of telemetry that could help network defenders detect and respond to hostile attempts to compromise a system. </itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore of Word Notes. </p>
<p>The absence of telemetry that could help network defenders detect and respond to hostile attempts to compromise a system. </p>]]>
      </content:encoded>
      <itunes:duration>364</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[1eb3d200-373c-11f0-a844-032b2db7a062]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW5262300122.mp3?updated=1747937626" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Scam me once.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/339/notes</link>
      <description>This week, our three hosts ⁠⁠Dave Bittner⁠⁠, ⁠⁠Joe Carrigan⁠⁠, and ⁠⁠Maria Varmazis⁠⁠ (also host of the ⁠⁠T-Minus⁠⁠ Space Daily show) are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. Listener Jim notes that money launderers and couriers mentioned in recent episodes are often scam victims themselves, unknowingly processing fraudulent payments or delivering items, sometimes with tragic consequences like an innocent Uber driver being shot. Dave shares two close calls with scams this week: one where a bank employee saved a 75-year-old customer from losing $9,000 to a Facebook crypto scam, and another where a scammer impersonating “Officer Shane Kitchens” nearly tricked his mom into sending $3,500 for fake bail and ankle monitor fees after a family member was arrested. Joe's got three short stories this week—one is on how someone tried scamming his wife, another about a DoorDash driver who admitted to stealing $2.5 million in a delivery scam, and the last on a warning to billions of Gmail users to remain vigilant over a terrifying new phishing scheme. Maria sits down with Alex Hall, Trust and Safety Architect at Sift, to discuss the rise of job scams. Our catch of the day comes from Jonathan who writes in with a fake PayPal invoice. 

Resources and links to stories:


  You all saved my customer today

  Loved one got arrested, next day got a call from a “Sergeant” at the county jail.

  DoorDash driver admits to stealing $2.5M in delivery scam

  Billions of Gmail users warned to 'remain vigilant' over terrifying scam


Have a Catch of the Day you'd like to share? Email it to us at ⁠⁠⁠⁠hackinghumans@n2k.com⁠⁠⁠⁠.</description>
      <pubDate>Thu, 22 May 2025 05:00:00 -0000</pubDate>
      <itunes:title>Scam me once.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>339</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>This week, our three hosts ⁠⁠Dave Bittner⁠⁠, ⁠⁠Joe Carrigan⁠⁠, and ⁠⁠Maria Varmazis⁠⁠ (also host of the ⁠⁠T-Minus⁠⁠ Space Daily show) are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. Listener Jim notes that money launderers and couriers mentioned in recent episodes are often scam victims themselves, unknowingly processing fraudulent payments or delivering items, sometimes with tragic consequences like an innocent Uber driver being shot. Dave shares two close calls with scams this week: one where a bank employee saved a 75-year-old customer from losing $9,000 to a Facebook crypto scam, and another where a scammer impersonating “Officer Shane Kitchens” nearly tricked his mom into sending $3,500 for fake bail and ankle monitor fees after a family member was arrested. Joe's got three short stories this week—one is on how someone tried scamming his wife, another about a DoorDash driver who admitted to stealing $2.5 million in a delivery scam, and the last on a warning to billions of Gmail users to remain vigilant over a terrifying new phishing scheme. Maria sits down with Alex Hall, Trust and Safety Architect at Sift, to discuss the rise of job scams. Our catch of the day comes from Jonathan who writes in with a fake PayPal invoice. 

Resources and links to stories:


  You all saved my customer today

  Loved one got arrested, next day got a call from a “Sergeant” at the county jail.

  DoorDash driver admits to stealing $2.5M in delivery scam

  Billions of Gmail users warned to 'remain vigilant' over terrifying scam


Have a Catch of the Day you'd like to share? Email it to us at ⁠⁠⁠⁠hackinghumans@n2k.com⁠⁠⁠⁠.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This week, our three hosts <a href="https://www.linkedin.com/in/dave-bittner-27231a4/">⁠⁠Dave Bittner⁠⁠</a>, <a href="https://www.linkedin.com/in/joecarrigan/">⁠⁠Joe Carrigan⁠⁠</a>, and <a href="https://www.linkedin.com/in/varmazis/">⁠⁠Maria Varmazis⁠⁠</a> (also host of the <a href="https://space.n2k.com/podcasts/t-minus?__hstc=223811332.a636bba53840b4700c929fe67723a129.1721054632698.1747145009569.1747159962459.413&amp;__hssc=223811332.2.1747159962459&amp;__hsfp=3690629108">⁠⁠T-Minus⁠⁠</a> Space Daily show) are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. Listener Jim notes that money launderers and couriers mentioned in recent episodes are often scam victims themselves, unknowingly processing fraudulent payments or delivering items, sometimes with tragic consequences like an innocent Uber driver being shot. Dave shares two close calls with scams this week: one where a bank employee saved a 75-year-old customer from losing $9,000 to a Facebook crypto scam, and another where a scammer impersonating “Officer Shane Kitchens” nearly tricked his mom into sending $3,500 for fake bail and ankle monitor fees after a family member was arrested. Joe's got three short stories this week—one is on how someone tried scamming his wife, another about a DoorDash driver who admitted to stealing $2.5 million in a delivery scam, and the last on a warning to billions of Gmail users to remain vigilant over a terrifying new phishing scheme. Maria sits down with <a href="https://www.linkedin.com/in/alexander-hall-ddc/">Alex Hall</a>, Trust and Safety Architect at <a href="https://www.linkedin.com/company/getsift/">Sift</a>, to discuss the rise of job scams. Our catch of the day comes from Jonathan who writes in with a fake PayPal invoice. </p>
<p><strong>Resources and links to stories:</strong></p>
<ul>
  <li><a href="https://www.reddit.com/r/Scams/comments/1km2t4w/ca_you_all_saved_my_customer_today/">You all saved my customer today</a></li>
  <li><a href="https://www.reddit.com/r/Scams/comments/1km2ivh/us_loved_one_got_arrested_next_day_got_a_call/">Loved one got arrested, next day got a call from a “Sergeant” at the county jail.</a></li>
  <li><a href="https://www.ktvu.com/news/doordash-driver-admits-stealing-2-5m-delivery-scam">DoorDash driver admits to stealing $2.5M in delivery scam</a></li>
  <li><a href="https://www.irishstar.com/news/us-news/gmail-users-warned-scam-call-35230601">Billions of Gmail users warned to 'remain vigilant' over terrifying scam</a></li>
</ul>
<p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@n2k.com">⁠⁠⁠⁠hackinghumans@n2k.com⁠⁠⁠⁠</a>.</p>]]>
      </content:encoded>
      <itunes:duration>3486</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[468fc71e-cdd5-11ef-8599-cf6ec24d8ee8]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW7834208741.mp3?updated=1747836910" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>OWASP identification and authentication failures (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/84/notes</link>
      <description>Please enjoy this encore of Word Notes. 

Ineffectual confirmation of a user's identity or authentication in session management.

CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/owasp-identification-and-authentication-failure⁠

Audio reference link: “⁠Mr. Robot Hack - Password Cracking - Episode 1⁠.” YouTube Video. YouTube, September 21, 2016.</description>
      <pubDate>Tue, 20 May 2025 07:00:00 -0000</pubDate>
      <itunes:title>OWASP identification and authentication failures (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>84</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/51fc6892-29c8-11f0-a837-efef7ddf8855/image/441b0ca2db080b93b935568d381ce462.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle/>
      <itunes:summary>Please enjoy this encore of Word Notes. 

Ineffectual confirmation of a user's identity or authentication in session management.

CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/owasp-identification-and-authentication-failure⁠

Audio reference link: “⁠Mr. Robot Hack - Password Cracking - Episode 1⁠.” YouTube Video. YouTube, September 21, 2016.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore of Word Notes. </p>
<p>Ineffectual confirmation of a user's identity or authentication in session management.</p>
<p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/owasp-identification-and-authentication-failure">⁠https://thecyberwire.com/glossary/owasp-identification-and-authentication-failure⁠</a></p>
<p>Audio reference link: “<a href="https://www.youtube.com/watch?v=o28LVrm3HkU">⁠Mr. Robot Hack - Password Cracking - Episode 1⁠</a>.” YouTube Video. YouTube, September 21, 2016.</p>]]>
      </content:encoded>
      <itunes:duration>358</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[51fc6892-29c8-11f0-a837-efef7ddf8855]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW1249937967.mp3?updated=1746459293" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The band is finally back together. </title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/338/notes</link>
      <description>And....we're back! This week, our three hosts Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of the T-Minus Space Daily show) are all back to share the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. The team shares three bits of follow-up and then breaks into their stories. Joe starts off sharing some stories about influencer fakery on fake private jet sets and a scam taking advantage of the RealID requirements coming into effect. Maria talks about "Scam Survivor Day" (it's a real thing). She also talks about a former Facebooker's tell-all "Careless People." Dave shares a story about fake Social Security statements. Our Catch of Day comes from Richard about a truck win. 



Resources and links to stories:


  Private Executive Jet

  Private Jet Set for exhibitions, events and photo opportunities

  REAL ID scams surge with arrival of deadline Wednesday

  Don't Blame the Victim: 'Fraud Shame' and Cybersecurity 

  Facebook Allegedly Detected When Teen Girls Deleted Selfies So It Could Serve Them Beauty Ads

  Beware of Fake Social Security Statement That Tricks Users to Install Malware


Have a Catch of the Day you'd like to share? Email it to us at ⁠⁠⁠hackinghumans@n2k.com⁠⁠⁠.</description>
      <pubDate>Thu, 15 May 2025 05:00:00 -0000</pubDate>
      <itunes:title>The band is finally back together. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>338</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>And....we're back! This week, our three hosts Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of the T-Minus Space Daily show) are all back to share the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. The team shares three bits of follow-up and then breaks into their stories. Joe starts off sharing some stories about influencer fakery on fake private jet sets and a scam taking advantage of the RealID requirements coming into effect. Maria talks about "Scam Survivor Day" (it's a real thing). She also talks about a former Facebooker's tell-all "Careless People." Dave shares a story about fake Social Security statements. Our Catch of Day comes from Richard about a truck win. 



Resources and links to stories:


  Private Executive Jet

  Private Jet Set for exhibitions, events and photo opportunities

  REAL ID scams surge with arrival of deadline Wednesday

  Don't Blame the Victim: 'Fraud Shame' and Cybersecurity 

  Facebook Allegedly Detected When Teen Girls Deleted Selfies So It Could Serve Them Beauty Ads

  Beware of Fake Social Security Statement That Tricks Users to Install Malware


Have a Catch of the Day you'd like to share? Email it to us at ⁠⁠⁠hackinghumans@n2k.com⁠⁠⁠.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>And....we're back! This week, our three hosts <a href="https://www.linkedin.com/in/dave-bittner-27231a4/">Dave Bittner</a>, <a href="https://www.linkedin.com/in/joecarrigan/">Joe Carrigan</a>, and <a href="https://www.linkedin.com/in/varmazis/">Maria Varmazis</a> (also host of the <a href="https://space.n2k.com/podcasts/t-minus?__hstc=223811332.a636bba53840b4700c929fe67723a129.1721054632698.1747145009569.1747159962459.413&amp;__hssc=223811332.2.1747159962459&amp;__hsfp=3690629108">T-Minus</a> Space Daily show) are all back to share the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. The team shares three bits of follow-up and then breaks into their stories. Joe starts off sharing some stories about influencer fakery on fake private jet sets and a scam taking advantage of the RealID requirements coming into effect. Maria talks about "Scam Survivor Day" (it's a real thing). She also talks about a former Facebooker's tell-all "Careless People." Dave shares a story about fake Social Security statements. Our Catch of Day comes from Richard about a truck win. </p>
<p><br></p>
<p><strong>Resources and links to stories:</strong></p>
<ul>
  <li><a href="https://www.thevillaserena.com/jet-aircraft-standing-set-for-filming.asp#jet1">Private Executive Jet</a></li>
  <li><a href="https://www.aviationfilming.com/aircraft-sets-studio/">Private Jet Set for exhibitions, events and photo opportunities</a></li>
  <li><a href="https://www.kens5.com/article/news/crime/san-antonio-texas-real-id-deadline-avoid-scammers-scams-warning-tips/273-b5bcb54d-5ccd-41a6-bca7-fca9bf49a594">REAL ID scams surge with arrival of deadline Wednesday</a></li>
  <li><a href="https://www.staysafeonline.org/articles/don-t-blame-the-victim-fraud-shame-and-cybersecurity">Don't Blame the Victim: 'Fraud Shame' and Cybersecurity </a></li>
  <li><a href="https://futurism.com/facebook-beauty-targeted-ads">Facebook Allegedly Detected When Teen Girls Deleted Selfies So It Could Serve Them Beauty Ads</a></li>
  <li><a href="https://cybersecuritynews.com/beware-of-fake-social-security-statement/">Beware of Fake Social Security Statement That Tricks Users to Install Malware</a></li>
</ul>
<p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@n2k.com">⁠⁠⁠hackinghumans@n2k.com⁠⁠⁠</a>.</p>]]>
      </content:encoded>
      <itunes:duration>2613</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[465b70ea-cdd5-11ef-8599-8b009558e4a1]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW8992227623.mp3?updated=1747167643" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Log4j vulnerability (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/83/notes</link>
      <description>Please enjoy this encore of Word Notes. 

An open source Java-based software tool available from the Apache Software Foundation designed to log security and performance information. 

CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/log4j⁠

Audio reference link: “⁠CISA Director: The LOG4J Security Flaw Is the ‘Most Serious’ She’s Seen in Her Career⁠,” by Eamon Javers (CNBC) and Jen Easterly (Cybersecurity and Infrastructure Security Director) YouTube, 20 December 20 2021.</description>
      <pubDate>Tue, 13 May 2025 07:00:00 -0000</pubDate>
      <itunes:title>Log4j vulnerability (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>83</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/293689d8-29c8-11f0-a8b6-ef0abf59c58e/image/441b0ca2db080b93b935568d381ce462.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle/>
      <itunes:summary>Please enjoy this encore of Word Notes. 

An open source Java-based software tool available from the Apache Software Foundation designed to log security and performance information. 

CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/log4j⁠

Audio reference link: “⁠CISA Director: The LOG4J Security Flaw Is the ‘Most Serious’ She’s Seen in Her Career⁠,” by Eamon Javers (CNBC) and Jen Easterly (Cybersecurity and Infrastructure Security Director) YouTube, 20 December 20 2021.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore of Word Notes. </p>
<p>An open source Java-based software tool available from the Apache Software Foundation designed to log security and performance information. </p>
<p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/log4j">⁠https://thecyberwire.com/glossary/log4j⁠</a></p>
<p>Audio reference link: “<a href="https://www.youtube.com/watch?v=XC3Oqn_yADk">⁠CISA Director: The LOG4J Security Flaw Is the ‘Most Serious’ She’s Seen in Her Career⁠</a>,” by Eamon Javers (CNBC) and Jen Easterly (Cybersecurity and Infrastructure Security Director) YouTube, 20 December 20 2021.</p>]]>
      </content:encoded>
      <itunes:duration>556</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[293689d8-29c8-11f0-a8b6-ef0abf59c58e]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW4859739947.mp3?updated=1746458482" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>What’s inside the mystery box? Spoiler: It’s a scam!</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/337/notes</link>
      <description>As Dave Bittner is at the RSA Conference this week, our hosts ⁠⁠Maria Varmazis and ⁠⁠Joe Carrigan⁠⁠,  are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. We start with some follow-up from José on episode 335, sharing how UK banking features like Faster Payments and the “Check Payee” function might have helped prevent a scam involving fake banking apps—and he even tells a wild tale of someone using a fake app to reverse-scam a bike thief. Joe covers the House’s overwhelming passage of the SHIELD Act to ban revenge porn—including deepfakes—and why critics say it could threaten encryption. He also shares a strong warning about trust and the real risks of sharing intimate images. Maria has the story of a surge in sophisticated subscription scams, where cybercriminals use fake “mystery box” websites, social media ads, and influencer impersonations to trick users into handing over credit card data and signing up for hidden recurring payments. Bitdefender researchers warn these polished scams are part of a broader evolution in social engineering, designed to bypass skepticism and evade detection. Our Catch of the Day comes from listener Rick, who received a suspicious email that appears to be from Harbor Freight—a popular U.S. retailer known for affordable tools and equipment—offering a “free gift” to the recipient… classic bait for a likely scam.

Resources and links to stories: 


  
⁠House Passes Bill to Ban Sharing of Revenge Porn, Sending It to Trump


  TAKE IT DOWN Act

  Trump’s hasty Take It Down Act has “gaping flaws” that threaten encryption

  Congress Passes TAKE IT DOWN Act Despite Major Flaws

  Mystery Box Scams Deployed to Steal Credit Card Data


Have a Catch of the Day you'd like to share? Email it to us at ⁠⁠hackinghumans@n2k.com⁠⁠.</description>
      <pubDate>Thu, 08 May 2025 05:00:00 -0000</pubDate>
      <itunes:title>What’s inside the mystery box? Spoiler: It’s a scam!</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>337</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>As Dave Bittner is at the RSA Conference this week, our hosts ⁠⁠Maria Varmazis and ⁠⁠Joe Carrigan⁠⁠,  are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. We start with some follow-up from José on episode 335, sharing how UK banking features like Faster Payments and the “Check Payee” function might have helped prevent a scam involving fake banking apps—and he even tells a wild tale of someone using a fake app to reverse-scam a bike thief. Joe covers the House’s overwhelming passage of the SHIELD Act to ban revenge porn—including deepfakes—and why critics say it could threaten encryption. He also shares a strong warning about trust and the real risks of sharing intimate images. Maria has the story of a surge in sophisticated subscription scams, where cybercriminals use fake “mystery box” websites, social media ads, and influencer impersonations to trick users into handing over credit card data and signing up for hidden recurring payments. Bitdefender researchers warn these polished scams are part of a broader evolution in social engineering, designed to bypass skepticism and evade detection. Our Catch of the Day comes from listener Rick, who received a suspicious email that appears to be from Harbor Freight—a popular U.S. retailer known for affordable tools and equipment—offering a “free gift” to the recipient… classic bait for a likely scam.

Resources and links to stories: 


  
⁠House Passes Bill to Ban Sharing of Revenge Porn, Sending It to Trump


  TAKE IT DOWN Act

  Trump’s hasty Take It Down Act has “gaping flaws” that threaten encryption

  Congress Passes TAKE IT DOWN Act Despite Major Flaws

  Mystery Box Scams Deployed to Steal Credit Card Data


Have a Catch of the Day you'd like to share? Email it to us at ⁠⁠hackinghumans@n2k.com⁠⁠.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>As Dave Bittner is at the RSA Conference this week, our hosts ⁠⁠<a href="https://www.linkedin.com/in/varmazis/">Maria Varmazis</a> and <a href="https://www.linkedin.com/in/joecarrigan/">⁠⁠Joe Carrigan⁠⁠</a>,  are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. We start with some follow-up from José on episode 335, sharing how UK banking features like Faster Payments and the “Check Payee” function might have helped prevent a scam involving fake banking apps—and he even tells a wild tale of someone using a fake app to <em>reverse-scam</em> a bike thief. Joe covers the House’s overwhelming passage of the SHIELD Act to ban revenge porn—including deepfakes—and why critics say it could threaten encryption. He also shares a strong warning about trust and the real risks of sharing intimate images. Maria has the story of a surge in sophisticated subscription scams, where cybercriminals use fake “mystery box” websites, social media ads, and influencer impersonations to trick users into handing over credit card data and signing up for hidden recurring payments. Bitdefender researchers warn these polished scams are part of a broader evolution in social engineering, designed to bypass skepticism and evade detection. Our Catch of the Day comes from listener Rick, who received a suspicious email that <em>appears</em> to be from Harbor Freight—a popular U.S. retailer known for affordable tools and equipment—offering a “free gift” to the recipient… classic bait for a likely scam.</p>
<p><strong>Resources and links to stories: </strong></p>
<ul>
  <li>
<a href="https://thrivedx.com/resources/article/investigating-the-mgm-cyberattack-how-social-engineering-and-a-help-desk-put-the-whole-strip-at-risk?utm_source=chatgpt.com">⁠</a><a href="https://www.nytimes.com/2025/04/28/us/politics/house-revenge-porn-bill.html"><u>House Passes Bill to Ban Sharing of Revenge Porn, Sending It to Trump</u></a>
</li>
  <li><a href="https://www.congress.gov/bill/118th-congress/senate-bill/4569/text">TAKE IT DOWN Act</a></li>
  <li><a href="https://arstechnica.com/tech-policy/2025/04/trumps-rush-to-stop-revenge-porn-and-ai-nudes-may-break-encryption/">Trump’s hasty Take It Down Act has “gaping flaws” that threaten encryption</a></li>
  <li><a href="https://www.eff.org/deeplinks/2025/04/congress-passes-take-it-down-act-despite-major-flaws">Congress Passes TAKE IT DOWN Act Despite Major Flaws</a></li>
  <li><a href="https://www.infosecurity-magazine.com/news/mystery-box-scams-credit-card-data/">Mystery Box Scams Deployed to Steal Credit Card Data</a></li>
</ul>
<p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@n2k.com">⁠⁠hackinghumans@n2k.com⁠⁠</a>.</p>]]>
      </content:encoded>
      <itunes:duration>2773</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[4629c2f2-cdd5-11ef-8599-e7c79ba2bada]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW2066942854.mp3?updated=1746552507" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>OWASP broken access control (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/82/notes</link>
      <description>Please enjoy this encore of Word Notes. 

Software users are allowed access to data or functionality contrary to the defined zero trust policy by bypassing or manipulating the installed security controls. </description>
      <pubDate>Tue, 06 May 2025 07:00:00 -0000</pubDate>
      <itunes:title>OWASP broken access control (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>82</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/0d5e2aa4-29c8-11f0-aa42-7779e7853a4e/image/441b0ca2db080b93b935568d381ce462.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle/>
      <itunes:summary>Please enjoy this encore of Word Notes. 

Software users are allowed access to data or functionality contrary to the defined zero trust policy by bypassing or manipulating the installed security controls. </itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore of Word Notes. </p>
<p>Software users are allowed access to data or functionality contrary to the defined zero trust policy by bypassing or manipulating the installed security controls. </p>]]>
      </content:encoded>
      <itunes:duration>450</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[0d5e2aa4-29c8-11f0-aa42-7779e7853a4e]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW7653540512.mp3?updated=1746458370" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The RMM protocol: Remote, risky, and ready to strike. [OMITB]</title>
      <link>https://thecyberwire.com/podcasts/only-malware-in-the-building/12/notes</link>
      <description>Welcome in! You’ve entered, Only Malware in the Building. Join us each month to sip tea and solve mysteries about today’s most interesting threats. Your host is ⁠Selena Larson⁠, ⁠Proofpoint⁠ intelligence analyst and host of their podcast ⁠DISCARDED⁠. Inspired by the residents of a building in New York’s exclusive upper west side, Selena is joined by ⁠N2K Networks⁠ ⁠Dave Bittner⁠ and our newest co-host, Keith Mularski, former FBI cybercrime investigator and now Chief Global Ambassador at Quintel.

Being a security researcher is a bit like being a detective: you gather clues, analyze the evidence, and consult the experts to solve the cyber puzzle. On this episode, our hosts discuss the growing trend of cybercriminals using legitimate remote monitoring and management (RMM) tools in email campaigns as a first-stage payload. They explore how these tools are being leveraged for data theft, financial fraud, and lateral movement within networks. With the decline of traditional malware delivery methods, including loaders and botnets, the shift toward RMMs marks a significant change in attack strategies. Tune in to learn more about this evolving threat landscape and how to stay ahead of these tactics.</description>
      <pubDate>Tue, 06 May 2025 07:00:00 -0000</pubDate>
      <itunes:title>The RMM protocol: Remote, risky, and ready to strike. [OMITB]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>12</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/201ffa52-2a84-11f0-9fc6-07801a437e51/image/14002263e169460f16ca12e04624eb3a.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle/>
      <itunes:summary>Welcome in! You’ve entered, Only Malware in the Building. Join us each month to sip tea and solve mysteries about today’s most interesting threats. Your host is ⁠Selena Larson⁠, ⁠Proofpoint⁠ intelligence analyst and host of their podcast ⁠DISCARDED⁠. Inspired by the residents of a building in New York’s exclusive upper west side, Selena is joined by ⁠N2K Networks⁠ ⁠Dave Bittner⁠ and our newest co-host, Keith Mularski, former FBI cybercrime investigator and now Chief Global Ambassador at Quintel.

Being a security researcher is a bit like being a detective: you gather clues, analyze the evidence, and consult the experts to solve the cyber puzzle. On this episode, our hosts discuss the growing trend of cybercriminals using legitimate remote monitoring and management (RMM) tools in email campaigns as a first-stage payload. They explore how these tools are being leveraged for data theft, financial fraud, and lateral movement within networks. With the decline of traditional malware delivery methods, including loaders and botnets, the shift toward RMMs marks a significant change in attack strategies. Tune in to learn more about this evolving threat landscape and how to stay ahead of these tactics.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Welcome in! You’ve entered, Only Malware in the Building. Join us each month to sip tea and solve mysteries about today’s most interesting threats. Your host is <a href="https://www.linkedin.com/in/selenalarson/">⁠Selena Larson⁠</a>, <a href="https://www.proofpoint.com/">⁠Proofpoint⁠</a> intelligence analyst and host of their podcast <a href="https://www.proofpoint.com/us/podcasts/discarded">⁠DISCARDED⁠</a>. Inspired by the residents of a building in New York’s exclusive upper west side, Selena is joined by <a href="https://www.n2k.com/">⁠N2K Networks⁠</a> <a href="https://www.linkedin.com/in/dave-bittner-27231a4/">⁠Dave Bittner⁠</a> and our newest co-host, <a href="https://www.linkedin.com/in/keith-mularski-b737551/">Keith Mularski</a>, former FBI cybercrime investigator and now Chief Global Ambassador at <a href="https://www.linkedin.com/company/qintel/">Quintel</a>.</p>
<p>Being a security researcher is a bit like being a detective: you gather clues, analyze the evidence, and consult the experts to solve the cyber puzzle. On this episode, our hosts discuss the growing trend of cybercriminals using legitimate remote monitoring and management (RMM) tools in email campaigns as a first-stage payload. They explore how these tools are being leveraged for data theft, financial fraud, and lateral movement within networks. With the decline of traditional malware delivery methods, including loaders and botnets, the shift toward RMMs marks a significant change in attack strategies. Tune in to learn more about this evolving threat landscape and how to stay ahead of these tactics.</p>]]>
      </content:encoded>
      <itunes:duration>2380</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[201ffa52-2a84-11f0-9fc6-07801a437e51]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW7217003203.mp3?updated=1747074465" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The prince, the pretender, and the PSA.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/336/notes</link>
      <description>As Maria is on vacation this week, our hosts ⁠Dave Bittner⁠ and ⁠Joe Carrigan⁠,  are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. Joe and Dave are joined by guest Rob Allen from ThreatLocker who shares a story on how a spoofed call to the help desk unraveled into a full-blown cyber siege on MGM Resorts. Joe’s story is on a new FBI warning: scammers are impersonating the Internet Crime Complaint Center (IC3), the very site where people go to report online fraud. Dave's got the story of a so-called “Nigerian prince” scammer who turned out to be a 67-year-old man from Louisiana, now facing 269 counts of wire fraud for helping funnel money to co-conspirators in Nigeria. Our catch of the day comes from a scams subreddit, and is on a message received from the Department of Homeland Security reaching out to a user to share that they are a victim of fraud. 

Resources and links to stories: 


  Investigating the MGM Cyberattack – How social engineering and a help desk put the whole strip at risk.

  Brian Krebs LinkedIn

  FBI Warns of Scammers Impersonating the IC3

  IC3 2024 Report

  'Nigerian prince' scammer was 67-year-old from Louisiana, police say


Have a Catch of the Day you'd like to share? Email it to us at ⁠hackinghumans@n2k.com⁠.</description>
      <pubDate>Thu, 01 May 2025 05:00:00 -0000</pubDate>
      <itunes:title>The prince, the pretender, and the PSA.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>336</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>As Maria is on vacation this week, our hosts ⁠Dave Bittner⁠ and ⁠Joe Carrigan⁠,  are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. Joe and Dave are joined by guest Rob Allen from ThreatLocker who shares a story on how a spoofed call to the help desk unraveled into a full-blown cyber siege on MGM Resorts. Joe’s story is on a new FBI warning: scammers are impersonating the Internet Crime Complaint Center (IC3), the very site where people go to report online fraud. Dave's got the story of a so-called “Nigerian prince” scammer who turned out to be a 67-year-old man from Louisiana, now facing 269 counts of wire fraud for helping funnel money to co-conspirators in Nigeria. Our catch of the day comes from a scams subreddit, and is on a message received from the Department of Homeland Security reaching out to a user to share that they are a victim of fraud. 

Resources and links to stories: 


  Investigating the MGM Cyberattack – How social engineering and a help desk put the whole strip at risk.

  Brian Krebs LinkedIn

  FBI Warns of Scammers Impersonating the IC3

  IC3 2024 Report

  'Nigerian prince' scammer was 67-year-old from Louisiana, police say


Have a Catch of the Day you'd like to share? Email it to us at ⁠hackinghumans@n2k.com⁠.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>As Maria is on vacation this week, our hosts <a href="https://www.linkedin.com/in/dave-bittner-27231a4/">⁠Dave Bittner⁠</a> and <a href="https://www.linkedin.com/in/joecarrigan/">⁠Joe Carrigan⁠</a>,  are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. Joe and Dave are joined by guest <a href="https://www.linkedin.com/in/threatlockerrob/">Rob Allen</a> from <a href="https://www.linkedin.com/company/threatlockerinc/">ThreatLocker</a> who shares a story on how a spoofed call to the help desk unraveled into a full-blown cyber siege on MGM Resorts. Joe’s story is on a new FBI warning: scammers are impersonating the Internet Crime Complaint Center (IC3), the very site where people go to report online fraud. Dave's got the story of a so-called “Nigerian prince” scammer who turned out to be a 67-year-old man from Louisiana, now facing 269 counts of wire fraud for helping funnel money to co-conspirators in Nigeria. Our catch of the day comes from a scams subreddit, and is on a message received from the Department of Homeland Security reaching out to a user to share that they are a victim of fraud. </p>
<p><strong>Resources and links to stories: </strong></p>
<ul>
  <li><a href="https://thrivedx.com/resources/article/investigating-the-mgm-cyberattack-how-social-engineering-and-a-help-desk-put-the-whole-strip-at-risk?utm_source=chatgpt.com">Investigating the MGM Cyberattack – How social engineering and a help desk put the whole strip at risk.</a></li>
  <li><a href="https://www.linkedin.com/posts/bkrebs_todays-most-meta-announcement-the-fbi-is-activity-7319031085093269504-6CJd/?utm_source=share&amp;utm_medium=member_desktop&amp;rcm=ACoAAABolDgBa1OkcRIevOVLL65vUF8SOgJfvpI">Brian Krebs LinkedIn</a></li>
  <li><a href="https://www.ic3.gov/PSA/2025/PSA250418">FBI Warns of Scammers Impersonating the IC3</a></li>
  <li><a href="https://www.ic3.gov/AnnualReport/Reports/2024_IC3Report.pdf">IC3 2024 Report</a></li>
  <li><a href="https://www.nbcnews.com/news/us-news/nigerian-prince-scammer-was-67-year-old-louisiana-police-say-n833801">'Nigerian prince' scammer was 67-year-old from Louisiana, police say</a></li>
</ul>
<p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@n2k.com">⁠hackinghumans@n2k.com⁠</a>.</p>]]>
      </content:encoded>
      <itunes:duration>1715</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[45f7098e-cdd5-11ef-8599-e7f7d90922d8]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW8923956871.mp3?updated=1745952644" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>OWASP security misconfiguration (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/81/notes</link>
      <description>Please enjoy this encore of Word Notes. 

The state of a web application when it's vulnerable to attack due to an insecure configuration. 

CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/owasp-security-misconfiguration⁠

Audio reference link: ⁠“What Is the Elvish Word for Friend?”⁠ Quora, 2021.</description>
      <pubDate>Tue, 29 Apr 2025 07:00:00 -0000</pubDate>
      <itunes:title>OWASP security misconfiguration (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>81</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/c8f3a8da-246d-11f0-90d3-6fd68a7227ed/image/441b0ca2db080b93b935568d381ce462.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle/>
      <itunes:summary>Please enjoy this encore of Word Notes. 

The state of a web application when it's vulnerable to attack due to an insecure configuration. 

CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/owasp-security-misconfiguration⁠

Audio reference link: ⁠“What Is the Elvish Word for Friend?”⁠ Quora, 2021.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore of Word Notes. </p>
<p>The state of a web application when it's vulnerable to attack due to an insecure configuration. </p>
<p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/owasp-security-misconfiguration">⁠https://thecyberwire.com/glossary/owasp-security-misconfiguration⁠</a></p>
<p>Audio reference link: <a href="https://www.quora.com/What-is-the-Elvish-word-for-friend?share=1">⁠“What Is the Elvish Word for Friend?”⁠</a> Quora, 2021.</p>]]>
      </content:encoded>
      <itunes:duration>423</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c8f3a8da-246d-11f0-90d3-6fd68a7227ed]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW3861849216.mp3?updated=1745871749" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>When AI lies, hackers rise.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/335/notes</link>
      <description>This week, our hosts Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of the T-Minus Space Daily show) are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. This week Joe's got some follow up about his chickens. Joe's story is on LLM-powered coding tools, and how they are increasingly hallucinating fake software package names, opening the door for attackers to upload malicious lookalike packages—a practice dubbed "slopsquatting"—that can compromise software supply chains when developers unwittingly install them. Dave’s story is on Cisco Talos uncovering a widespread toll road smishing campaign across multiple U.S. states, where financially motivated threat actors—using a smishing kit developed by “Wang Duo Yu”—impersonate toll services to steal victims' personal and payment information through spoofed domains and phishing sites. Maria's got the story of how scammers are using fake banking apps to fool sellers with phony payment screens—and walking away with thousands in goods. Our catch of the day comes from listener John who writes in to share a suspicious text message he received. 
Resources and links to stories: 

LLMs can't stop making up software dependencies and sabotaging everything

Unraveling the U.S. toll road smishing scams

'Scammers used fake app to steal from me in person'


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@n2k.com.</description>
      <pubDate>Thu, 24 Apr 2025 05:00:00 -0000</pubDate>
      <itunes:title>When AI lies, hackers rise.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>335</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>This week, our hosts Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of the T-Minus Space Daily show) are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. This week Joe's got some follow up about his chickens. Joe's story is on LLM-powered coding tools, and how they are increasingly hallucinating fake software package names, opening the door for attackers to upload malicious lookalike packages—a practice dubbed "slopsquatting"—that can compromise software supply chains when developers unwittingly install them. Dave’s story is on Cisco Talos uncovering a widespread toll road smishing campaign across multiple U.S. states, where financially motivated threat actors—using a smishing kit developed by “Wang Duo Yu”—impersonate toll services to steal victims' personal and payment information through spoofed domains and phishing sites. Maria's got the story of how scammers are using fake banking apps to fool sellers with phony payment screens—and walking away with thousands in goods. Our catch of the day comes from listener John who writes in to share a suspicious text message he received. 
Resources and links to stories: 

LLMs can't stop making up software dependencies and sabotaging everything

Unraveling the U.S. toll road smishing scams

'Scammers used fake app to steal from me in person'


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@n2k.com.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This week, our hosts <a href="https://www.linkedin.com/in/dave-bittner-27231a4/">Dave Bittner</a>, <a href="https://www.linkedin.com/in/joecarrigan/">Joe Carrigan</a>, and <a href="https://www.linkedin.com/in/varmazis/">Maria Varmazis</a> (also host of the <a href="https://space.n2k.com/podcasts/t-minus">T-Minus</a> Space Daily show) are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. This week Joe's got some follow up about his chickens. Joe's story is on LLM-powered coding tools, and how they are increasingly hallucinating fake software package names, opening the door for attackers to upload malicious lookalike packages—a practice dubbed "slopsquatting"—that can compromise software supply chains when developers unwittingly install them. Dave’s story is on Cisco Talos uncovering a widespread toll road smishing campaign across multiple U.S. states, where financially motivated threat actors—using a smishing kit developed by “Wang Duo Yu”—impersonate toll services to steal victims' personal and payment information through spoofed domains and phishing sites. Maria's got the story of how scammers are using fake banking apps to fool sellers with phony payment screens—and walking away with thousands in goods. Our catch of the day comes from listener John who writes in to share a suspicious text message he received. </p><p>Resources and links to stories: </p><ul>
<li><a href="https://www.theregister.com/2025/04/12/ai_code_suggestions_sabotage_supply_chain/">LLMs can't stop making up software dependencies and sabotaging everything</a></li>
<li><a href="https://blog.talosintelligence.com/unraveling-the-us-toll-road-smishing-scams/">Unraveling the U.S. toll road smishing scams</a></li>
<li><a href="https://www.bbc.com/news/articles/cn05d58jwvdo">'Scammers used fake app to steal from me in person'</a></li>
</ul><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@n2k.com">hackinghumans@n2k.com</a>.</p>]]>
      </content:encoded>
      <itunes:duration>2557</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[45c43608-cdd5-11ef-8599-17770fa23577]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW7354649101.mp3?updated=1745426513" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>OWASP insecure design (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/80/notes</link>
      <description>Please enjoy this encore episode of Word Notes. 
A broad OWASP Top 10 software development category representing missing, ineffective, or unforeseen security measures.
CyberWire Glossary link: https://thecyberwire.com/glossary/owasp-insecure-design
Audio reference link: “Oceans Eleven Problem Constraints Assumptions.” by Steve Jones, YouTube, 4 November 2015.</description>
      <pubDate>Tue, 22 Apr 2025 07:00:00 -0000</pubDate>
      <itunes:title>OWASP insecure design (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>80</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/b666ae68-1ede-11f0-9d09-5b4aac4b2b7b/image/441b0ca2db080b93b935568d381ce462.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle/>
      <itunes:summary>Please enjoy this encore episode of Word Notes. 
A broad OWASP Top 10 software development category representing missing, ineffective, or unforeseen security measures.
CyberWire Glossary link: https://thecyberwire.com/glossary/owasp-insecure-design
Audio reference link: “Oceans Eleven Problem Constraints Assumptions.” by Steve Jones, YouTube, 4 November 2015.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore episode of Word Notes. </p><p>A broad OWASP Top 10 software development category representing missing, ineffective, or unforeseen security measures.</p><p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/owasp-insecure-design">https://thecyberwire.com/glossary/owasp-insecure-design</a></p><p>Audio reference link: “<a href="https://www.youtube.com/watch?v=7X9kHeY-lpo">Oceans Eleven Problem Constraints Assumptions</a>.” by Steve Jones, YouTube, 4 November 2015.</p>]]>
      </content:encoded>
      <itunes:duration>499</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b666ae68-1ede-11f0-9d09-5b4aac4b2b7b]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW1794014830.mp3?updated=1745258101" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Phishing in the tariff storm.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/334/notes</link>
      <description>This week, our hosts Dave Bittner and Joe Carrigan, are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines, while our other host, Maria Varmazis is at a conference. We begin with some follow-up, as Joe reflects on the density of gold. Then, Dave shares some heartfelt and moving words about the recent passing of his father. Dave's story follows how confusion sparked by Trump's erratic tariff policies is fueling a global surge in cyber scams, phishing sites, and crypto cons, as threat actors exploit the chaos to mislead, defraud, and manipulate online users. Joe has two stories this week, the first is about the "blessing scam," a con that targets older Chinese women with promises of spiritual cleansing that ends in financial ruin. The second covers a new FTC rule requiring companies to make subscription cancellations as easy as sign-ups, cracking down on deceptive practices. Our catch of the day this week comes from MontClair University, as they are warning of a phishing scam offering a “free 2014 Airstream Sport 16′ Travel Trailer.”
Resources and links to stories: 

Trump Tariff Confusion Fuels Online Scams

Oklahoma woman charged with laundering $1.5M from elderly women in online romance scam

A new ‘jackpotting’ scam has drained more than $236,000 from Texas ATMs — but who foots the loss?

Opportunity To Own A Free 2014 Airstream Sport 16′ Travel Trailer


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@n2k.com.</description>
      <pubDate>Thu, 17 Apr 2025 05:00:00 -0000</pubDate>
      <itunes:title>Phishing in the tariff storm.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>334</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>This week, our hosts Dave Bittner and Joe Carrigan, are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines, while our other host, Maria Varmazis is at a conference. We begin with some follow-up, as Joe reflects on the density of gold. Then, Dave shares some heartfelt and moving words about the recent passing of his father. Dave's story follows how confusion sparked by Trump's erratic tariff policies is fueling a global surge in cyber scams, phishing sites, and crypto cons, as threat actors exploit the chaos to mislead, defraud, and manipulate online users. Joe has two stories this week, the first is about the "blessing scam," a con that targets older Chinese women with promises of spiritual cleansing that ends in financial ruin. The second covers a new FTC rule requiring companies to make subscription cancellations as easy as sign-ups, cracking down on deceptive practices. Our catch of the day this week comes from MontClair University, as they are warning of a phishing scam offering a “free 2014 Airstream Sport 16′ Travel Trailer.”
Resources and links to stories: 

Trump Tariff Confusion Fuels Online Scams

Oklahoma woman charged with laundering $1.5M from elderly women in online romance scam

A new ‘jackpotting’ scam has drained more than $236,000 from Texas ATMs — but who foots the loss?

Opportunity To Own A Free 2014 Airstream Sport 16′ Travel Trailer


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@n2k.com.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This week, our hosts <a href="https://www.linkedin.com/in/dave-bittner-27231a4/">Dave Bittner</a> and <a href="https://www.linkedin.com/in/joecarrigan/">Joe Carrigan</a>, are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines, while our other host, <a href="https://www.linkedin.com/in/varmazis/">Maria Varmazis</a> is at a conference. We begin with some follow-up, as Joe reflects on the density of gold. Then, Dave shares some heartfelt and moving words about the recent passing of his father. Dave's story follows how confusion sparked by Trump's erratic tariff policies is fueling a global surge in cyber scams, phishing sites, and crypto cons, as threat actors exploit the chaos to mislead, defraud, and manipulate online users. Joe has two stories this week, the first is about the "blessing scam," a con that targets older Chinese women with promises of spiritual cleansing that ends in financial ruin. The second covers a new FTC rule requiring companies to make subscription cancellations as easy as sign-ups, cracking down on deceptive practices. Our catch of the day this week comes from MontClair University, as they are warning of a phishing scam offering a “free 2014 Airstream Sport 16′ Travel Trailer.”</p><p>Resources and links to stories: </p><ul>
<li><a href="https://www.forbes.com/sites/emmawoollacott/2025/04/10/trump-tariff-confusion-fuels-online-scams/">Trump Tariff Confusion Fuels Online Scams</a></li>
<li><a href="https://www.foxnews.com/us/oklahoma-woman-charged-laundering-1-5m-from-elderly-women-online-romance-scam">Oklahoma woman charged with laundering $1.5M from elderly women in online romance scam</a></li>
<li><a href="https://www.yahoo.com/news/jackpotting-scam-drained-more-236-110900898.html?guccounter=1&amp;guce_referrer=aHR0cHM6Ly93d3cuZ29vZ2xlLmNvbS8&amp;guce_referrer_sig=AQAAACoO7q4vRhd33ftG3Ak2pN42Aw23uyziwT35V0ggRRHVx1EEkH46nZkEOoHn8vaeSYg_8jknuCkpTYYilp5WPyGjngMUZAO_VtrltdU4LNsMCULF_RUqpv98tSe5S0GDER8kHHa_1Rmpyjh9fRrbJSPr9Kr5IIxrlLLzbAYFn6Gv">A new ‘jackpotting’ scam has drained more than $236,000 from Texas ATMs — but who foots the loss?</a></li>
<li><a href="https://www.montclair.edu/phish-files/2025/04/01/free-item-phish/">Opportunity To Own A Free 2014 Airstream Sport 16′ Travel Trailer</a></li>
</ul><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@n2k.com">hackinghumans@n2k.com</a>.</p>]]>
      </content:encoded>
      <itunes:duration>2097</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[45932464-cdd5-11ef-8599-77ca8ee6e646]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW3129999514.mp3?updated=1744822828" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>OWASP injection (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/79/notes</link>
      <description>Please enjoy this encore of Word Notes.
A broad class of attack vectors, where an attacker supplies input to an applications command interpreter that results in unanticipated functionality. 
CyberWire Glossary link: https://thecyberwire.com/glossary/owasp-injection
Audio reference link: “APPSEC Cali 2018 - Taking on the King: Killing Injection Vulnerabilities” YouTube Video. YouTube, March 19, 2018.</description>
      <pubDate>Tue, 15 Apr 2025 07:00:00 -0000</pubDate>
      <itunes:title>OWASP injection (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>79</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/7d986ebe-1970-11f0-ba26-9f631d30530b/image/441b0ca2db080b93b935568d381ce462.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle/>
      <itunes:summary>Please enjoy this encore of Word Notes.
A broad class of attack vectors, where an attacker supplies input to an applications command interpreter that results in unanticipated functionality. 
CyberWire Glossary link: https://thecyberwire.com/glossary/owasp-injection
Audio reference link: “APPSEC Cali 2018 - Taking on the King: Killing Injection Vulnerabilities” YouTube Video. YouTube, March 19, 2018.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore of Word Notes.</p><p>A broad class of attack vectors, where an attacker supplies input to an applications command interpreter that results in unanticipated functionality. </p><p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/owasp-injection">https://thecyberwire.com/glossary/owasp-injection</a></p><p>Audio reference link: “<a href="https://www.youtube.com/watch?v=g_24036NDhM">APPSEC Cali 2018 - Taking on the King: Killing Injection Vulnerabilities</a>” YouTube Video. YouTube, March 19, 2018.</p>]]>
      </content:encoded>
      <itunes:duration>392</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[7d986ebe-1970-11f0-ba26-9f631d30530b]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW2665126787.mp3?updated=1744662063" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>You get a million dollars, and you get a million dollars!</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/333/notes</link>
      <description>This week, while Dave Bittner is out, Joe Carrigan, and Maria Varmazis (also host of N2K's daily space podcast, T-Minus), are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. We start off with a lot of follow up on listener feedback this week! Justin shares a thought about how to track gold deliveries with a simple sting operation involving an AirTag. Xray Specs offers a fun response to a theory about scanning plates and running Python scripts, stating they receive similar emails despite not owning a car. Jim Gilchrist recounts his experience with E-ZPass and unpaid tolls, explaining how a failed transponder led to a replacement and noting the prevalence of scam toll messages. Joe shares two gripping stories this week, one being on how the FBI is seizing $8.2 million from a massive romance scam involving cryptocurrency, and second is on a Maryland woman losing millions in a growing "pig butchering" scheme, with the FBI warning that many more victims are at risk. Maria's story is on an East Hartford woman caught up in a federal sweepstakes scam targeting the elderly. The suspects, including one local resident, allegedly stole millions. What did they do, and how did they get caught? Our catch of the day comes from a user on Reddit who shares a message they got from billionaire, and owner of Tesla, Elon Musk. 
Resources and links to stories: 

FBI Cracks 'Pig Butchering' Scam on Dating Sites

Maryland woman loses millions in crypto "pig butchering" scam as FBI warns of more targets

East Hartford Woman Bilked Elderly In Fake Sweepstakes Scam: Feds

Elon Musk Vows To Hand Out $1 Million Checks This Weekend: What To Know


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@n2k.com.</description>
      <pubDate>Thu, 10 Apr 2025 05:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>333</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>This week, while Dave Bittner is out, Joe Carrigan, and Maria Varmazis (also host of N2K's daily space podcast, T-Minus), are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. We start off with a lot of follow up on listener feedback this week! Justin shares a thought about how to track gold deliveries with a simple sting operation involving an AirTag. Xray Specs offers a fun response to a theory about scanning plates and running Python scripts, stating they receive similar emails despite not owning a car. Jim Gilchrist recounts his experience with E-ZPass and unpaid tolls, explaining how a failed transponder led to a replacement and noting the prevalence of scam toll messages. Joe shares two gripping stories this week, one being on how the FBI is seizing $8.2 million from a massive romance scam involving cryptocurrency, and second is on a Maryland woman losing millions in a growing "pig butchering" scheme, with the FBI warning that many more victims are at risk. Maria's story is on an East Hartford woman caught up in a federal sweepstakes scam targeting the elderly. The suspects, including one local resident, allegedly stole millions. What did they do, and how did they get caught? Our catch of the day comes from a user on Reddit who shares a message they got from billionaire, and owner of Tesla, Elon Musk. 
Resources and links to stories: 

FBI Cracks 'Pig Butchering' Scam on Dating Sites

Maryland woman loses millions in crypto "pig butchering" scam as FBI warns of more targets

East Hartford Woman Bilked Elderly In Fake Sweepstakes Scam: Feds

Elon Musk Vows To Hand Out $1 Million Checks This Weekend: What To Know


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@n2k.com.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This week, while <a href="https://www.linkedin.com/in/dave-bittner-27231a4/">Dave Bittner</a> is out, <a href="https://www.linkedin.com/in/joecarrigan/">Joe Carrigan</a>, and <a href="https://www.linkedin.com/in/varmazis/">Maria Varmazis</a> (also host of N2K's daily space podcast, <a href="https://space.n2k.com/podcasts/t-minus">T-Minus</a>), are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. We start off with a lot of follow up on listener feedback this week! Justin shares a thought about how to track gold deliveries with a simple sting operation involving an AirTag. Xray Specs offers a fun response to a theory about scanning plates and running Python scripts, stating they receive similar emails despite not owning a car. Jim Gilchrist recounts his experience with E-ZPass and unpaid tolls, explaining how a failed transponder led to a replacement and noting the prevalence of scam toll messages. Joe shares two gripping stories this week, one being on how the FBI is seizing $8.2 million from a massive romance scam involving cryptocurrency, and second is on a Maryland woman losing millions in a growing "pig butchering" scheme, with the FBI warning that many more victims are at risk. Maria's story is on an East Hartford woman caught up in a federal sweepstakes scam targeting the elderly. The suspects, including one local resident, allegedly stole millions. What did they do, and how did they get caught? Our catch of the day comes from a user on Reddit who shares a message they got from billionaire, and owner of Tesla, Elon Musk. </p><p>Resources and links to stories: </p><ul>
<li><a href="https://www.newsweek.com/fbi-pig-butchering-romance-dating-app-scam-2054079">FBI Cracks 'Pig Butchering' Scam on Dating Sites</a></li>
<li><a href="https://www.cbsnews.com/baltimore/news/maryland-crypto-pig-butchering-scam-fbi-warning-asia/">Maryland woman loses millions in crypto "pig butchering" scam as FBI warns of more targets</a></li>
<li><a href="https://patch.com/connecticut/hartford/east-hartford-woman-bilked-elderly-fake-sweepstakes-scam-feds">East Hartford Woman Bilked Elderly In Fake Sweepstakes Scam: Feds</a></li>
<li><a href="https://www.newsweek.com/elon-musk-million-dollar-checks-wisconsin-supreme-court-2051906">Elon Musk Vows To Hand Out $1 Million Checks This Weekend: What To Know</a></li>
</ul><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@n2k.com">hackinghumans@n2k.com</a>.</p>]]>
      </content:encoded>
      <itunes:duration>2232</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[45615808-cdd5-11ef-8599-33d1041ab92e]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW1555250685.mp3?updated=1744217285" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>OWASP cryptographic failures (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/78/notes</link>
      <description>Please enjoy this encore of Word Notes.
Code that fails to protect sensitive information. 
CyberWire Glossary link: https://thecyberwire.com/glossary/owasp-cryptographic-failure
Audio reference link: Vandana Verma. “OWASP Spotlight - Project 10 - Top10.” YouTube Video. YouTube, January 4, 2021.</description>
      <pubDate>Tue, 08 Apr 2025 07:00:00 -0000</pubDate>
      <itunes:title>OWASP cryptographic failures (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>78</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/8e9cfa1c-10ac-11f0-bc8c-2f09ea78a0d6/image/441b0ca2db080b93b935568d381ce462.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Please enjoy this encore of Word Notes.
Code that fails to protect sensitive information. 
CyberWire Glossary link: https://thecyberwire.com/glossary/owasp-cryptographic-failure
Audio reference link: Vandana Verma. “OWASP Spotlight - Project 10 - Top10.” YouTube Video. YouTube, January 4, 2021.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore of Word Notes.</p><p>Code that fails to protect sensitive information. </p><p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/owasp-cryptographic-failure">https://thecyberwire.com/glossary/owasp-cryptographic-failure</a></p><p>Audio reference link: Vandana Verma. “<a href="https://www.youtube.com/watch?v=RMkoIrpz8ug">OWASP Spotlight - Project 10 - Top10</a>.” YouTube Video. YouTube, January 4, 2021.</p>]]>
      </content:encoded>
      <itunes:duration>395</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[8e9cfa1c-10ac-11f0-bc8c-2f09ea78a0d6]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW6128906253.mp3?updated=1743699685" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Not-so-real deals.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/332/notes</link>
      <description>This week our hosts, Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of N2K's daily space podcast, T-Minus), are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. First, we start off with some more follow-up on EZ passes, along with the newest iteration, as Kailey Cornick shares that scammers target phone numbers rather than actual toll users, sending her SUN pass scam texts tied to her old Florida number. Dave shares the story of Palo Alto's Unit 42 researchers uncovering a massive campaign distributing thousands of fraudulent cryptocurrency investment platforms via websites and mobile apps, using brand impersonation, Ponzi-like schemes, and domain fronting to deceive victims, primarily in East Africa and Asia. Maria follows the story of a Queens man arraigned for allegedly scamming a 72-year-old Newton woman out of over $480,000 by posing as a DEA agent and coercing her into transferring her assets under the threat of arrest. Joe came across a Facebook video featuring an AI-generated ad falsely claiming Kelly Clarkson endorsed a weight loss product. These deceptive ads use AI to create convincing deepfakes, making it appear as if celebrities are promoting products they’ve never actually supported. Our catch of the day comes from listener Connor, who flagged a phishing email pretending to be from the Social Security Administration. The email urges the recipient to click a link to view an "important update," but the repetition of the message and a suspicious logo placeholder suggest it's a phishing attempt designed to steal personal info. 
Resources and links to stories: 

Investigating Scam Crypto Investment Platforms Using Pyramid Schemes to Defraud Victims

Man Arraigned After Posing as Government Agent to Scam Senior out of Over $480,000

'I have terminal cancer and lost my life savings to whisky barrel scammers'

Casks and Kegs


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@n2k.com.</description>
      <pubDate>Thu, 03 Apr 2025 05:00:00 -0000</pubDate>
      <itunes:title>Not-so-real deals.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>332</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>This week our hosts, Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of N2K's daily space podcast, T-Minus), are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. First, we start off with some more follow-up on EZ passes, along with the newest iteration, as Kailey Cornick shares that scammers target phone numbers rather than actual toll users, sending her SUN pass scam texts tied to her old Florida number. Dave shares the story of Palo Alto's Unit 42 researchers uncovering a massive campaign distributing thousands of fraudulent cryptocurrency investment platforms via websites and mobile apps, using brand impersonation, Ponzi-like schemes, and domain fronting to deceive victims, primarily in East Africa and Asia. Maria follows the story of a Queens man arraigned for allegedly scamming a 72-year-old Newton woman out of over $480,000 by posing as a DEA agent and coercing her into transferring her assets under the threat of arrest. Joe came across a Facebook video featuring an AI-generated ad falsely claiming Kelly Clarkson endorsed a weight loss product. These deceptive ads use AI to create convincing deepfakes, making it appear as if celebrities are promoting products they’ve never actually supported. Our catch of the day comes from listener Connor, who flagged a phishing email pretending to be from the Social Security Administration. The email urges the recipient to click a link to view an "important update," but the repetition of the message and a suspicious logo placeholder suggest it's a phishing attempt designed to steal personal info. 
Resources and links to stories: 

Investigating Scam Crypto Investment Platforms Using Pyramid Schemes to Defraud Victims

Man Arraigned After Posing as Government Agent to Scam Senior out of Over $480,000

'I have terminal cancer and lost my life savings to whisky barrel scammers'

Casks and Kegs


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@n2k.com.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This week our hosts, <a href="https://www.linkedin.com/in/dave-bittner-27231a4/">Dave Bittner</a>, <a href="https://www.linkedin.com/in/joecarrigan/">Joe Carrigan</a>, and <a href="https://www.linkedin.com/in/varmazis/">Maria Varmazis</a> (also host of N2K's daily space podcast, <a href="https://space.n2k.com/podcasts/t-minus">T-Minus</a>), are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. First, we start off with some more follow-up on EZ passes, along with the newest iteration, as Kailey Cornick shares that scammers target phone numbers rather than actual toll users, sending her SUN pass scam texts tied to her old Florida number. Dave shares the story of Palo Alto's Unit 42 researchers uncovering a massive campaign distributing thousands of fraudulent cryptocurrency investment platforms via websites and mobile apps, using brand impersonation, Ponzi-like schemes, and domain fronting to deceive victims, primarily in East Africa and Asia. Maria follows the story of a Queens man arraigned for allegedly scamming a 72-year-old Newton woman out of over $480,000 by posing as a DEA agent and coercing her into transferring her assets under the threat of arrest. Joe came across a Facebook video featuring an AI-generated ad falsely claiming Kelly Clarkson endorsed a weight loss product. These deceptive ads use AI to create convincing deepfakes, making it appear as if celebrities are promoting products they’ve never actually supported. Our catch of the day comes from listener Connor, who flagged a phishing email pretending to be from the Social Security Administration. The email urges the recipient to click a link to view an "important update," but the repetition of the message and a suspicious logo placeholder suggest it's a phishing attempt designed to steal personal info. </p><p>Resources and links to stories: </p><ul>
<li><a href="https://unit42.paloaltonetworks.com/fraud-crypto-platforms-campaign/">Investigating Scam Crypto Investment Platforms Using Pyramid Schemes to Defraud Victims</a></li>
<li><a href="https://www.middlesexda.com/press-releases/news/man-arraigned-after-posing-government-agent-scam-senior-out-over-480000">Man Arraigned After Posing as Government Agent to Scam Senior out of Over $480,000</a></li>
<li><a href="https://www.bbc.com/news/articles/cx2r7enl3d1o">'I have terminal cancer and lost my life savings to whisky barrel scammers'</a></li>
<li><a href="https://cestwhat.com/2019/09/18/casks-and-kegs/#:~:text=Cask%20sizes%3A%20Pin%20">Casks and Kegs</a></li>
</ul><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@n2k.com">hackinghumans@n2k.com</a>.</p>]]>
      </content:encoded>
      <itunes:duration>2772</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[452d5efe-cdd5-11ef-8599-83a2ef19ca5e]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW6845698582.mp3?updated=1743611806" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>account takeover prevention (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/77/notes</link>
      <description>Enjoy this encore of Word Notes. 
The prevention of the first part of an intrusion kill chain model exploitation technique, where the hacker steals valid logging credentials from a targeted victim. 
CyberWire Glossary link: https://thecyberwire.com/glossary/account-takeover-prevention</description>
      <pubDate>Tue, 01 Apr 2025 07:00:00 -0000</pubDate>
      <itunes:title>account takeover prevention (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>77</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/5e6699a8-0e4e-11f0-ba23-97a0ed79d66b/image/441b0ca2db080b93b935568d381ce462.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle/>
      <itunes:summary>Enjoy this encore of Word Notes. 
The prevention of the first part of an intrusion kill chain model exploitation technique, where the hacker steals valid logging credentials from a targeted victim. 
CyberWire Glossary link: https://thecyberwire.com/glossary/account-takeover-prevention</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Enjoy this encore of Word Notes. </p><p>The prevention of the first part of an intrusion kill chain model exploitation technique, where the hacker steals valid logging credentials from a targeted victim. </p><p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/account-takeover-prevention">https://thecyberwire.com/glossary/account-takeover-prevention</a></p>]]>
      </content:encoded>
      <itunes:duration>383</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[5e6699a8-0e4e-11f0-ba23-97a0ed79d66b]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW9725091791.mp3?updated=1743437801" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Hello? Is it malware you’re looking for? [OMITB]</title>
      <link>https://thecyberwire.com/podcasts/only-malware-in-the-building/11/notes</link>
      <description>Welcome in! You’ve entered, Only Malware in the Building. Join us each month to sip tea and solve mysteries about today’s most interesting threats. Your host is Selena Larson, Proofpoint intelligence analyst and host of their podcast DISCARDED. Inspired by the residents of a building in New York’s exclusive upper west side, Selena is joined by N2K Networks Dave Bittner —and our newest totally unbiased co-host, Archy, a highly sophisticated AI robot who swears they have no ulterior motives (but we’re keeping an eye on them just in case).
Being a security researcher is a bit like being a detective: you gather clues, analyze the evidence, and consult the experts to solve the cyber puzzle. On this episode, our hosts discuss Telephone-Oriented Attack Delivery (TOAD), also known as callback phishing. In this type of attack, an attacker sends a seemingly benign email, often containing an invoice or payment notification, along with a phone number. When the victim calls, they speak with the attacker, who convinces them to install remote access tools, leading to malware installation, phishing, and financial theft. Tune in as we explore how this deceptive tactic works and ways to protect yourself from falling victim to it.</description>
      <pubDate>Tue, 01 Apr 2025 07:00:00 -0000</pubDate>
      <itunes:title>Hello? Is it malware you’re looking for? [OMITB]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>11</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/62fb0282-0e6d-11f0-805e-c72a05c93b4b/image/14002263e169460f16ca12e04624eb3a.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle/>
      <itunes:summary>Welcome in! You’ve entered, Only Malware in the Building. Join us each month to sip tea and solve mysteries about today’s most interesting threats. Your host is Selena Larson, Proofpoint intelligence analyst and host of their podcast DISCARDED. Inspired by the residents of a building in New York’s exclusive upper west side, Selena is joined by N2K Networks Dave Bittner —and our newest totally unbiased co-host, Archy, a highly sophisticated AI robot who swears they have no ulterior motives (but we’re keeping an eye on them just in case).
Being a security researcher is a bit like being a detective: you gather clues, analyze the evidence, and consult the experts to solve the cyber puzzle. On this episode, our hosts discuss Telephone-Oriented Attack Delivery (TOAD), also known as callback phishing. In this type of attack, an attacker sends a seemingly benign email, often containing an invoice or payment notification, along with a phone number. When the victim calls, they speak with the attacker, who convinces them to install remote access tools, leading to malware installation, phishing, and financial theft. Tune in as we explore how this deceptive tactic works and ways to protect yourself from falling victim to it.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Welcome in! You’ve entered, Only Malware in the Building. Join us each month to sip tea and solve mysteries about today’s most interesting threats. Your host is <a href="https://www.linkedin.com/in/selenalarson/">Selena Larson</a>, <a href="https://www.proofpoint.com/">Proofpoint</a> intelligence analyst and host of their podcast <a href="https://www.proofpoint.com/us/podcasts/discarded">DISCARDED</a>. Inspired by the residents of a building in New York’s exclusive upper west side, Selena is joined by <a href="https://www.n2k.com/">N2K Networks</a> <a href="https://www.linkedin.com/in/dave-bittner-27231a4/">Dave Bittner</a> —and our newest <em>totally</em> unbiased co-host, Archy, a highly sophisticated AI robot who swears they have <em>no</em> ulterior motives (but we’re keeping an eye on them just in case).</p><p>Being a security researcher is a bit like being a detective: you gather clues, analyze the evidence, and consult the experts to solve the cyber puzzle. On this episode, our hosts discuss Telephone-Oriented Attack Delivery (TOAD), also known as callback phishing. In this type of attack, an attacker sends a seemingly benign email, often containing an invoice or payment notification, along with a phone number. When the victim calls, they speak with the attacker, who convinces them to install remote access tools, leading to malware installation, phishing, and financial theft. Tune in as we explore how this deceptive tactic works and ways to protect yourself from falling victim to it.</p>]]>
      </content:encoded>
      <itunes:duration>2077</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[62fb0282-0e6d-11f0-805e-c72a05c93b4b]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW4049398493.mp3?updated=1743456464" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Smells like scam season is upon us. </title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/331/notes</link>
      <description>This week our hosts, Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of N2K's daily space podcast, T-Minus), are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. We start with some follow-up on E-ZPass scams—a listener suggests that scammers may be exploiting exposed license plate reader data, as demonstrated by YouTuber Mike Brown, to link plate numbers with breached phone records and send scam texts in real time. Dave's story is on how scammers may use conditioning techniques in romance scams—Ben Tasker observed that refusing to provide a phone number led to fewer photos being sent early on, suggesting scammers use rewards like photos to encourage compliance. Joe's got the story of Google's lawsuit against scammers who created and sold thousands of fake business listings on Google Maps, exploiting urgent services like locksmiths and towing to deceive customers and charge inflated fees. Maria's got the story of the FTC suing Click Profit for allegedly scamming consumers out of millions with a fake “passive income” scheme, falsely promising high returns through AI-driven e-commerce stores on Amazon, Walmart, and TikTok while most investors ended up losing money. Our catch of the day comes from Reddit after a user posted a conversation with a scammer after messing with them about a potential job opportunity. 

Resources and links to stories: 

Who is sending those scammy text messages about unpaid tolls?

My Scammer Girlfriend: Baiting A Romance Fraudster

Google finds 10,000 fake listings on Google Maps, sues alleged network of scammers

AI scammers on Amazon duped investors out of millions with ‘passive income’ scheme, FTC alleges

Can I work from jail?


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@n2k.com.</description>
      <pubDate>Thu, 27 Mar 2025 05:00:00 -0000</pubDate>
      <itunes:title>Smells like scam season is upon us. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>331</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>This week our hosts, Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of N2K's daily space podcast, T-Minus), are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. We start with some follow-up on E-ZPass scams—a listener suggests that scammers may be exploiting exposed license plate reader data, as demonstrated by YouTuber Mike Brown, to link plate numbers with breached phone records and send scam texts in real time. Dave's story is on how scammers may use conditioning techniques in romance scams—Ben Tasker observed that refusing to provide a phone number led to fewer photos being sent early on, suggesting scammers use rewards like photos to encourage compliance. Joe's got the story of Google's lawsuit against scammers who created and sold thousands of fake business listings on Google Maps, exploiting urgent services like locksmiths and towing to deceive customers and charge inflated fees. Maria's got the story of the FTC suing Click Profit for allegedly scamming consumers out of millions with a fake “passive income” scheme, falsely promising high returns through AI-driven e-commerce stores on Amazon, Walmart, and TikTok while most investors ended up losing money. Our catch of the day comes from Reddit after a user posted a conversation with a scammer after messing with them about a potential job opportunity. 

Resources and links to stories: 

Who is sending those scammy text messages about unpaid tolls?

My Scammer Girlfriend: Baiting A Romance Fraudster

Google finds 10,000 fake listings on Google Maps, sues alleged network of scammers

AI scammers on Amazon duped investors out of millions with ‘passive income’ scheme, FTC alleges

Can I work from jail?


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@n2k.com.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This week our hosts, <a href="https://www.linkedin.com/in/dave-bittner-27231a4/">Dave Bittner</a>, <a href="https://www.linkedin.com/in/joecarrigan/">Joe Carrigan</a>, and <a href="https://www.linkedin.com/in/varmazis/">Maria Varmazis</a> (also host of N2K's daily space podcast, <a href="https://space.n2k.com/podcasts/t-minus">T-Minus</a>), are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. We start with some follow-up on E-ZPass scams—a listener suggests that scammers may be exploiting exposed license plate reader data, as demonstrated by YouTuber Mike Brown, to link plate numbers with breached phone records and send scam texts in real time. Dave's story is on how scammers may use conditioning techniques in romance scams—Ben Tasker observed that refusing to provide a phone number led to fewer photos being sent early on, suggesting scammers use rewards like photos to encourage compliance. Joe's got the story of Google's lawsuit against scammers who created and sold thousands of fake business listings on Google Maps, exploiting urgent services like locksmiths and towing to deceive customers and charge inflated fees. Maria's got the story of the FTC suing Click Profit for allegedly scamming consumers out of millions with a fake “passive income” scheme, falsely promising high returns through AI-driven e-commerce stores on Amazon, Walmart, and TikTok while most investors ended up losing money. Our catch of the day comes from Reddit after a user posted a conversation with a scammer after messing with them about a potential job opportunity. </p><p><br></p><p>Resources and links to stories: </p><ul>
<li><a href="https://cyberscoop.com/toll-road-text-message-scam-swells-nationwide-how-to-stop/">Who is sending those scammy text messages about unpaid tolls?</a></li>
<li><a href="https://www.bentasker.co.uk/posts/blog/security/seducing-a-romance-scammer.html">My Scammer Girlfriend: Baiting A Romance Fraudster</a></li>
<li><a href="https://www.cbsnews.com/news/google-maps-fake-listings-lawsuit-scams/">Google finds 10,000 fake listings on Google Maps, sues alleged network of scammers</a></li>
<li><a href="https://www.cnbc.com/2025/03/18/ftc-amazon-ai-scammers-defrauded-users-with-passive-income-scheme.html?__source=bluesky%7Cmain">AI scammers on Amazon duped investors out of millions with ‘passive income’ scheme, FTC alleges</a></li>
<li><a href="https://www.reddit.com/r/scambait/comments/1jekp1p/can_i_work_from_jail_yes/">Can I work from jail?</a></li>
</ul><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@n2k.com">hackinghumans@n2k.com</a>.</p>]]>
      </content:encoded>
      <itunes:duration>2931</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[44faf0cc-cdd5-11ef-8599-c77590c1b607]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW1156501117.mp3?updated=1743613886" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>threat hunting (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/76/notes</link>
      <description>Please enjoy this encore of Word Notes. 
The process of proactively searching through networks to detect and isolate security threats, rather than relying on security solutions or services to detect those threats. 
CyberWire Glossary link: https://thecyberwire.com/glossary/threat-hunting
Audio reference link: “My ‘Aha!" Moment - Methods, Tips, &amp; Lessons Learned in Threat Hunting - sans Thir Summit 2019.” YouTube, YouTube, 25 Feb. 2020.</description>
      <pubDate>Tue, 25 Mar 2025 07:00:00 -0000</pubDate>
      <itunes:title>threat hunting (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>76</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/00c6f860-08c2-11f0-99b3-3f3017bddb1d/image/441b0ca2db080b93b935568d381ce462.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle/>
      <itunes:summary>Please enjoy this encore of Word Notes. 
The process of proactively searching through networks to detect and isolate security threats, rather than relying on security solutions or services to detect those threats. 
CyberWire Glossary link: https://thecyberwire.com/glossary/threat-hunting
Audio reference link: “My ‘Aha!" Moment - Methods, Tips, &amp; Lessons Learned in Threat Hunting - sans Thir Summit 2019.” YouTube, YouTube, 25 Feb. 2020.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore of Word Notes. </p><p>The process of proactively searching through networks to detect and isolate security threats, rather than relying on security solutions or services to detect those threats. </p><p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/threat-hunting">https://thecyberwire.com/glossary/threat-hunting</a></p><p>Audio reference link: “<a href="https://www.youtube.com/watch?v=oCkgJIxYujs.">My ‘Aha!" Moment - Methods, Tips, &amp; Lessons Learned in Threat Hunting - sans Thir Summit 2019.</a>” <em>YouTube</em>, YouTube, 25 Feb. 2020.</p>]]>
      </content:encoded>
      <itunes:duration>421</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[00c6f860-08c2-11f0-99b3-3f3017bddb1d]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW1884001915.mp3?updated=1742829121" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>E-ZPass or easy scam?</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/330/notes</link>
      <description>On Hacking Humans, this week Dave Bittner is back with Joe Carrigan, and Maria Varmazis (also host of N2K's daily space podcast, T-Minus), and they are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. Joe shares a bit of follow up on scam victims sharing their experiences of losing money to various frauds, including investment schemes, romance scams, business email compromises, online shopping fraud, unusual payment requests, tax impersonations, remote access scams, and identity theft. Maria shares a story on scammers using fake E-ZPass toll alerts to steal personal information, and another on victims losing thousands to investment, romance, and online shopping scams. Dave's got the story of how digital scammers prey on the financially vulnerable, using AI-generated content and deceptive ads on platforms like Instagram to sell worthless "get-rich-quick" schemes that ultimately leave victims deeper in debt. Joe's got two stories this week, the first being on Wenhui Sun, a California man, and how he was sentenced to six and a half years for stealing nearly $800,000 through a gold bar scam targeting victims nationwide. Meanwhile, the U.S. Federal Trade Commission reported a sharp rise in fraud, with 2.6 million people losing $12.5 billion in 2024, up from $2.5 billion in 2023, primarily due to impostor scams. Younger adults reported losing money more often than older ones. Our catch of the day follows how First Lady Melania Trump messaged an unsuspecting citizen claiming to give them a free gift.

Resources and links to stories: 

Scam victims tell us their stories

Digital Snake Oil Merchants Are Stealing From The Already Broken

California man sentenced after Montgomery Co. woman loses over $700K in gold bar scam

FTC says Americans lost $12.5B to scams last year — social media, AI, and crypto didn’t help


You can hear more from the T-Minus space daily show here.

Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@n2k.com.</description>
      <pubDate>Thu, 20 Mar 2025 05:00:00 -0000</pubDate>
      <itunes:title>E-ZPass or easy scam?</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>330</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>On Hacking Humans, this week Dave Bittner is back with Joe Carrigan, and Maria Varmazis (also host of N2K's daily space podcast, T-Minus), and they are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. Joe shares a bit of follow up on scam victims sharing their experiences of losing money to various frauds, including investment schemes, romance scams, business email compromises, online shopping fraud, unusual payment requests, tax impersonations, remote access scams, and identity theft. Maria shares a story on scammers using fake E-ZPass toll alerts to steal personal information, and another on victims losing thousands to investment, romance, and online shopping scams. Dave's got the story of how digital scammers prey on the financially vulnerable, using AI-generated content and deceptive ads on platforms like Instagram to sell worthless "get-rich-quick" schemes that ultimately leave victims deeper in debt. Joe's got two stories this week, the first being on Wenhui Sun, a California man, and how he was sentenced to six and a half years for stealing nearly $800,000 through a gold bar scam targeting victims nationwide. Meanwhile, the U.S. Federal Trade Commission reported a sharp rise in fraud, with 2.6 million people losing $12.5 billion in 2024, up from $2.5 billion in 2023, primarily due to impostor scams. Younger adults reported losing money more often than older ones. Our catch of the day follows how First Lady Melania Trump messaged an unsuspecting citizen claiming to give them a free gift.

Resources and links to stories: 

Scam victims tell us their stories

Digital Snake Oil Merchants Are Stealing From The Already Broken

California man sentenced after Montgomery Co. woman loses over $700K in gold bar scam

FTC says Americans lost $12.5B to scams last year — social media, AI, and crypto didn’t help


You can hear more from the T-Minus space daily show here.

Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@n2k.com.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>On Hacking Humans, this week Dave Bittner is back with <a href="https://www.linkedin.com/in/joecarrigan/">Joe Carrigan</a>, and <a href="https://www.linkedin.com/in/varmazis/">Maria Varmazis</a> (also host of N2K's daily space podcast, T-Minus), and they are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. Joe shares a bit of follow up on scam victims sharing their experiences of losing money to various frauds, including investment schemes, romance scams, business email compromises, online shopping fraud, unusual payment requests, tax impersonations, remote access scams, and identity theft. Maria shares a story on scammers using fake E-ZPass toll alerts to steal personal information, and another on victims losing thousands to investment, romance, and online shopping scams. Dave's got the story of how digital scammers prey on the financially vulnerable, using AI-generated content and deceptive ads on platforms like Instagram to sell worthless "get-rich-quick" schemes that ultimately leave victims deeper in debt. Joe's got two stories this week, the first being on Wenhui Sun, a California man, and how he was sentenced to six and a half years for stealing nearly $800,000 through a gold bar scam targeting victims nationwide. Meanwhile, the U.S. Federal Trade Commission reported a sharp rise in fraud, with 2.6 million people losing $12.5 billion in 2024, up from $2.5 billion in 2023, primarily due to impostor scams. Younger adults reported losing money more often than older ones. Our catch of the day follows how First Lady Melania Trump messaged an unsuspecting citizen claiming to give them a free gift.</p><p><br></p><p>Resources and links to stories: </p><ul>
<li><a href="https://www.scamwatch.gov.au/protect-yourself/real-life-stories/scam-victims-tell-us-their-stories">Scam victims tell us their stories</a></li>
<li><a href="https://www.joanwestenberg.com/digital-snake-oil-merchants-are-stealing-from-the-already-broken/">Digital Snake Oil Merchants Are Stealing From The Already Broken</a></li>
<li><a href="https://wtop.com/montgomery-county/2025/03/california-man-sentenced-after-montgomery-co-woman-loses-over-700k-in-gold-bar-scam/">California man sentenced after Montgomery Co. woman loses over $700K in gold bar scam</a></li>
<li><a href="https://techcrunch.com/2025/03/11/ftc-says-americans-lost-12-5b-to-scams-last-year-social-media-ai-and-crypto-didnt-help/?guccounter=1&amp;guce_referrer=aHR0cHM6Ly93d3cuZ29vZ2xlLmNvbS8&amp;guce_referrer_sig=AQAAAKu9l8IhHfWA9-v_24NtxuQVpSTfOarr3HPm17lpgBhavHG_fjq-BMx77K-OZWU-avpUSqh3mBut_sl7UqthG8r1lbvSN5SlOUpwZoB_khQouhZSCWgzvHUJLKvyQIBmSK2qLblvVArAVOyvS1cFL0NDD4WMGkDDEmzKrXKkm9Aw">FTC says Americans lost $12.5B to scams last year — social media, AI, and crypto didn’t help</a></li>
</ul><p><br></p><p>You can hear more from the T-Minus space daily show <a href="https://space.n2k.com/podcasts/t-minus">here</a>.</p><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@n2k.com">hackinghumans@n2k.com</a>.</p>]]>
      </content:encoded>
      <itunes:duration>2186</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[44c95738-cdd5-11ef-8599-a7b3a2a534f5]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW2505747846.mp3?updated=1742500007" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>vulnerability management (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/75/notes</link>
      <description>Please enjoy this encore of Word Notes.
The continuous practice of identifying classifying, prioritizing, remediating, and mitigating software vulnerabilities within this.
CyberWire Glossary link: https://thecyberwire.com/glossary/vulnerability-management
Audio reference link: “Vulnerability Scanning - Comptia Security+ sy0-501 - 1.5.” YouTube, YouTube, 11 Nov. 2017,</description>
      <pubDate>Tue, 18 Mar 2025 07:00:00 -0000</pubDate>
      <itunes:title>vulnerability management (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>75</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Please enjoy this encore of Word Notes.
The continuous practice of identifying classifying, prioritizing, remediating, and mitigating software vulnerabilities within this.
CyberWire Glossary link: https://thecyberwire.com/glossary/vulnerability-management
Audio reference link: “Vulnerability Scanning - Comptia Security+ sy0-501 - 1.5.” YouTube, YouTube, 11 Nov. 2017,</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore of Word Notes.</p><p>The continuous practice of identifying classifying, prioritizing, remediating, and mitigating software vulnerabilities within this.</p><p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/vulnerability-management">https://thecyberwire.com/glossary/vulnerability-management</a></p><p>Audio reference link: “<a href="https://www.youtube.com/watch?v=HukLd-6C4Ew">Vulnerability Scanning - Comptia Security+ sy0-501 - 1.5</a>.” <em>YouTube</em>, YouTube, 11 Nov. 2017, </p>]]>
      </content:encoded>
      <itunes:duration>496</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[db57bf7a-0370-11f0-b903-9bb7b2607839]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW5835966639.mp3?updated=1742243764" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Catch me if you scam.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/329/notes</link>
      <description>On Hacking Humans, this week Dave Bittner is on vacation so our two hosts Joe Carrigan, and Maria Varmazis (also host of N2K's daily space podcast, T-Minus), are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. Our hosts start out with some follow up on chicken talk from last week. Maria shares the story of scammers impersonating police officers in England to steal cryptocurrency by exploiting leaked personal data, creating fake fraud reports, and tricking victims into revealing their seed phrases, leading to losses totaling £1 million. Joe has two stories this week, his first one is on a $21 million "Grandparent Scam" in which 25 Canadians were charged for running a scheme from Montreal call centers, posing as grandchildren in distress to deceive elderly Americans into handing over money, with 23 suspects already arrested. Joe's second story is on two people charged in a ticket scam that exploited a loophole in StubHub’s system to steal and resell over 900 tickets—mostly for Taylor Swift’s Eras Tour—netting more than $600,000 in profit before being caught by the Queens D.A.'s Cybercrime Unit. We have a special catch of the day this week, where we are joined by N2K's own Ma'ayan Plaut, who joins to discuss going out of business scams. 

Resources and links to stories: 

‘Fake police call cryptocurrency investors to steal their funds

Dozens of Canadians Are Charged in $21 Million ‘Grandparent Scam’

2 People Charged with Taylor Swift Eras Tour Ticket Scam That Allegedly Netted More Than $600K

BBB Scam Alert: How to spot a fake "going out of business" sale

Joann Fabric’s going out of business scam


You can hear more from the T-Minus space daily show here.

Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@n2k.com.</description>
      <pubDate>Thu, 13 Mar 2025 05:00:00 -0000</pubDate>
      <itunes:title>Catch me if you scam.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>329</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>On Hacking Humans, this week Dave Bittner is on vacation so our two hosts Joe Carrigan, and Maria Varmazis (also host of N2K's daily space podcast, T-Minus), are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. Our hosts start out with some follow up on chicken talk from last week. Maria shares the story of scammers impersonating police officers in England to steal cryptocurrency by exploiting leaked personal data, creating fake fraud reports, and tricking victims into revealing their seed phrases, leading to losses totaling £1 million. Joe has two stories this week, his first one is on a $21 million "Grandparent Scam" in which 25 Canadians were charged for running a scheme from Montreal call centers, posing as grandchildren in distress to deceive elderly Americans into handing over money, with 23 suspects already arrested. Joe's second story is on two people charged in a ticket scam that exploited a loophole in StubHub’s system to steal and resell over 900 tickets—mostly for Taylor Swift’s Eras Tour—netting more than $600,000 in profit before being caught by the Queens D.A.'s Cybercrime Unit. We have a special catch of the day this week, where we are joined by N2K's own Ma'ayan Plaut, who joins to discuss going out of business scams. 

Resources and links to stories: 

‘Fake police call cryptocurrency investors to steal their funds

Dozens of Canadians Are Charged in $21 Million ‘Grandparent Scam’

2 People Charged with Taylor Swift Eras Tour Ticket Scam That Allegedly Netted More Than $600K

BBB Scam Alert: How to spot a fake "going out of business" sale

Joann Fabric’s going out of business scam


You can hear more from the T-Minus space daily show here.

Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@n2k.com.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>On Hacking Humans, this week Dave Bittner is on vacation so our two hosts <a href="https://www.linkedin.com/in/joecarrigan/">Joe Carrigan</a>, and <a href="https://www.linkedin.com/in/varmazis/">Maria Varmazis</a> (also host of N2K's daily space podcast, T-Minus), are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. Our hosts start out with some follow up on chicken talk from last week. Maria shares the story of scammers impersonating police officers in England to steal cryptocurrency by exploiting leaked personal data, creating fake fraud reports, and tricking victims into revealing their seed phrases, leading to losses totaling £1 million. Joe has two stories this week, his first one is on a $21 million "Grandparent Scam" in which 25 Canadians were charged for running a scheme from Montreal call centers, posing as grandchildren in distress to deceive elderly Americans into handing over money, with 23 suspects already arrested. Joe's second story is on two people charged in a ticket scam that exploited a loophole in StubHub’s system to steal and resell over 900 tickets—mostly for Taylor Swift’s Eras Tour—netting more than $600,000 in profit before being caught by the Queens D.A.'s Cybercrime Unit. We have a special catch of the day this week, where we are joined by N2K's own Ma'ayan Plaut, who joins to discuss going out of business scams. </p><p><br></p><p>Resources and links to stories: </p><ul>
<li><a href="https://www.bitdefender.com/en-us/blog/hotforsecurity/fake-police-call-cryptocurrency-investors-to-steal-their-funds">‘Fake police call cryptocurrency investors to steal their funds</a></li>
<li><a href="https://www.nytimes.com/2025/03/04/us/grandparent-scam-canada-us-fraud.html">Dozens of Canadians Are Charged in $21 Million ‘Grandparent Scam’</a></li>
<li><a href="https://people.com/2-people-charged-with-usd600k-taylor-swift-eras-tour-ticket-scam-11692047">2 People Charged with Taylor Swift Eras Tour Ticket Scam That Allegedly Netted More Than $600K</a></li>
<li><a href="https://www.bbb.org/article/news-releases/31498-bbb-scam-alert-how-to-spot-a-fake-going-out-of-business-sale">BBB Scam Alert: How to spot a fake "going out of business" sale</a></li>
<li><a href="https://www.instagram.com/reel/DGoP8-kpIdH/?igsh=MTZrdjZtZWxrNHIycA%3D%3D">Joann Fabric’s going out of business scam</a></li>
</ul><p><br></p><p>You can hear more from the T-Minus space daily show <a href="https://space.n2k.com/podcasts/t-minus">here</a>.</p><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@n2k.com">hackinghumans@n2k.com</a>.</p>]]>
      </content:encoded>
      <itunes:duration>2494</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[44963cc2-cdd5-11ef-8599-7fc39786b762]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW1766601587.mp3?updated=1741798708" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>software bill of materials (SBOM) (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/74/notes</link>
      <description>Please enjoy this encore of Word Notes. 
A formal record containing the details and supply chain relationships of various components used in building software. </description>
      <pubDate>Tue, 11 Mar 2025 07:00:00 -0000</pubDate>
      <itunes:title>software bill of materials (SBOM) (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>74</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Please enjoy this encore of Word Notes. 
A formal record containing the details and supply chain relationships of various components used in building software. </itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore of Word Notes. </p><p>A formal record containing the details and supply chain relationships of various components used in building software. </p>]]>
      </content:encoded>
      <itunes:duration>419</itunes:duration>
      <guid isPermaLink="false"><![CDATA[43a1ebcc-ff62-11ef-a2dc-a74c3bb7affd]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW4377541348.mp3?updated=1741638165" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Scams in the henhouse.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/328/notes</link>
      <description>On Hacking Humans, this week Dave Bittner is on vacation so  our two hosts Joe Carrigan, and Maria Varmazis (also host of N2K's daily space podcast, T-Minus), are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. We start off the show with some follow-up from a long-time listener who shared how switching to Publii and Cloudflare Pages saved his wife's psychiatric nurse practice over $120/year in hosting costs after discovering static site generators on Hacking Humans. Joe's story is on a warning from an Oregon woman who fell victim to an online scam while trying to buy hens for her backyard chicken coop amid egg shortages caused by the bird flu, urging others to be cautious and avoid transactions on social media. Maria has the story on the increasing threats targeting sellers on online marketplaces, including phishing campaigns, scams designed to bypass platform protections, and the risks associated with off-platform transactions, all of which emphasize the need for heightened vigilance and security measures. The catch of the day, from Scott, highlights an email invitation that appeared legitimate but redirected to a phishing site designed to steal email credentials, with Scott’s wife recognizing the suspicious nature and forwarding it for further investigation.

Resources and links to stories: 

‘Be suspicious’: Sweet Home woman warns of chicken scam amid egg shortage

Your item has sold! Avoiding scams targeting online sellers


You can hear more from the T-Minus space daily show here.

Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@n2k.com.</description>
      <pubDate>Thu, 06 Mar 2025 06:00:00 -0000</pubDate>
      <itunes:title>Scams in the henhouse.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>328</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>On Hacking Humans, this week Dave Bittner is on vacation so  our two hosts Joe Carrigan, and Maria Varmazis (also host of N2K's daily space podcast, T-Minus), are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. We start off the show with some follow-up from a long-time listener who shared how switching to Publii and Cloudflare Pages saved his wife's psychiatric nurse practice over $120/year in hosting costs after discovering static site generators on Hacking Humans. Joe's story is on a warning from an Oregon woman who fell victim to an online scam while trying to buy hens for her backyard chicken coop amid egg shortages caused by the bird flu, urging others to be cautious and avoid transactions on social media. Maria has the story on the increasing threats targeting sellers on online marketplaces, including phishing campaigns, scams designed to bypass platform protections, and the risks associated with off-platform transactions, all of which emphasize the need for heightened vigilance and security measures. The catch of the day, from Scott, highlights an email invitation that appeared legitimate but redirected to a phishing site designed to steal email credentials, with Scott’s wife recognizing the suspicious nature and forwarding it for further investigation.

Resources and links to stories: 

‘Be suspicious’: Sweet Home woman warns of chicken scam amid egg shortage

Your item has sold! Avoiding scams targeting online sellers


You can hear more from the T-Minus space daily show here.

Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@n2k.com.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>On Hacking Humans, this week Dave Bittner is on vacation so  our two hosts <a href="https://www.linkedin.com/in/joecarrigan/">Joe Carrigan</a>, and <a href="https://www.linkedin.com/in/varmazis/">Maria Varmazis</a> (also host of N2K's daily space podcast, T-Minus), are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. We start off the show with some follow-up from a long-time listener who shared how switching to Publii and Cloudflare Pages saved his wife's psychiatric nurse practice over $120/year in hosting costs after discovering static site generators on Hacking Humans. Joe's story is on a warning from an Oregon woman who fell victim to an online scam while trying to buy hens for her backyard chicken coop amid egg shortages caused by the bird flu, urging others to be cautious and avoid transactions on social media. Maria has the story on the increasing threats targeting sellers on online marketplaces, including phishing campaigns, scams designed to bypass platform protections, and the risks associated with off-platform transactions, all of which emphasize the need for heightened vigilance and security measures. The catch of the day, from Scott, highlights an email invitation that appeared legitimate but redirected to a phishing site designed to steal email credentials, with Scott’s wife recognizing the suspicious nature and forwarding it for further investigation.</p><p><br></p><p>Resources and links to stories: </p><ul>
<li><a href="https://www.koin.com/news/oregon/be-suspicious-sweet-home-woman-warns-of-chicken-scam-amid-egg-shortage/">‘Be suspicious’: Sweet Home woman warns of chicken scam amid egg shortage</a></li>
<li><a href="https://blog.talosintelligence.com/online-marketplace-scams/">Your item has sold! Avoiding scams targeting online sellers</a></li>
</ul><p><br></p><p>You can hear more from the T-Minus space daily show <a href="https://space.n2k.com/podcasts/t-minus">here</a>.</p><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@n2k.com">hackinghumans@n2k.com</a>.</p>]]>
      </content:encoded>
      <itunes:duration>2078</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[44646ff8-cdd5-11ef-8599-f397b9f32f15]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW6750311190.mp3?updated=1741194453" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The new malware on the block. [Only Malware in the Building]</title>
      <link>https://thecyberwire.com/podcasts/only-malware-in-the-building/10/notes</link>
      <description>Welcome in! You’ve entered, Only Malware in the Building. Join us each month to sip tea and solve mysteries about today’s most interesting threats. Your host is Selena Larson, Proofpoint intelligence analyst and host of their podcast DISCARDED. Inspired by the residents of a building in New York’s exclusive upper west side, Selena is joined by N2K Networks Dave Bittner —and our newest totally unbiased co-host, Archy, a highly sophisticated AI robot who swears they have no ulterior motives (but we’re keeping an eye on them just in case).
Being a security researcher is a bit like being a detective: you gather clues, analyze the evidence, and consult the experts to solve the cyber puzzle. On this episode, we talk about the latest shake-ups in the fake update threat landscape, including two new cybercriminal actors, fresh Mac malware, and the growing challenge of tracking these evolving campaigns.</description>
      <pubDate>Tue, 04 Mar 2025 08:00:00 -0000</pubDate>
      <itunes:title>The new malware on the block. [Only Malware in the Building]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>10</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/6c744334-f86d-11ef-b87c-e7629c741028/image/14002263e169460f16ca12e04624eb3a.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle/>
      <itunes:summary>Welcome in! You’ve entered, Only Malware in the Building. Join us each month to sip tea and solve mysteries about today’s most interesting threats. Your host is Selena Larson, Proofpoint intelligence analyst and host of their podcast DISCARDED. Inspired by the residents of a building in New York’s exclusive upper west side, Selena is joined by N2K Networks Dave Bittner —and our newest totally unbiased co-host, Archy, a highly sophisticated AI robot who swears they have no ulterior motives (but we’re keeping an eye on them just in case).
Being a security researcher is a bit like being a detective: you gather clues, analyze the evidence, and consult the experts to solve the cyber puzzle. On this episode, we talk about the latest shake-ups in the fake update threat landscape, including two new cybercriminal actors, fresh Mac malware, and the growing challenge of tracking these evolving campaigns.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Welcome in! You’ve entered, Only Malware in the Building. Join us each month to sip tea and solve mysteries about today’s most interesting threats. Your host is <a href="https://www.linkedin.com/in/selenalarson/">Selena Larson</a>, <a href="https://www.proofpoint.com/">Proofpoint</a> intelligence analyst and host of their podcast <a href="https://www.proofpoint.com/us/podcasts/discarded">DISCARDED</a>. Inspired by the residents of a building in New York’s exclusive upper west side, Selena is joined by <a href="https://www.n2k.com/">N2K Networks</a> <a href="https://www.linkedin.com/in/dave-bittner-27231a4/">Dave Bittner</a> —and our newest <em>totally</em> unbiased co-host, Archy, a highly sophisticated AI robot who swears they have <em>no</em> ulterior motives (but we’re keeping an eye on them just in case).</p><p>Being a security researcher is a bit like being a detective: you gather clues, analyze the evidence, and consult the experts to solve the cyber puzzle. On this episode, we talk about the latest shake-ups in the <a href="https://www.proofpoint.com/us/blog/threat-insight/update-fake-updates-two-new-actors-and-new-mac-malware">fake update threat landscape</a>, including two new cybercriminal actors, fresh Mac malware, and the growing challenge of tracking these evolving campaigns.</p>]]>
      </content:encoded>
      <itunes:duration>1983</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[6c744334-f86d-11ef-b87c-e7629c741028]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW5899190970.mp3?updated=1741033653" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>zero trust (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/73/notes</link>
      <description>Please enjoy this encore of Word Notes. 
A security philosophy that assumes adversaries have already penetrated the digital environment and tries to reduce the potential impact by limiting access by people, devices, and software to only the resources essential to perform their function and nothing more. </description>
      <pubDate>Tue, 04 Mar 2025 08:00:00 -0000</pubDate>
      <itunes:title>zero trust (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>73</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/c99e7342-f870-11ef-9988-43a0b0f522df/image/441b0ca2db080b93b935568d381ce462.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle/>
      <itunes:summary>Please enjoy this encore of Word Notes. 
A security philosophy that assumes adversaries have already penetrated the digital environment and tries to reduce the potential impact by limiting access by people, devices, and software to only the resources essential to perform their function and nothing more. </itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore of Word Notes. </p><p>A security philosophy that assumes adversaries have already penetrated the digital environment and tries to reduce the potential impact by limiting access by people, devices, and software to only the resources essential to perform their function and nothing more. </p>]]>
      </content:encoded>
      <itunes:duration>542</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c99e7342-f870-11ef-9988-43a0b0f522df]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW8084417772.mp3?updated=1741034464" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Live from Orlando, it's Hacking Humans!</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/327/notes</link>
      <description>In this special live episode of Hacking Humans, recorded at ThreatLocker’s Zero Trust World 2025 conference in Orlando, Florida, Dave Bittner is joined by T-Minus host Maria Varmazis. Together, they explore the latest in social engineering scams, phishing schemes, and cybercriminal exploits making headlines. Their guest, Seamus Lennon, ThreatLocker’s VP of Operations for EMEA, shares insights on Zero Trust security and the evolving threat landscape. Maria's story this week follows the IRS warning about a fake “Self Employment Tax Credit” scam on social media, urging taxpayers to ignore misinformation and consult professionals. Dave's got the story of the Better Business Bureau’s annual Scam Tracker report, revealing that online shopping scams continue to top the list for the fifth year, with phishing and employment scams remaining major threats, while fraudsters increasingly use AI and deepfake technology to deceive victims. Our catch of the day comes from Diesel in West Virginia, and features a scammer who tried to panic their target with a classic “We’ve frozen your account” scam—only to get hilariously mixed up with actual embryo freezing.
Resources and links to stories: 

Better Business Bureau reveals top local scams of 2024

IRS warns taxpayers about misleading claims about non-existent “Self Employment Tax Credit;” promoters, social media peddling inaccurate eligibility suggestions

BBB Scam Tracker

Got a $1,400 rebate text from the IRS? It's a scam, Better Business Bureau warns.


You can hear more from the T-Minus space daily show here.

Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@n2k.com.</description>
      <pubDate>Thu, 27 Feb 2025 06:00:00 -0000</pubDate>
      <itunes:title>Live from Orlando, it's Hacking Humans!</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>327</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>In this special live episode of Hacking Humans, recorded at ThreatLocker’s Zero Trust World 2025 conference in Orlando, Florida, Dave Bittner is joined by T-Minus host Maria Varmazis. Together, they explore the latest in social engineering scams, phishing schemes, and cybercriminal exploits making headlines. Their guest, Seamus Lennon, ThreatLocker’s VP of Operations for EMEA, shares insights on Zero Trust security and the evolving threat landscape. Maria's story this week follows the IRS warning about a fake “Self Employment Tax Credit” scam on social media, urging taxpayers to ignore misinformation and consult professionals. Dave's got the story of the Better Business Bureau’s annual Scam Tracker report, revealing that online shopping scams continue to top the list for the fifth year, with phishing and employment scams remaining major threats, while fraudsters increasingly use AI and deepfake technology to deceive victims. Our catch of the day comes from Diesel in West Virginia, and features a scammer who tried to panic their target with a classic “We’ve frozen your account” scam—only to get hilariously mixed up with actual embryo freezing.
Resources and links to stories: 

Better Business Bureau reveals top local scams of 2024

IRS warns taxpayers about misleading claims about non-existent “Self Employment Tax Credit;” promoters, social media peddling inaccurate eligibility suggestions

BBB Scam Tracker

Got a $1,400 rebate text from the IRS? It's a scam, Better Business Bureau warns.


You can hear more from the T-Minus space daily show here.

Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@n2k.com.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In this special live episode of <em>Hacking Humans</em>, recorded at ThreatLocker’s Zero Trust World 2025 conference in Orlando, Florida, <a href="https://www.linkedin.com/in/dave-bittner-27231a4/">Dave Bittner</a> is joined by <em>T-Minus</em> host <a href="https://www.linkedin.com/in/varmazis/">Maria Varmazis</a>. Together, they explore the latest in social engineering scams, phishing schemes, and cybercriminal exploits making headlines. Their guest, <a href="https://www.linkedin.com/in/seamus-lennon-41423886/">Seamus Lennon</a>, ThreatLocker’s VP of Operations for EMEA, shares insights on Zero Trust security and the evolving threat landscape. Maria's story this week follows the IRS warning about a fake “Self Employment Tax Credit” scam on social media, urging taxpayers to ignore misinformation and consult professionals. Dave's got the story of the Better Business Bureau’s annual Scam Tracker report, revealing that online shopping scams continue to top the list for the fifth year, with phishing and employment scams remaining major threats, while fraudsters increasingly use AI and deepfake technology to deceive victims. Our catch of the day comes from Diesel in West Virginia, and features a scammer who tried to panic their target with a classic “We’ve frozen your account” scam—only to get hilariously mixed up with actual embryo freezing.</p><p>Resources and links to stories: </p><ul>
<li><a href="https://abc7chicago.com/post/better-business-bureau-reveals-top-local-scams-2024-online-shopping-phone-email-rampant/15741408/">Better Business Bureau reveals top local scams of 2024</a></li>
<li><a href="https://www.irs.gov/newsroom/irs-warns-taxpayers-about-misleading-claims-about-non-existent-self-employment-tax-credit-promoters-social-media-peddling-inaccurate-eligibility-suggestions">IRS warns taxpayers about misleading claims about non-existent “Self Employment Tax Credit;” promoters, social media peddling inaccurate eligibility suggestions</a></li>
<li><a href="https://www.bbb.org/scamtracker/lookupscam/936488">BBB Scam Tracker</a></li>
<li><a href="https://www.cbsnews.com/news/irs-economic-impact-payment-text/">Got a $1,400 rebate text from the IRS? It's a scam, Better Business Bureau warns.</a></li>
</ul><p><br></p><p>You can hear more from the T-Minus space daily show <a href="https://space.n2k.com/podcasts/t-minus">here</a>.</p><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@n2k.com">hackinghumans@n2k.com</a>.</p>]]>
      </content:encoded>
      <itunes:duration>1851</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[443243de-cdd5-11ef-8599-23c32ab9590a]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW1272679227.mp3?updated=1740510971" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>OT security (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/72/notes</link>
      <description>Please enjoy this encore episode of Word Notes.
Hardware and software designed to detect and prevent cyber adversary campaigns that target industrial operations. </description>
      <pubDate>Tue, 25 Feb 2025 08:00:00 -0000</pubDate>
      <itunes:title>OT security (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>72</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/84d0c05a-f2dd-11ef-9fb0-6f4e6d664a7d/image/441b0ca2db080b93b935568d381ce462.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Please enjoy this encore episode of Word Notes.
Hardware and software designed to detect and prevent cyber adversary campaigns that target industrial operations. </itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore episode of Word Notes.</p><p>Hardware and software designed to detect and prevent cyber adversary campaigns that target industrial operations. </p>]]>
      </content:encoded>
      <itunes:duration>493</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[84d0c05a-f2dd-11ef-9fb0-6f4e6d664a7d]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW4912465074.mp3?updated=1740423788" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>I'm a scammer and need support. </title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/326/notes</link>
      <description>On Hacking Humans, Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of N2K's daily space podcast, T-Minus), are once again sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines to help our audience become aware of what is out there. We start off with some follow up from listener Dave who writes in with a call for help after a good friend of his, who fell victim to a dream job scam. They also have a discussion after the Washington Post shared an article on scammers are remorseful and how they have a support group. Maria has a quick follow up from last week, talking about deepfakes, this week, she talks about Kim Jong Un. Dave has a romance scam story this week, talking about how the loneliness epidemic is causing issues. Joe has two stories this week, the first is on a thief using a homemade barcode ring to scam Walmart self-checkouts. Joe's second story is on new protection methods that are out, giving us game changing anti-scam laws. Our catch of the day comes from Reddit after a user posted a conversation they had with a scammer that got a bit out of hand. 

Resources and links to stories: 

Arizona laptop farmer pleads guilty for funneling $17M to Kim Jong Un

The Loneliness Epidemic Is a Security Crisis

Thief using homemade barcode ring to scam Walmart self-checkout busted after trying to ring up $300 grill for price of tomato soup: cops

'Game-changing' anti-scam laws to protect consumers

Hello, Jane.


You can hear more from the T-Minus space daily show here.

Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@n2k.com.</description>
      <pubDate>Thu, 20 Feb 2025 06:00:00 -0000</pubDate>
      <itunes:title>I'm a scammer and need support. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>326</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>On Hacking Humans, Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of N2K's daily space podcast, T-Minus), are once again sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines to help our audience become aware of what is out there. We start off with some follow up from listener Dave who writes in with a call for help after a good friend of his, who fell victim to a dream job scam. They also have a discussion after the Washington Post shared an article on scammers are remorseful and how they have a support group. Maria has a quick follow up from last week, talking about deepfakes, this week, she talks about Kim Jong Un. Dave has a romance scam story this week, talking about how the loneliness epidemic is causing issues. Joe has two stories this week, the first is on a thief using a homemade barcode ring to scam Walmart self-checkouts. Joe's second story is on new protection methods that are out, giving us game changing anti-scam laws. Our catch of the day comes from Reddit after a user posted a conversation they had with a scammer that got a bit out of hand. 

Resources and links to stories: 

Arizona laptop farmer pleads guilty for funneling $17M to Kim Jong Un

The Loneliness Epidemic Is a Security Crisis

Thief using homemade barcode ring to scam Walmart self-checkout busted after trying to ring up $300 grill for price of tomato soup: cops

'Game-changing' anti-scam laws to protect consumers

Hello, Jane.


You can hear more from the T-Minus space daily show here.

Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@n2k.com.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>On Hacking Humans, <a href="https://www.linkedin.com/in/dave-bittner-27231a4/">Dave Bittner</a>, <a href="https://www.linkedin.com/in/joecarrigan/">Joe Carrigan</a>, and <a href="https://www.linkedin.com/in/varmazis/">Maria Varmazis</a> (also host of N2K's daily space podcast, T-Minus), are once again sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines to help our audience become aware of what is out there. We start off with some follow up from listener Dave who writes in with a call for help after a good friend of his, who fell victim to a dream job scam. They also have a discussion after the Washington Post shared an article on scammers are remorseful and how they have a support group. Maria has a quick follow up from last week, talking about deepfakes, this week, she talks about Kim Jong Un. Dave has a romance scam story this week, talking about how the loneliness epidemic is causing issues. Joe has two stories this week, the first is on a thief using a homemade barcode ring to scam Walmart self-checkouts. Joe's second story is on new protection methods that are out, giving us game changing anti-scam laws. Our catch of the day comes from Reddit after a user posted a conversation they had with a scammer that got a bit out of hand. </p><p><br></p><p>Resources and links to stories: </p><ul>
<li><a href="https://www.msn.com/en-us/news/crime/arizona-laptop-farmer-pleads-guilty-for-funneling-17m-to-kim-jong-un/ar-AA1yVqPC?ocid=TobArticle&amp;cvid=5134df8292d44236bf32d96b072ec27c&amp;ei=3">Arizona laptop farmer pleads guilty for funneling $17M to Kim Jong Un</a></li>
<li><a href="https://www.wired.com/story/loneliness-epidemic-romance-scams-security-crisis/">The Loneliness Epidemic Is a Security Crisis</a></li>
<li><a href="https://nypost.com/2025/02/04/us-news/thief-uses-homemade-barcode-ring-to-scam-self-checkout-at-walmart-cops/">Thief using homemade barcode ring to scam Walmart self-checkout busted after trying to ring up $300 grill for price of tomato soup: cops</a></li>
<li><a href="https://au.news.yahoo.com/game-changing-anti-scam-laws-021252457.html?guccounter=1&amp;guce_referrer=aHR0cHM6Ly93d3cuZ29vZ2xlLmNvbS8&amp;guce_referrer_sig=AQAAACoO7q4vRhd33ftG3Ak2pN42Aw23uyziwT35V0ggRRHVx1EEkH46nZkEOoHn8vaeSYg_8jknuCkpTYYilp5WPyGjngMUZAO_VtrltdU4LNsMCULF_RUqpv98tSe5S0GDER8kHHa_1Rmpyjh9fRrbJSPr9Kr5IIxrlLLzbAYFn6Gv">'Game-changing' anti-scam laws to protect consumers</a></li>
<li><a href="https://www.reddit.com/r/scambait/comments/1inut0k/hello_jane/#lightbox">Hello, Jane.</a></li>
</ul><p><br></p><p>You can hear more from the T-Minus space daily show <a href="https://space.n2k.com/podcasts/t-minus">here</a>.</p><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@n2k.com">hackinghumans@n2k.com</a>.</p>]]>
      </content:encoded>
      <itunes:duration>2672</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[4400522a-cdd5-11ef-8599-87214f4bbb78]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW4476459583.mp3?updated=1739983149" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>cybersecurity skills gap (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/71/notes</link>
      <description>Please enjoy this encore episode of Word Notes. 
The difference between organizational employee job requirements and the available skillsets in the potential employee pool.</description>
      <pubDate>Tue, 18 Feb 2025 08:00:00 -0000</pubDate>
      <itunes:title>cybersecurity skills gap (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>71</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/6f056b5a-eb16-11ef-87dc-dfcea33ca257/image/441b0ca2db080b93b935568d381ce462.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Please enjoy this encore episode of Word Notes. 
The difference between organizational employee job requirements and the available skillsets in the potential employee pool.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore episode of Word Notes. </p><p>The difference between organizational employee job requirements and the available skillsets in the potential employee pool.</p>]]>
      </content:encoded>
      <itunes:duration>463</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[6f056b5a-eb16-11ef-87dc-dfcea33ca257]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW5371855873.mp3?updated=1739567253" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The “t” that tricked.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/325/notes</link>
      <description>On Hacking Humans, Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of N2K's daily space podcast, T-Minus), are once again sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines to help our audience become aware of what is out there. Our hosts start off with some follow up from listener Robert who writes in from the Great White North, who shares how he thinks the U.S. might be stuck in the past with payment tech. Joe's got two stories this week, both on financial crime—Thailand cutting power to Myanmar's billion-dollar scam hubs and the struggle to shut them down for good. Maria has the story of a job candidate who not only used AI-generated answers during a technical interview but also altered his appearance with software—marking the second time this has happened to the interviewer in just two months. Dave sits down with our guest Nati Tal, Head of Guardio Labs, as he is discussing the growing danger of homograph attacks. Our catch of the day comes from listener Kenneth, who got an alarming email from the PayPal Security Team—apparently, he just bought nearly $700 in Bitcoin. 
Resources and links to stories: 

China's Xi hails Thailand's 'strong' action against scam centres

Power cut to site of global, billion-dollar scam industry. But will it halt the swindling?

AI altering


You can hear more from the T-Minus space daily show here.

Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@n2k.com.</description>
      <pubDate>Thu, 13 Feb 2025 06:00:00 -0000</pubDate>
      <itunes:title>The “t” that tricked.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>325</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>On Hacking Humans, Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of N2K's daily space podcast, T-Minus), are once again sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines to help our audience become aware of what is out there. Our hosts start off with some follow up from listener Robert who writes in from the Great White North, who shares how he thinks the U.S. might be stuck in the past with payment tech. Joe's got two stories this week, both on financial crime—Thailand cutting power to Myanmar's billion-dollar scam hubs and the struggle to shut them down for good. Maria has the story of a job candidate who not only used AI-generated answers during a technical interview but also altered his appearance with software—marking the second time this has happened to the interviewer in just two months. Dave sits down with our guest Nati Tal, Head of Guardio Labs, as he is discussing the growing danger of homograph attacks. Our catch of the day comes from listener Kenneth, who got an alarming email from the PayPal Security Team—apparently, he just bought nearly $700 in Bitcoin. 
Resources and links to stories: 

China's Xi hails Thailand's 'strong' action against scam centres

Power cut to site of global, billion-dollar scam industry. But will it halt the swindling?

AI altering


You can hear more from the T-Minus space daily show here.

Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@n2k.com.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>On Hacking Humans, <a href="https://www.linkedin.com/in/dave-bittner-27231a4/">Dave Bittner</a>, <a href="https://www.linkedin.com/in/joecarrigan/">Joe Carrigan</a>, and <a href="https://www.linkedin.com/in/varmazis/">Maria Varmazis</a> (also host of N2K's daily space podcast, T-Minus), are once again sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines to help our audience become aware of what is out there. Our hosts start off with some follow up from listener Robert who writes in from the Great White North, who shares how he thinks the U.S. might be stuck in the past with payment tech. Joe's got two stories this week, both on financial crime—Thailand cutting power to Myanmar's billion-dollar scam hubs and the struggle to shut them down for good. Maria has the story of a job candidate who not only used AI-generated answers during a technical interview but also altered his appearance with software—marking the second time this has happened to the interviewer in just two months. Dave sits down with our guest <a href="https://www.linkedin.com/in/natital/">Nati Tal</a>, Head of <a href="https://guard.io/">Guardio Labs</a>, as he is discussing the growing danger of homograph attacks. Our catch of the day comes from listener Kenneth, who got an alarming email from the <em>PayPal Security Team</em>—apparently, he just bought nearly $700 in Bitcoin. </p><p>Resources and links to stories: </p><ul>
<li><a href="https://www.nbc39.com/news/national/chinas-xi-hails-thailands-strong-action-against-scam-centres/article_774e0f32-a9f1-5181-a0d7-3d533d2ed31d.html">China's Xi hails Thailand's 'strong' action against scam centres</a></li>
<li><a href="https://www.cnn.com/2025/02/05/asia/myanmar-thailand-scam-power-cuts-intl-hnk/index.html">Power cut to site of global, billion-dollar scam industry. But will it halt the swindling?</a></li>
<li><a href="https://www.linkedin.com/feed/update/urn:li:activity:7292604406464671744/">AI altering</a></li>
</ul><p><br></p><p>You can hear more from the T-Minus space daily show <a href="https://space.n2k.com/podcasts/t-minus">here</a>.</p><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@n2k.com">hackinghumans@n2k.com</a>. </p>]]>
      </content:encoded>
      <itunes:duration>2728</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[43ceea50-cdd5-11ef-8599-bb8861bc0708]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW6800856927.mp3?updated=1739295106" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>digital transformation (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/70/notes</link>
      <description>Please enjoy this encore episode of Word Notes.
The use of technology to radically improve the performance or reach of the business. </description>
      <pubDate>Tue, 11 Feb 2025 08:00:00 -0000</pubDate>
      <itunes:title>digital transformation (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>70</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/3cfc330e-e7de-11ef-bec5-33d32fb187ae/image/441b0ca2db080b93b935568d381ce462.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Please enjoy this encore episode of Word Notes.
The use of technology to radically improve the performance or reach of the business. </itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore episode of Word Notes.</p><p>The use of technology to radically improve the performance or reach of the business. </p>]]>
      </content:encoded>
      <itunes:duration>425</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[3cfc330e-e7de-11ef-bec5-33d32fb187ae]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW4799357796.mp3?updated=1739213145" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Old school scams updated.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/324/notes</link>
      <description>On this episode of Hacking Humans, we are going old school with Dave Bittner and Joe Carrigan sans T-Minus host Maria Varmazis (as she was hanging out with astronauts at the SpaceCom event). Not to worry, Dave and Joe have it covered sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines to help our audience become aware of what is out there. This week, we have some follow up including a conversation Joe had with ChatGPT, some discussion on AI generated images of people, and scam letters that are sent out in the mail. Joe shares a text his office mate received from the "IRS." He also has a story about food workers taking photos of credit and debit cards at restaurant drive throughs. Dave's story is about a near-perfect scam attempt that almost fooled a very smart guy—Zach Latta, the founder of Hack Club. Our Catch of the Day comes from Reddit about a Facebook Marketplace scam using Zelle. 

Resources and links to stories: 

Scam Warning: Food workers taking photos of debit cards in North Carolina, police say

Google takes action after coder reports 'most sophisticated attack I've ever seen'

FB Marketplace scam using Zelle


You can hear more from the T-Minus space daily show here.

Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@n2k.com.</description>
      <pubDate>Thu, 06 Feb 2025 06:00:00 -0000</pubDate>
      <itunes:title>Old school scams updated.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>324</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>On this episode of Hacking Humans, we are going old school with Dave Bittner and Joe Carrigan sans T-Minus host Maria Varmazis (as she was hanging out with astronauts at the SpaceCom event). Not to worry, Dave and Joe have it covered sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines to help our audience become aware of what is out there. This week, we have some follow up including a conversation Joe had with ChatGPT, some discussion on AI generated images of people, and scam letters that are sent out in the mail. Joe shares a text his office mate received from the "IRS." He also has a story about food workers taking photos of credit and debit cards at restaurant drive throughs. Dave's story is about a near-perfect scam attempt that almost fooled a very smart guy—Zach Latta, the founder of Hack Club. Our Catch of the Day comes from Reddit about a Facebook Marketplace scam using Zelle. 

Resources and links to stories: 

Scam Warning: Food workers taking photos of debit cards in North Carolina, police say

Google takes action after coder reports 'most sophisticated attack I've ever seen'

FB Marketplace scam using Zelle


You can hear more from the T-Minus space daily show here.

Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@n2k.com.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>On this episode of Hacking Humans, we are going old school with <a href="https://www.linkedin.com/in/dave-bittner-27231a4/">Dave Bittner</a> and <a href="https://www.linkedin.com/in/joecarrigan/">Joe Carrigan</a> sans T-Minus host <a href="https://www.linkedin.com/in/varmazis/">Maria Varmazis</a> (as she was hanging out with astronauts at the SpaceCom event). Not to worry, Dave and Joe have it covered sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines to help our audience become aware of what is out there. This week, we have some follow up including a conversation Joe had with ChatGPT, some discussion on AI generated images of people, and scam letters that are sent out in the mail. Joe shares a text his office mate received from the "IRS." He also has a story about food workers taking photos of credit and debit cards at restaurant drive throughs. Dave's story is about a near-perfect scam attempt that almost fooled a very smart guy—Zach Latta, the founder of Hack Club. Our Catch of the Day comes from Reddit about a Facebook Marketplace scam using Zelle. </p><p><br></p><p>Resources and links to stories: </p><ul>
<li><a href="https://myfox8.com/news/north-carolina/scam-warning-food-workers-taking-photos-of-debit-cards-in-north-carolina-police-say/">Scam Warning: Food workers taking photos of debit cards in North Carolina, police say</a></li>
<li><a href="https://www.theregister.com/2025/01/27/google_confirms_action_taken_to/">Google takes action after coder reports 'most sophisticated attack I've ever seen'</a></li>
<li><a href="https://www.reddit.com/r/Scams/comments/1idcm1k/fb_marketplace_scam_using_zelle/">FB Marketplace scam using Zelle</a></li>
</ul><p><br></p><p>You can hear more from the T-Minus space daily show <a href="https://space.n2k.com/podcasts/t-minus">here</a>.</p><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@n2k.com">hackinghumans@n2k.com</a>. </p>]]>
      </content:encoded>
      <itunes:duration>2111</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[439c9a46-cdd5-11ef-8599-3b1a43f1444f]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW2226091476.mp3?updated=1738624739" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>bulletproof hosting (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/69/notes</link>
      <description>Please enjoy this encore episode of Word Notes.
Cloud services intended for cyber criminals and other bad actors designed to obstruct law enforcement and other kinds of government investigations, and to provide some protection against competitors.</description>
      <pubDate>Tue, 04 Feb 2025 08:00:00 -0000</pubDate>
      <itunes:title>bulletproof hosting (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>69</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Please enjoy this encore episode of Word Notes.
Cloud services intended for cyber criminals and other bad actors designed to obstruct law enforcement and other kinds of government investigations, and to provide some protection against competitors.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore episode of Word Notes.</p><p>Cloud services intended for cyber criminals and other bad actors designed to obstruct law enforcement and other kinds of government investigations, and to provide some protection against competitors.</p>]]>
      </content:encoded>
      <itunes:duration>392</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[3cc7881a-e25d-11ef-8cb7-0f5aade7b281]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW8686045119.mp3?updated=1738607944" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Cyber Groundhog Day and romance scams. [Only Malware in the Building]</title>
      <link>https://thecyberwire.com/podcasts/only-malware-in-the-building/9/notes</link>
      <description>Welcome in! You’ve entered, Only Malware in the Building. Join us each month to sip tea and solve mysteries about today’s most interesting threats. Your host is Selena Larson, Proofpoint intelligence analyst and host of their podcast DISCARDED. Inspired by the residents of a building in New York’s exclusive upper west side, Selena is joined by N2K Networks Dave Bittner and Rick Howard to uncover the stories behind notable cyberattacks.

Being a security researcher is a bit like being a detective: you gather clues, analyze the evidence, and consult the experts to solve the cyber puzzle. On this episode and since it is February (the month of love as Selena calls it), we talk about romance scams known throughout the security world as pig butchering. And, Rick's experiencing a bit of a Cyber Groundhog Day in his newly-realized retirement.</description>
      <pubDate>Tue, 04 Feb 2025 06:00:00 -0000</pubDate>
      <itunes:title>Cyber Groundhog Day and romance scams. [Only Malware in the Building]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/95c65b50-e26f-11ef-933f-db9fecffab6a/image/d9f0cdb0dcdd515f0dfd92da4cc68fb2.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Welcome in! You’ve entered, Only Malware in the Building. Join us each month to sip tea and solve mysteries about today’s most interesting threats. Your host is Selena Larson, Proofpoint intelligence analyst and host of their podcast DISCARDED. Inspired by the residents of a building in New York’s exclusive upper west side, Selena is joined by N2K Networks Dave Bittner and Rick Howard to uncover the stories behind notable cyberattacks.

Being a security researcher is a bit like being a detective: you gather clues, analyze the evidence, and consult the experts to solve the cyber puzzle. On this episode and since it is February (the month of love as Selena calls it), we talk about romance scams known throughout the security world as pig butchering. And, Rick's experiencing a bit of a Cyber Groundhog Day in his newly-realized retirement.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Welcome in! You’ve entered, Only Malware in the Building. Join us each month to sip tea and solve mysteries about today’s most interesting threats. Your host is <a href="https://www.linkedin.com/in/selenalarson/">Selena Larson</a>, <a href="https://www.proofpoint.com/">Proofpoint</a> intelligence analyst and host of their podcast <a href="https://www.proofpoint.com/us/podcasts/discarded">DISCARDED</a>. Inspired by the residents of a building in New York’s exclusive upper west side, Selena is joined by <a href="https://www.n2k.com/">N2K Networks</a> <a href="https://www.linkedin.com/in/dave-bittner-27231a4/">Dave Bittner</a> and <a href="https://www.linkedin.com/in/rickhoward/">Rick Howard</a> to uncover the stories behind notable cyberattacks.</p><p><br></p><p>Being a security researcher is a bit like being a detective: you gather clues, analyze the evidence, and consult the experts to solve the cyber puzzle. On this episode and since it is February (the month of love as Selena calls it), we talk about romance scams known throughout the security world as pig butchering. And, Rick's experiencing a bit of a Cyber Groundhog Day in his newly-realized retirement. </p>]]>
      </content:encoded>
      <itunes:duration>2758</itunes:duration>
      <guid isPermaLink="false"><![CDATA[95c65b50-e26f-11ef-933f-db9fecffab6a]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW9877953389.mp3?updated=1738704761" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Despicable donation request scamming. </title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/323/notes</link>
      <description>On Hacking Humans, Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of N2K's daily space podcast, T-Minus), are once again sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines to help our audience become aware of what is out there. This week, Dave has the story from Ampyx Cyber that has a scam reporter on staff to do awareness videos and this latest one is about an amazing sale on fake leather bags. Joe has two stories this week. The first one sent Joe down a rabbit hole and is about romance scams where 3 people were recently sentenced. The second one is about one of the victims of that previous romance scam. And finally, Maria's story is about Restaurant Week in NYC and third-party brokers who do restaurant reservation auctions. Our Catch of the Day involves a GoGetFunding gift card scam related to a campaign looking for donations to help pay for a child's medical costs.

Resources and links to stories: 

Fake leather, fake people: AI sellers generate numerous complaints

Romance scam "money mules" sentenced in case that ended with Illinois woman's death

When her mother went missing, an Illinois woman ventured into the dark corners of America's romance scam epidemic

Security Alert: Bots Target NYC Restaurant Week

GoGetFunding Scamming Donations Alert


You can hear more from the T-Minus space daily show here.

Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@n2k.com.</description>
      <pubDate>Thu, 30 Jan 2025 06:00:00 -0000</pubDate>
      <itunes:title>Despicable donation request scamming. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>323</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>On Hacking Humans, Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of N2K's daily space podcast, T-Minus), are once again sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines to help our audience become aware of what is out there. This week, Dave has the story from Ampyx Cyber that has a scam reporter on staff to do awareness videos and this latest one is about an amazing sale on fake leather bags. Joe has two stories this week. The first one sent Joe down a rabbit hole and is about romance scams where 3 people were recently sentenced. The second one is about one of the victims of that previous romance scam. And finally, Maria's story is about Restaurant Week in NYC and third-party brokers who do restaurant reservation auctions. Our Catch of the Day involves a GoGetFunding gift card scam related to a campaign looking for donations to help pay for a child's medical costs.

Resources and links to stories: 

Fake leather, fake people: AI sellers generate numerous complaints

Romance scam "money mules" sentenced in case that ended with Illinois woman's death

When her mother went missing, an Illinois woman ventured into the dark corners of America's romance scam epidemic

Security Alert: Bots Target NYC Restaurant Week

GoGetFunding Scamming Donations Alert


You can hear more from the T-Minus space daily show here.

Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@n2k.com.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>On Hacking Humans, <a href="https://www.linkedin.com/in/dave-bittner-27231a4/">Dave Bittner</a>, <a href="https://www.linkedin.com/in/joecarrigan/">Joe Carrigan</a>, and <a href="https://www.linkedin.com/in/varmazis/">Maria Varmazis</a> (also host of N2K's daily space podcast, T-Minus), are once again sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines to help our audience become aware of what is out there. This week, Dave has the story from Ampyx Cyber that has a scam reporter on staff to do awareness videos and this latest one is about an amazing sale on fake leather bags. Joe has two stories this week. The first one sent Joe down a rabbit hole and is about romance scams where 3 people were recently sentenced. The second one is about one of the victims of that previous romance scam. And finally, Maria's story is about Restaurant Week in NYC and third-party brokers who do restaurant reservation auctions. Our Catch of the Day involves a GoGetFunding gift card scam related to a campaign looking for donations to help pay for a child's medical costs.</p><p><br></p><p>Resources and links to stories: </p><ul>
<li><a href="https://ampyxcyber.com/newsarchive/fake-leather-fake-people-ai-sellers-generate-numerous-complaints">Fake leather, fake people: AI sellers generate numerous complaints</a></li>
<li><a href="https://www.cbsnews.com/news/romance-scam-money-mules-sentenced-illinois/">Romance scam "money mules" sentenced in case that ended with Illinois woman's death</a></li>
<li><a href="https://www.cbsnews.com/news/romance-scams-illinois-woman-mother-missing-investigation/">When her mother went missing, an Illinois woman ventured into the dark corners of America's romance scam epidemic</a></li>
<li><a href="https://datadome.co/threat-research/bots-target-nyc-restaurant-week/">Security Alert: Bots Target NYC Restaurant Week</a></li>
<li><a href="https://www.reddit.com/r/Scams/comments/1i82mi2/gogetfunding_scamming_donations_alert/">GoGetFunding Scamming Donations Alert</a></li>
</ul><p><br></p><p>You can hear more from the T-Minus space daily show <a href="https://space.n2k.com/podcasts/t-minus">here</a>.</p><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@n2k.com">hackinghumans@n2k.com</a>. </p>]]>
      </content:encoded>
      <itunes:duration>2687</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[4367807c-cdd5-11ef-8599-d35df06c096b]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW4484381792.mp3?updated=1738082988" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>endpoint security [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/68/notes</link>
      <description>Please enjoy this encore of Word Notes. 
The practice of securing a device that connects to a network in order to facilitate communication with other devices on the same or different networks. </description>
      <pubDate>Tue, 28 Jan 2025 08:00:00 -0000</pubDate>
      <itunes:title>endpoint security [Word Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>68</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/9e5e6830-daa3-11ef-be70-f73b8b60a48b/image/441b0ca2db080b93b935568d381ce462.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Please enjoy this encore of Word Notes. 
The practice of securing a device that connects to a network in order to facilitate communication with other devices on the same or different networks. </itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore of Word Notes. </p><p>The practice of securing a device that connects to a network in order to facilitate communication with other devices on the same or different networks. </p>]]>
      </content:encoded>
      <itunes:duration>511</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[9e5e6830-daa3-11ef-be70-f73b8b60a48b]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW2814420024.mp3?updated=1737758556" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Back to the office, back to the threats.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/322/notes</link>
      <description>On Hacking Humans, Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of N2K's daily space podcast, T-Minus), are once again sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines to help our audience become aware of what is out there. This week Maria has the story on how the return to office life brings unique security challenges, highlighting the need for Red Team assessments to uncover and address physical and digital vulnerabilities, empowering organizations to proactively enhance workplace security and protect against evolving threats. Joe's story comes from the FCC's warning about a scam dubbed "Green Mirage," where fraudsters impersonate mortgage lenders, spoof caller IDs, and use social engineering to trick financially vulnerable homeowners into sending payments via unconventional methods, often only discovered when foreclosure proceedings begin. Last but not least, Dave's story is on how a Reddit user shared their cautious experiment with a suspected Airbnb scam involving a new account requesting to move to WhatsApp, agreeing to unusually high rental rates, and engaging in rapport-building tactics, with red flags pointing to potential financial fraud or phishing attempts. Our catch of the day comes from listener William, who spotted a phishing scam disguised as a security alert about a compromised crypto wallet, featuring an unsolicited QR code and a generic warning that targets even non-crypto users.

Resources and links to stories: 

Navigating Workplace Security: Red Team Insights for the Return to Office

FCC warns of 50-state scam by fraudsters posing as mortgage lenders

FCC ENFORCEMENT ADVISORY

I'm saying "Yes" to the Chinese long-term rental WhatsApp chat asking for video


You can hear more from the T-Minus space daily show here.

Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@n2k.com.</description>
      <pubDate>Thu, 23 Jan 2025 06:00:00 -0000</pubDate>
      <itunes:title>Back to the office, back to the threats.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>322</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>On Hacking Humans, Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of N2K's daily space podcast, T-Minus), are once again sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines to help our audience become aware of what is out there. This week Maria has the story on how the return to office life brings unique security challenges, highlighting the need for Red Team assessments to uncover and address physical and digital vulnerabilities, empowering organizations to proactively enhance workplace security and protect against evolving threats. Joe's story comes from the FCC's warning about a scam dubbed "Green Mirage," where fraudsters impersonate mortgage lenders, spoof caller IDs, and use social engineering to trick financially vulnerable homeowners into sending payments via unconventional methods, often only discovered when foreclosure proceedings begin. Last but not least, Dave's story is on how a Reddit user shared their cautious experiment with a suspected Airbnb scam involving a new account requesting to move to WhatsApp, agreeing to unusually high rental rates, and engaging in rapport-building tactics, with red flags pointing to potential financial fraud or phishing attempts. Our catch of the day comes from listener William, who spotted a phishing scam disguised as a security alert about a compromised crypto wallet, featuring an unsolicited QR code and a generic warning that targets even non-crypto users.

Resources and links to stories: 

Navigating Workplace Security: Red Team Insights for the Return to Office

FCC warns of 50-state scam by fraudsters posing as mortgage lenders

FCC ENFORCEMENT ADVISORY

I'm saying "Yes" to the Chinese long-term rental WhatsApp chat asking for video


You can hear more from the T-Minus space daily show here.

Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@n2k.com.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>On Hacking Humans, <a href="https://www.linkedin.com/in/dave-bittner-27231a4/">Dave Bittner</a>, <a href="https://www.linkedin.com/in/joecarrigan/">Joe Carrigan</a>, and <a href="https://www.linkedin.com/in/varmazis/">Maria Varmazis</a> (also host of N2K's daily space podcast, T-Minus), are once again sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines to help our audience become aware of what is out there. This week Maria has the story on how the return to office life brings unique security challenges, highlighting the need for Red Team assessments to uncover and address physical and digital vulnerabilities, empowering organizations to proactively enhance workplace security and protect against evolving threats. Joe's story comes from the FCC's warning about a scam dubbed "Green Mirage," where fraudsters impersonate mortgage lenders, spoof caller IDs, and use social engineering to trick financially vulnerable homeowners into sending payments via unconventional methods, often only discovered when foreclosure proceedings begin. Last but not least, Dave's story is on how a Reddit user shared their cautious experiment with a suspected Airbnb scam involving a new account requesting to move to WhatsApp, agreeing to unusually high rental rates, and engaging in rapport-building tactics, with red flags pointing to potential financial fraud or phishing attempts. Our catch of the day comes from listener William, who spotted a phishing scam disguised as a security alert about a compromised crypto wallet, featuring an unsolicited QR code and a generic warning that targets even non-crypto users.</p><p><br></p><p>Resources and links to stories: </p><ul>
<li><a href="https://bishopfox.com/blog/navigating-workplace-security-with-red-team-insights">Navigating Workplace Security: Red Team Insights for the Return to Office</a></li>
<li><a href="https://www.cbsnews.com/news/fcc-mortgage-lending-scam-homeowners/#">FCC warns of 50-state scam by fraudsters posing as mortgage lenders</a></li>
<li><a href="https://docs.fcc.gov/public/attachments/DA-25-41A1.pdf">FCC ENFORCEMENT ADVISORY</a></li>
<li><a href="https://www.reddit.com/r/airbnb_hosts/comments/1i0fxn4/im_saying_yes_to_the_chinese_longterm_rental/?share_id=wbZUGEBdakoE_15DoQZre&amp;utm_medium=android_app&amp;utm_name=androidcss&amp;utm_source=share&amp;utm_term=1">I'm saying "Yes" to the Chinese long-term rental WhatsApp chat asking for video</a></li>
</ul><p><br></p><p>You can hear more from the T-Minus space daily show <a href="https://space.n2k.com/podcasts/t-minus">here</a>.</p><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@n2k.com">hackinghumans@n2k.com</a>. </p>]]>
      </content:encoded>
      <itunes:duration>2591</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[43361758-cdd5-11ef-8599-9f6222b6ab43]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW3327801465.mp3?updated=1737571415" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Executive Order on Improving the Nation's Cybersecurity (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/67/notes</link>
      <description>Please enjoy this encore episode.
President Biden's May, 2021 formal compliance mandate for federal civilian executive branch agencies, or FCEBs, to include specific shortterm and longterm deadlines designed to enhance the federal government's digital defense posture. </description>
      <pubDate>Tue, 21 Jan 2025 08:00:00 -0000</pubDate>
      <itunes:title>Executive Order on Improving the Nation's Cybersecurity (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>67</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Please enjoy this encore episode.
President Biden's May, 2021 formal compliance mandate for federal civilian executive branch agencies, or FCEBs, to include specific shortterm and longterm deadlines designed to enhance the federal government's digital defense posture. </itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore episode.</p><p>President Biden's May, 2021 formal compliance mandate for federal civilian executive branch agencies, or FCEBs, to include specific shortterm and longterm deadlines designed to enhance the federal government's digital defense posture. </p>]]>
      </content:encoded>
      <itunes:duration>494</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[132033e2-d4f5-11ef-9640-636718083aeb]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW5685568224.mp3?updated=1737133951" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Crypto chameleons and star fraud.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/321/notes</link>
      <description>On Hacking Humans, Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of N2K's daily space podcast, T-Minus), are once again sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines to help our audience become aware of what is out there. This week we jump right into stories, Maria shares Apple’s new AI feature and how it is unintentionally rewording scam messages to make them appear more legitimate and flagging them as priority notifications, raising concerns about increased susceptibility to scams. Joe has two stories this week, the first focuses on two individuals, including an inmate using a smuggled cellphone, being charged with defrauding a Sarasota woman of $12,000 in a jury duty scam involving spoofed law enforcement identities and Bitcoin transfers, with authorities urging vigilance against such schemes. Joe's second story is on a LinkedIn job interview turned hacking attempt when a technical challenge contained obfuscated code designed to gather crypto wallet information from the user's computer; the scam highlights the importance of carefully reviewing code and using secure environments like virtual machines during such evaluations. Finally Dave has the story on a prolific voice phishing crew manipulating legitimate Apple and Google services to deceive victims, leveraging advanced phishing kits, social engineering tactics, and automated tools like "autodoxers" to target cryptocurrency holders and high-value individuals for significant financial theft. Our catch of the day comes from listener Keefe, who shares a voicemail from one suspicious sounding Walmart voice. 
Resources and links to stories: 

Apple’s new AI feature rewords scam messages to make them look more legit

Apple urged to withdraw 'out of control' AI news alerts

Suspected jury duty scammers arrested for bilking Sarasota woman out of $12K: DOJ

The code challenge scam

A Day in the Life of a Prolific Voice Phishing Crew


You can hear more from the T-Minus space daily show here.

Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@n2k.com.</description>
      <pubDate>Thu, 16 Jan 2025 06:00:00 -0000</pubDate>
      <itunes:title>Crypto chameleons and star fraud.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>321</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>On Hacking Humans, Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of N2K's daily space podcast, T-Minus), are once again sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines to help our audience become aware of what is out there. This week we jump right into stories, Maria shares Apple’s new AI feature and how it is unintentionally rewording scam messages to make them appear more legitimate and flagging them as priority notifications, raising concerns about increased susceptibility to scams. Joe has two stories this week, the first focuses on two individuals, including an inmate using a smuggled cellphone, being charged with defrauding a Sarasota woman of $12,000 in a jury duty scam involving spoofed law enforcement identities and Bitcoin transfers, with authorities urging vigilance against such schemes. Joe's second story is on a LinkedIn job interview turned hacking attempt when a technical challenge contained obfuscated code designed to gather crypto wallet information from the user's computer; the scam highlights the importance of carefully reviewing code and using secure environments like virtual machines during such evaluations. Finally Dave has the story on a prolific voice phishing crew manipulating legitimate Apple and Google services to deceive victims, leveraging advanced phishing kits, social engineering tactics, and automated tools like "autodoxers" to target cryptocurrency holders and high-value individuals for significant financial theft. Our catch of the day comes from listener Keefe, who shares a voicemail from one suspicious sounding Walmart voice. 
Resources and links to stories: 

Apple’s new AI feature rewords scam messages to make them look more legit

Apple urged to withdraw 'out of control' AI news alerts

Suspected jury duty scammers arrested for bilking Sarasota woman out of $12K: DOJ

The code challenge scam

A Day in the Life of a Prolific Voice Phishing Crew


You can hear more from the T-Minus space daily show here.

Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@n2k.com.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>On Hacking Humans, <a href="https://www.linkedin.com/in/dave-bittner-27231a4/">Dave Bittner</a>, <a href="https://www.linkedin.com/in/joecarrigan/">Joe Carrigan</a>, and <a href="https://www.linkedin.com/in/varmazis/">Maria Varmazis</a> (also host of N2K's daily space podcast, T-Minus), are once again sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines to help our audience become aware of what is out there. This week we jump right into stories, Maria shares Apple’s new AI feature and how it is unintentionally rewording scam messages to make them appear more legitimate and flagging them as priority notifications, raising concerns about increased susceptibility to scams. Joe has two stories this week, the first focuses on two individuals, including an inmate using a smuggled cellphone, being charged with defrauding a Sarasota woman of $12,000 in a jury duty scam involving spoofed law enforcement identities and Bitcoin transfers, with authorities urging vigilance against such schemes. Joe's second story is on a LinkedIn job interview turned hacking attempt when a technical challenge contained obfuscated code designed to gather crypto wallet information from the user's computer; the scam highlights the importance of carefully reviewing code and using secure environments like virtual machines during such evaluations. Finally Dave has the story on a prolific voice phishing crew manipulating legitimate Apple and Google services to deceive victims, leveraging advanced phishing kits, social engineering tactics, and automated tools like "autodoxers" to target cryptocurrency holders and high-value individuals for significant financial theft. Our catch of the day comes from listener Keefe, who shares a voicemail from one suspicious sounding Walmart voice. </p><p>Resources and links to stories: </p><ul>
<li><a href="https://www.crikey.com.au/2025/01/08/apple-new-artificial-intelligence-rewords-scam-messages-look-legitimate/">Apple’s new AI feature rewords scam messages to make them look more legit</a></li>
<li><a href="https://www.bbc.com/news/articles/cge93de21n0o">Apple urged to withdraw 'out of control' AI news alerts</a></li>
<li><a href="https://www.fox13news.com/news/suspected-jury-duty-scammers-arrested-bilking-sarasota-woman-out-12k-doj">Suspected jury duty scammers arrested for bilking Sarasota woman out of $12K: DOJ</a></li>
<li><a href="https://www.linkedin.com/posts/franco-aguilera-2583685a_the-code-challenge-scam-they-tried-to-hack-activity-7270114822950703107-K3DW/">The code challenge scam</a></li>
<li><a href="https://krebsonsecurity.com/2025/01/a-day-in-the-life-of-a-prolific-voice-phishing-crew/">A Day in the Life of a Prolific Voice Phishing Crew</a></li>
</ul><p><br></p><p>You can hear more from the T-Minus space daily show <a href="https://space.n2k.com/podcasts/t-minus">here</a>.</p><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@n2k.com">hackinghumans@n2k.com</a>. </p>]]>
      </content:encoded>
      <itunes:duration>2512</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[4303ad4a-cdd5-11ef-8599-0708667bf92f]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW3608199149.mp3?updated=1736963801" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>lateral movement (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/66/notes</link>
      <description>Phase of a typical cyber adversary group's attack sequence, after the initial compromise and usually after the group has established a command and control channel, where the group moves through the victims network by compromising as many systems as it can, by looking for the data, it has come to steal or to destroy.</description>
      <pubDate>Tue, 14 Jan 2025 08:00:00 -0000</pubDate>
      <itunes:title>lateral movement (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>66</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Phase of a typical cyber adversary group's attack sequence, after the initial compromise and usually after the group has established a command and control channel, where the group moves through the victims network by compromising as many systems as it can, by looking for the data, it has come to steal or to destroy.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Phase of a typical cyber adversary group's attack sequence, after the initial compromise and usually after the group has established a command and control channel, where the group moves through the victims network by compromising as many systems as it can, by looking for the data, it has come to steal or to destroy.</p>]]>
      </content:encoded>
      <itunes:duration>483</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[6d3365f0-d1eb-11ef-9a4c-07123b55394a]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW1731032687.mp3?updated=1736799924" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Nice to meet you, I'm a scammer.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/320/notes</link>
      <description>On Hacking Humans, Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of N2K's daily space podcast, T-Minus), are once again sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines to help our audience become aware of what is out there. Our hosts discuss and ponder whether or not diamonds are the original cryptocurrency, as well as diving further into Yubikeys for organizations. Maria shares the story of a 66-year-old woman who lost her $2 million retirement savings to a romance scam on Match.com, highlighting the rise in such scams and efforts to pass the Online Dating Safety Act to protect users. Joe's story is on the Madoff Victim Fund's final $131.4 million payout, bringing total recoveries to $4.3 billion for victims of Bernard Madoff's infamous Ponzi scheme, which collapsed during the 2008 financial crisis. Dave's got the story on allegations that the PayPal Honey browser extension not only fails to deliver the best deals but also hijacks affiliate revenue from influencers by replacing their links with its own, sparking backlash and controversy. Our catch of the day comes from Reddit and Dave and Maria do their best impressions yet, as a scammer chats up an unsuspecting victim. 
Resources and links to stories: 

Online dating scammers bilk more money each year. A bipartisan bill seeks to stop them at the source.

Madoff fraud victims get $4.3bn as fund completes payouts

Honey’s deal-hunting browser extension is accused of ripping off customers and YouTubers

You can hear more from the T-Minus space daily show here.

Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@n2k.com.</description>
      <pubDate>Thu, 09 Jan 2025 06:00:00 -0000</pubDate>
      <itunes:title>Nice to meet you, I'm a scammer.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>320</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>On Hacking Humans, Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of N2K's daily space podcast, T-Minus), are once again sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines to help our audience become aware of what is out there. Our hosts discuss and ponder whether or not diamonds are the original cryptocurrency, as well as diving further into Yubikeys for organizations. Maria shares the story of a 66-year-old woman who lost her $2 million retirement savings to a romance scam on Match.com, highlighting the rise in such scams and efforts to pass the Online Dating Safety Act to protect users. Joe's story is on the Madoff Victim Fund's final $131.4 million payout, bringing total recoveries to $4.3 billion for victims of Bernard Madoff's infamous Ponzi scheme, which collapsed during the 2008 financial crisis. Dave's got the story on allegations that the PayPal Honey browser extension not only fails to deliver the best deals but also hijacks affiliate revenue from influencers by replacing their links with its own, sparking backlash and controversy. Our catch of the day comes from Reddit and Dave and Maria do their best impressions yet, as a scammer chats up an unsuspecting victim. 
Resources and links to stories: 

Online dating scammers bilk more money each year. A bipartisan bill seeks to stop them at the source.

Madoff fraud victims get $4.3bn as fund completes payouts

Honey’s deal-hunting browser extension is accused of ripping off customers and YouTubers

You can hear more from the T-Minus space daily show here.

Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@n2k.com.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>On Hacking Humans, <a href="https://www.linkedin.com/in/dave-bittner-27231a4/">Dave Bittner</a>, <a href="https://www.linkedin.com/in/joecarrigan/">Joe Carrigan</a>, and <a href="https://www.linkedin.com/in/varmazis/">Maria Varmazis</a> (also host of N2K's daily space podcast, T-Minus), are once again sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines to help our audience become aware of what is out there. Our hosts discuss and ponder whether or not diamonds are the original cryptocurrency, as well as diving further into Yubikeys for organizations. Maria shares the story of a 66-year-old woman who lost her $2 million retirement savings to a romance scam on Match.com, highlighting the rise in such scams and efforts to pass the Online Dating Safety Act to protect users. Joe's story is on the Madoff Victim Fund's final $131.4 million payout, bringing total recoveries to $4.3 billion for victims of Bernard Madoff's infamous Ponzi scheme, which collapsed during the 2008 financial crisis. Dave's got the story on allegations that the PayPal Honey browser extension not only fails to deliver the best deals but also hijacks affiliate revenue from influencers by replacing their links with its own, sparking backlash and controversy. Our catch of the day comes from Reddit and Dave and Maria do their best impressions yet, as a scammer chats up an unsuspecting victim. </p><p>Resources and links to stories: </p><ul>
<li><a href="https://www.cbsnews.com/news/online-dating-scams-bipartisan-bill-congress/">Online dating scammers bilk more money each year. A bipartisan bill seeks to stop them at the source.</a></li>
<li><a href="https://www.bbc.com/news/articles/c140yjm5znzo">Madoff fraud victims get $4.3bn as fund completes payouts</a></li>
<li><a href="https://www.theverge.com/2024/12/23/24328268/honey-coupon-code-browser-extension-scam-influencers-affiliate-marketing">Honey’s deal-hunting browser extension is accused of ripping off customers and YouTubers</a></li>
</ul><p>You can hear more from the T-Minus space daily show <a href="https://space.n2k.com/podcasts/t-minus">here</a>.</p><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@n2k.com">hackinghumans@n2k.com</a>. </p>]]>
      </content:encoded>
      <itunes:duration>3178</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[42ccd676-cdd5-11ef-8599-dbe8da6839b4]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW4819047322.mp3?updated=1736360217" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>common vulnerabilities and exposures (CVE) (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/65/notes</link>
      <description>A public list sponsored by the US government and designed to uniquely identify, without the need to manually cross- reference, all the known software vulnerabilities in the world. </description>
      <pubDate>Tue, 07 Jan 2025 08:00:00 -0000</pubDate>
      <itunes:title>common vulnerabilities and exposures (CVE) (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>65</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A public list sponsored by the US government and designed to uniquely identify, without the need to manually cross- reference, all the known software vulnerabilities in the world. </itunes:summary>
      <content:encoded>
        <![CDATA[<p>A public list sponsored by the US government and designed to uniquely identify, without the need to manually cross- reference, all the known software vulnerabilities in the world. </p>]]>
      </content:encoded>
      <itunes:duration>433</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[fccf4bea-cc6c-11ef-99d3-ab8072fbae4b]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW6353260542.mp3?updated=1736196217" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Malware metamorphosis: 2024 reflections and 2025 predictions. [Only Malware in the building]</title>
      <link>https://thecyberwire.com/podcasts/only-malware-in-the-building/8/notes</link>
      <description>Welcome in! You’ve entered, Only Malware in the Building. Join us each month to sip tea and solve mysteries about today’s most interesting threats. Your host is Selena Larson, Proofpoint intelligence analyst and host of their podcast DISCARDED. Inspired by the residents of a building in New York’s exclusive upper west side, Selena is joined by N2K Networks Dave Bittner and Rick Howard to uncover the stories behind notable cyberattacks. 
Being a security researcher is a bit like being a detective: you gather clues, analyze the evidence, and consult the experts to solve the cyber puzzle. On this episode, we talk about the year's most impactful cyber trends and incidents—from the Snowflake hack and Operation Endgame to the rise of multi-channel scams and explosive growth in web inject attacks. Ransomware continued to wreak havoc, especially in healthcare, while callback phishing and MFA-focused credential attacks kept defenders on high alert. Join us as we reflect on these challenges and look ahead to what’s next in 2025.</description>
      <pubDate>Tue, 07 Jan 2025 08:00:00 -0000</pubDate>
      <itunes:title>Malware metamorphosis: 2024 reflections and 2025 predictions. [Only Malware in the building]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>8</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Welcome in! You’ve entered, Only Malware in the Building. Join us each month to sip tea and solve mysteries about today’s most interesting threats. Your host is Selena Larson, Proofpoint intelligence analyst and host of their podcast DISCARDED. Inspired by the residents of a building in New York’s exclusive upper west side, Selena is joined by N2K Networks Dave Bittner and Rick Howard to uncover the stories behind notable cyberattacks. 
Being a security researcher is a bit like being a detective: you gather clues, analyze the evidence, and consult the experts to solve the cyber puzzle. On this episode, we talk about the year's most impactful cyber trends and incidents—from the Snowflake hack and Operation Endgame to the rise of multi-channel scams and explosive growth in web inject attacks. Ransomware continued to wreak havoc, especially in healthcare, while callback phishing and MFA-focused credential attacks kept defenders on high alert. Join us as we reflect on these challenges and look ahead to what’s next in 2025.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Welcome in! You’ve entered, Only Malware in the Building. Join us each month to sip tea and solve mysteries about today’s most interesting threats. Your host is <a href="https://www.linkedin.com/in/selenalarson/">Selena Larson</a>, <a href="https://www.proofpoint.com/">Proofpoint</a> intelligence analyst and host of their podcast <a href="https://www.proofpoint.com/us/podcasts/discarded">DISCARDED</a>. Inspired by the residents of a building in New York’s exclusive upper west side, Selena is joined by <a href="https://www.n2k.com/">N2K</a> Networks <a href="https://www.linkedin.com/in/dave-bittner-27231a4/">Dave Bittner</a> and <a href="https://www.linkedin.com/in/rickhoward/">Rick Howard</a> to uncover the stories behind notable cyberattacks. </p><p>Being a security researcher is a bit like being a detective: you gather clues, analyze the evidence, and consult the experts to solve the cyber puzzle. On this episode, we talk about the year's most impactful cyber trends and incidents—from the Snowflake hack and Operation Endgame to the rise of multi-channel scams and explosive growth in web inject attacks. Ransomware continued to wreak havoc, especially in healthcare, while callback phishing and MFA-focused credential attacks kept defenders on high alert. Join us as we reflect on these challenges and look ahead to what’s next in 2025.</p>]]>
      </content:encoded>
      <itunes:duration>3116</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[8c4be80e-cc5f-11ef-9616-ab7c66a627b8]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW9262177273.mp3?updated=1736190363" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The intersection of hackers, scammers, and false collaborations.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/319/notes</link>
      <description>On Hacking Humans, Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of N2K's daily space podcast, T-Minus), are once again sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines to help our audience become aware of what is out there. First off, our hosts share some follow up, Asher wrote in to discuss follow up on the AI granny. Maria's story covers a "new QR code scam" involving unsolicited packages and brushing tactics, where scammers lure victims into scanning malicious QR codes to steal personal and financial information. Joe's story highlights how the FBI and CISA urge Americans to secure their text messages using end-to-end encryption to combat sophisticated hacking campaigns linked to China's government, which target telecom networks and user data. Dave's story highlights how pallet liquidation scams target buyers with offers of discounted merchandise, warning against red flags like unrealistic prices and unverified sellers. Our Catch of the Day comes from Jim, who shares a suspicious email he received offering a collaboration under the guise of a business partnership, which included overly generic language and an unusual sign-off from "Robert De Niro."
Resources and links to stories: 

New warning about ‘brushing’ scam as victims are reported in Colorado

FBI warns Americans to keep their text messages secure: What to know

Pallet liquidation scams and how to recognize them

Mobile Communications Best Practice Guidance


You can hear more from the T-Minus space daily show here.

Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@n2k.com.</description>
      <pubDate>Thu, 02 Jan 2025 06:00:00 -0000</pubDate>
      <itunes:title>The intersection of hackers, scammers, and false collaborations.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>319</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>On Hacking Humans, Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of N2K's daily space podcast, T-Minus), are once again sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines to help our audience become aware of what is out there. First off, our hosts share some follow up, Asher wrote in to discuss follow up on the AI granny. Maria's story covers a "new QR code scam" involving unsolicited packages and brushing tactics, where scammers lure victims into scanning malicious QR codes to steal personal and financial information. Joe's story highlights how the FBI and CISA urge Americans to secure their text messages using end-to-end encryption to combat sophisticated hacking campaigns linked to China's government, which target telecom networks and user data. Dave's story highlights how pallet liquidation scams target buyers with offers of discounted merchandise, warning against red flags like unrealistic prices and unverified sellers. Our Catch of the Day comes from Jim, who shares a suspicious email he received offering a collaboration under the guise of a business partnership, which included overly generic language and an unusual sign-off from "Robert De Niro."
Resources and links to stories: 

New warning about ‘brushing’ scam as victims are reported in Colorado

FBI warns Americans to keep their text messages secure: What to know

Pallet liquidation scams and how to recognize them

Mobile Communications Best Practice Guidance


You can hear more from the T-Minus space daily show here.

Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@n2k.com.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>On Hacking Humans, <a href="https://www.linkedin.com/in/dave-bittner-27231a4/">Dave Bittner</a>, <a href="https://www.linkedin.com/in/joecarrigan/">Joe Carrigan</a>, and <a href="https://www.linkedin.com/in/varmazis/">Maria Varmazis</a> (also host of N2K's daily space podcast, T-Minus), are once again sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines to help our audience become aware of what is out there. First off, our hosts share some follow up, Asher wrote in to discuss follow up on the AI granny. Maria's story covers a "new QR code scam" involving unsolicited packages and brushing tactics, where scammers lure victims into scanning malicious QR codes to steal personal and financial information. Joe's story highlights how the FBI and CISA urge Americans to secure their text messages using end-to-end encryption to combat sophisticated hacking campaigns linked to China's government, which target telecom networks and user data. Dave's story highlights how pallet liquidation scams target buyers with offers of discounted merchandise, warning against red flags like unrealistic prices and unverified sellers. Our Catch of the Day comes from Jim, who shares a suspicious email he received offering a collaboration under the guise of a business partnership, which included overly generic language and an unusual sign-off from "Robert De Niro."</p><p>Resources and links to stories: </p><ul>
<li><a href="https://www.kktv.com/2024/12/17/new-warning-about-brushing-scam-victims-are-reported-colorado/">New warning about ‘brushing’ scam as victims are reported in Colorado</a></li>
<li><a href="https://www.npr.org/2024/12/17/nx-s1-5223490/text-messaging-security-fbi-chinese-hackers-security-encryption">FBI warns Americans to keep their text messages secure: What to know</a></li>
<li><a href="https://www.malwarebytes.com/blog/news/2024/12/pallet-liquidation-scams-and-how-to-recognize-them">Pallet liquidation scams and how to recognize them</a></li>
<li><a href="https://www.cisa.gov/sites/default/files/2024-12/guidance-mobile-communications-best-practices.pdf">Mobile Communications Best Practice Guidance</a></li>
</ul><p><br></p><p>You can hear more from the T-Minus space daily show <a href="https://space.n2k.com/podcasts/t-minus">here</a>.</p><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@n2k.com">hackinghumans@n2k.com</a>. </p>]]>
      </content:encoded>
      <itunes:duration>2530</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[fe0e252a-ac02-11ee-b598-8b8e5a93f503]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW2480896835.mp3?updated=1734979282" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>dead-box forensics (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/64/notes </link>
      <description>A forensic technique where practitioners capture an entire image of a system and analyze the contents offline.</description>
      <pubDate>Tue, 31 Dec 2024 08:00:00 -0000</pubDate>
      <itunes:title>dead-box forensics (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>64</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/6d6f162c-c14c-11ef-9380-a310d2b56ee9/image/441b0ca2db080b93b935568d381ce462.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A forensic technique where practitioners capture an entire image of a system and analyze the contents offline.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A forensic technique where practitioners capture an entire image of a system and analyze the contents offline.</p>]]>
      </content:encoded>
      <itunes:duration>376</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[6d6f162c-c14c-11ef-9380-a310d2b56ee9]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW4758358841.mp3?updated=1734973562" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>New tools, old problems.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/280/notes</link>
      <description>Please enjoy this encore episode of Hacking Humans. 
This week we are joined by Maria Varmazis, host of the N2K daily space show, T-Minus. She discusses how AI is being used as a possible solution to one of the oldest scams in the book in Japan. Dave and Joe share some listener follow up, one from listener Alan and one from Clinton, who both write in about a recent episode and they share their thoughts on the story of Charlotte Cowles being scammed out of $50,000. Dave shares a story about calendar meeting links, from Calendly, a popular application for scheduling appointments and meetings, being used to spread mac malware. Joe shares write ins from several listeners, some writing in to share experiences with scams they have come across, others writing to warn others on scams they have seen used in the real world. Our catch of the day comes from Zach with an oddity, getting scammed by mail! 
Please take a moment to fill out an audience survey! Let us know how we are doing! 
Links to the stories:

Japan’s new ATMs automatically play anti-fraud videos to people talking on mobile phones【Video】

Fraudsters in Japan use foreigners' bank accounts in cash grab

【警察庁】ATMで携帯電話…AIで検知し警告表示 特殊詐欺の被害増受け

Calendar Meeting Links Used to Spread Mac Malware

IDcare


You can hear more from the T-Minus space daily show here.
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com.</description>
      <pubDate>Thu, 26 Dec 2024 06:00:00 -0000</pubDate>
      <itunes:title>New tools, old problems.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>280</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Please enjoy this encore episode of Hacking Humans. 
This week we are joined by Maria Varmazis, host of the N2K daily space show, T-Minus. She discusses how AI is being used as a possible solution to one of the oldest scams in the book in Japan. Dave and Joe share some listener follow up, one from listener Alan and one from Clinton, who both write in about a recent episode and they share their thoughts on the story of Charlotte Cowles being scammed out of $50,000. Dave shares a story about calendar meeting links, from Calendly, a popular application for scheduling appointments and meetings, being used to spread mac malware. Joe shares write ins from several listeners, some writing in to share experiences with scams they have come across, others writing to warn others on scams they have seen used in the real world. Our catch of the day comes from Zach with an oddity, getting scammed by mail! 
Please take a moment to fill out an audience survey! Let us know how we are doing! 
Links to the stories:

Japan’s new ATMs automatically play anti-fraud videos to people talking on mobile phones【Video】

Fraudsters in Japan use foreigners' bank accounts in cash grab

【警察庁】ATMで携帯電話…AIで検知し警告表示 特殊詐欺の被害増受け

Calendar Meeting Links Used to Spread Mac Malware

IDcare


You can hear more from the T-Minus space daily show here.
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore episode of Hacking Humans. </p><p>This week we are joined by Maria Varmazis, host of the N2K daily space show, T-Minus. She discusses how AI is being used as a possible solution to one of the oldest scams in the book in Japan. Dave and Joe share some listener follow up, one from listener Alan and one from Clinton, who both write in about a recent episode and they share their thoughts on the story of Charlotte Cowles being scammed out of $50,000. Dave shares a story about calendar meeting links, from Calendly, a popular application for scheduling appointments and meetings, being used to spread mac malware. Joe shares write ins from several listeners, some writing in to share experiences with scams they have come across, others writing to warn others on scams they have seen used in the real world. Our catch of the day comes from Zach with an oddity, getting scammed by mail! </p><p><em>Please take a moment to fill out an </em><a href="https://www.surveymonkey.com/r/cwcv-listener"><em>audience survey</em></a><em>! Let us know how we are doing! </em></p><p>Links to the stories:</p><ul>
<li><a href="https://soranews24.com/2024/02/25/atms-that-automatically-play-anti-fraud-videos-to-people-talking-on-mobile-phones-in-development/">Japan’s new ATMs automatically play anti-fraud videos to people talking on mobile phones【Video】</a></li>
<li><a href="https://www3.nhk.or.jp/nhkworld/en/news/backstories/2860/">Fraudsters in Japan use foreigners' bank accounts in cash grab</a></li>
<li><a href="https://www.youtube.com/watch?v=F-QuIIBI6OY&amp;t=44s">【警察庁】ATMで携帯電話…AIで検知し警告表示 特殊詐欺の被害増受け</a></li>
<li><a href="https://krebsonsecurity.com/2024/02/calendar-meeting-links-used-to-spread-mac-malware/">Calendar Meeting Links Used to Spread Mac Malware</a></li>
<li><a href="https://www.idcare.org/">IDcare</a></li>
</ul><p><br></p><p>You can hear more from the T-Minus space daily show here.</p><p>Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com.</p>]]>
      </content:encoded>
      <itunes:duration>2948</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[7516c4c4-bcb0-11ef-ac24-17126be647e7]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW5421991922.mp3?updated=1734466593" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>cybersecurity maturity model certification (CMMC) (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/63/notes</link>
      <description>Please enjoy this encore episode of Word Notes. 
A supply chain cybersecurity accreditation standard designed for the protection of controlled unclassified information that the U.S. Department of Defense, or DoD, will require for all contract bids by October, 2025. </description>
      <pubDate>Tue, 24 Dec 2024 06:00:00 -0000</pubDate>
      <itunes:title>cybersecurity maturity model certification (CMMC) (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>63</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Please enjoy this encore episode of Word Notes. 
A supply chain cybersecurity accreditation standard designed for the protection of controlled unclassified information that the U.S. Department of Defense, or DoD, will require for all contract bids by October, 2025. </itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore episode of Word Notes. </p><p>A supply chain cybersecurity accreditation standard designed for the protection of controlled unclassified information that the U.S. Department of Defense, or DoD, will require for all contract bids by October, 2025. </p>]]>
      </content:encoded>
      <itunes:duration>417</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[674a7e2c-b8bd-11ef-910e-876a78df7be5]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW3517813097.mp3?updated=1734031358" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Gold bars and bold lies.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/318/notes</link>
      <description>On Hacking Humans, Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of N2K's daily space podcast, T-Minus), are once again sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines to help our audience become aware of what is out there. First we start off with some follow up, our hosts share some more information on VIN swapping, and a clarification on bank participation in FinCEN. Maria shares a telling tale about a Bethesda couple loosing $367,000 in gold bars to a sophisticated scam involving fake officials and elaborate deceptions, but a police sting led to the arrest of a suspect, highlighting a growing nationwide trend of elderly victims targeted by gold bar fraud. Joe's story comes from KnowBe4 and is on DavidB, their VP of Asia Pacific, thwarting a sophisticated social engineering attack via WhatsApp by recognizing inconsistencies in the impersonator’s behavior and verifying directly with the colleague they claimed to be. Dave's story comes from the FBI on how criminals are exploiting generative AI to enhance fraud schemes, including using AI-generated text, images, audio, and video to create convincing social engineering attacks, phishing scams, and identity fraud, while offering tips to protect against these threats. Our catch of the day comes from a listener who received an urgent email from someone claiming to be an FBI agent with a rather dramatic tale about intercepted consignment boxes, missing documents, and a ticking clock—but let's just say this "agent" might need some better training in both law enforcement and grammar.
Resources and links to stories: 

“VIN swap scam costs Las Vegas man $50K, new truck"

FinCEN

Gold bar scammers claimed hackers could fund Russian missiles, police say

Real Social Engineering Attack on KnowBe4 Employee Foiled

Criminals Use Generative Artificial Intelligence to Facilitate Financial Fraud


You can hear more from the T-Minus space daily show here.

Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@n2k.com.</description>
      <pubDate>Thu, 19 Dec 2024 06:00:00 -0000</pubDate>
      <itunes:title>Gold bars and bold lies.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>318</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>On Hacking Humans, Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of N2K's daily space podcast, T-Minus), are once again sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines to help our audience become aware of what is out there. First we start off with some follow up, our hosts share some more information on VIN swapping, and a clarification on bank participation in FinCEN. Maria shares a telling tale about a Bethesda couple loosing $367,000 in gold bars to a sophisticated scam involving fake officials and elaborate deceptions, but a police sting led to the arrest of a suspect, highlighting a growing nationwide trend of elderly victims targeted by gold bar fraud. Joe's story comes from KnowBe4 and is on DavidB, their VP of Asia Pacific, thwarting a sophisticated social engineering attack via WhatsApp by recognizing inconsistencies in the impersonator’s behavior and verifying directly with the colleague they claimed to be. Dave's story comes from the FBI on how criminals are exploiting generative AI to enhance fraud schemes, including using AI-generated text, images, audio, and video to create convincing social engineering attacks, phishing scams, and identity fraud, while offering tips to protect against these threats. Our catch of the day comes from a listener who received an urgent email from someone claiming to be an FBI agent with a rather dramatic tale about intercepted consignment boxes, missing documents, and a ticking clock—but let's just say this "agent" might need some better training in both law enforcement and grammar.
Resources and links to stories: 

“VIN swap scam costs Las Vegas man $50K, new truck"

FinCEN

Gold bar scammers claimed hackers could fund Russian missiles, police say

Real Social Engineering Attack on KnowBe4 Employee Foiled

Criminals Use Generative Artificial Intelligence to Facilitate Financial Fraud


You can hear more from the T-Minus space daily show here.

Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@n2k.com.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>On Hacking Humans, <a href="https://www.linkedin.com/in/dave-bittner-27231a4/">Dave Bittner</a>, <a href="https://www.linkedin.com/in/joecarrigan/">Joe Carrigan</a>, and <a href="https://www.linkedin.com/in/varmazis/">Maria Varmazis</a> (also host of N2K's daily space podcast, T-Minus), are once again sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines to help our audience become aware of what is out there. First we start off with some follow up, our hosts share some more information on VIN swapping, and a clarification on bank participation in FinCEN. Maria shares a telling tale about a Bethesda couple loosing $367,000 in gold bars to a sophisticated scam involving fake officials and elaborate deceptions, but a police sting led to the arrest of a suspect, highlighting a growing nationwide trend of elderly victims targeted by gold bar fraud. Joe's story comes from KnowBe4 and is on DavidB, their VP of Asia Pacific, thwarting a sophisticated social engineering attack via WhatsApp by recognizing inconsistencies in the impersonator’s behavior and verifying directly with the colleague they claimed to be. Dave's story comes from the FBI on how criminals are exploiting generative AI to enhance fraud schemes, including using AI-generated text, images, audio, and video to create convincing social engineering attacks, phishing scams, and identity fraud, while offering tips to protect against these threats. Our catch of the day comes from a listener who received an urgent email from someone claiming to be an FBI agent with a rather dramatic tale about intercepted consignment boxes, missing documents, and a ticking clock—but let's just say this "agent" might need some better training in both law enforcement and grammar.</p><p>Resources and links to stories: </p><ul>
<li><a href="https://www.8newsnow.com/news/local-news/vin-swap-scam-costs-las-vegas-man-50k-new-truck/">“VIN swap scam costs Las Vegas man $50K, new truck"</a></li>
<li><a href="https://infosec.exchange/@lippard/113602552863611173">FinCEN</a></li>
<li><a href="https://www.washingtonpost.com/dc-md-va/2024/12/09/gold-bar-scam-maryland-russia/">Gold bar scammers claimed hackers could fund Russian missiles, police say</a></li>
<li><a href="https://blog.knowbe4.com/real-social-engineering-attack-on-knowbe4-employee-foiled">Real Social Engineering Attack on KnowBe4 Employee Foiled</a></li>
<li><a href="https://www.ic3.gov/PSA/2024/PSA241203">Criminals Use Generative Artificial Intelligence to Facilitate Financial Fraud</a></li>
</ul><p><br></p><p>You can hear more from the T-Minus space daily show <a href="https://space.n2k.com/podcasts/t-minus">here</a>.</p><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@n2k.com">hackinghumans@n2k.com</a>. </p>]]>
      </content:encoded>
      <itunes:duration>2757</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[fdadc36a-ac02-11ee-b598-4bd1f508b903]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW9668130196.mp3?updated=1734545293" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>incident response (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/62/notes</link>
      <description>Please enjoy this encore episode of Word Notes. 
A collection of people, process, and technology that provides an organization the ability to detect and respond to cyber attacks.</description>
      <pubDate>Tue, 17 Dec 2024 08:00:00 -0000</pubDate>
      <itunes:title>incident response (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>62</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Please enjoy this encore episode of Word Notes. 
A collection of people, process, and technology that provides an organization the ability to detect and respond to cyber attacks.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore episode of Word Notes. </p><p>A collection of people, process, and technology that provides an organization the ability to detect and respond to cyber attacks.</p>]]>
      </content:encoded>
      <itunes:duration>470</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[908e1d9e-b8bc-11ef-ba56-9b93f697c3fe]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW9592475331.mp3?updated=1734031152" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Silent push, loud consequences.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/317/notes</link>
      <description>On Hacking Humans, Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of N2K's daily space podcast, T-Minus), are once again sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines to help our audience become aware of what is out there. This week, Maria shares two stories this week, the first is from "PayPal" saying they are owed over $200. The second comes from LinkedIn where a gentleman shares the terrifying story of losing everything all because of a scam. Joe's story is on text message scams where strangers pretend to know you, building trust over time to lure victims into schemes like cryptocurrency fraud; he advises ignoring unknown messages, blocking suspicious numbers, avoiding links, and protecting personal information. Dave's story follows Silent Push Threat Analysts tracking "Payroll Pirates," a group leveraging phishing campaigns targeting HR systems like Workday to redirect payroll funds by using search ads, spoofed websites, and credential harvesting, as they alert organizations and share threat intelligence to counter these sophisticated attacks. Our catch of the day comes from a phishing scam email claiming to offer a $1.75 million compensation fund via the "United Bank for Africa," requiring victims to share personal and banking details under the guise of an IMF directive.
Resources and links to stories: 

“Wrong Number” Text Scams on the Rise

Hunting Payroll Pirates: Silent Push Tracks HR Redirect Phishing Scam


You can hear more from the T-Minus space daily show here.

Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@n2k.com.</description>
      <pubDate>Thu, 12 Dec 2024 06:00:00 -0000</pubDate>
      <itunes:title>Silent push, loud consequences.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>317</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>On Hacking Humans, Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of N2K's daily space podcast, T-Minus), are once again sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines to help our audience become aware of what is out there. This week, Maria shares two stories this week, the first is from "PayPal" saying they are owed over $200. The second comes from LinkedIn where a gentleman shares the terrifying story of losing everything all because of a scam. Joe's story is on text message scams where strangers pretend to know you, building trust over time to lure victims into schemes like cryptocurrency fraud; he advises ignoring unknown messages, blocking suspicious numbers, avoiding links, and protecting personal information. Dave's story follows Silent Push Threat Analysts tracking "Payroll Pirates," a group leveraging phishing campaigns targeting HR systems like Workday to redirect payroll funds by using search ads, spoofed websites, and credential harvesting, as they alert organizations and share threat intelligence to counter these sophisticated attacks. Our catch of the day comes from a phishing scam email claiming to offer a $1.75 million compensation fund via the "United Bank for Africa," requiring victims to share personal and banking details under the guise of an IMF directive.
Resources and links to stories: 

“Wrong Number” Text Scams on the Rise

Hunting Payroll Pirates: Silent Push Tracks HR Redirect Phishing Scam


You can hear more from the T-Minus space daily show here.

Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@n2k.com.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>On Hacking Humans, <a href="https://www.linkedin.com/in/dave-bittner-27231a4/">Dave Bittner</a>, <a href="https://www.linkedin.com/in/joecarrigan/">Joe Carrigan</a>, and <a href="https://www.linkedin.com/in/varmazis/">Maria Varmazis</a> (also host of N2K's daily space podcast, T-Minus), are once again sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines to help our audience become aware of what is out there. This week, Maria shares two stories this week, the first is from "PayPal" saying they are owed over $200. The second comes from LinkedIn where a gentleman shares the terrifying story of losing everything all because of a scam. Joe's story is on text message scams where strangers pretend to know you, building trust over time to lure victims into schemes like cryptocurrency fraud; he advises ignoring unknown messages, blocking suspicious numbers, avoiding links, and protecting personal information. Dave's story follows Silent Push Threat Analysts tracking "Payroll Pirates," a group leveraging phishing campaigns targeting HR systems like Workday to redirect payroll funds by using search ads, spoofed websites, and credential harvesting, as they alert organizations and share threat intelligence to counter these sophisticated attacks. Our catch of the day comes from a phishing scam email claiming to offer a $1.75 million compensation fund via the "United Bank for Africa," requiring victims to share personal and banking details under the guise of an IMF directive.</p><p>Resources and links to stories: </p><ul>
<li><a href="https://www.themerrimack.com/2024/10/17/wrong-number-text-scams-on-the-rise/">“Wrong Number” Text Scams on the Rise</a></li>
<li><a href="https://www.silentpush.com/blog/payroll-pirates/">Hunting Payroll Pirates: Silent Push Tracks HR Redirect Phishing Scam</a></li>
</ul><p><br></p><p>You can hear more from the T-Minus space daily show <a href="https://space.n2k.com/podcasts/t-minus">here</a>.</p><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@n2k.com">hackinghumans@n2k.com</a>. </p>]]>
      </content:encoded>
      <itunes:duration>2688</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[fd7e32ee-ac02-11ee-b598-1f3aff751a5b]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW7633971840.mp3?updated=1733935703" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>script kiddies (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/61/notes</link>
      <description>Please enjoy this encore episode of Word Notes.
Cybercriminals who lack the expertise to write their own programs use existing scripts, code, or tools authored by other more skilled hackers. </description>
      <pubDate>Tue, 10 Dec 2024 08:00:00 -0000</pubDate>
      <itunes:title>script kiddies (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>61</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Please enjoy this encore episode of Word Notes.
Cybercriminals who lack the expertise to write their own programs use existing scripts, code, or tools authored by other more skilled hackers. </itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore episode of Word Notes.</p><p>Cybercriminals who lack the expertise to write their own programs use existing scripts, code, or tools authored by other more skilled hackers. </p>]]>
      </content:encoded>
      <itunes:duration>338</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[7990888e-b655-11ef-82f4-13b13e19ef9b]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW9832799503.mp3?updated=1733767424" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Fraud's festive frenzy.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/316/notes</link>
      <description>On Hacking Humans, Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of N2K's daily space podcast, T-Minus), are once again sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines to help our audience become aware of what is out there. This week, our hosts dive into some follow up from listener Will. who writes in about the Financial Crimes Enforcement Network. They also share after an anonymous listener writes in with a suggestion on filtering scam emails using the DocuSign API. Maria follows the story of how Black Friday is increasingly being dubbed "Black Fraud Day," as criminals exploit the festive shopping frenzy to scam eager bargain hunters, often using AI to create convincing fraud schemes. Joe has two stories this week. The first one is on scammers exploiting financially distressed individuals by posing as the "Bankruptcy Fraud Watchdog Group," threatening bankruptcy filers with false accusations and fines payable in Bitcoin, while warning them against contacting their attorneys. The second story explores the rise of deepfake scams in the U.S., with criminals using AI-generated videos of celebrities like Elon Musk to deceive victims into fraudulent cryptocurrency investments, contributing to over $12 billion in annual fraud losses. Finally, Dave share's a story on a new wave of deepfake scams, where AI-generated videos of Elon Musk trick unsuspecting victims into investing large sums, contributing to billions in fraud losses. Our catch of the day comes from Raul, who shares a scammy text message sent to his mother, sharing his efforts to educate her on spotting fraudulent messages. 
Resources and links to stories: 

Black Friday turning into Black Fraud Day, says UK cybersecurity chief

U.S. Trustee Program Warns Consumers of Bankruptcy Fraud Alert Scam

Deepfakes of Elon Musk are contributing to billions of dollars in fraud losses in the U.S.

Inside the Mind of Thru-Hiking’s Most Devious Con Man


You can hear more from the T-Minus space daily show here.

Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@n2k.com.</description>
      <pubDate>Thu, 05 Dec 2024 06:00:00 -0000</pubDate>
      <itunes:title>Fraud's festive frenzy.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>316</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>On Hacking Humans, Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of N2K's daily space podcast, T-Minus), are once again sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines to help our audience become aware of what is out there. This week, our hosts dive into some follow up from listener Will. who writes in about the Financial Crimes Enforcement Network. They also share after an anonymous listener writes in with a suggestion on filtering scam emails using the DocuSign API. Maria follows the story of how Black Friday is increasingly being dubbed "Black Fraud Day," as criminals exploit the festive shopping frenzy to scam eager bargain hunters, often using AI to create convincing fraud schemes. Joe has two stories this week. The first one is on scammers exploiting financially distressed individuals by posing as the "Bankruptcy Fraud Watchdog Group," threatening bankruptcy filers with false accusations and fines payable in Bitcoin, while warning them against contacting their attorneys. The second story explores the rise of deepfake scams in the U.S., with criminals using AI-generated videos of celebrities like Elon Musk to deceive victims into fraudulent cryptocurrency investments, contributing to over $12 billion in annual fraud losses. Finally, Dave share's a story on a new wave of deepfake scams, where AI-generated videos of Elon Musk trick unsuspecting victims into investing large sums, contributing to billions in fraud losses. Our catch of the day comes from Raul, who shares a scammy text message sent to his mother, sharing his efforts to educate her on spotting fraudulent messages. 
Resources and links to stories: 

Black Friday turning into Black Fraud Day, says UK cybersecurity chief

U.S. Trustee Program Warns Consumers of Bankruptcy Fraud Alert Scam

Deepfakes of Elon Musk are contributing to billions of dollars in fraud losses in the U.S.

Inside the Mind of Thru-Hiking’s Most Devious Con Man


You can hear more from the T-Minus space daily show here.

Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@n2k.com.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>On Hacking Humans, <a href="https://www.linkedin.com/in/dave-bittner-27231a4/">Dave Bittner</a>, <a href="https://www.linkedin.com/in/joecarrigan/">Joe Carrigan</a>, and <a href="https://www.linkedin.com/in/varmazis/">Maria Varmazis</a> (also host of N2K's daily space podcast, T-Minus), are once again sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines to help our audience become aware of what is out there. This week, our hosts dive into some follow up from listener Will. who writes in about the Financial Crimes Enforcement Network. They also share after an anonymous listener writes in with a suggestion on filtering scam emails using the DocuSign API. Maria follows the story of how Black Friday is increasingly being dubbed "Black Fraud Day," as criminals exploit the festive shopping frenzy to scam eager bargain hunters, often using AI to create convincing fraud schemes. Joe has two stories this week. The first one is on scammers exploiting financially distressed individuals by posing as the "Bankruptcy Fraud Watchdog Group," threatening bankruptcy filers with false accusations and fines payable in Bitcoin, while warning them against contacting their attorneys. The second story explores the rise of deepfake scams in the U.S., with criminals using AI-generated videos of celebrities like Elon Musk to deceive victims into fraudulent cryptocurrency investments, contributing to over $12 billion in annual fraud losses. Finally, Dave share's a story on a new wave of deepfake scams, where AI-generated videos of Elon Musk trick unsuspecting victims into investing large sums, contributing to billions in fraud losses. Our catch of the day comes from Raul, who shares a scammy text message sent to his mother, sharing his efforts to educate her on spotting fraudulent messages. </p><p>Resources and links to stories: </p><ul>
<li><a href="https://www.theguardian.com/business/2024/nov/18/black-friday-turning-into-black-day-says-uk-cybersecurity-chief">Black Friday turning into Black Fraud Day, says UK cybersecurity chief</a></li>
<li><a href="https://www.justice.gov/ust/blog/us-trustee-program-warns-consumers-bankruptcy-fraud-alert-scam">U.S. Trustee Program Warns Consumers of Bankruptcy Fraud Alert Scam</a></li>
<li><a href="https://www.cbsnews.com/texas/news/deepfakes-ai-fraud-elon-musk/">Deepfakes of Elon Musk are contributing to billions of dollars in fraud losses in the U.S.</a></li>
<li><a href="https://www.outsideonline.com/outdoor-adventure/hiking-and-backpacking/appalachian-hustle/">Inside the Mind of Thru-Hiking’s Most Devious Con Man</a></li>
</ul><p><br></p><p>You can hear more from the T-Minus space daily show <a href="https://space.n2k.com/podcasts/t-minus">here</a>.</p><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@n2k.com">hackinghumans@n2k.com</a>. </p>]]>
      </content:encoded>
      <itunes:duration>2865</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[fd4e556a-ac02-11ee-b598-8b20cdb9cb2b]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW3754164372.mp3?updated=1733330305" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>A cyber carol. [Only Malware in the Building]</title>
      <link>https://thecyberwire.com/podcasts/only-malware-in-the-building/7/notes</link>
      <description>Welcome in! You’ve entered, Only Malware in the Building. Grab your eggnog and don your coziest holiday sweater as we sleuth our way through cyber mysteries with a festive twist! Your host is Selena Larson, Proofpoint intelligence analyst and host of their podcast DISCARDED. Inspired by the residents of a building in New York’s exclusive upper west side, Selena is joined by N2K Networks Dave Bittner and Rick Howard to uncover the stories behind notable cyberattacks. Being a security researcher is a bit like being a detective: you gather clues, analyze the evidence, and consult the experts to solve the cyber puzzle. On this episode, our cyber ghosts delve into the past, present, and future of some of the season’s most pressing threats: two-factor authentication (2FA), social engineering scams, and the return to consumer-targeted attacks. 
Together, Rick, Dave, and Selena deliver a ghostly—but insightful—message about the state of cybersecurity, past, present, and future. Can their advice save your holiday season from digital disaster? Tune in and find out.
May your holidays be merry, bright, and free of cyber fright!</description>
      <pubDate>Tue, 03 Dec 2024 08:00:00 -0000</pubDate>
      <itunes:title>A cyber carol. [Only Malware in the Building]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>7</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/2f670dc4-b186-11ef-b5ba-fb8083e1aa03/image/d9f0cdb0dcdd515f0dfd92da4cc68fb2.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Welcome in! You’ve entered, Only Malware in the Building. Grab your eggnog and don your coziest holiday sweater as we sleuth our way through cyber mysteries with a festive twist! Your host is Selena Larson, Proofpoint intelligence analyst and host of their podcast DISCARDED. Inspired by the residents of a building in New York’s exclusive upper west side, Selena is joined by N2K Networks Dave Bittner and Rick Howard to uncover the stories behind notable cyberattacks. Being a security researcher is a bit like being a detective: you gather clues, analyze the evidence, and consult the experts to solve the cyber puzzle. On this episode, our cyber ghosts delve into the past, present, and future of some of the season’s most pressing threats: two-factor authentication (2FA), social engineering scams, and the return to consumer-targeted attacks. 
Together, Rick, Dave, and Selena deliver a ghostly—but insightful—message about the state of cybersecurity, past, present, and future. Can their advice save your holiday season from digital disaster? Tune in and find out.
May your holidays be merry, bright, and free of cyber fright!</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Welcome in! You’ve entered, Only Malware in the Building. Grab your eggnog and don your coziest holiday sweater as we sleuth our way through cyber mysteries with a festive twist! Your host is <a href="https://www.linkedin.com/in/selenalarson/">Selena Larson</a>, <a href="https://www.proofpoint.com/">Proofpoint</a> intelligence analyst and host of their podcast <a href="https://www.proofpoint.com/us/podcasts/discarded">DISCARDED</a>. Inspired by the residents of a building in New York’s exclusive upper west side, Selena is joined by <a href="https://www.n2k.com/">N2K</a> Networks <a href="https://www.linkedin.com/in/dave-bittner-27231a4/">Dave Bittner</a> and <a href="https://www.linkedin.com/in/rickhoward/">Rick Howard</a> to uncover the stories behind notable cyberattacks. Being a security researcher is a bit like being a detective: you gather clues, analyze the evidence, and consult the experts to solve the cyber puzzle. On this episode, our cyber ghosts delve into the past, present, and future of some of the season’s most pressing threats: two-factor authentication (2FA), social engineering scams, and the return to consumer-targeted attacks. </p><p>Together, Rick, Dave, and Selena deliver a ghostly—but insightful—message about the state of cybersecurity, past, present, and future. Can their advice save your holiday season from digital disaster? Tune in and find out.</p><p>May your holidays be merry, bright, and free of cyber fright!</p>]]>
      </content:encoded>
      <itunes:duration>2962</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[2f670dc4-b186-11ef-b5ba-fb8083e1aa03]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW1796357855.mp3?updated=1733238276" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>sandbox (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/60/notes</link>
      <description>Please enjoy this encore episode of Word Notes.
An isolated and controlled set of resources that mimics real world environments and used to safely execute suspicious code without infecting or causing damage to the host machine, operating system, or network.</description>
      <pubDate>Tue, 03 Dec 2024 08:00:00 -0000</pubDate>
      <itunes:title>sandbox (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>60</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/1afacd64-b0d0-11ef-85fc-1f96ac9aba5c/image/441b0ca2db080b93b935568d381ce462.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Please enjoy this encore episode of Word Notes.
An isolated and controlled set of resources that mimics real world environments and used to safely execute suspicious code without infecting or causing damage to the host machine, operating system, or network.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore episode of Word Notes.</p><p>An isolated and controlled set of resources that mimics real world environments and used to safely execute suspicious code without infecting or causing damage to the host machine, operating system, or network.</p>]]>
      </content:encoded>
      <itunes:duration>385</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[1afacd64-b0d0-11ef-85fc-1f96ac9aba5c]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW2107679304.mp3?updated=1733159705" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Scamming just isn't what it used to be. </title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/276/notes</link>
      <description>Please enjoy this encore of Hacking Humans: 
This week, we are joined by host of N2K's T-Minus Space Daily podcast, Maria Varmazis, she sits down with Joe and Dave to discuss sextorion materials that were found on popular social media apps such as, TikTok, Instagram, Snapchat and YouTube. Joe and Dave share quite a bit of follow up, Joe starts with an anonymous listener writing in sharing their story on gift card scams. Dave shares another anonymous listeners comments, sharing about what they think of Andy Cohen going public on how he got scammed. Finally, Joe and Dave hear from a listener by the name of "The Computrix," who says they need to defend Walmart. Dave share's his story about the most common phishing email themes of 2023. Joe's got the story of ransomware not being paid the same way as it used to be by companies, and share the two different angles on that. Our catch of the day comes from listener William, who writes in with a phishing scam that caught his eye. 
Links to the stories:

Sextortion training materials found on TikTok, Instagram, Snapchat and YouTube, according to new report

Most Common Phishing Email Themes of 2023

Companies aren’t paying ransoms like they used to

New Ransomware Reporting Requirements Kick in as Victims Increasingly Avoid Paying

FBI: Scammers Are Sending Couriers to Collect Cash From Victims


You can hear more from the T-Minus space daily show here.
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com.</description>
      <pubDate>Thu, 28 Nov 2024 06:00:00 -0000</pubDate>
      <itunes:title>Scamming just isn't what it used to be. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>276</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Please enjoy this encore of Hacking Humans: 
This week, we are joined by host of N2K's T-Minus Space Daily podcast, Maria Varmazis, she sits down with Joe and Dave to discuss sextorion materials that were found on popular social media apps such as, TikTok, Instagram, Snapchat and YouTube. Joe and Dave share quite a bit of follow up, Joe starts with an anonymous listener writing in sharing their story on gift card scams. Dave shares another anonymous listeners comments, sharing about what they think of Andy Cohen going public on how he got scammed. Finally, Joe and Dave hear from a listener by the name of "The Computrix," who says they need to defend Walmart. Dave share's his story about the most common phishing email themes of 2023. Joe's got the story of ransomware not being paid the same way as it used to be by companies, and share the two different angles on that. Our catch of the day comes from listener William, who writes in with a phishing scam that caught his eye. 
Links to the stories:

Sextortion training materials found on TikTok, Instagram, Snapchat and YouTube, according to new report

Most Common Phishing Email Themes of 2023

Companies aren’t paying ransoms like they used to

New Ransomware Reporting Requirements Kick in as Victims Increasingly Avoid Paying

FBI: Scammers Are Sending Couriers to Collect Cash From Victims


You can hear more from the T-Minus space daily show here.
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore of Hacking Humans: </p><p>This week, we are joined by host of N2K's T-Minus Space Daily podcast, Maria Varmazis, she sits down with Joe and Dave to discuss sextorion materials that were found on popular social media apps such as, TikTok, Instagram, Snapchat and YouTube. Joe and Dave share quite a bit of follow up, Joe starts with an anonymous listener writing in sharing their story on gift card scams. Dave shares another anonymous listeners comments, sharing about what they think of Andy Cohen going public on how he got scammed. Finally, Joe and Dave hear from a listener by the name of "The Computrix," who says they need to defend Walmart. Dave share's his story about the most common phishing email themes of 2023. Joe's got the story of ransomware not being paid the same way as it used to be by companies, and share the two different angles on that. Our catch of the day comes from listener William, who writes in with a phishing scam that caught his eye. </p><p>Links to the stories:</p><ul>
<li><a href="https://www.nbcnews.com/tech/internet/sextortion-yahoo-boys-snapchat-tiktok-teen-wizz-rcna134200">Sextortion training materials found on TikTok, Instagram, Snapchat and YouTube, according to new report</a></li>
<li><a href="https://cofense.com/blog/most-common-phishing-email-themes-of-2023/">Most Common Phishing Email Themes of 2023</a></li>
<li><a href="https://www.axios.com/2024/01/30/ransomware-pay-out-decline-chart">Companies aren’t paying ransoms like they used to</a></li>
<li><a href="https://www.coveware.com/blog/2024/1/25/new-ransomware-reporting-requirements-kick-in-as-victims-increasingly-avoid-paying">New Ransomware Reporting Requirements Kick in as Victims Increasingly Avoid Paying</a></li>
<li><a href="https://www.infosecurity-magazine.com/news/fbi-scammers-couriers-collect-cash/">FBI: Scammers Are Sending Couriers to Collect Cash From Victims</a></li>
</ul><p><br></p><p>You can hear more from the T-Minus space daily show <a href="https://space.n2k.com/podcasts/t-minus">here</a>.</p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a>.</p>]]>
      </content:encoded>
      <itunes:duration>2857</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[fd1e6f30-ac02-11ee-b598-ebc87151cbe0]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW3592772674.mp3?updated=1732654512" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>security orchestration, automation, and response (SOAR) (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/59/notes</link>
      <description>Please enjoy this encore episode of Word Notes. 
A stack of security software solutions and tools that allow organizations to orchestrate disparate internal and external tools which feed pre-built automation playbooks that respond to events or alert analysts if an event meets a certain threshold.</description>
      <pubDate>Tue, 26 Nov 2024 08:00:00 -0000</pubDate>
      <itunes:title>security orchestration, automation, and response (SOAR) (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>59</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Please enjoy this encore episode of Word Notes. 
A stack of security software solutions and tools that allow organizations to orchestrate disparate internal and external tools which feed pre-built automation playbooks that respond to events or alert analysts if an event meets a certain threshold.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore episode of Word Notes. </p><p>A stack of security software solutions and tools that allow organizations to orchestrate disparate internal and external tools which feed pre-built automation playbooks that respond to events or alert analysts if an event meets a certain threshold.</p>]]>
      </content:encoded>
      <itunes:duration>386</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[04584514-a761-11ef-8b13-67b14ba95a1b]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW8743432540.mp3?updated=1732122464" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Granny’s got a new trick.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/315/notes</link>
      <description>On Hacking Humans, Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of N2K's daily space podcast, T-Minus), are once again sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines to help our audience become aware of what is out there. This week, Joe shares a note from listener Michael before getting into stories, and Michael writes in to share that there are VIN cloning scams. Joe brings back the Iota discussion from last week. Joe's up first for stories and focuses on fraud. Dave informs us of the new human-like AI granny who is wasting scammers time. Finally Maria brings us the story of how BforeAI researchers analyzed over 6000 newly registered retail domains, revealing a surge in scam activity targeting shoppers with phishing websites, fake apps, and fraudulent offers, particularly during the holiday season, exploiting brand names, seasonal trends, and emerging technologies like AI and cryptocurrency. Our catch of the day comes from listener Kenneth who writes in about a fraudulent email claiming to be from Emirates Group, inviting a company to register as a vendor or contractor for upcoming projects in 2024/2025. The email emphasizes the company's experience in various sectors and urges a prompt response to initiate the registration process. It is signed by a supposed "Contractors Coordinator," Mr. Steve Ibrahim Ghandi, and includes fake contact details for the Emirates Group. 

Resources and links to stories: 

VIN cloning

How Cybercriminals Use Vehicle Identification Numbers (VINs) to Hack Cars

Yes, your car's Vehicle Identification Number can be used to steal from you

Geolocation Resources for OSINT Investigations

Person dressed in a bear costume to fake attacks on cars for insurance payout, California officials say

U.S. Trustee Program Warns Consumers of Bankruptcy Fraud Alert Scam

O2 unveils Daisy, the AI granny wasting scammers’ time

2024 Online Holiday Retail Threat Report


You can hear more from the T-Minus space daily show here.

Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@n2k.com.</description>
      <pubDate>Thu, 21 Nov 2024 06:00:00 -0000</pubDate>
      <itunes:title>Granny’s got a new trick.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>315</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>On Hacking Humans, Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of N2K's daily space podcast, T-Minus), are once again sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines to help our audience become aware of what is out there. This week, Joe shares a note from listener Michael before getting into stories, and Michael writes in to share that there are VIN cloning scams. Joe brings back the Iota discussion from last week. Joe's up first for stories and focuses on fraud. Dave informs us of the new human-like AI granny who is wasting scammers time. Finally Maria brings us the story of how BforeAI researchers analyzed over 6000 newly registered retail domains, revealing a surge in scam activity targeting shoppers with phishing websites, fake apps, and fraudulent offers, particularly during the holiday season, exploiting brand names, seasonal trends, and emerging technologies like AI and cryptocurrency. Our catch of the day comes from listener Kenneth who writes in about a fraudulent email claiming to be from Emirates Group, inviting a company to register as a vendor or contractor for upcoming projects in 2024/2025. The email emphasizes the company's experience in various sectors and urges a prompt response to initiate the registration process. It is signed by a supposed "Contractors Coordinator," Mr. Steve Ibrahim Ghandi, and includes fake contact details for the Emirates Group. 

Resources and links to stories: 

VIN cloning

How Cybercriminals Use Vehicle Identification Numbers (VINs) to Hack Cars

Yes, your car's Vehicle Identification Number can be used to steal from you

Geolocation Resources for OSINT Investigations

Person dressed in a bear costume to fake attacks on cars for insurance payout, California officials say

U.S. Trustee Program Warns Consumers of Bankruptcy Fraud Alert Scam

O2 unveils Daisy, the AI granny wasting scammers’ time

2024 Online Holiday Retail Threat Report


You can hear more from the T-Minus space daily show here.

Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@n2k.com.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>On Hacking Humans, <a href="https://www.linkedin.com/in/dave-bittner-27231a4/">Dave Bittner</a>, <a href="https://www.linkedin.com/in/joecarrigan/">Joe Carrigan</a>, and <a href="https://www.linkedin.com/in/varmazis/">Maria Varmazis</a> (also host of N2K's daily space podcast, T-Minus), are once again sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines to help our audience become aware of what is out there. This week, Joe shares a note from listener Michael before getting into stories, and Michael writes in to share that there are VIN cloning scams. Joe brings back the Iota discussion from last week. Joe's up first for stories and focuses on fraud. Dave informs us of the new human-like AI granny who is wasting scammers time. Finally Maria brings us the story of how BforeAI researchers analyzed over 6000 newly registered retail domains, revealing a surge in scam activity targeting shoppers with phishing websites, fake apps, and fraudulent offers, particularly during the holiday season, exploiting brand names, seasonal trends, and emerging technologies like AI and cryptocurrency. Our catch of the day comes from listener Kenneth who writes in about a fraudulent email claiming to be from Emirates Group, inviting a company to register as a vendor or contractor for upcoming projects in 2024/2025. The email emphasizes the company's experience in various sectors and urges a prompt response to initiate the registration process. It is signed by a supposed "Contractors Coordinator," Mr. Steve Ibrahim Ghandi, and includes fake contact details for the Emirates Group. </p><p><br></p><p>Resources and links to stories: </p><ul>
<li><a href="https://en.wikipedia.org/wiki/VIN_cloning">VIN cloning</a></li>
<li><a href="https://www.uscybersecurity.net/how-cybercriminals-use-vehicle-identification-numbers-vin-to-hack-cars/">How Cybercriminals Use Vehicle Identification Numbers (VINs) to Hack Cars</a></li>
<li><a href="https://www.wkyc.com/article/news/verify/your-car-vin-steal-verify-cloning-vehicle-identification-number-identity-theft/95-75027156-f3ad-4dee-b30c-cd01fc1ad2e3">Yes, your car's Vehicle Identification Number can be used to steal from you</a></li>
<li><a href="https://www.sans.org/blog/geolocation-resources-for-osint-investigations/">Geolocation Resources for OSINT Investigations</a></li>
<li><a href="https://www.nbcnews.com/news/us-news/person-dressed-bear-costume-fake-attacks-cars-insurance-payout-califor-rcna180075">Person dressed in a bear costume to fake attacks on cars for insurance payout, California officials say</a></li>
<li><a href="https://justice.gov/ust/blog/us-trustee-program-warns-consumers-bankruptcy-fraud-alert-scam">U.S. Trustee Program Warns Consumers of Bankruptcy Fraud Alert Scam</a></li>
<li><a href="https://news.virginmediao2.co.uk/o2-unveils-daisy-the-ai-granny-wasting-scammers-time/">O2 unveils Daisy, the AI granny wasting scammers’ time</a></li>
<li><a href="https://bfore.ai/2024-online-holiday-retail-threat-report/">2024 Online Holiday Retail Threat Report</a></li>
</ul><p><br></p><p>You can hear more from the T-Minus space daily show <a href="https://space.n2k.com/podcasts/t-minus">here</a>.</p><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@n2k.com">hackinghumans@n2k.com</a>. </p>]]>
      </content:encoded>
      <itunes:duration>2149</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[fcec1fda-ac02-11ee-b598-0769ef929942]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW1291995945.mp3?updated=1732035901" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>personally identifiable information (PII) (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/58/notes</link>
      <description>A term of legal art that defines the types of data and circumstances that permits a third party to directly or indirectly identify an individual with collected data. </description>
      <pubDate>Tue, 19 Nov 2024 08:00:00 -0000</pubDate>
      <itunes:title>personally identifiable information (PII) (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>58</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A term of legal art that defines the types of data and circumstances that permits a third party to directly or indirectly identify an individual with collected data. </itunes:summary>
      <content:encoded>
        <![CDATA[<p>A term of legal art that defines the types of data and circumstances that permits a third party to directly or indirectly identify an individual with collected data. </p>]]>
      </content:encoded>
      <itunes:duration>446</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[229a3fd2-a5f4-11ef-8b9f-671333f56aa8]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW9521759369.mp3?updated=1731965768" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Final approach to scammer advent. </title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/314/notes</link>
      <description>On Hacking Humans, Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of N2K's daily space podcast, T-Minus), are once again sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines to help our audience become aware of what is out there. This week, the team shares follow up about FEMA and Hurricane Helene relief. Dave's story is about romance scams involving an impersonator of a WWE star scamming a grandfather out of their retirement savings, Maria shares a story about a valid-looking document impersonating DocuSign's API (application programming interface). Joe's got a few stories including one about a CVE (Common Vulnerabilities Enumeration) relating to an Okta bug and one from the Better Business Bureau with a new twist on online shopping scams where your get a "card declined" message. Our Catch of the Day comes from listener William about an email from the "United Nations."

Resources and links to stories: 

DisasterAssistance.gov

They’re Giving Scammers All Their Money. The Kids Can’t Stop Them.

Attackers Abuse DocuSign API to Send Authentic-Looking Invoices At Scale


DMARC: Domain-based Message Authentication, Reporting &amp; Conformance

CVE-2024-10327

BBB Scam Alert: 'Card declined' error may lead to multiple fraudulent charges


You can hear more from the T-Minus space daily show here.

Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@n2k.com.</description>
      <pubDate>Thu, 14 Nov 2024 06:00:00 -0000</pubDate>
      <itunes:title>Final approach to scammer advent. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>314</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>On Hacking Humans, Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of N2K's daily space podcast, T-Minus), are once again sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines to help our audience become aware of what is out there. This week, the team shares follow up about FEMA and Hurricane Helene relief. Dave's story is about romance scams involving an impersonator of a WWE star scamming a grandfather out of their retirement savings, Maria shares a story about a valid-looking document impersonating DocuSign's API (application programming interface). Joe's got a few stories including one about a CVE (Common Vulnerabilities Enumeration) relating to an Okta bug and one from the Better Business Bureau with a new twist on online shopping scams where your get a "card declined" message. Our Catch of the Day comes from listener William about an email from the "United Nations."

Resources and links to stories: 

DisasterAssistance.gov

They’re Giving Scammers All Their Money. The Kids Can’t Stop Them.

Attackers Abuse DocuSign API to Send Authentic-Looking Invoices At Scale


DMARC: Domain-based Message Authentication, Reporting &amp; Conformance

CVE-2024-10327

BBB Scam Alert: 'Card declined' error may lead to multiple fraudulent charges


You can hear more from the T-Minus space daily show here.

Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@n2k.com.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>On Hacking Humans, <a href="https://www.linkedin.com/in/dave-bittner-27231a4/">Dave Bittner</a>, <a href="https://www.linkedin.com/in/joecarrigan/">Joe Carrigan</a>, and <a href="https://www.linkedin.com/in/varmazis/">Maria Varmazis</a> (also host of N2K's daily space podcast, T-Minus), are once again sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines to help our audience become aware of what is out there. This week, the team shares follow up about FEMA and Hurricane Helene relief. Dave's story is about romance scams involving an impersonator of a WWE star scamming a grandfather out of their retirement savings, Maria shares a story about a valid-looking document impersonating DocuSign's API (application programming interface). Joe's got a few stories including one about a CVE (Common Vulnerabilities Enumeration) relating to an Okta bug and one from the Better Business Bureau with a new twist on online shopping scams where your get a "card declined" message. Our Catch of the Day comes from listener William about an email from the "United Nations."</p><p><br></p><p>Resources and links to stories: </p><ul>
<li><a href="https://www.disasterassistance.gov/">DisasterAssistance.gov</a></li>
<li><a href="https://www.nytimes.com/2024/10/31/business/scam-con-artist-family-savings.html?unlocked_article_code=1.Wk4.Mj_K.Q75hWeVtmwJp">They’re Giving Scammers All Their Money. The Kids Can’t Stop Them.</a></li>
<li><a href="https://lab.wallarm.com/attackers-abuse-docusign-api-to-send-authentic-looking-invoices-at-scale/">Attackers Abuse DocuSign API to Send Authentic-Looking Invoices At Scale</a></li>
<li>
<a href="https://dmarc.org/">DMARC</a>: Domain-based Message Authentication, Reporting &amp; Conformance</li>
<li><a href="https://www.cve.org/CVERecord?id=CVE-2024-10327">CVE-2024-10327</a></li>
<li><a href="https://www.bbb.org/article/news-releases/30839-bbb-scam-alert-card-declined-error-may-lead-to-multiple-fraudulent-charges">BBB Scam Alert: 'Card declined' error may lead to multiple fraudulent charges</a></li>
</ul><p><br></p><p>You can hear more from the T-Minus space daily show <a href="https://space.n2k.com/podcasts/t-minus">here</a>.</p><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@n2k.com">hackinghumans@n2k.com</a>. </p>]]>
      </content:encoded>
      <itunes:duration>2564</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[fcbc0188-ac02-11ee-b598-3f2617f199be]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW1300577620.mp3?updated=1731439963" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>secure access service edge (SASE) (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/57/notes</link>
      <description>Enjoy this encore episode. 
A security architecture that incorporates the cloud shared responsibility model, a vendor provided security stack, an SD-WAN abstraction layer, and network peering with one or more of the big content providers and their associated fiber networks.</description>
      <pubDate>Tue, 12 Nov 2024 08:00:00 -0000</pubDate>
      <itunes:title>secure access service edge (SASE) (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>57</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Enjoy this encore episode. 
A security architecture that incorporates the cloud shared responsibility model, a vendor provided security stack, an SD-WAN abstraction layer, and network peering with one or more of the big content providers and their associated fiber networks.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Enjoy this encore episode. </p><p>A security architecture that incorporates the cloud shared responsibility model, a vendor provided security stack, an SD-WAN abstraction layer, and network peering with one or more of the big content providers and their associated fiber networks.</p>]]>
      </content:encoded>
      <itunes:duration>505</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b1b234fe-9f91-11ef-aa15-2b7a8bbe6aad]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW3950418231.mp3?updated=1731263758" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Happy hour hacking.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/313/notes</link>
      <description>Maria Varmazis, host of N2K's daily space show T-Minus, joins Dave and Joe to share the story of the five types of social engineers Deanne Lewis encountered while tending bar, revealing how each barroom personality reflects a common cybersecurity threat. Our hosts share some follow-up from a friend of the show, JJ, who reports a rise in tech support scams targeting non-tech-savvy users by locking their screens and persuading them to call scammers, often leading to credit card fraud and unauthorized remote access through tools like AnyDesk or TeamViewer. Joe has two stories this week: one covering JPMorgan Chase's lawsuits against individuals who exploited an ATM glitch to withdraw fake deposits, a scam popularized on TikTok; and the second on four suspects in Maryland charged with conning an elderly woman out of nearly $40,000 in a "pigeon drop" scam, where victims are promised a cut of "found" money in exchange for collateral. Dave's story is on a viral AI-generated hoax spreading on Facebook, where fake posts about neighbors egging cars over Halloween decorations are stirring moral panic and sowing distrust, especially among older users. Finally, our catch of the day comes from some text threads about a scammer trying to get clever while buying a used car. 
Links to the stories:

The Five Types of Social Engineers I Met Tending Bar (And What They Taught Me About InfoSec)

JPMorgan Chase is suing customers over 'infinite money glitch' ATM scam

Four charged in ‘pigeon drop’ scam targeting elderly in Maryland

The newest AI slop on Facebook exploits suburban fear


You can hear more from the T-Minus space daily show here.

Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@n2k.com.</description>
      <pubDate>Thu, 07 Nov 2024 06:00:00 -0000</pubDate>
      <itunes:title>Happy hour hacking.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>313</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Maria Varmazis, host of N2K's daily space show T-Minus, joins Dave and Joe to share the story of the five types of social engineers Deanne Lewis encountered while tending bar, revealing how each barroom personality reflects a common cybersecurity threat. Our hosts share some follow-up from a friend of the show, JJ, who reports a rise in tech support scams targeting non-tech-savvy users by locking their screens and persuading them to call scammers, often leading to credit card fraud and unauthorized remote access through tools like AnyDesk or TeamViewer. Joe has two stories this week: one covering JPMorgan Chase's lawsuits against individuals who exploited an ATM glitch to withdraw fake deposits, a scam popularized on TikTok; and the second on four suspects in Maryland charged with conning an elderly woman out of nearly $40,000 in a "pigeon drop" scam, where victims are promised a cut of "found" money in exchange for collateral. Dave's story is on a viral AI-generated hoax spreading on Facebook, where fake posts about neighbors egging cars over Halloween decorations are stirring moral panic and sowing distrust, especially among older users. Finally, our catch of the day comes from some text threads about a scammer trying to get clever while buying a used car. 
Links to the stories:

The Five Types of Social Engineers I Met Tending Bar (And What They Taught Me About InfoSec)

JPMorgan Chase is suing customers over 'infinite money glitch' ATM scam

Four charged in ‘pigeon drop’ scam targeting elderly in Maryland

The newest AI slop on Facebook exploits suburban fear


You can hear more from the T-Minus space daily show here.

Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@n2k.com.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Maria Varmazis, host of N2K's daily space show <em>T-Minus</em>, joins Dave and Joe to share the story of the five types of social engineers Deanne Lewis encountered while tending bar, revealing how each barroom personality reflects a common cybersecurity threat. Our hosts share some follow-up from a friend of the show, JJ, who reports a rise in tech support scams targeting non-tech-savvy users by locking their screens and persuading them to call scammers, often leading to credit card fraud and unauthorized remote access through tools like AnyDesk or TeamViewer. Joe has two stories this week: one covering JPMorgan Chase's lawsuits against individuals who exploited an ATM glitch to withdraw fake deposits, a scam popularized on TikTok; and the second on four suspects in Maryland charged with conning an elderly woman out of nearly $40,000 in a "pigeon drop" scam, where victims are promised a cut of "found" money in exchange for collateral. Dave's story is on a viral AI-generated hoax spreading on Facebook, where fake posts about neighbors egging cars over Halloween decorations are stirring moral panic and sowing distrust, especially among older users. Finally, our catch of the day comes from some text threads about a scammer trying to get clever while buying a used car. </p><p>Links to the stories:</p><ul>
<li><a href="https://medium.com/@dlewis40624/the-five-types-of-social-engineers-i-met-tending-bar-and-what-they-taught-me-about-infosec-061e658b073b">The Five Types of Social Engineers I Met Tending Bar (And What They Taught Me About InfoSec)</a></li>
<li><a href="https://www.npr.org/2024/10/29/nx-s1-5170331/jpmorgan-chase-infinite-money-glitch-atm-scam">JPMorgan Chase is suing customers over 'infinite money glitch' ATM scam</a></li>
<li><a href="https://www.fox5dc.com/news/four-charged-pigeon-drop-scam-targeting-elderly-maryland">Four charged in ‘pigeon drop’ scam targeting elderly in Maryland</a></li>
<li><a href="https://www.usermag.co/p/my-neighbors-ridiculous-reason-for">The newest AI slop on Facebook exploits suburban fear</a></li>
</ul><p><br></p><p>You can hear more from the T-Minus space daily show <a href="https://space.n2k.com/podcasts/t-minus">here</a>.</p><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@n2k.com">hackinghumans@n2k.com</a>. </p>]]>
      </content:encoded>
      <itunes:duration>2893</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[fc8f80fe-ac02-11ee-b598-631190ca5f83]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW7609998705.mp3?updated=1731440656" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Whispers in the wires: A closer look at the new age of intrusion. [OMITB]</title>
      <link>https://thecyberwire.com/podcasts/only-malware-in-the-building/6/notes</link>
      <description>Welcome in! You’ve entered, Only Malware in the Building. Join us each month to sip tea and solve mysteries about today’s most interesting threats. Your host is Selena Larson, Proofpoint intelligence analyst and host of their podcast DISCARDED. Inspired by the residents of a building in New York’s exclusive upper west side, Selena is joined by N2K Networks Dave Bittner and Rick Howard to uncover the stories behind notable cyberattacks. 
Being a security researcher is a bit like being a detective: you gather clues, analyze the evidence, and consult the experts to solve the cyber puzzle. On this episode, we talk about how threat actors are shifting tactics across the landscape, focusing more on advanced social engineering and refined initial access strategies than on sophisticated malware. 
We’ll dive into Proofpoint's latest blog detailing a transport sector breach that, while involving relatively standard malware, showcases this growing trend of nuanced techniques and toolsets.</description>
      <pubDate>Tue, 05 Nov 2024 08:00:00 -0000</pubDate>
      <itunes:title>Whispers in the wires: A closer look at the new age of intrusion. [OMITB]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>6</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/fd2b62ae-9ae4-11ef-950f-cbef6c04f373/image/d9f0cdb0dcdd515f0dfd92da4cc68fb2.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Welcome in! You’ve entered, Only Malware in the Building. Join us each month to sip tea and solve mysteries about today’s most interesting threats. Your host is Selena Larson, Proofpoint intelligence analyst and host of their podcast DISCARDED. Inspired by the residents of a building in New York’s exclusive upper west side, Selena is joined by N2K Networks Dave Bittner and Rick Howard to uncover the stories behind notable cyberattacks. 
Being a security researcher is a bit like being a detective: you gather clues, analyze the evidence, and consult the experts to solve the cyber puzzle. On this episode, we talk about how threat actors are shifting tactics across the landscape, focusing more on advanced social engineering and refined initial access strategies than on sophisticated malware. 
We’ll dive into Proofpoint's latest blog detailing a transport sector breach that, while involving relatively standard malware, showcases this growing trend of nuanced techniques and toolsets.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Welcome in! You’ve entered, Only Malware in the Building. Join us each month to sip tea and solve mysteries about today’s most interesting threats. Your host is <a href="https://www.linkedin.com/in/selenalarson/">Selena Larson</a>, <a href="https://www.proofpoint.com/">Proofpoint</a> intelligence analyst and host of their podcast <a href="https://www.proofpoint.com/us/podcasts/discarded">DISCARDED</a>. Inspired by the residents of a building in New York’s exclusive upper west side, Selena is joined by <a href="https://www.n2k.com/">N2K</a> Networks <a href="https://www.linkedin.com/in/dave-bittner-27231a4/">Dave Bittner</a> and <a href="https://www.linkedin.com/in/rickhoward/">Rick Howard</a> to uncover the stories behind notable cyberattacks. </p><p>Being a security researcher is a bit like being a detective: you gather clues, analyze the evidence, and consult the experts to solve the cyber puzzle. On this episode, we talk about how threat actors are shifting tactics across the landscape, focusing more on advanced social engineering and refined initial access strategies than on sophisticated malware. </p><p>We’ll dive into Proofpoint's latest <a href="https://www.proofpoint.com/us/blog/threat-insight/security-brief-actor-uses-compromised-accounts-customized-social-engineering">blog</a> detailing a transport sector breach that, while involving relatively standard malware, showcases this growing trend of nuanced techniques and toolsets.</p>]]>
      </content:encoded>
      <itunes:duration>2350</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[fd2b62ae-9ae4-11ef-950f-cbef6c04f373]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW8205716381.mp3?updated=1730750749" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>red teaming (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/56/notes</link>
      <description>Enjoy this encore episode. 
 The practice of emulating known adversary behavior against an organization's actual defensive posture.</description>
      <pubDate>Tue, 05 Nov 2024 08:00:00 -0000</pubDate>
      <itunes:title>red teaming (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>56</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Enjoy this encore episode. 
 The practice of emulating known adversary behavior against an organization's actual defensive posture.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Enjoy this encore episode. </p><p> The practice of emulating known adversary behavior against an organization's actual defensive posture.</p>]]>
      </content:encoded>
      <itunes:duration>386</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[79fd5258-9af7-11ef-acc2-c716c68340d3]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW5131384255.mp3?updated=1730757677" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The Malware Mash</title>
      <description>Happy Halloween from the team at N2K Networks! 

We hope you share in our Halloween tradition of listening to the Malware Mash. You can check out our video here.  

Lyrics

I was coding in the lab late one night
when my eyes beheld an eerie sight 
for my malware threat score began to rise 
and suddenly to my surprise...

It did the Mash 
It did the Malware Mash 
The Malware Mash 
It was a botnet smash 
It did the Mash 
It caught on 'cause of Flash 
The Malware Mash 
It did the Malware Mash

From the Stuxnet worm squirming toward the near east 
to the dark web souqs where the script kiddies feast 
the APTs left their humble abodes 
to get installed from rootkit payloads. 

They did the Mash 
They did the Malware Mash 
The Malware Mash 
It was an adware smash 
They did the Mash 
It caught on 'cause of Flash 
The Malware Mash 
They did the Malware Mash

The botnets were having fun 
The DDoS had just begun 
The viruses hit the darknet, 
with ransomware yet to come. 
The keys were logging, phishing emails abound, 
Snowden on chains, backed by his Russian hounds. 
The Shadow Brokers were about to arrive 
with their vocal group, "The NotPetya Five."

They did the Mash 
They played the Malware Mash
The Malware Mash 
It was a botnet smash 
They did the Mash 
It caught on 'cause of Flash 
The Malware Mash 
They played the Malware Mash

Somewhere in Moscow Vlad's voice did ring 
Seems he was troubled by just one thing. 
He opened a shell then shook his fist 
and said, "Whatever happened to my Turla Trojan twist." 

It's now the Mash 
It's now the Malware Mash 
The Malware Mash 
And it's a botnet smash 
It's now the Mash 
It caught on 'cause of Flash 
The Malware Mash 
It's now the Malware Mash

Now everything's cool, Vlad's a part of the band 
And the Malware Mash is the hit of the land. 
For you, defenders, this mash was meant to 
when you get to my door, tell them Creeper sent you.

Then you can Mash 
Then you can Malware Mash 
The Malware Mash 
And be a botnet smash 
It is the Mash 
Don't you dare download Flash 
The Malware Mash 
Just do the Malware Mash</description>
      <pubDate>Thu, 31 Oct 2024 18:40:00 -0000</pubDate>
      <itunes:title>The Malware Mash </itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/9c26dca8-97b6-11ef-8c72-87522a74bcd0/image/a7bd2dc42eefee62cd5572fe3881cc20.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Happy Halloween from the team at N2K Networks! 

We hope you share in our Halloween tradition of listening to the Malware Mash. You can check out our video here.  

Lyrics

I was coding in the lab late one night
when my eyes beheld an eerie sight 
for my malware threat score began to rise 
and suddenly to my surprise...

It did the Mash 
It did the Malware Mash 
The Malware Mash 
It was a botnet smash 
It did the Mash 
It caught on 'cause of Flash 
The Malware Mash 
It did the Malware Mash

From the Stuxnet worm squirming toward the near east 
to the dark web souqs where the script kiddies feast 
the APTs left their humble abodes 
to get installed from rootkit payloads. 

They did the Mash 
They did the Malware Mash 
The Malware Mash 
It was an adware smash 
They did the Mash 
It caught on 'cause of Flash 
The Malware Mash 
They did the Malware Mash

The botnets were having fun 
The DDoS had just begun 
The viruses hit the darknet, 
with ransomware yet to come. 
The keys were logging, phishing emails abound, 
Snowden on chains, backed by his Russian hounds. 
The Shadow Brokers were about to arrive 
with their vocal group, "The NotPetya Five."

They did the Mash 
They played the Malware Mash
The Malware Mash 
It was a botnet smash 
They did the Mash 
It caught on 'cause of Flash 
The Malware Mash 
They played the Malware Mash

Somewhere in Moscow Vlad's voice did ring 
Seems he was troubled by just one thing. 
He opened a shell then shook his fist 
and said, "Whatever happened to my Turla Trojan twist." 

It's now the Mash 
It's now the Malware Mash 
The Malware Mash 
And it's a botnet smash 
It's now the Mash 
It caught on 'cause of Flash 
The Malware Mash 
It's now the Malware Mash

Now everything's cool, Vlad's a part of the band 
And the Malware Mash is the hit of the land. 
For you, defenders, this mash was meant to 
when you get to my door, tell them Creeper sent you.

Then you can Mash 
Then you can Malware Mash 
The Malware Mash 
And be a botnet smash 
It is the Mash 
Don't you dare download Flash 
The Malware Mash 
Just do the Malware Mash</itunes:summary>
      <content:encoded>
        <![CDATA[<h3>Happy Halloween from the team at N2K Networks! </h3><p><br></p><p>We hope you share in our Halloween tradition of listening to the Malware Mash. You can check out our video <a href="https://youtu.be/QBpAAhbPOk0">here</a>.  </p><h2><br></h2><h3><strong>Lyrics</strong></h3><p><br></p><p>I was coding in the lab late one night</p><p>when my eyes beheld an eerie sight </p><p>for my malware threat score began to rise </p><p>and suddenly to my surprise...</p><p><br></p><p>It did the Mash </p><p>It did the Malware Mash </p><p>The Malware Mash </p><p>It was a botnet smash </p><p>It did the Mash </p><p>It caught on 'cause of Flash </p><p>The Malware Mash </p><p>It did the Malware Mash</p><p><br></p><p>From the Stuxnet worm squirming toward the near east </p><p>to the dark web souqs where the script kiddies feast </p><p>the APTs left their humble abodes </p><p>to get installed from rootkit payloads. </p><p><br></p><p>They did the Mash </p><p>They did the Malware Mash </p><p>The Malware Mash </p><p>It was an adware smash </p><p>They did the Mash </p><p>It caught on 'cause of Flash </p><p>The Malware Mash </p><p>They did the Malware Mash</p><p><br></p><p>The botnets were having fun </p><p>The DDoS had just begun </p><p>The viruses hit the darknet, </p><p>with ransomware yet to come. </p><p>The keys were logging, phishing emails abound, </p><p>Snowden on chains, backed by his Russian hounds. </p><p>The Shadow Brokers were about to arrive </p><p>with their vocal group, "The NotPetya Five."</p><p><br></p><p>They did the Mash </p><p>They played the Malware Mash</p><p>The Malware Mash </p><p>It was a botnet smash </p><p>They did the Mash </p><p>It caught on 'cause of Flash </p><p>The Malware Mash </p><p>They played the Malware Mash</p><p><br></p><p>Somewhere in Moscow Vlad's voice did ring </p><p>Seems he was troubled by just one thing. </p><p>He opened a shell then shook his fist </p><p>and said, "Whatever happened to my Turla Trojan twist." </p><p><br></p><p>It's now the Mash </p><p>It's now the Malware Mash </p><p>The Malware Mash </p><p>And it's a botnet smash </p><p>It's now the Mash </p><p>It caught on 'cause of Flash </p><p>The Malware Mash </p><p>It's now the Malware Mash</p><p><br></p><p>Now everything's cool, Vlad's a part of the band </p><p>And the Malware Mash is the hit of the land. </p><p>For you, defenders, this mash was meant to </p><p>when you get to my door, tell them Creeper sent you.</p><p><br></p><p>Then you can Mash </p><p>Then you can Malware Mash </p><p>The Malware Mash </p><p>And be a botnet smash </p><p>It is the Mash </p><p>Don't you dare download Flash </p><p>The Malware Mash </p><p>Just do the Malware Mash</p>]]>
      </content:encoded>
      <itunes:duration>231</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[9c26dca8-97b6-11ef-8c72-87522a74bcd0]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW6262555387.mp3?updated=1730399904" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>How political donations can be deceiving.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/312/notes</link>
      <description>Maria Varmazis, host of N2K's daily space show T-Minus, joins Dave and Joe to share the story of a relentless wave of political donation texts that go well beyond simple annoyance, revealing an unsettling impact on vulnerable populations. CNN's investigation exposes how these texts, with their urgent and personal tone, have led seniors, including those with dementia, to make thousands of donations—sometimes unknowingly amassing hundreds of thousands of dollars for campaigns. Joe's story highlights a dash cam video capturing a car colliding with another vehicle while backing up on a busy highway. The footage raises questions about driver awareness and road safety in high-traffic situations. Dave's story shares the alarming potential of OpenAI's real-time voice API, which allows scammers to create AI agents capable of executing phone scams for as little as $0.75. Researchers from the University of Illinois Urbana-Champaign revealed that these agents can autonomously conduct scams, raising serious concerns about the misuse of voice-enabled AI technology despite previous safety precautions. And finally, our catch of the day shares how the Library of Congress is cracking down on copy write infringement.
Links to the stories:

Age of fraud: Are seniors more vulnerable to financial scams?

How elderly dementia patients are unwittingly fueling political campaigns

Apparent attempt at insurance scam caught on camera

Voice-enabled AI agents can automate everything, even your phone scams

Bank account transfer scam


You can hear more from the T-Minus space daily show here.

Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@n2k.com.</description>
      <pubDate>Thu, 31 Oct 2024 05:00:00 -0000</pubDate>
      <itunes:title>How political donations can be deceiving.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>312</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Maria Varmazis, host of N2K's daily space show T-Minus, joins Dave and Joe to share the story of a relentless wave of political donation texts that go well beyond simple annoyance, revealing an unsettling impact on vulnerable populations. CNN's investigation exposes how these texts, with their urgent and personal tone, have led seniors, including those with dementia, to make thousands of donations—sometimes unknowingly amassing hundreds of thousands of dollars for campaigns. Joe's story highlights a dash cam video capturing a car colliding with another vehicle while backing up on a busy highway. The footage raises questions about driver awareness and road safety in high-traffic situations. Dave's story shares the alarming potential of OpenAI's real-time voice API, which allows scammers to create AI agents capable of executing phone scams for as little as $0.75. Researchers from the University of Illinois Urbana-Champaign revealed that these agents can autonomously conduct scams, raising serious concerns about the misuse of voice-enabled AI technology despite previous safety precautions. And finally, our catch of the day shares how the Library of Congress is cracking down on copy write infringement.
Links to the stories:

Age of fraud: Are seniors more vulnerable to financial scams?

How elderly dementia patients are unwittingly fueling political campaigns

Apparent attempt at insurance scam caught on camera

Voice-enabled AI agents can automate everything, even your phone scams

Bank account transfer scam


You can hear more from the T-Minus space daily show here.

Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@n2k.com.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Maria Varmazis, host of N2K's daily space show <em>T-Minus</em>, joins Dave and Joe to share the story of a relentless wave of political donation texts that go well beyond simple annoyance, revealing an unsettling impact on vulnerable populations. CNN's investigation exposes how these texts, with their urgent and personal tone, have led seniors, including those with dementia, to make thousands of donations—sometimes unknowingly amassing hundreds of thousands of dollars for campaigns. Joe's story highlights a dash cam video capturing a car colliding with another vehicle while backing up on a busy highway. The footage raises questions about driver awareness and road safety in high-traffic situations. Dave's story shares the alarming potential of OpenAI's real-time voice API, which allows scammers to create AI agents capable of executing phone scams for as little as $0.75. Researchers from the University of Illinois Urbana-Champaign revealed that these agents can autonomously conduct scams, raising serious concerns about the misuse of voice-enabled AI technology despite previous safety precautions. And finally, our catch of the day shares how the Library of Congress is cracking down on copy write infringement.</p><p>Links to the stories:</p><ul>
<li><a href="https://www.marketplace.org/collection/brains-losses-aging-financial-vulnerability/">Age of fraud: Are seniors more vulnerable to financial scams?</a></li>
<li><a href="https://www.cnn.com/interactive/2024/10/politics/political-fundraising-elderly-election-invs-dg/">How elderly dementia patients are unwittingly fueling political campaigns</a></li>
<li><a href="https://www.youtube.com/watch?v=S45oXU5alPA">Apparent attempt at insurance scam caught on camera</a></li>
<li><a href="https://www.theregister.com/2024/10/24/openai_realtime_api_phone_scam/">Voice-enabled AI agents can automate everything, even your phone scams</a></li>
<li><a href="https://www.youtube.com/watch?v=MeQ3zt6EcoQ">Bank account transfer scam</a></li>
</ul><p><br></p><p>You can hear more from the T-Minus space daily show <a href="https://space.n2k.com/podcasts/t-minus">here</a>.</p><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@n2k.com">hackinghumans@n2k.com</a>. </p>]]>
      </content:encoded>
      <itunes:duration>3024</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[fc634890-ac02-11ee-b598-ebd0f09fe7eb]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW2745027695.mp3?updated=1730232179" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>next generation firewall (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/55/notes</link>
      <description>Please enjoy this encore episode of Word Notes.
A layer seven security orchestration platform deployed at the boundary between internal workloads slash data storage and untrusted sources that blocks incoming and outgoing network traffic with rules that tie applications to the authenticated user and provides most of the traditional security stack functions in one device or software application.</description>
      <pubDate>Tue, 29 Oct 2024 07:00:00 -0000</pubDate>
      <itunes:title>next generation firewall (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Please enjoy this encore episode of Word Notes.
A layer seven security orchestration platform deployed at the boundary between internal workloads slash data storage and untrusted sources that blocks incoming and outgoing network traffic with rules that tie applications to the authenticated user and provides most of the traditional security stack functions in one device or software application.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore episode of Word Notes.</p><p>A layer seven security orchestration platform deployed at the boundary between internal workloads slash data storage and untrusted sources that blocks incoming and outgoing network traffic with rules that tie applications to the authenticated user and provides most of the traditional security stack functions in one device or software application.</p>]]>
      </content:encoded>
      <itunes:duration>447</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[3db71028-9565-11ef-8252-6f3b1561c25c]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW7417556565.mp3?updated=1730145192" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Spiritual healers or master con artists?</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/311/notes</link>
      <description>Maria Varmazis, host of N2K's daily space show T-Minus, joins Dave and Joe to share the story of how ESET Research revealed that Telekopye, a scam toolkit used by cybercriminals, has expanded its operations from online marketplaces to accommodation booking platforms like Booking.com and Airbnb. Joe’s story is on the elaborate "blessing scam" targeting older Chinese women, where scammers pose as spiritual healers to swindle victims out of their valuables by convincing them their loved ones are in danger—a criminal act spanning across the UK, US, Australia, and Canada, leaving families desperate to catch the perpetrators. Dave follows the story of a new rule passed by the US Federal Trade Commission (FTC) to make subscription cancellations easier with a simple "click to cancel" process. Our catch of the day comes from Reddit where a user was contacted via text message claiming that they were mixed up in a romance scam. 
Links to the stories:

Telekopye scammer network targets Booking.com and Airbnb

'Your son will die': How blessing scammers prowl streets

FTC “click to cancel” rule seeks to end free trial traps, sneaky auto-enrollments


You can hear more from the T-Minus space daily show here.

Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@n2k.com.</description>
      <pubDate>Thu, 24 Oct 2024 05:00:00 -0000</pubDate>
      <itunes:title>Spiritual healers or master con artists?</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>311</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Maria Varmazis, host of N2K's daily space show T-Minus, joins Dave and Joe to share the story of how ESET Research revealed that Telekopye, a scam toolkit used by cybercriminals, has expanded its operations from online marketplaces to accommodation booking platforms like Booking.com and Airbnb. Joe’s story is on the elaborate "blessing scam" targeting older Chinese women, where scammers pose as spiritual healers to swindle victims out of their valuables by convincing them their loved ones are in danger—a criminal act spanning across the UK, US, Australia, and Canada, leaving families desperate to catch the perpetrators. Dave follows the story of a new rule passed by the US Federal Trade Commission (FTC) to make subscription cancellations easier with a simple "click to cancel" process. Our catch of the day comes from Reddit where a user was contacted via text message claiming that they were mixed up in a romance scam. 
Links to the stories:

Telekopye scammer network targets Booking.com and Airbnb

'Your son will die': How blessing scammers prowl streets

FTC “click to cancel” rule seeks to end free trial traps, sneaky auto-enrollments


You can hear more from the T-Minus space daily show here.

Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@n2k.com.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Maria Varmazis, host of N2K's daily space show <em>T-Minus</em>, joins Dave and Joe to share the story of how ESET Research revealed that Telekopye, a scam toolkit used by cybercriminals, has expanded its operations from online marketplaces to accommodation booking platforms like Booking.com and Airbnb. Joe’s story is on the elaborate "blessing scam" targeting older Chinese women, where scammers pose as spiritual healers to swindle victims out of their valuables by convincing them their loved ones are in danger—a criminal act spanning across the UK, US, Australia, and Canada, leaving families desperate to catch the perpetrators. Dave follows the story of a new rule passed by the US Federal Trade Commission (FTC) to make subscription cancellations easier with a simple "click to cancel" process. Our catch of the day comes from Reddit where a user was contacted via text message claiming that they were mixed up in a romance scam. </p><p>Links to the stories:</p><ul>
<li><a href="https://www.eset.com/int/about/newsroom/press-releases/research/eset-research-telekopye-scammer-network-targets-bookingcom-and-airbnb-1/">Telekopye scammer network targets Booking.com and Airbnb</a></li>
<li><a href="https://www.bbc.com/news/articles/cn5zn1l6g5yo">'Your son will die': How blessing scammers prowl streets</a></li>
<li><a href="https://arstechnica.com/tech-policy/2024/10/ftc-click-to-cancel-rule-seeks-to-end-free-trial-traps-sneaky-auto-enrollments/?utm_brand=arstechnica&amp;utm_social-type=owned&amp;utm_source=mastodon&amp;utm_medium=social">FTC “click to cancel” rule seeks to end free trial traps, sneaky auto-enrollments</a></li>
</ul><p><br></p><p>You can hear more from the T-Minus space daily show <a href="https://space.n2k.com/podcasts/t-minus">here</a>.</p><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@n2k.com">hackinghumans@n2k.com</a>. </p>]]>
      </content:encoded>
      <itunes:duration>2135</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[fc36cfd6-ac02-11ee-b598-2faa07ce73e3]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW6549955225.mp3?updated=1729703861" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>fast flux (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/54/notes</link>
      <description>Please enjoy this encore of Word Notes.
A network designed to obfuscate the location of a cyber adversary's command and control server by manipulating the domain name system, or DNS, in a way that rotates the associated IP address among large numbers of compromised hosts in a botnet.</description>
      <pubDate>Tue, 22 Oct 2024 07:00:00 -0000</pubDate>
      <itunes:title>fast flux (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>54</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/088d5fac-8fd3-11ef-ae4c-9fa92812dc4b/image/441b0ca2db080b93b935568d381ce462.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Please enjoy this encore of Word Notes.
A network designed to obfuscate the location of a cyber adversary's command and control server by manipulating the domain name system, or DNS, in a way that rotates the associated IP address among large numbers of compromised hosts in a botnet.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore of Word Notes.</p><p>A network designed to obfuscate the location of a cyber adversary's command and control server by manipulating the domain name system, or DNS, in a way that rotates the associated IP address among large numbers of compromised hosts in a botnet.</p>]]>
      </content:encoded>
      <itunes:duration>433</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[088d5fac-8fd3-11ef-ae4c-9fa92812dc4b]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW7979739662.mp3?updated=1729533193" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Cybercriminals thrive in vulnerable moments.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/310/notes</link>
      <description>Maria Varmazis, host of N2K's daily space show T-Minus, joins Dave and Joe to share the story of how cybercriminals are exploiting the chaos following Hurricane Helene in Florida by launching scams and phishing attacks. Veriti’s research highlights three key threats: FEMA claim scams, phishing using hurricane-related domains, and malicious files disguised as FEMA documents, all targeting vulnerable individuals. This week, Joe's got three hard-hitting stories lined up! First, U.S. authorities have charged 18 individuals and companies for pulling off fraudulent schemes to manipulate cryptocurrency markets. Next, leaders from four crypto firms and market makers face charges for wash-trading and inflating prices to lure in investors. Finally, in a groundbreaking move, federal prosecutors have launched the first-ever criminal case targeting wash trading in digital assets, shaking up the crypto world. Dave share's a Facebook watch you can't say no too. Our catch of the day comes from Reddit, and follows a chain of messages where a scammer is sharing news that sounds a bit too good to be true. 
Links to the stories:

Exploiting Hurricane Helene with FEMA Scams and Phishing Threats

Eighteen Individuals and Entities Charged in International Operation Targeting Widespread Fraud and Manipulation in the Cryptocurrency Markets

Seeking Information in Cryptocurrency Investment Fraud Investigation

U.S. Federal Prosecutors File First-Ever Criminal Charges for Crypto Market Manipulation


You can hear more from the T-Minus space daily show here.

Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@n2k.com.</description>
      <pubDate>Thu, 17 Oct 2024 05:00:00 -0000</pubDate>
      <itunes:title>Cybercriminals thrive in vulnerable moments.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>310</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Maria Varmazis, host of N2K's daily space show T-Minus, joins Dave and Joe to share the story of how cybercriminals are exploiting the chaos following Hurricane Helene in Florida by launching scams and phishing attacks. Veriti’s research highlights three key threats: FEMA claim scams, phishing using hurricane-related domains, and malicious files disguised as FEMA documents, all targeting vulnerable individuals. This week, Joe's got three hard-hitting stories lined up! First, U.S. authorities have charged 18 individuals and companies for pulling off fraudulent schemes to manipulate cryptocurrency markets. Next, leaders from four crypto firms and market makers face charges for wash-trading and inflating prices to lure in investors. Finally, in a groundbreaking move, federal prosecutors have launched the first-ever criminal case targeting wash trading in digital assets, shaking up the crypto world. Dave share's a Facebook watch you can't say no too. Our catch of the day comes from Reddit, and follows a chain of messages where a scammer is sharing news that sounds a bit too good to be true. 
Links to the stories:

Exploiting Hurricane Helene with FEMA Scams and Phishing Threats

Eighteen Individuals and Entities Charged in International Operation Targeting Widespread Fraud and Manipulation in the Cryptocurrency Markets

Seeking Information in Cryptocurrency Investment Fraud Investigation

U.S. Federal Prosecutors File First-Ever Criminal Charges for Crypto Market Manipulation


You can hear more from the T-Minus space daily show here.

Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@n2k.com.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Maria Varmazis, host of N2K's daily space show <em>T-Minus</em>, joins Dave and Joe to share the story of how cybercriminals are exploiting the chaos following Hurricane Helene in Florida by launching scams and phishing attacks. Veriti’s research highlights three key threats: FEMA claim scams, phishing using hurricane-related domains, and malicious files disguised as FEMA documents, all targeting vulnerable individuals. This week, Joe's got three hard-hitting stories lined up! First, U.S. authorities have charged 18 individuals and companies for pulling off fraudulent schemes to manipulate cryptocurrency markets. Next, leaders from four crypto firms and market makers face charges for wash-trading and inflating prices to lure in investors. Finally, in a groundbreaking move, federal prosecutors have launched the first-ever criminal case targeting wash trading in digital assets, shaking up the crypto world. Dave share's a Facebook watch you can't say no too. Our catch of the day comes from Reddit, and follows a chain of messages where a scammer is sharing news that sounds a bit too good to be true. </p><p>Links to the stories:</p><ul>
<li><a href="https://veriti.ai/blog/exploiting-hurricane-helene-with-fema-scams-and-phishing-threats/">Exploiting Hurricane Helene with FEMA Scams and Phishing Threats</a></li>
<li><a href="https://www.justice.gov/usao-ma/pr/eighteen-individuals-and-entities-charged-international-operation-targeting-widespread">Eighteen Individuals and Entities Charged in International Operation Targeting Widespread Fraud and Manipulation in the Cryptocurrency Markets</a></li>
<li><a href="https://www.fbi.gov/how-we-can-help-you/victim-services/seeking-victim-information/seeking-information-in-cryptocurrency-investment-fraud-investigation">Seeking Information in Cryptocurrency Investment Fraud Investigation</a></li>
<li><a href="https://www.cryptoglobe.com/latest/2024/10/u-s-federal-prosecutors-file-first-ever-criminal-charges-for-crypto-market-manipulation/">U.S. Federal Prosecutors File First-Ever Criminal Charges for Crypto Market Manipulation</a></li>
</ul><p><br></p><p>You can hear more from the T-Minus space daily show <a href="https://space.n2k.com/podcasts/t-minus">here</a>.</p><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@n2k.com">hackinghumans@n2k.com</a>. </p>]]>
      </content:encoded>
      <itunes:duration>2690</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[fc0a730a-ac02-11ee-b598-07965e0603f3]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW4074209514.mp3?updated=1729094639" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Election Propaganda: Part 3: Efforts to reduce the impact of future elections. [CSO Perspectives]</title>
      <link>https://thecyberwire.com/podcasts/cso-perspectives-public/5575/notes</link>
      <description>Thinking past the US 2024 Presidential Election, In part three of the series, Rick Howard, N2K CyberWire’s Chief Analyst and Senior Fellow, discusses reducing the impact of propaganda in the future elections with Perry Carpenter, Chief Human Risk Management Strategist at KnowBe4 and host of the 8th Layer Insights Podcast, Nina Jankowicz, Co-Founder and CEO of the The American Sunlight Project, and Scott Small, Director of Cyber Threat Intelligence at Tidal Cyber.

Check out Part 1 &amp; 2!
Part 1: Election Propaganda Part 1: How Does Election Propaganda Work? In this episode, Rick Howard, N2K CyberWire’s Chief Analyst and Senior Fellow, discusses personal defensive measures that every citizen can take—regardless of political philosophy—to resist the influence of propaganda. This foundational episode is essential for understanding how to navigate the complex landscape of election messaging.

Part 2: Election Propaganda: Part 2: Modern propaganda efforts. In preparation for the US 2024 Presidential Election, Rick Howard, N2K CyberWire’s Chief Analyst and Senior Fellow, discusses recent international propaganda efforts in the form of nation state interference and influence operations as well as domestic campaigns designed to split the target country into opposing camps. Guests include Nina Jankowicz, Co-Founder and CEO of the The American Sunlight Project and Scott Small, Director of Cyber Threat Intelligence at Tidal Cyber.

References:
Rick Howard, 2024. Election Propaganda Part 1: How does election propaganda work? [3 Part Podcast Series]. The CyberWire.
Rick Howard, 2024. Election Propaganda: Part 2: Modern propaganda efforts. [3 Part Podcast Series]. The CyberWire.
Christopher Chabris, Daniel Simons, 2010. The Invisible Gorilla: And Other Ways Our Intuitions Deceive Us [Book]. Goodreads.
Chris Palmer, 2010. TFL Viral - Awareness Test (Moonwalking Bear) [Explainer]. YouTube.
David Ehl, 2024. Why Meta is now banning Russian propaganda [News]. Deutsche Welle. 
Eli Pariser, 2011. The Filter Bubble: What the Internet is Hiding From You [Book]. Goodreads.
Kara Swisher, Julia Davis, Alex Stamos, Brandy Zadrozny, 2024. Useful Idiots? How Right-Wing Influencers Got $ to Spread Russian Propaganda [Podcast]. On with Kara Swisher.
Nate Silver, 2024. What’s behind Trump’s surge in prediction markets? [Analysis]. Silver Bulletin.
Niha Masih, 2024. Meta bans Russian state media outlet RT for acts of ‘foreign interference’ [News]. The Washington Post.
Nilay Patel, 2024. The AI election deepfakes have arrived [Podcast]. Decoder.
Nina Jankowicz, 2020. How to Lose the Information War: Russia, Fake News and the Future of Conflict [Book]. Goodreads. 
Perry Carpenter, 2024. FAIK: A Practical Guide to Living in a World of Deepfakes, Disinformation, and AI-Generated Deceptions [Book]. Goodreads. 
Perry Carpenter, 2021. Meatloaf Recipes Cookbook: Easy Recipes For Preparing Tasty Meals For Weight Loss And Healthy Lifestyle All Year Round [Book]. Goodreads.
Perry Carpenter, n.d. 8th Layer Insights [Podcast]. N2K CyberWire.
Renee DiResta, 2024. Invisible Rulers: The People Who Turn Lies into Reality [Book]. Goodreads. 
Robin Stern, Marc Brackett, 2024. 5 Ways to Recognize and Avoid Political Gaslighting [Explainer]. The Washington Post.
Sarah Ellison, Amy Gardner, Clara Ence Morse, 2024. Elon Musk’s misleading election claims reach millions and alarm election officials [News]. The Washington Post.
Scott Small, 2024. Election Cyber Interference Threats &amp; Defenses: A Data-Driven Study [White Paper]. Tidal Cyber.
Staff, n.d. Overview: Coalition for Content Provenance and Authenticity [Website]. C2PA.
Staff, 2021. Foreign Threats to the 2020 US Federal Elections [Intelligence Community Assessment]. DNI.
Staff, n.d. Project Origin [Website]. OriginProject. URL https://www.originproject.info/
Stuart A. Thompson, Tiffany Hsu, 2024. Left-Wing Misinformation Is Having a Moment [Analysis] The New York Times.</description>
      <pubDate>Wed, 16 Oct 2024 07:00:00 -0000</pubDate>
      <itunes:title>Election Propaganda: Part 3: Efforts to reduce the impact of future elections. [CSO Perspectives]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>11</itunes:season>
      <itunes:episode>5575</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Thinking past the US 2024 Presidential Election, In part three of the series, Rick Howard, N2K CyberWire’s Chief Analyst and Senior Fellow, discusses reducing the impact of propaganda in the future elections with Perry Carpenter, Chief Human Risk Management Strategist at KnowBe4 and host of the 8th Layer Insights Podcast, Nina Jankowicz, Co-Founder and CEO of the The American Sunlight Project, and Scott Small, Director of Cyber Threat Intelligence at Tidal Cyber.

Check out Part 1 &amp; 2!
Part 1: Election Propaganda Part 1: How Does Election Propaganda Work? In this episode, Rick Howard, N2K CyberWire’s Chief Analyst and Senior Fellow, discusses personal defensive measures that every citizen can take—regardless of political philosophy—to resist the influence of propaganda. This foundational episode is essential for understanding how to navigate the complex landscape of election messaging.

Part 2: Election Propaganda: Part 2: Modern propaganda efforts. In preparation for the US 2024 Presidential Election, Rick Howard, N2K CyberWire’s Chief Analyst and Senior Fellow, discusses recent international propaganda efforts in the form of nation state interference and influence operations as well as domestic campaigns designed to split the target country into opposing camps. Guests include Nina Jankowicz, Co-Founder and CEO of the The American Sunlight Project and Scott Small, Director of Cyber Threat Intelligence at Tidal Cyber.

References:
Rick Howard, 2024. Election Propaganda Part 1: How does election propaganda work? [3 Part Podcast Series]. The CyberWire.
Rick Howard, 2024. Election Propaganda: Part 2: Modern propaganda efforts. [3 Part Podcast Series]. The CyberWire.
Christopher Chabris, Daniel Simons, 2010. The Invisible Gorilla: And Other Ways Our Intuitions Deceive Us [Book]. Goodreads.
Chris Palmer, 2010. TFL Viral - Awareness Test (Moonwalking Bear) [Explainer]. YouTube.
David Ehl, 2024. Why Meta is now banning Russian propaganda [News]. Deutsche Welle. 
Eli Pariser, 2011. The Filter Bubble: What the Internet is Hiding From You [Book]. Goodreads.
Kara Swisher, Julia Davis, Alex Stamos, Brandy Zadrozny, 2024. Useful Idiots? How Right-Wing Influencers Got $ to Spread Russian Propaganda [Podcast]. On with Kara Swisher.
Nate Silver, 2024. What’s behind Trump’s surge in prediction markets? [Analysis]. Silver Bulletin.
Niha Masih, 2024. Meta bans Russian state media outlet RT for acts of ‘foreign interference’ [News]. The Washington Post.
Nilay Patel, 2024. The AI election deepfakes have arrived [Podcast]. Decoder.
Nina Jankowicz, 2020. How to Lose the Information War: Russia, Fake News and the Future of Conflict [Book]. Goodreads. 
Perry Carpenter, 2024. FAIK: A Practical Guide to Living in a World of Deepfakes, Disinformation, and AI-Generated Deceptions [Book]. Goodreads. 
Perry Carpenter, 2021. Meatloaf Recipes Cookbook: Easy Recipes For Preparing Tasty Meals For Weight Loss And Healthy Lifestyle All Year Round [Book]. Goodreads.
Perry Carpenter, n.d. 8th Layer Insights [Podcast]. N2K CyberWire.
Renee DiResta, 2024. Invisible Rulers: The People Who Turn Lies into Reality [Book]. Goodreads. 
Robin Stern, Marc Brackett, 2024. 5 Ways to Recognize and Avoid Political Gaslighting [Explainer]. The Washington Post.
Sarah Ellison, Amy Gardner, Clara Ence Morse, 2024. Elon Musk’s misleading election claims reach millions and alarm election officials [News]. The Washington Post.
Scott Small, 2024. Election Cyber Interference Threats &amp; Defenses: A Data-Driven Study [White Paper]. Tidal Cyber.
Staff, n.d. Overview: Coalition for Content Provenance and Authenticity [Website]. C2PA.
Staff, 2021. Foreign Threats to the 2020 US Federal Elections [Intelligence Community Assessment]. DNI.
Staff, n.d. Project Origin [Website]. OriginProject. URL https://www.originproject.info/
Stuart A. Thompson, Tiffany Hsu, 2024. Left-Wing Misinformation Is Having a Moment [Analysis] The New York Times.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Thinking past the US 2024 Presidential Election, In part three of the series, Rick Howard, N2K CyberWire’s Chief Analyst and Senior Fellow, discusses reducing the impact of propaganda in the future elections with Perry Carpenter, Chief Human Risk Management Strategist at KnowBe4 and host of the 8th Layer Insights Podcast, Nina Jankowicz, Co-Founder and CEO of the The American Sunlight Project, and Scott Small, Director of Cyber Threat Intelligence at Tidal Cyber.</p><p><br></p><h2>Check out Part 1 &amp; 2!</h2><p><strong>Part 1:</strong> <a href="https://thecyberwire.com/podcasts/cso-perspectives-public/5573/notes">Election Propaganda Part 1: How Does Election Propaganda Work?</a> In this episode, Rick Howard, N2K CyberWire’s Chief Analyst and Senior Fellow, discusses personal defensive measures that every citizen can take—regardless of political philosophy—to resist the influence of propaganda. This foundational episode is essential for understanding how to navigate the complex landscape of election messaging.</p><p><br></p><p><strong>Part 2: </strong><a href="https://thecyberwire.com/podcasts/cso-perspectives-public/5574/notes">Election Propaganda: Part 2: Modern propaganda efforts.</a><strong> </strong>In preparation for the US 2024 Presidential Election, Rick Howard, N2K CyberWire’s Chief Analyst and Senior Fellow, discusses recent international propaganda efforts in the form of nation state interference and influence operations as well as domestic campaigns designed to split the target country into opposing camps. Guests include Nina Jankowicz, Co-Founder and CEO of the The American Sunlight Project and Scott Small, Director of Cyber Threat Intelligence at Tidal Cyber.</p><p><br></p><h2>References:</h2><p><a href="https://thecyberwire.com/podcasts/cso-perspectives-public/5573/notes">Rick Howard, 2024. Election Propaganda Part 1: How does election propaganda work? [3 Part Podcast Series]. The CyberWire.</a></p><p><a href="https://thecyberwire.com/podcasts/cso-perspectives-public/5574/notes">Rick Howard, 2024. Election Propaganda: Part 2: Modern propaganda efforts. [3 Part Podcast Series]. The CyberWire.</a></p><p><a href="https://www.goodreads.com/book/show/7783191-the-invisible-gorilla">Christopher Chabris, Daniel Simons, 2010. The Invisible Gorilla: And Other Ways Our Intuitions Deceive Us [Book]. Goodreads.</a></p><p><a href="https://www.youtube.com/watch?v=xNSgmm9FX2s">Chris Palmer, 2010. TFL Viral - Awareness Test (Moonwalking Bear) [Explainer]. YouTube.</a></p><p><a href="https://www.dw.com/en/why-meta-is-now-banning-russian-propaganda/a-70290904">David Ehl, 2024. Why Meta is now banning Russian propaganda [News]. Deutsche Welle.</a> </p><p><a href="https://www.goodreads.com/book/show/10596103-the-filter-bubble">Eli Pariser, 2011. The Filter Bubble: What the Internet is Hiding From You [Book]. Goodreads.</a></p><p><a href="https://pca.st/pq9bqe5c">Kara Swisher, Julia Davis, Alex Stamos, Brandy Zadrozny, 2024. Useful Idiots? How Right-Wing Influencers Got $ to Spread Russian Propaganda [Podcast]. On with Kara Swisher.</a></p><p><a href="https://www.natesilver.net/p/whats-behind-trumps-surge-in-prediction">Nate Silver, 2024. What’s behind Trump’s surge in prediction markets? [Analysis]. Silver Bulletin.</a></p><p><a href="https://www.washingtonpost.com/technology/2024/09/17/meta-ban-rt-russia-state-media">Niha Masih, 2024. Meta bans Russian state media outlet RT for acts of ‘foreign interference’ [News]. The Washington Post.</a></p><p><a href="https://pca.st/hym6jsf4">Nilay Patel, 2024. The AI election deepfakes have arrived [Podcast]. Decoder.</a></p><p><a href="https://www.goodreads.com/book/show/52382865-how-to-lose-the-information-war">Nina Jankowicz, 2020. How to Lose the Information War: Russia, Fake News and the Future of Conflict [Book]. Goodreads. </a></p><p><a href="https://www.goodreads.com/book/show/217957690-faik">Perry Carpenter, 2024. FAIK: A Practical Guide to Living in a World of Deepfakes, Disinformation, and AI-Generated Deceptions [Book]. Goodreads.</a> </p><p><a href="https://www.goodreads.com/book/show/113976361-meatloaf-recipes-cookbook">Perry Carpenter, 2021. Meatloaf Recipes Cookbook: Easy Recipes For Preparing Tasty Meals For Weight Loss And Healthy Lifestyle All Year Round [Book]. Goodreads.</a></p><p><a href="https://thecyberwire.com/podcasts/8th-layer-insights">Perry Carpenter, n.d. 8th Layer Insights [Podcast]. N2K CyberWire.</a></p><p><a href="https://www.goodreads.com/book/show/199372835-invisible-rulers">Renee DiResta, 2024. Invisible Rulers: The People Who Turn Lies into Reality [Book]. Goodreads. </a></p><p><a href="https://www.washingtonpost.com/wellness/2024/09/10/political-gaslighting-comic/">Robin Stern, Marc Brackett, 2024. 5 Ways to Recognize and Avoid Political Gaslighting [Explainer]. The Washington Post.</a></p><p><a href="https://www.washingtonpost.com/politics/2024/09/10/elon-musk-illegal-immigrant-voting-misinformation/">Sarah Ellison, Amy Gardner, Clara Ence Morse, 2024. Elon Musk’s misleading election claims reach millions and alarm election officials [News]. The Washington Post.</a></p><p><a href="https://www.tidalcyber.com/election-cyber-interference-threats-and-defenses">Scott Small, 2024. Election Cyber Interference Threats &amp; Defenses: A Data-Driven Study [White Paper]. Tidal Cyber.</a></p><p><a href="https://c2pa.org/">Staff, n.d. Overview: Coalition for Content Provenance and Authenticity [Website]. C2PA.</a></p><p><a href="https://www.dni.gov/files/ODNI/documents/assessments/ICA-declass-16MAR21.pdf">Staff, 2021. Foreign Threats to the 2020 US Federal Elections [Intelligence Community Assessment]. DNI.</a></p><p><a href="https://www.nytimes.com/2024/09/03/technology/left-wing-misinformation-conspiracy-theories.html">Staff, n.d. Project Origin [Website]. OriginProject. URL https://www.originproject.info/</a></p><p><a href="https://www.nytimes.com/2024/09/03/technology/left-wing-misinformation-conspiracy-theories.html">Stuart A. Thompson, Tiffany Hsu, 2024. Left-Wing Misinformation Is Having a Moment [Analysis] The New York Times. </a></p>]]>
      </content:encoded>
      <itunes:duration>2788</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[04f6cbbe-8b3a-11ef-b43c-ef220c633d65]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW1185543119.mp3?updated=1729027430" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>encryption (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/53/notes</link>
      <description>Enjoy this Word Notes encore. 
The process of converting plain text into an unrecognizable form or secret code to hide its true meaning.</description>
      <pubDate>Tue, 15 Oct 2024 07:00:00 -0000</pubDate>
      <itunes:title>encryption (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>53</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Enjoy this Word Notes encore. 
The process of converting plain text into an unrecognizable form or secret code to hide its true meaning.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Enjoy this Word Notes encore. </p><p>The process of converting plain text into an unrecognizable form or secret code to hide its true meaning.</p>]]>
      </content:encoded>
      <itunes:duration>407</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[ed590cc8-872f-11ef-9daf-7bbb192d36b6]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW8145810995.mp3?updated=1728582911" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The e-commerce scam you didn’t see coming!</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/309/notes</link>
      <description>Maria Varmazis, host of N2K's daily space show T-Minus, joins Dave and Joe to share the story of a South Carolina couple, and how they were devastated to discover their vacant land in Concord, Massachusetts was fraudulently sold by thieves who posed as them, with the new owners already building a home on the property, prompting a lawsuit and an FBI investigation. 
Our hosts share some follow-up on two intriguing listener contributions. John blocks Google ads using NextDNS, which catches ad wrappers unless manually disabled. Georgi from Japan describes a new Visa card with no visible number or CVV. 
Dave's story is on triangulation fraud, a scam on e-commerce platforms like Amazon, where a fraudster lures buyers with fake listings for popular products at enticingly low prices, then uses stolen payment information to purchase the legitimate product from a seller, ultimately leaving the buyer unaware until debt collection notices arrive. Meanwhile, Joe has two stories this week. Police arrested five individuals in connection with a fake Brad Pitt scam that defrauded two women of $362,000. He also explores insights from the 2024 Global State of Authentication survey in a Q&amp;A with Yubico VP Derek Hanson, who discusses the future of passkeys. Our catch of the day shares some royal secrets you won't want to miss. 
Links to the stories:

Valuable land in Concord, Massachusetts stolen from couple. Now a home is being built there

The Amazon triangle scam: What it is, how it works, and what to do

Police arrest five people over fake Brad Pitt scam after two women lost $362,000

2024 Global State of Authentication survey: Q&amp;A with Yubico VP Derek Hanson on a passkey future


You can hear more from the T-Minus space daily show here.

Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@n2k.com.</description>
      <pubDate>Thu, 10 Oct 2024 05:00:00 -0000</pubDate>
      <itunes:title>The e-commerce scam you didn’t see coming!</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>309</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Maria Varmazis, host of N2K's daily space show T-Minus, joins Dave and Joe to share the story of a South Carolina couple, and how they were devastated to discover their vacant land in Concord, Massachusetts was fraudulently sold by thieves who posed as them, with the new owners already building a home on the property, prompting a lawsuit and an FBI investigation. 
Our hosts share some follow-up on two intriguing listener contributions. John blocks Google ads using NextDNS, which catches ad wrappers unless manually disabled. Georgi from Japan describes a new Visa card with no visible number or CVV. 
Dave's story is on triangulation fraud, a scam on e-commerce platforms like Amazon, where a fraudster lures buyers with fake listings for popular products at enticingly low prices, then uses stolen payment information to purchase the legitimate product from a seller, ultimately leaving the buyer unaware until debt collection notices arrive. Meanwhile, Joe has two stories this week. Police arrested five individuals in connection with a fake Brad Pitt scam that defrauded two women of $362,000. He also explores insights from the 2024 Global State of Authentication survey in a Q&amp;A with Yubico VP Derek Hanson, who discusses the future of passkeys. Our catch of the day shares some royal secrets you won't want to miss. 
Links to the stories:

Valuable land in Concord, Massachusetts stolen from couple. Now a home is being built there

The Amazon triangle scam: What it is, how it works, and what to do

Police arrest five people over fake Brad Pitt scam after two women lost $362,000

2024 Global State of Authentication survey: Q&amp;A with Yubico VP Derek Hanson on a passkey future


You can hear more from the T-Minus space daily show here.

Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@n2k.com.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Maria Varmazis, host of N2K's daily space show <em>T-Minus</em>, joins Dave and Joe to share the story of a South Carolina couple, and how they were devastated to discover their vacant land in Concord, Massachusetts was fraudulently sold by thieves who posed as them, with the new owners already building a home on the property, prompting a lawsuit and an FBI investigation. </p><p>Our hosts share some follow-up on two intriguing listener contributions. John blocks Google ads using NextDNS, which catches ad wrappers unless manually disabled. Georgi from Japan describes a new Visa card with no visible number or CVV. </p><p>Dave's story is on triangulation fraud, a scam on e-commerce platforms like Amazon, where a fraudster lures buyers with fake listings for popular products at enticingly low prices, then uses stolen payment information to purchase the legitimate product from a seller, ultimately leaving the buyer unaware until debt collection notices arrive. Meanwhile, Joe has two stories this week. Police arrested five individuals in connection with a fake Brad Pitt scam that defrauded two women of $362,000. He also explores insights from the 2024 Global State of Authentication survey in a Q&amp;A with Yubico VP Derek Hanson, who discusses the future of passkeys. Our catch of the day shares some royal secrets you won't want to miss. </p><p>Links to the stories:</p><ul>
<li><a href="https://www.cbsnews.com/boston/news/land-stolen-concord-home-construction-iteam/">Valuable land in Concord, Massachusetts stolen from couple. Now a home is being built there</a></li>
<li><a href="https://www.pcworld.com/article/2385361/amazon-how-the-triangular-scam-works.html">The Amazon triangle scam: What it is, how it works, and what to do</a></li>
<li><a href="https://www.cnn.com/2024/09/24/europe/spain-arrest-fake-brad-pitt-scam-intl-scli/index.html">Police arrest five people over fake Brad Pitt scam after two women lost $362,000</a></li>
<li><a href="https://www.yubico.com/blog/2024-global-state-of-authentication-survey-qa-with-yubico-vp-derek-hanson-on-a-passkey-future/">2024 Global State of Authentication survey: Q&amp;A with Yubico VP Derek Hanson on a passkey future</a></li>
</ul><p><br></p><p>You can hear more from the T-Minus space daily show <a href="https://space.n2k.com/podcasts/t-minus">here</a>.</p><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@n2k.com">hackinghumans@n2k.com</a>. </p>]]>
      </content:encoded>
      <itunes:duration>2788</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[fbde159e-ac02-11ee-b598-4b39f777a90c]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW4359933723.mp3?updated=1728500999" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Election Propaganda: Part 2: Modern propaganda efforts. [CSO Perspectives]</title>
      <link>https://thecyberwire.com/podcasts/cso-perspectives-public/5574/notes</link>
      <description>In preparation for the US 2024 Presidential Election, Rick Howard, N2K CyberWire’s Chief Analyst and Senior Fellow, discusses recent international propaganda efforts in the form of nation state interference and influence operations as well as domestic campaigns designed to split the target country into opposing camps. Guests include Nina Jankowicz, Co-Founder and CEO of the The American Sunlight Project and Scott Small, Director of Cyber Threat Intelligence at Tidal Cyber.

References:
Scott Small, 2024. Election Cyber Interference Threats &amp; Defenses: A Data-Driven Study [White Paper]. Tidal Cyber.
Renee DiResta, 2024. Invisible Rulers: The People Who Turn Lies into Reality [Book]. Goodreads.
Nina Jankowicz, 2020. How to Lose the Information War: Russia, Fake News and the Future of Conflict [Book]. Goodreads.</description>
      <pubDate>Wed, 09 Oct 2024 07:00:00 -0000</pubDate>
      <itunes:title>Election Propaganda: Part 2: Modern propaganda efforts. [CSO Perspectives]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>11</itunes:season>
      <itunes:episode>5574</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>In preparation for the US 2024 Presidential Election, Rick Howard, N2K CyberWire’s Chief Analyst and Senior Fellow, discusses recent international propaganda efforts in the form of nation state interference and influence operations as well as domestic campaigns designed to split the target country into opposing camps. Guests include Nina Jankowicz, Co-Founder and CEO of the The American Sunlight Project and Scott Small, Director of Cyber Threat Intelligence at Tidal Cyber.

References:
Scott Small, 2024. Election Cyber Interference Threats &amp; Defenses: A Data-Driven Study [White Paper]. Tidal Cyber.
Renee DiResta, 2024. Invisible Rulers: The People Who Turn Lies into Reality [Book]. Goodreads.
Nina Jankowicz, 2020. How to Lose the Information War: Russia, Fake News and the Future of Conflict [Book]. Goodreads.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In preparation for the US 2024 Presidential Election, Rick Howard, N2K CyberWire’s Chief Analyst and Senior Fellow, discusses recent international propaganda efforts in the form of nation state interference and influence operations as well as domestic campaigns designed to split the target country into opposing camps. Guests include Nina Jankowicz, Co-Founder and CEO of the The American Sunlight Project and Scott Small, Director of Cyber Threat Intelligence at Tidal Cyber.</p><p><br></p><h2>References:</h2><p><a href="https://www.tidalcyber.com/election-cyber-interference-threats-and-defenses">Scott Small, 2024. Election Cyber Interference Threats &amp; Defenses: A Data-Driven Study [White Paper]. Tidal Cyber.</a></p><p><a href="https://www.goodreads.com/book/show/199372835-invisible-rulers">Renee DiResta, 2024. Invisible Rulers: The People Who Turn Lies into Reality [Book]. Goodreads.</a></p><p><a href="https://www.goodreads.com/book/show/52382865-how-to-lose-the-information-war">Nina Jankowicz, 2020. How to Lose the Information War: Russia, Fake News and the Future of Conflict [Book]. Goodreads.</a></p>]]>
      </content:encoded>
      <itunes:duration>2986</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[e2cf701a-85b5-11ef-899e-d3037dacb02f]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW5242688669.mp3?updated=1728504052" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>keylogger (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/52/notes</link>
      <description>Please enjoy this encore episode of Word Notes.
Software or hardware that records the computer keys pressed by a user. </description>
      <pubDate>Tue, 08 Oct 2024 07:00:00 -0000</pubDate>
      <itunes:title>keylogger (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>52</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Please enjoy this encore episode of Word Notes.
Software or hardware that records the computer keys pressed by a user. </itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore episode of Word Notes.</p><p>Software or hardware that records the computer keys pressed by a user. </p>]]>
      </content:encoded>
      <itunes:duration>330</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[8d5c3934-84ec-11ef-b0dc-cf29bc0ebbf5]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW1680666368.mp3?updated=1728333952" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Election Propaganda Part 1: How does election propaganda work? [CSO Perspectives]</title>
      <link>https://thecyberwire.com/podcasts/cso-perspectives-public/5573/notes</link>
      <description>Rick Howard, N2K CyberWire’s Chief Analyst and Senior Fellow, discusses personal defensive measures that an average citizen, regardless of political philosophy, can take in order to not succumb to propaganda.
References:
David Ehl, 2024. Why Meta is now banning Russian propaganda [News]. Deutsche Welle.
Jeff Berman, Renée DiResta, 2023. Disinformation &amp; How To Combat It [Interview]. Youtube. 
Niha Masih, 2024. Meta bans Russian state media outlet RT for acts of ‘foreign interference’ [News]. The Washington Post.
Quentin Hardy, Renée DiResta, 2024. The Invisible Rulers Turning Lies Into Reality [Interview]. YouTube. 
Rob Tracinski, Renée DiResta, 2024. The Internet Rumor Mill [Interview]. YouTube.
Robin Stern, Marc Brackett, 2024. 5 Ways to Recognize and Avoid Political Gaslighting [Explainer]. The Washington Post.
Sarah Ellison, Amy Gardner, Clara Ence Morse, 2024. Elon Musk’s misleading election claims reach millions and alarm election officials [News]. The Washington Post.
Scott Small, 2024. Election Cyber Interference Threats &amp; Defenses: A Data-Driven Study [White Paper]. Tidal Cyber. 
Staff, 2021. Foreign Threats to the 2020 US Federal Elections [Intelligence Community Assessment]. DNI.
Staff, 2024. Election Cyber Interference Threats &amp; Defenses: A Data-Driven Study [White Paper]. Tidal.
Stuart A. Thompson, Tiffany Hsu, 2024. Left-Wing Misinformation Is Having a Moment [Analysis. The New York Times. 
Stuart A. Thompson, 2024. Elon Musk’s Week on X: Deepfakes, Falsehoods and Lots of Memes [News]. The New York Times.
Will Oremus, 2024. Zuckerberg expresses regrets over covid misinformation crackdown [News]. The Washington Post.
Yascha Mounk, Renée DiResta, 2022. How (Not) to Fix Social Media [Interview]. YouTube.
Renee DiResta, 2024. Invisible Rulers: The People Who Turn Lies into Reality [Book]. Goodreads. 
Nina Jankowicz, 2020. How to Lose the Information War: Russia, Fake News and the Future of Conflict [Book]. Goodreads.</description>
      <pubDate>Thu, 03 Oct 2024 07:00:00 -0000</pubDate>
      <itunes:title>Election Propaganda Part 1: How does election propaganda work? [CSO Perspectives]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>5573</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Rick Howard, N2K CyberWire’s Chief Analyst and Senior Fellow, discusses personal defensive measures that an average citizen, regardless of political philosophy, can take in order to not succumb to propaganda.
References:
David Ehl, 2024. Why Meta is now banning Russian propaganda [News]. Deutsche Welle.
Jeff Berman, Renée DiResta, 2023. Disinformation &amp; How To Combat It [Interview]. Youtube. 
Niha Masih, 2024. Meta bans Russian state media outlet RT for acts of ‘foreign interference’ [News]. The Washington Post.
Quentin Hardy, Renée DiResta, 2024. The Invisible Rulers Turning Lies Into Reality [Interview]. YouTube. 
Rob Tracinski, Renée DiResta, 2024. The Internet Rumor Mill [Interview]. YouTube.
Robin Stern, Marc Brackett, 2024. 5 Ways to Recognize and Avoid Political Gaslighting [Explainer]. The Washington Post.
Sarah Ellison, Amy Gardner, Clara Ence Morse, 2024. Elon Musk’s misleading election claims reach millions and alarm election officials [News]. The Washington Post.
Scott Small, 2024. Election Cyber Interference Threats &amp; Defenses: A Data-Driven Study [White Paper]. Tidal Cyber. 
Staff, 2021. Foreign Threats to the 2020 US Federal Elections [Intelligence Community Assessment]. DNI.
Staff, 2024. Election Cyber Interference Threats &amp; Defenses: A Data-Driven Study [White Paper]. Tidal.
Stuart A. Thompson, Tiffany Hsu, 2024. Left-Wing Misinformation Is Having a Moment [Analysis. The New York Times. 
Stuart A. Thompson, 2024. Elon Musk’s Week on X: Deepfakes, Falsehoods and Lots of Memes [News]. The New York Times.
Will Oremus, 2024. Zuckerberg expresses regrets over covid misinformation crackdown [News]. The Washington Post.
Yascha Mounk, Renée DiResta, 2022. How (Not) to Fix Social Media [Interview]. YouTube.
Renee DiResta, 2024. Invisible Rulers: The People Who Turn Lies into Reality [Book]. Goodreads. 
Nina Jankowicz, 2020. How to Lose the Information War: Russia, Fake News and the Future of Conflict [Book]. Goodreads.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Rick Howard, N2K CyberWire’s Chief Analyst and Senior Fellow, discusses personal defensive measures that an average citizen, regardless of political philosophy, can take in order to not succumb to propaganda.</p><h2>References:</h2><p><a href="https://www.dw.com/en/why-meta-is-now-banning-russian-propaganda/a-70290904">David Ehl, 2024. Why Meta is now banning Russian propaganda [News]. Deutsche Welle.</a></p><p><a href="https://www.youtube.com/watch?v=YG_qFv83gpA">Jeff Berman, Renée DiResta, 2023. Disinformation &amp; How To Combat It [Interview]. Youtube. </a></p><p><a href="https://www.washingtonpost.com/technology/2024/09/17/meta-ban-rt-russia-state-media">Niha Masih, 2024. Meta bans Russian state media outlet RT for acts of ‘foreign interference’ [News]. The Washington Post.</a></p><p><a href="https://www.youtube.com/watch?v=Ad2gjdN_k5Y">Quentin Hardy, Renée DiResta, 2024. The Invisible Rulers Turning Lies Into Reality [Interview]. YouTube. </a></p><p><a href="https://www.youtube.com/watch?v=WIeNusUarhE">Rob Tracinski, Renée DiResta, 2024. The Internet Rumor Mill [Interview]. YouTube.</a></p><p><a href="https://www.washingtonpost.com/wellness/2024/09/10/political-gaslighting-comic/">Robin Stern, Marc Brackett, 2024. 5 Ways to Recognize and Avoid Political Gaslighting [Explainer]. The Washington Post.</a></p><p><a href="https://www.washingtonpost.com/politics/2024/09/10/elon-musk-illegal-immigrant-voting-misinformation/">Sarah Ellison, Amy Gardner, Clara Ence Morse, 2024. Elon Musk’s misleading election claims reach millions and alarm election officials [News]. The Washington Post.</a></p><p><a href="https://www.tidalcyber.com/election-cyber-interference-threats-and-defenses">Scott Small, 2024. Election Cyber Interference Threats &amp; Defenses: A Data-Driven Study [White Paper]. Tidal Cyber. </a></p><p><a href="https://www.dni.gov/files/ODNI/documents/assessments/ICA-declass-16MAR21.pdf">Staff, 2021. Foreign Threats to the 2020 US Federal Elections [Intelligence Community Assessment]. DNI.</a></p><p><a href="https://www.tidalcyber.com/election-cyber-interference-threats-and-defenses">Staff, 2024. Election Cyber Interference Threats &amp; Defenses: A Data-Driven Study [White Paper]. Tidal.</a></p><p><a href="https://www.nytimes.com/2024/09/03/technology/left-wing-misinformation-conspiracy-theories.html">Stuart A. Thompson, Tiffany Hsu, 2024. Left-Wing Misinformation Is Having a Moment [Analysis. The New York Times. </a></p><p><a href="https://www.nytimes.com/2024/09/27/technology/elon-musk-x-posts.html">Stuart A. Thompson, 2024. Elon Musk’s Week on X: Deepfakes, Falsehoods and Lots of Memes [News]. The New York Times.</a></p><p><a href="https://www.washingtonpost.com/technology/2024/08/27/meta-zuckerberg-covid-misinformation-jordan-white-house/">Will Oremus, 2024. Zuckerberg expresses regrets over covid misinformation crackdown [News]. The Washington Post.</a></p><p><a href="https://www.youtube.com/watch?v=Qouv-mfAAbI">Yascha Mounk, Renée DiResta, 2022. How (Not) to Fix Social Media [Interview]. YouTube.</a></p><p><a href="https://www.goodreads.com/book/show/199372835-invisible-rulers">Renee DiResta, 2024. Invisible Rulers: The People Who Turn Lies into Reality [Book]. Goodreads. </a></p><p><a href="https://www.goodreads.com/book/show/52382865-how-to-lose-the-information-war">Nina Jankowicz, 2020. How to Lose the Information War: Russia, Fake News and the Future of Conflict [Book]. Goodreads.</a></p>]]>
      </content:encoded>
      <itunes:duration>1972</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[334f4f6e-8021-11ef-8a86-cbe0a8d9fc14]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW4297449407.mp3?updated=1727806804" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The Dark Arts of cyber. [Only Malware in the Building]</title>
      <link>https://thecyberwire.com/podcasts/only-malware-in-the-building/5/notes</link>
      <description>Welcome, witches, wizards, and cybersecurity sleuths! You’ve entered, Only Malware in the Building. Join us each month to brew potions of knowledge and crack the curses of today’s most intriguing cyber mysteries. Your host is Selena Larson, Proofpoint intelligence analyst and host of their podcast DISCARDED. Inspired by the residents of a building in New York’s exclusive upper west side, Selena is joined by N2K Networks Dave Bittner and Rick Howard to uncover the stories behind notable cyberattacks. 
Being a security researcher is a bit like being a detective: you gather clues, analyze the evidence, and consult the experts to solve the cyber puzzle. On this episode, we dive into how Proofpoint researchers uncovered an espionage campaign casting custom malware known as "Voldemort" in August 2024.
The Dark Arts practitioner behind this campaign targeted global organizations, disguising themselves as mundane tax authorities and weaving clever enchantments like using Google Sheets for command and control (C2). While their ultimate motive remains as shadowy as a cursed Horcrux, this malware is built for intelligence gathering and is primed to unleash additional attacks — likely summoning something even darker, like Cobalt Strike.
Prepare your wands, and let’s dive into this tale of digital sorcery!</description>
      <pubDate>Tue, 01 Oct 2024 07:00:00 -0000</pubDate>
      <itunes:title>The Dark Arts of cyber.The Dark Arts of cyber. [Only Malware in the Building]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>4</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Welcome, witches, wizards, and cybersecurity sleuths! You’ve entered, Only Malware in the Building. Join us each month to brew potions of knowledge and crack the curses of today’s most intriguing cyber mysteries. Your host is Selena Larson, Proofpoint intelligence analyst and host of their podcast DISCARDED. Inspired by the residents of a building in New York’s exclusive upper west side, Selena is joined by N2K Networks Dave Bittner and Rick Howard to uncover the stories behind notable cyberattacks. 
Being a security researcher is a bit like being a detective: you gather clues, analyze the evidence, and consult the experts to solve the cyber puzzle. On this episode, we dive into how Proofpoint researchers uncovered an espionage campaign casting custom malware known as "Voldemort" in August 2024.
The Dark Arts practitioner behind this campaign targeted global organizations, disguising themselves as mundane tax authorities and weaving clever enchantments like using Google Sheets for command and control (C2). While their ultimate motive remains as shadowy as a cursed Horcrux, this malware is built for intelligence gathering and is primed to unleash additional attacks — likely summoning something even darker, like Cobalt Strike.
Prepare your wands, and let’s dive into this tale of digital sorcery!</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Welcome, witches, wizards, and cybersecurity sleuths! You’ve entered, Only Malware in the Building. Join us each month to brew potions of knowledge and crack the curses of today’s most intriguing cyber mysteries. Your host is <a href="https://www.linkedin.com/in/selenalarson/">Selena Larson</a>, <a href="https://www.proofpoint.com/">Proofpoint</a> intelligence analyst and host of their podcast <a href="https://www.proofpoint.com/us/podcasts/discarded">DISCARDED</a>. Inspired by the residents of a building in New York’s exclusive upper west side, Selena is joined by <a href="https://www.n2k.com/">N2K</a> Networks <a href="https://www.linkedin.com/in/dave-bittner-27231a4/">Dave Bittner</a> and <a href="https://www.linkedin.com/in/rickhoward/">Rick Howard</a> to uncover the stories behind notable cyberattacks. </p><p>Being a security researcher is a bit like being a detective: you gather clues, analyze the evidence, and consult the experts to solve the cyber puzzle. On this episode, we dive into how <a href="https://www.proofpoint.com/us">Proofpoint</a> researchers uncovered an espionage campaign casting custom malware known as <strong>"</strong><a href="https://www.proofpoint.com/us/blog/threat-insight/malware-must-not-be-named-suspected-espionage-campaign-delivers-voldemort">Voldemort</a><strong>"</strong> in August 2024.</p><p>The Dark Arts practitioner behind this campaign targeted global organizations, disguising themselves as mundane tax authorities and weaving clever enchantments like using Google Sheets for command and control (C2). While their ultimate motive remains as shadowy as a cursed Horcrux, this malware is built for intelligence gathering and is primed to unleash additional attacks — likely summoning something even darker, like Cobalt Strike.</p><p>Prepare your wands, and let’s dive into this tale of digital sorcery!</p>]]>
      </content:encoded>
      <itunes:duration>1906</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[d324e69a-7cff-11ef-af41-27c668bc83ab]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW1017497027.mp3?updated=1727460894" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>non-fungible tokens (NFT) (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/51/notes</link>
      <description>Enjoy this encore of Word Notes.
Digital assets that are cryptographically protected on a blockchain and contain unique identification codes and metadata that makes them one of a kind.</description>
      <pubDate>Tue, 01 Oct 2024 07:00:00 -0000</pubDate>
      <itunes:title>non-fungible tokens (NFT) (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>54</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Enjoy this encore of Word Notes.
Digital assets that are cryptographically protected on a blockchain and contain unique identification codes and metadata that makes them one of a kind.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Enjoy this encore of Word Notes.</p><p>Digital assets that are cryptographically protected on a blockchain and contain unique identification codes and metadata that makes them one of a kind.</p>]]>
      </content:encoded>
      <itunes:duration>334</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[5f99e5ea-7f48-11ef-976c-eb6ecbea1432]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW1121002856.mp3?updated=1727711696" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The devil IS in the details. </title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/308/notes</link>
      <description>It's all in the details, folks. Pay attention to those and you can avoid unnecessary stress. Dave Bittner, Maria Varmazis, and Joe Carrigan swap stories on email password-stealing attacks, Google ads scams, and fake banks this week. The team shares follow up from listener Steven from the UK about the hazards of shoulder surfing when they received their new debit card with all PII on the same side of the card. A friend of the show JJ shared a story and a warning about fake checks. Never accept a check from a stranger. 

Dave's story covers Action Fraud, the UK’s national fraud and cyber reporting center, warning iPhone users of a new Apple ID phishing campaign. Maria talks about new research that uncovers a new scam that takes advantage of public wishlists on ecommerce websites, which in this case is Walmart, but is similar to those found on Amazon and other sites. Joe's story is about a firm in Singapore with an email from a supplier requesting that a pending payment be sent to a new bank account based in East Timor. 

Our Catch of the Day is from Reddit on the /scambait subreddit  "THE Dolly Parton is going to let ME in her VIP club."  

Links to the stories:

iPhone Users Warned As New Email Password-Stealing Attacks Reported

Walmart customers scammed via fake shopping lists, threatened with arrest

Police recover over USD 40 million from international email scam

THE Dolly Parton is going to let ME in her VIP club.


You can hear more from the T-Minus space daily show here.

Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@n2k.com.</description>
      <pubDate>Thu, 26 Sep 2024 05:00:00 -0000</pubDate>
      <itunes:title>The devil IS in the details. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>308</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>It's all in the details, folks. Pay attention to those and you can avoid unnecessary stress. Dave Bittner, Maria Varmazis, and Joe Carrigan swap stories on email password-stealing attacks, Google ads scams, and fake banks this week. The team shares follow up from listener Steven from the UK about the hazards of shoulder surfing when they received their new debit card with all PII on the same side of the card. A friend of the show JJ shared a story and a warning about fake checks. Never accept a check from a stranger. 

Dave's story covers Action Fraud, the UK’s national fraud and cyber reporting center, warning iPhone users of a new Apple ID phishing campaign. Maria talks about new research that uncovers a new scam that takes advantage of public wishlists on ecommerce websites, which in this case is Walmart, but is similar to those found on Amazon and other sites. Joe's story is about a firm in Singapore with an email from a supplier requesting that a pending payment be sent to a new bank account based in East Timor. 

Our Catch of the Day is from Reddit on the /scambait subreddit  "THE Dolly Parton is going to let ME in her VIP club."  

Links to the stories:

iPhone Users Warned As New Email Password-Stealing Attacks Reported

Walmart customers scammed via fake shopping lists, threatened with arrest

Police recover over USD 40 million from international email scam

THE Dolly Parton is going to let ME in her VIP club.


You can hear more from the T-Minus space daily show here.

Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@n2k.com.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>It's all in the details, folks. Pay attention to those and you can avoid unnecessary stress. Dave Bittner, Maria Varmazis, and Joe Carrigan swap stories on email password-stealing attacks, Google ads scams, and fake banks this week. The team shares follow up from listener Steven from the UK about the hazards of shoulder surfing when they received their new debit card with all PII on the same side of the card. A friend of the show JJ shared a story and a warning about fake checks. Never accept a check from a stranger. </p><p><br></p><p>Dave's story covers Action Fraud, the UK’s national fraud and cyber reporting center, warning iPhone users of a new Apple ID phishing campaign. Maria talks about new research that uncovers a new scam that takes advantage of public wishlists on ecommerce websites, which in this case is Walmart, but is similar to those found on Amazon and other sites. Joe's story is about a firm in Singapore with an email from a supplier requesting that a pending payment be sent to a new bank account based in East Timor. </p><p><br></p><p>Our Catch of the Day is from Reddit on the /scambait subreddit  "THE Dolly Parton is going to let ME in her VIP club."  </p><p><br></p><p>Links to the stories:</p><ul>
<li><a href="https://www.forbes.com/sites/daveywinder/2024/09/18/icloud-password-attack-warning-for-iphone-15-iphone-16-gmail-outlook-users/">iPhone Users Warned As New Email Password-Stealing Attacks Reported</a></li>
<li><a href="https://www.malwarebytes.com/blog/scams/2024/09/walmart-customers-scammed-via-fake-shopping-lists-threatened-with-arrest">Walmart customers scammed via fake shopping lists, threatened with arrest</a></li>
<li><a href="https://www.interpol.int/en/News-and-Events/News/2024/Police-recover-over-USD-40-million-from-international-email-scam">Police recover over USD 40 million from international email scam</a></li>
<li><a href="https://www.reddit.com/r/scambait/comments/1fh1rl7/the_dolly_parton_is_going_to_let_me_in_her_vip/?share_id=p3wjeUkDwFLXDnwaMubrD&amp;utm_content=1&amp;utm_medium=ios_app&amp;utm_name=ioscss&amp;utm_source=share&amp;utm_term=1">THE Dolly Parton is going to let ME in her VIP club.</a></li>
</ul><p><br></p><p>You can hear more from the T-Minus space daily show <a href="https://space.n2k.com/podcasts/t-minus">here</a>.</p><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@n2k.com">hackinghumans@n2k.com</a>. </p>]]>
      </content:encoded>
      <itunes:duration>2825</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[fb852ed4-ac02-11ee-b598-6f71e2f535f2]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW2342514282.mp3?updated=1727129805" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>multi-factor authentication (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/50/notes</link>
      <description>Enjoy this special encore episode.
The use of two or more verification methods to gain access to an account.</description>
      <pubDate>Tue, 24 Sep 2024 07:10:00 -0000</pubDate>
      <itunes:title>multi-factor authentication (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>50</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Enjoy this special encore episode.
The use of two or more verification methods to gain access to an account.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Enjoy this special encore episode.</p><p>The use of two or more verification methods to gain access to an account.</p>]]>
      </content:encoded>
      <itunes:duration>361</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[8ebee4a2-75ce-11ef-a219-d3da70a23bf3]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW7081743885.mp3?updated=1726671603" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Scammers beware, the world is watching!</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/307/notes</link>
      <description>This week, Dave and Joe share some listener follow-up from Clayton about credit card fraud and the potential issues with automatic update services that some cards provide. Dave's story is on sextortion scams targeting spouses, where scammers claim a partner is cheating and provide links to fake "proof." Joe has two stories this week, the first one is on how Police in Lebanon County arrested an alleged grandparent scammer after a sting operation. Joe's second story is on scam victims being compensated under a new Labor plan in Australia, which would fine banks, telcos, and social media platforms up to $50 million for failing to meet anti-scam obligations. Our catch of the day comes from Reddit, where someone posted a text message thread of their conversation with a scammer about a potential job. 
Links to the stories:

Sextortion scams now use your "cheating" spouse’s name as a lure

Police in Lebanon County arrest alleged grandparent scammer after sting operation

Scam victims to be compensated under Labor plan to fine banks and social media platforms $50m


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com.</description>
      <pubDate>Thu, 19 Sep 2024 05:00:00 -0000</pubDate>
      <itunes:title>Scammers beware, the world is watching!</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>307</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>This week, Dave and Joe share some listener follow-up from Clayton about credit card fraud and the potential issues with automatic update services that some cards provide. Dave's story is on sextortion scams targeting spouses, where scammers claim a partner is cheating and provide links to fake "proof." Joe has two stories this week, the first one is on how Police in Lebanon County arrested an alleged grandparent scammer after a sting operation. Joe's second story is on scam victims being compensated under a new Labor plan in Australia, which would fine banks, telcos, and social media platforms up to $50 million for failing to meet anti-scam obligations. Our catch of the day comes from Reddit, where someone posted a text message thread of their conversation with a scammer about a potential job. 
Links to the stories:

Sextortion scams now use your "cheating" spouse’s name as a lure

Police in Lebanon County arrest alleged grandparent scammer after sting operation

Scam victims to be compensated under Labor plan to fine banks and social media platforms $50m


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This week, Dave and Joe share some listener follow-up from Clayton about credit card fraud and the potential issues with automatic update services that some cards provide. Dave's story is on sextortion scams targeting spouses, where scammers claim a partner is cheating and provide links to fake "proof." Joe has two stories this week, the first one is on how Police in Lebanon County arrested an alleged grandparent scammer after a sting operation. Joe's second story is on scam victims being compensated under a new Labor plan in Australia, which would fine banks, telcos, and social media platforms up to $50 million for failing to meet anti-scam obligations. Our catch of the day comes from Reddit, where someone posted a text message thread of their conversation with a scammer about a potential job. </p><p>Links to the stories:</p><ul>
<li><a href="https://www.bleepingcomputer.com/news/security/sextortion-scams-now-use-your-cheating-spouses-name-as-a-lure/">Sextortion scams now use your "cheating" spouse’s name as a lure</a></li>
<li><a href="https://www.wgal.com/article/lebanon-county-police-arrest-alleged-grandparent-scammer-after-sting-operation/62178560">Police in Lebanon County arrest alleged grandparent scammer after sting operation</a></li>
<li><a href="https://www.theguardian.com/money/2024/sep/13/banks-and-social-media-firms-face-payouts-to-australian-scam-victims-and-fines-of-up-50m-in-new-crackdown">Scam victims to be compensated under Labor plan to fine banks and social media platforms $50m</a></li>
</ul><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com.</p>]]>
      </content:encoded>
      <itunes:duration>1843</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[fb57fc52-ac02-11ee-b598-ff6b49338d02]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW5994821296.mp3?updated=1726595968" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>machine learning (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/49/notes</link>
      <description>Enjoy this special encore episode.
A programming technique where the developer doesn't specify each step of the algorithm in code, but instead teaches the algorithm to learn from the experience.</description>
      <pubDate>Tue, 17 Sep 2024 07:10:00 -0000</pubDate>
      <itunes:title>machine learning (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>49</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Enjoy this special encore episode.
A programming technique where the developer doesn't specify each step of the algorithm in code, but instead teaches the algorithm to learn from the experience.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Enjoy this special encore episode.</p><p>A programming technique where the developer doesn't specify each step of the algorithm in code, but instead teaches the algorithm to learn from the experience.</p>]]>
      </content:encoded>
      <itunes:duration>376</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[a343179c-7464-11ef-ae6c-67946d4af858]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW3587280631.mp3?updated=1726516404" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Baked goods and bad actors.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/306/notes</link>
      <description>Maria Varmazis, host of N2K's daily space show T-Minus, joins Dave and Joe to share the story on the "Hello pervert" sextortion scam, where scammers now use threats of Pegasus spyware and photos of victims' homes to intensify their demands. We have quite a bit of follow-up today. Scott from Australia shared how self-service checkouts now display scam warnings when purchasing gift cards to prevent fraud. Jim highlighted a vulnerability in YubiKey encryption libraries that allows key cloning with an oscilloscope, while a former US Marshal reminded us that Zelle is marketed specifically for transfers between friends and family. Joe's story is on Loria Stern, a small bakery owner who fell victim to a counterfeit check scam after receiving a $7,500 payment for a large cupcake order that was later halved, resulting in her bank withdrawing the funds. Dave's story follows the scams targeting grieving individuals on Facebook, where cybercriminals use fake funeral live stream links or donation requests to steal money and credit card details. Our catch of the day comes from listener Anne, who shares a phishing email sent to a friend. The email emphasized the importance of thorough testing in the software development lifecycle and came with a suspicious PDF attachment, likely containing a malicious link. Anne hopes the campaign has zero success.
Links to the stories:

“Hello pervert” sextortion scam includes new threat of Pegasus—and a picture of your home

LA bakery owner takes big financial hit after receiving scam order of 1,000 cupcakes, paid for with a $7.5K counterfeit check — her bank’s promise of protection fell through

Fake funeral “live stream” scams target grieving users on Facebook


You can hear more from the T-Minus space daily show here.
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com.</description>
      <pubDate>Thu, 12 Sep 2024 05:00:00 -0000</pubDate>
      <itunes:title>Baked goods and bad actors.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>306</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Maria Varmazis, host of N2K's daily space show T-Minus, joins Dave and Joe to share the story on the "Hello pervert" sextortion scam, where scammers now use threats of Pegasus spyware and photos of victims' homes to intensify their demands. We have quite a bit of follow-up today. Scott from Australia shared how self-service checkouts now display scam warnings when purchasing gift cards to prevent fraud. Jim highlighted a vulnerability in YubiKey encryption libraries that allows key cloning with an oscilloscope, while a former US Marshal reminded us that Zelle is marketed specifically for transfers between friends and family. Joe's story is on Loria Stern, a small bakery owner who fell victim to a counterfeit check scam after receiving a $7,500 payment for a large cupcake order that was later halved, resulting in her bank withdrawing the funds. Dave's story follows the scams targeting grieving individuals on Facebook, where cybercriminals use fake funeral live stream links or donation requests to steal money and credit card details. Our catch of the day comes from listener Anne, who shares a phishing email sent to a friend. The email emphasized the importance of thorough testing in the software development lifecycle and came with a suspicious PDF attachment, likely containing a malicious link. Anne hopes the campaign has zero success.
Links to the stories:

“Hello pervert” sextortion scam includes new threat of Pegasus—and a picture of your home

LA bakery owner takes big financial hit after receiving scam order of 1,000 cupcakes, paid for with a $7.5K counterfeit check — her bank’s promise of protection fell through

Fake funeral “live stream” scams target grieving users on Facebook


You can hear more from the T-Minus space daily show here.
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Maria Varmazis, host of N2K's daily space show <em>T-Minus</em>, joins Dave and Joe to share the story on the "Hello pervert" sextortion scam, where scammers now use threats of Pegasus spyware and photos of victims' homes to intensify their demands. We have quite a bit of follow-up today. Scott from Australia shared how self-service checkouts now display scam warnings when purchasing gift cards to prevent fraud. Jim highlighted a vulnerability in YubiKey encryption libraries that allows key cloning with an oscilloscope, while a former US Marshal reminded us that Zelle is marketed specifically for transfers between friends and family. Joe's story is on Loria Stern, a small bakery owner who fell victim to a counterfeit check scam after receiving a $7,500 payment for a large cupcake order that was later halved, resulting in her bank withdrawing the funds. Dave's story follows the scams targeting grieving individuals on Facebook, where cybercriminals use fake funeral live stream links or donation requests to steal money and credit card details. Our catch of the day comes from listener Anne, who shares a phishing email sent to a friend. The email emphasized the importance of thorough testing in the software development lifecycle and came with a suspicious PDF attachment, likely containing a malicious link. Anne hopes the campaign has zero success.</p><p>Links to the stories:</p><ul>
<li><a href="https://www.malwarebytes.com/blog/news/2024/09/hello-pervert-sextortion-scam-includes-new-threat-of-pegasus-and-a-picture-of-your-home">“Hello pervert” sextortion scam includes new threat of Pegasus—and a picture of your home</a></li>
<li><a href="https://finance.yahoo.com/news/la-bakery-owner-takes-big-102200672.html?guce_referrer=aHR0cHM6Ly93d3cuZ29vZ2xlLmNvbS8&amp;guce_referrer_sig=AQAAALGhKJITSlmoDM6Pel4ro0hKb6NoSk8rQt28Q4gZLXM0QPviyV_cwOsjdYkBYGKV3_PSHOfJw0_gX8nOvW-S8FR1y26IiWVFLQD3gkI5hAxljlHCxVkw09zK5zIcJBFI1LGxbdvPNg_NPVcpOsDC0cosgHfHNyHiieucmm2MWjle&amp;guccounter=1">LA bakery owner takes big financial hit after receiving scam order of 1,000 cupcakes, paid for with a $7.5K counterfeit check — her bank’s promise of protection fell through</a></li>
<li><a href="https://www.malwarebytes.com/blog/news/2024/08/fake-funeral-live-stream-scams-target-grieving-users-on-facebook">Fake funeral “live stream” scams target grieving users on Facebook</a></li>
</ul><p><br></p><p>You can hear more from the T-Minus space daily show <a href="https://space.n2k.com/podcasts/t-minus">here</a>.</p><p>Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com.</p>]]>
      </content:encoded>
      <itunes:duration>2567</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[fb2af720-ac02-11ee-b598-17bf2723e71b]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW6262304525.mp3?updated=1726154012" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>intelligence (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/48/notes</link>
      <description>Enjoy this special encore episode. 
The process of turning raw information into intelligence products that leaders use to make decisions with.</description>
      <pubDate>Tue, 10 Sep 2024 07:00:00 -0000</pubDate>
      <itunes:title>intelligence (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>48</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Enjoy this special encore episode. 
The process of turning raw information into intelligence products that leaders use to make decisions with.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Enjoy this special encore episode. </p><p>The process of turning raw information into intelligence products that leaders use to make decisions with.</p>]]>
      </content:encoded>
      <itunes:duration>356</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b428f108-6ebf-11ef-828f-578968beea98]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW7669571381.mp3?updated=1725896397" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Illusions &amp; ill-intent.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/305/notes</link>
      <description>Maria Varmazis, host of N2K's daily space show T-Minus, joins Dave and Joe to share the story of how the ease of registering an LLC in Colorado has led to a surge in fraudulent businesses. She discusses how residents receiving suspicious mail addressed to fake LLCs registered at their homes are overwhelming the state's Secretary of State with thousands of complaints. Joe's story is on how scammers used a seaside hotel and former bank offices on the Isle of Man to defraud victims in China out of millions of dollars. Dave's story follows a phishing campaign where attackers impersonated HR departments by sending fake mid-year employee engagement surveys to steal Microsoft Office 365 credentials. Our catch of the day comes from Mitch, who received a scam email claiming to be an invitation to join the "Great Illuminati Brotherhood." The email promises wealth, fame, and protection, urging the recipient to contact them to solve financial problems and join the so-called "Elite Family."

Links to the stories:

Colorado has a backlog of shady LLCs to investigate

China scam run from Isle of Man

Mid-Year Engagement Trap: How Fake Surveys Are Used in Phishing


You can hear more from the T-Minus space daily show here.
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com.</description>
      <pubDate>Thu, 05 Sep 2024 05:00:00 -0000</pubDate>
      <itunes:title>Illusions &amp; ill-intent.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>305</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Maria Varmazis, host of N2K's daily space show T-Minus, joins Dave and Joe to share the story of how the ease of registering an LLC in Colorado has led to a surge in fraudulent businesses. She discusses how residents receiving suspicious mail addressed to fake LLCs registered at their homes are overwhelming the state's Secretary of State with thousands of complaints. Joe's story is on how scammers used a seaside hotel and former bank offices on the Isle of Man to defraud victims in China out of millions of dollars. Dave's story follows a phishing campaign where attackers impersonated HR departments by sending fake mid-year employee engagement surveys to steal Microsoft Office 365 credentials. Our catch of the day comes from Mitch, who received a scam email claiming to be an invitation to join the "Great Illuminati Brotherhood." The email promises wealth, fame, and protection, urging the recipient to contact them to solve financial problems and join the so-called "Elite Family."

Links to the stories:

Colorado has a backlog of shady LLCs to investigate

China scam run from Isle of Man

Mid-Year Engagement Trap: How Fake Surveys Are Used in Phishing


You can hear more from the T-Minus space daily show here.
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Maria Varmazis, host of N2K's daily space show <em>T-Minus</em>, joins Dave and Joe to share the story of how the ease of registering an LLC in Colorado has led to a surge in fraudulent businesses. She discusses how residents receiving suspicious mail addressed to fake LLCs registered at their homes are overwhelming the state's Secretary of State with thousands of complaints. Joe's story is on how scammers used a seaside hotel and former bank offices on the Isle of Man to defraud victims in China out of millions of dollars. Dave's story follows a phishing campaign where attackers impersonated HR departments by sending fake mid-year employee engagement surveys to steal Microsoft Office 365 credentials. Our catch of the day comes from Mitch, who received a scam email claiming to be an invitation to join the "Great Illuminati Brotherhood." The email promises wealth, fame, and protection, urging the recipient to contact them to solve financial problems and join the so-called "Elite Family."</p><p><br></p><p>Links to the stories:</p><ul>
<li><a href="https://www.9news.com/article/money/consumer/steve-on-your-side/colorado-shady-llcs/73-4efc268a-e061-4bec-97f1-0a7cbae24a87">Colorado has a backlog of shady LLCs to investigate</a></li>
<li><a href="https://www.bbc.com/news/articles/cz6x1ql1yelo">China scam run from Isle of Man</a></li>
<li><a href="https://cofense.com/blog/mid-year-engagement-trap-how-fake-surveys-are-used-in-phishing">Mid-Year Engagement Trap: How Fake Surveys Are Used in Phishing</a></li>
</ul><p><br></p><p>You can hear more from the T-Minus space daily show <a href="https://space.n2k.com/podcasts/t-minus">here</a>.</p><p>Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com.</p>]]>
      </content:encoded>
      <itunes:duration>2355</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[fafe2632-ac02-11ee-b598-e73148d3dcd7]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW4946636285.mp3?updated=1725468507" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>RATs in the tunnel: Uncovering the cyber underworld. [OMITB]</title>
      <link>https://thecyberwire.com/podcasts/only-malware-in-the-building/4/notes</link>
      <description>Welcome in! You’ve entered, Only Malware in the Building. Join us each month to sip tea and solve mysteries about today’s most interesting threats. Your host is Selena Larson, Proofpoint intelligence analyst and host of their podcast DISCARDED. Inspired by the residents of a building in New York’s exclusive upper west side, Selena is joined by N2K Networks Dave Bittner and Rick Howard to uncover the stories behind notable cyberattacks. 
Being a security researcher is a bit like being a detective: you gather clues, analyze the evidence, and consult the experts to solve the cyber puzzle. On this episode, we talk about the abuse of legitimate services for malware delivery.
Proofpoint has seen an increase in the abuse of tools like ScreenConnect and NetSupport, as well as Cloudflare Tunnel abuse and the use of IP filtering. They have also observed a rise in financially motivated malware delivery using TryCloudflare Tunnel abuse, focusing on remote access trojans (RATs) like Xworm and AsyncRAT.
Today we look at how Cloudflare tunnels are used to evade detection and how they have evolved their tactics by incorporating obfuscation techniques, with ongoing research to identify the threat actors involved.</description>
      <pubDate>Tue, 03 Sep 2024 07:10:00 -0000</pubDate>
      <itunes:title>RATs in the tunnel: Uncovering the cyber underworld. [OMITB]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>4</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Welcome in! You’ve entered, Only Malware in the Building. Join us each month to sip tea and solve mysteries about today’s most interesting threats. Your host is Selena Larson, Proofpoint intelligence analyst and host of their podcast DISCARDED. Inspired by the residents of a building in New York’s exclusive upper west side, Selena is joined by N2K Networks Dave Bittner and Rick Howard to uncover the stories behind notable cyberattacks. 
Being a security researcher is a bit like being a detective: you gather clues, analyze the evidence, and consult the experts to solve the cyber puzzle. On this episode, we talk about the abuse of legitimate services for malware delivery.
Proofpoint has seen an increase in the abuse of tools like ScreenConnect and NetSupport, as well as Cloudflare Tunnel abuse and the use of IP filtering. They have also observed a rise in financially motivated malware delivery using TryCloudflare Tunnel abuse, focusing on remote access trojans (RATs) like Xworm and AsyncRAT.
Today we look at how Cloudflare tunnels are used to evade detection and how they have evolved their tactics by incorporating obfuscation techniques, with ongoing research to identify the threat actors involved.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Welcome in! You’ve entered, Only Malware in the Building. Join us each month to sip tea and solve mysteries about today’s most interesting threats. Your host is <a href="https://www.linkedin.com/in/selenalarson/">Selena Larson</a>, <a href="https://www.proofpoint.com/">Proofpoint</a> intelligence analyst and host of their podcast <a href="https://www.proofpoint.com/us/podcasts/discarded">DISCARDED</a>. Inspired by the residents of a building in New York’s exclusive upper west side, Selena is joined by <a href="https://www.n2k.com/">N2K</a> Networks <a href="https://www.linkedin.com/in/dave-bittner-27231a4/">Dave Bittner</a> and <a href="https://www.linkedin.com/in/rickhoward/">Rick Howard</a> to uncover the stories behind notable cyberattacks. </p><p>Being a security researcher is a bit like being a detective: you gather clues, analyze the evidence, and consult the experts to solve the cyber puzzle. On this episode, we talk about the abuse of legitimate services for malware delivery.</p><p>Proofpoint has seen an increase in the abuse of tools like ScreenConnect and NetSupport, as well as <a href="https://www.proofpoint.com/us/blog/threat-insight/threat-actor-abuses-cloudflare-tunnels-deliver-rats">Cloudflare Tunnel</a> abuse and the use of IP filtering. They have also observed a rise in financially motivated malware delivery using TryCloudflare Tunnel abuse, focusing on remote access trojans (RATs) like Xworm and AsyncRAT.</p><p>Today we look at how Cloudflare tunnels are used to evade detection and how they have evolved their tactics by incorporating obfuscation techniques, with ongoing research to identify the threat actors involved.</p>]]>
      </content:encoded>
      <itunes:duration>2225</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[9b816ae2-66fc-11ef-9f37-2b024d3b2d33]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW4814775498.mp3?updated=1727471344" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>SaaS (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/47/notes</link>
      <description>Enjoy this special edition of Word Notes:
A cloud-based software distribution method where app infrastructure, performance, and security are maintained by a service provider and accessible to users, typically via subscription, from any device connected to the internet.</description>
      <pubDate>Tue, 03 Sep 2024 07:00:00 -0000</pubDate>
      <itunes:title>SaaS (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>47</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Enjoy this special edition of Word Notes:
A cloud-based software distribution method where app infrastructure, performance, and security are maintained by a service provider and accessible to users, typically via subscription, from any device connected to the internet.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Enjoy this special edition of Word Notes:</p><p>A cloud-based software distribution method where app infrastructure, performance, and security are maintained by a service provider and accessible to users, typically via subscription, from any device connected to the internet.</p>]]>
      </content:encoded>
      <itunes:duration>364</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[5ac4b81a-663e-11ef-aaf3-8385f38e9cc7]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW7069227345.mp3?updated=1724960519" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Beware of the deceivers.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/304/notes</link>
      <description>This week Joe and Dave share some listener follow up from Tim, who writes in to give some more information on a payment apps story in episode 302. Joe's story is on Suzy Enos, whose sister died, only for scammers to impersonate a family member and take over her phone number, leading to fraudulent charges on her accounts. Enos fought back to secure her late sister's assets and raise awareness about protecting accounts after a loved one's death. Dave's story follows how scammers exploit the "Automatic Billing Update" (ABU) program to enroll people in fake subscriptions and charge them even after their credit cards are replaced. To avoid this, you need to inform your issuer that it's a subscription scam and request them to block the merchant from using ABU to get your new card number. Our catch of the day comes from listener Felipe, who writes in share a letter he got in the mail where scammers were trying to convince him that he is owed money from a family member he has never heard of before. 
Links to the stories:


Her sister died. Then scammers took over her phone number and started racking up bills.

Mastodon Royce Williams

The little-known credit card program that lets companies share your information

Keep your cards on file always up-to-date

MasterCard Automatic Billing Updater Service


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com.</description>
      <pubDate>Thu, 29 Aug 2024 05:00:00 -0000</pubDate>
      <itunes:title>Beware of the deceivers.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>306</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>This week Joe and Dave share some listener follow up from Tim, who writes in to give some more information on a payment apps story in episode 302. Joe's story is on Suzy Enos, whose sister died, only for scammers to impersonate a family member and take over her phone number, leading to fraudulent charges on her accounts. Enos fought back to secure her late sister's assets and raise awareness about protecting accounts after a loved one's death. Dave's story follows how scammers exploit the "Automatic Billing Update" (ABU) program to enroll people in fake subscriptions and charge them even after their credit cards are replaced. To avoid this, you need to inform your issuer that it's a subscription scam and request them to block the merchant from using ABU to get your new card number. Our catch of the day comes from listener Felipe, who writes in share a letter he got in the mail where scammers were trying to convince him that he is owed money from a family member he has never heard of before. 
Links to the stories:


Her sister died. Then scammers took over her phone number and started racking up bills.

Mastodon Royce Williams

The little-known credit card program that lets companies share your information

Keep your cards on file always up-to-date

MasterCard Automatic Billing Updater Service


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This week Joe and Dave share some listener follow up from Tim, who writes in to give some more information on a payment apps story in episode 302. Joe's story is on Suzy Enos, whose sister died, only for scammers to impersonate a family member and take over her phone number, leading to fraudulent charges on her accounts. Enos fought back to secure her late sister's assets and raise awareness about protecting accounts after a loved one's death. Dave's story follows how scammers exploit the "Automatic Billing Update" (ABU) program to enroll people in fake subscriptions and charge them even after their credit cards are replaced. To avoid this, you need to inform your issuer that it's a subscription scam and request them to block the merchant from using ABU to get your new card number. Our catch of the day comes from listener Felipe, who writes in share a letter he got in the mail where scammers were trying to convince him that he is owed money from a family member he has never heard of before. </p><p>Links to the stories:</p><ul>
<li>
<a href="https://www.bostonglobe.com/2024/08/15/business/tmobile-death-scammers-cell-phone-number/">Her sister died. Then scammers took over her phone number and started racking up bills</a>.</li>
<li><a href="https://infosec.exchange/@tychotithonus/112998448807436243">Mastodon Royce Williams</a></li>
<li><a href="https://globalnews.ca/news/9763295/little-known-credit-card-program-companies-information/">The little-known credit card program that lets companies share your information</a></li>
<li><a href="https://developer.mastercard.com/product/automatic-billing-updater-abu/">Keep your cards on file always up-to-date</a></li>
<li><a href="https://www.susserbank.com/automatic-billing-updater-service/">MasterCard Automatic Billing Updater Service</a></li>
</ul><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com.</p>]]>
      </content:encoded>
      <itunes:duration>2696</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[fad0c3fe-ac02-11ee-b598-33a3c5089bb5]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW3526185628.mp3?updated=1724779669" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>brute-force attack (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/46/notes</link>
      <description>Enjoy this special encore episode.
A cryptographic hack that relies on guessing all possible letter combinations of a targeted password until the correct codeword is discovered.</description>
      <pubDate>Tue, 27 Aug 2024 07:00:00 -0000</pubDate>
      <itunes:title>brute-force attack (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>46</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Enjoy this special encore episode.
A cryptographic hack that relies on guessing all possible letter combinations of a targeted password until the correct codeword is discovered.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Enjoy this special encore episode.</p><p>A cryptographic hack that relies on guessing all possible letter combinations of a targeted password until the correct codeword is discovered.</p>]]>
      </content:encoded>
      <itunes:duration>392</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[370d36b6-63d4-11ef-817c-7f049a954870]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW9903186214.mp3?updated=1724694285" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>How scammers weave deception into everyday life.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/303/notes</link>
      <description>Maria Varmazis host of the N2K daily space show, T-Minus, joins Dave and Joe to share her story on how AI-generated scams have infiltrated the world of crochet and other crafts, selling fake patterns that often result in impossible or frustrating projects. Dave's story is on the rise of "digital arrest" scams in India, where criminals posing as law enforcement officers coerce victims into making payments to avoid fake charges against their loved ones. Joe's story come's from a listener this week, and follows the latest evolution of the classic invoice scam, where scammers are now embedding unrelated but meaningful text to bypass spam filters. Our catch of the day comes from listener William, who shares a classic Nigerian Banker Scam. In this version, a young bank employee named Zayas Yovani claims to have discovered your overdue funds at the Central Bank of Nigeria. He offers to release the money if you help him flee the country, requiring you to purchase special hard drives and share your banking details. 
Please take a moment to fill out an audience survey! Let us know how we are doing!  
Links to the stories:

This is what happens when ChatGPT tries to create crochet patterns

'Digital arrest' scams are big in India and may be spreading


You can hear more from the T-Minus space daily show here.
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com.</description>
      <pubDate>Thu, 22 Aug 2024 05:00:00 -0000</pubDate>
      <itunes:title>How scammers weave deception into everyday life.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>303</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Maria Varmazis host of the N2K daily space show, T-Minus, joins Dave and Joe to share her story on how AI-generated scams have infiltrated the world of crochet and other crafts, selling fake patterns that often result in impossible or frustrating projects. Dave's story is on the rise of "digital arrest" scams in India, where criminals posing as law enforcement officers coerce victims into making payments to avoid fake charges against their loved ones. Joe's story come's from a listener this week, and follows the latest evolution of the classic invoice scam, where scammers are now embedding unrelated but meaningful text to bypass spam filters. Our catch of the day comes from listener William, who shares a classic Nigerian Banker Scam. In this version, a young bank employee named Zayas Yovani claims to have discovered your overdue funds at the Central Bank of Nigeria. He offers to release the money if you help him flee the country, requiring you to purchase special hard drives and share your banking details. 
Please take a moment to fill out an audience survey! Let us know how we are doing!  
Links to the stories:

This is what happens when ChatGPT tries to create crochet patterns

'Digital arrest' scams are big in India and may be spreading


You can hear more from the T-Minus space daily show here.
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Maria Varmazis host of the N2K daily space show, T-Minus, joins Dave and Joe to share her story on how AI-generated scams have infiltrated the world of crochet and other crafts, selling fake patterns that often result in impossible or frustrating projects. Dave's story is on the rise of "digital arrest" scams in India, where criminals posing as law enforcement officers coerce victims into making payments to avoid fake charges against their loved ones. Joe's story come's from a listener this week, and follows the latest evolution of the classic invoice scam, where scammers are now embedding unrelated but meaningful text to bypass spam filters. Our catch of the day comes from listener William, who shares a classic Nigerian Banker Scam. In this version, a young bank employee named Zayas Yovani claims to have discovered your overdue funds at the Central Bank of Nigeria. He offers to release the money if you help him flee the country, requiring you to purchase special hard drives and share your banking details. </p><p><em>Please take a moment to fill out an </em><a href="https://www.surveymonkey.com/r/cwcv-listener"><em>audience survey</em></a><em>! Let us know how we are doing! </em> </p><p>Links to the stories:</p><ul>
<li><a href="https://www.cnn.com/2023/07/08/us/chatgpt-crochet-patterns-artifical-intelligence-cec/index.html">This is what happens when ChatGPT tries to create crochet patterns</a></li>
<li><a href="https://www.theregister.com/2024/08/13/india_digital_arrest_scams/">'Digital arrest' scams are big in India and may be spreading</a></li>
</ul><p><br></p><p>You can hear more from the T-Minus space daily show <a href="https://space.n2k.com/podcasts/t-minus">here</a>.</p><p>Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com.</p>]]>
      </content:encoded>
      <itunes:duration>2822</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[faa4cc0e-ac02-11ee-b598-6bf85611fbb3]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW1402029994.mp3?updated=1724259410" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>decryption (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/45/notes</link>
      <description>Enjoy this special encore of Word Notes. 
A process of converting encrypted data into something that a human or computer can understand.</description>
      <pubDate>Tue, 20 Aug 2024 07:00:00 -0000</pubDate>
      <itunes:title>decryption (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>45</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Enjoy this special encore of Word Notes. 
A process of converting encrypted data into something that a human or computer can understand.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Enjoy this special encore of Word Notes. </p><p>A process of converting encrypted data into something that a human or computer can understand.</p>]]>
      </content:encoded>
      <itunes:duration>448</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[eb5fa5c8-5e65-11ef-b9f8-c704f05b70f8]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW6685452094.mp3?updated=1724098050" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Navigating dark waters and deceptive currents.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/302/notes</link>
      <description>Maria Varmazis host of the N2K daily space show, T-Minus, joins Dave and Joe to share her story from listener Chloe, who shared a post she found on a social media platformed called "Bluesky," where a company is asking for photos and videos of your children to help AI smarter. Our hosts share some listener follow up on how a scammer impersonated a government official to deceive a woman into converting her assets into gold bars, resulting in the theft of over $789,000. They also share some follow up from listener Steve to discuss the "No Numbers Project" from episode 300. Joe's story is on regulators investigating whether major banks, including JPMorgan Chase, Bank of America, and Wells Fargo, are adequately addressing Zelle scams by shutting down accounts used by fraudsters. Dave has the story on the FTC warning that scammers are the only ones who promise to remove all negative details from your credit report. Our catch of the day come from listener Benjamin who shares an email they received claiming to know things about him that he would not want getting out. 
Please take a moment to fill out an audience survey! Let us know how we are doing!  
Links to the stories:

Bluesky

Second gold bar scam suspect arrested, extradited to Maryland

Regulators Probing Big Banks’ Handling of Zelle Scams

FTC warns consumers of scammers offering to remove all negative information from credit reports


You can hear more from the T-Minus space daily show here.
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com.</description>
      <pubDate>Thu, 15 Aug 2024 05:00:00 -0000</pubDate>
      <itunes:title>Navigating dark waters and deceptive currents.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>302</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Maria Varmazis host of the N2K daily space show, T-Minus, joins Dave and Joe to share her story from listener Chloe, who shared a post she found on a social media platformed called "Bluesky," where a company is asking for photos and videos of your children to help AI smarter. Our hosts share some listener follow up on how a scammer impersonated a government official to deceive a woman into converting her assets into gold bars, resulting in the theft of over $789,000. They also share some follow up from listener Steve to discuss the "No Numbers Project" from episode 300. Joe's story is on regulators investigating whether major banks, including JPMorgan Chase, Bank of America, and Wells Fargo, are adequately addressing Zelle scams by shutting down accounts used by fraudsters. Dave has the story on the FTC warning that scammers are the only ones who promise to remove all negative details from your credit report. Our catch of the day come from listener Benjamin who shares an email they received claiming to know things about him that he would not want getting out. 
Please take a moment to fill out an audience survey! Let us know how we are doing!  
Links to the stories:

Bluesky

Second gold bar scam suspect arrested, extradited to Maryland

Regulators Probing Big Banks’ Handling of Zelle Scams

FTC warns consumers of scammers offering to remove all negative information from credit reports


You can hear more from the T-Minus space daily show here.
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Maria Varmazis host of the N2K daily space show, T-Minus, joins Dave and Joe to share her story from listener Chloe, who shared a post she found on a social media platformed called "Bluesky," where a company is asking for photos and videos of your children to help AI smarter. Our hosts share some listener follow up on how a scammer impersonated a government official to deceive a woman into converting her assets into gold bars, resulting in the theft of over $789,000. They also share some follow up from listener Steve to discuss the "No Numbers Project" from episode 300. Joe's story is on regulators investigating whether major banks, including JPMorgan Chase, Bank of America, and Wells Fargo, are adequately addressing Zelle scams by shutting down accounts used by fraudsters. Dave has the story on the FTC warning that scammers are the only ones who promise to remove all negative details from your credit report. Our catch of the day come from listener Benjamin who shares an email they received claiming to know things about him that he would not want getting out. </p><p><em>Please take a moment to fill out an </em><a href="https://www.surveymonkey.com/r/cwcv-listener"><em>audience survey</em></a><em>! Let us know how we are doing! </em> </p><p>Links to the stories:</p><ul>
<li><a href="https://bsky.app/profile/criminalerin.bsky.social/post/3kxsbwf4vfi2d">Bluesky</a></li>
<li><a href="https://www.wusa9.com/article/news/crime/illinois-man-arrested-maryland-woman-800k-gold-bar-scam-police-say/65-535b135e-66fb-433e-b50d-e946421f511e">Second gold bar scam suspect arrested, extradited to Maryland</a></li>
<li><a href="https://www.wsj.com/finance/banking/regulators-probing-big-banks-handling-of-zelle-scams-57e3b6ea">Regulators Probing Big Banks’ Handling of Zelle Scams</a></li>
<li><a href="https://www.bitdefender.com/blog/hotforsecurity/ftc-warns-consumers-of-scammers-offering-to-remove-all-negative-information-from-credit-reports/">FTC warns consumers of scammers offering to remove all negative information from credit reports</a></li>
</ul><p><br></p><p>You can hear more from the T-Minus space daily show <a href="https://space.n2k.com/podcasts/t-minus">here</a>.</p><p>Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com.</p>]]>
      </content:encoded>
      <itunes:duration>2436</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[fa786ed4-ac02-11ee-b598-53c055f09bfa]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW7979308036.mp3?updated=1723658863" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>denial-of-service attack (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/44/notes</link>
      <description>Enjoy this encore episode:
A cyber attack designed to impair or eliminate access to online services or data.</description>
      <pubDate>Tue, 13 Aug 2024 07:00:00 -0000</pubDate>
      <itunes:title>denial-of-service attack (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>44</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Enjoy this encore episode:
A cyber attack designed to impair or eliminate access to online services or data.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Enjoy this encore episode:</p><p>A cyber attack designed to impair or eliminate access to online services or data.</p>]]>
      </content:encoded>
      <itunes:duration>397</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[42d9c39c-58e9-11ef-8a34-d393e9c91d35]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW8511946314.mp3?updated=1723494696" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Phishing for votes.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/301/notes</link>
      <description>Maria Varmazis host of the N2K daily space show, T-Minus, joins Dave to share her story on how recent research by security firm Veriti reveals a phishing campaign targeting Trump’s 2024 supporters, soliciting cryptocurrency donations through fake WinRed-branded domains, with limited transactions and some activity traced to China. Dave and Maria share some follow-up from a listener, including suggestions for protecting Dave's father's computer from phishing scams by using LibreWolf browser, UBlock Origin extension, and NextDNS, as well as a listener sharing insights on the pronunciation of "Ports-Muth." Dave's story follows how in June, Ferrari CEO Benedetto Vigna was impersonated via deepfake technology in an attempted scam to deceive a Ferrari executive into signing a Non-Disclosure Agreement for a fictitious acquisition, but the ruse was detected and the company emerged unscathed. Dave also goes on to share news about his own home state Maryland and their gift card policy. Our catch of the day come from the scam subreddit and follows a text message where a scammer is trying to intimidate the recipient. 
Please take a moment to fill out an audience survey! Let us know how we are doing!  
Links to the stories:

Ferrari exec foils deepfake attempt by asking the scammer a question only CEO Benedetto Vigna could answer

Maryland becomes first state to pass law against gift card draining

TRUMP CAMPAIGN CRYPTO SCAM: UNVEILING THE PHISHING PLOT


You can hear more from the T-Minus space daily show here.
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com.</description>
      <pubDate>Thu, 08 Aug 2024 05:00:00 -0000</pubDate>
      <itunes:title>Phishing for votes.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>301</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Maria Varmazis host of the N2K daily space show, T-Minus, joins Dave to share her story on how recent research by security firm Veriti reveals a phishing campaign targeting Trump’s 2024 supporters, soliciting cryptocurrency donations through fake WinRed-branded domains, with limited transactions and some activity traced to China. Dave and Maria share some follow-up from a listener, including suggestions for protecting Dave's father's computer from phishing scams by using LibreWolf browser, UBlock Origin extension, and NextDNS, as well as a listener sharing insights on the pronunciation of "Ports-Muth." Dave's story follows how in June, Ferrari CEO Benedetto Vigna was impersonated via deepfake technology in an attempted scam to deceive a Ferrari executive into signing a Non-Disclosure Agreement for a fictitious acquisition, but the ruse was detected and the company emerged unscathed. Dave also goes on to share news about his own home state Maryland and their gift card policy. Our catch of the day come from the scam subreddit and follows a text message where a scammer is trying to intimidate the recipient. 
Please take a moment to fill out an audience survey! Let us know how we are doing!  
Links to the stories:

Ferrari exec foils deepfake attempt by asking the scammer a question only CEO Benedetto Vigna could answer

Maryland becomes first state to pass law against gift card draining

TRUMP CAMPAIGN CRYPTO SCAM: UNVEILING THE PHISHING PLOT


You can hear more from the T-Minus space daily show here.
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Maria Varmazis host of the N2K daily space show, T-Minus, joins Dave to share her story on how recent research by security firm Veriti reveals a phishing campaign targeting Trump’s 2024 supporters, soliciting cryptocurrency donations through fake WinRed-branded domains, with limited transactions and some activity traced to China. Dave and Maria share some follow-up from a listener, including suggestions for protecting Dave's father's computer from phishing scams by using LibreWolf browser, UBlock Origin extension, and NextDNS, as well as a listener sharing insights on the pronunciation of "Ports-Muth." Dave's story follows how in June, Ferrari CEO Benedetto Vigna was impersonated via deepfake technology in an attempted scam to deceive a Ferrari executive into signing a Non-Disclosure Agreement for a fictitious acquisition, but the ruse was detected and the company emerged unscathed. Dave also goes on to share news about his own home state Maryland and their gift card policy. Our catch of the day come from the scam subreddit and follows a text message where a scammer is trying to intimidate the recipient. </p><p><em>Please take a moment to fill out an </em><a href="https://www.surveymonkey.com/r/cwcv-listener"><em>audience survey</em></a><em>! Let us know how we are doing! </em> </p><p>Links to the stories:</p><ul>
<li><a href="https://fortune.com/2024/07/27/ferrari-deepfake-attempt-scammer-security-question-ceo-benedetto-vigna-cybersecurity-ai/">Ferrari exec foils deepfake attempt by asking the scammer a question only CEO Benedetto Vigna could answer</a></li>
<li><a href="https://www.cbsnews.com/news/gift-card-draining-maryland-first-state-law/">Maryland becomes first state to pass law against gift card draining</a></li>
<li><a href="https://veriti.ai/blog/trump-campaign-crypto-scam-unveiling-the-phishing-plot/">TRUMP CAMPAIGN CRYPTO SCAM: UNVEILING THE PHISHING PLOT</a></li>
</ul><p><br></p><p>You can hear more from the T-Minus space daily show <a href="https://space.n2k.com/podcasts/t-minus">here</a>.</p><p>Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com.</p>]]>
      </content:encoded>
      <itunes:duration>1931</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[fa4bf782-ac02-11ee-b598-03cf07f94bd4]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW1045434391.mp3?updated=1723051993" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>AI: The new partner in cybercrime? [OMITB]</title>
      <link>https://thecyberwire.com/podcasts/only-malware-in-the-building/3/notes</link>
      <description>Welcome in! You’ve entered, Only Malware in the Building. Join us each month to sip tea and solve mysteries about today’s most interesting threats. Your host is Selena Larson, Proofpoint intelligence analyst and host of their podcast DISCARDED. Inspired by the residents of a building in New York’s exclusive upper west side, Selena is joined by N2K Networks Dave Bittner and Rick Howard to uncover the stories behind notable cyberattacks. 
Being a security researcher is a bit like being a detective: you gather clues, analyze the evidence, and consult the experts to solve the cyber puzzle. On this episode, we talk about the use of AI in cyberattacks
Proofpoint recently released two articles on two cyber campaigns: one by the group UNK_SweetSpecter targeting U.S. organizations involved in AI with the SugarGh0st RAT, and another by TA547 targeting German organizations with Rhadamanthys malware.
Today we look at what the focus of threat actor objectives are and what that means for defenders.</description>
      <pubDate>Tue, 06 Aug 2024 11:00:00 -0000</pubDate>
      <itunes:title>AI: The new partner in cybercrime? [OMITB]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>3</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Welcome in! You’ve entered, Only Malware in the Building. Join us each month to sip tea and solve mysteries about today’s most interesting threats. Your host is Selena Larson, Proofpoint intelligence analyst and host of their podcast DISCARDED. Inspired by the residents of a building in New York’s exclusive upper west side, Selena is joined by N2K Networks Dave Bittner and Rick Howard to uncover the stories behind notable cyberattacks. 
Being a security researcher is a bit like being a detective: you gather clues, analyze the evidence, and consult the experts to solve the cyber puzzle. On this episode, we talk about the use of AI in cyberattacks
Proofpoint recently released two articles on two cyber campaigns: one by the group UNK_SweetSpecter targeting U.S. organizations involved in AI with the SugarGh0st RAT, and another by TA547 targeting German organizations with Rhadamanthys malware.
Today we look at what the focus of threat actor objectives are and what that means for defenders.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Welcome in! You’ve entered, Only Malware in the Building. Join us each month to sip tea and solve mysteries about today’s most interesting threats. Your host is <a href="https://www.linkedin.com/in/selenalarson/">Selena Larson</a>, <a href="https://www.proofpoint.com/">Proofpoint</a> intelligence analyst and host of their podcast <a href="https://www.proofpoint.com/us/podcasts/discarded">DISCARDED</a>. Inspired by the residents of a building in New York’s exclusive upper west side, Selena is joined by <a href="https://www.n2k.com/">N2K</a> Networks <a href="https://www.linkedin.com/in/dave-bittner-27231a4/">Dave Bittner</a> and <a href="https://www.linkedin.com/in/rickhoward/">Rick Howard</a> to uncover the stories behind notable cyberattacks. </p><p>Being a security researcher is a bit like being a detective: you gather clues, analyze the evidence, and consult the experts to solve the cyber puzzle. On this episode, we talk about the use of AI in cyberattacks</p><p>Proofpoint recently released two articles on two cyber campaigns: one by the group UNK_SweetSpecter targeting U.S. organizations involved in AI with the <a href="https://www.proofpoint.com/us/blog/threat-insight/security-brief-artificial-sweetener-sugargh0st-rat-used-target-american">SugarGh0st RAT</a>, and another by <a href="https://www.proofpoint.com/us/blog/threat-insight/security-brief-ta547-targets-german-organizations-rhadamanthys-stealer">TA547</a> targeting German organizations with Rhadamanthys malware.</p><p>Today we look at what the focus of threat actor objectives are and what that means for defenders.</p>]]>
      </content:encoded>
      <itunes:duration>2270</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[651662f2-535e-11ef-a689-833d982a7858]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW4159638646.mp3?updated=1727471352" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>cold boot attack (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/43/notes</link>
      <description>Please enjoy this special encore episode of Word Notes.
A type of side channel attack in which an attacker with physical access to a computer performs a memory dump of a computer’s Random Access Memory or RAM during the reboot process in order to steal sensitive data. </description>
      <pubDate>Tue, 06 Aug 2024 07:00:00 -0000</pubDate>
      <itunes:title>cold boot attack (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>43</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Please enjoy this special encore episode of Word Notes.
A type of side channel attack in which an attacker with physical access to a computer performs a memory dump of a computer’s Random Access Memory or RAM during the reboot process in order to steal sensitive data. </itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this special encore episode of Word Notes.</p><p>A type of side channel attack in which an attacker with physical access to a computer performs a memory dump of a computer’s Random Access Memory or RAM during the reboot process in order to steal sensitive data. </p>]]>
      </content:encoded>
      <itunes:duration>419</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[7827d7b4-536c-11ef-8546-037449e6e2f4]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW4983700956.mp3?updated=1722891342" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>This is 300!</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/300/notes</link>
      <description>This week we celebrate 300 episodes! Maria Varmazis host of the N2K daily space show, T-Minus, joins Dave and Joe and shares a PSA on the CrowdStrike outage. Her story focuses on the Olympics, as this was the first week the Olympics started, and she shares about a recent fraud campaign that is targeting iPhone users in India, posing as India Post through smishing attacks. Our hosts discuss some follow up, from listener Brie, who writes in to share how one police force is helping folks stay safe from scam callers. They also share a story from listener Mark, who writes in about his 77-year-old mom's Facebook account being hacked, and she was tricked into downloading an app and opening her banking app while on a fake customer service call. Dave's story is on Gina Russell, who posed as a psychic and led an elaborate extortion scheme with her family, coercing victims into giving them millions of dollars under threats of harm. Joe has the story of social media giant Meta saying sextortion scams are increasing, with criminals from Nigeria often targeting adult men in the U.S.. Our catch of the day comes from an anonymous listener, who shared a post they found on the social media platform "Shared," about a scammer getting messed with. 
Please take a moment to fill out an audience survey! Let us know how we are doing!  
Links to the stories:

Phishing Campaign Targeting Mobile Users in India Using India Post Lures

Sextortion scams run by Nigerian criminals are targeting American men, Meta says

‘Psychic’ and family of extortionists scam Md. man out of $4.2 million


You can hear more from the T-Minus space daily show here.
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com.</description>
      <pubDate>Thu, 01 Aug 2024 05:00:00 -0000</pubDate>
      <itunes:title>This is 300!</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>300</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>This week we celebrate 300 episodes! Maria Varmazis host of the N2K daily space show, T-Minus, joins Dave and Joe and shares a PSA on the CrowdStrike outage. Her story focuses on the Olympics, as this was the first week the Olympics started, and she shares about a recent fraud campaign that is targeting iPhone users in India, posing as India Post through smishing attacks. Our hosts discuss some follow up, from listener Brie, who writes in to share how one police force is helping folks stay safe from scam callers. They also share a story from listener Mark, who writes in about his 77-year-old mom's Facebook account being hacked, and she was tricked into downloading an app and opening her banking app while on a fake customer service call. Dave's story is on Gina Russell, who posed as a psychic and led an elaborate extortion scheme with her family, coercing victims into giving them millions of dollars under threats of harm. Joe has the story of social media giant Meta saying sextortion scams are increasing, with criminals from Nigeria often targeting adult men in the U.S.. Our catch of the day comes from an anonymous listener, who shared a post they found on the social media platform "Shared," about a scammer getting messed with. 
Please take a moment to fill out an audience survey! Let us know how we are doing!  
Links to the stories:

Phishing Campaign Targeting Mobile Users in India Using India Post Lures

Sextortion scams run by Nigerian criminals are targeting American men, Meta says

‘Psychic’ and family of extortionists scam Md. man out of $4.2 million


You can hear more from the T-Minus space daily show here.
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This week we celebrate 300 episodes! Maria Varmazis host of the N2K daily space show, T-Minus, joins Dave and Joe and shares a PSA on the CrowdStrike outage. Her story focuses on the Olympics, as this was the first week the Olympics started, and she shares about a recent fraud campaign that is targeting iPhone users in India, posing as India Post through smishing attacks. Our hosts discuss some follow up, from listener Brie, who writes in to share how one police force is helping folks stay safe from scam callers. They also share a story from listener Mark, who writes in about his 77-year-old mom's Facebook account being hacked, and she was tricked into downloading an app and opening her banking app while on a fake customer service call. Dave's story is on Gina Russell, who posed as a psychic and led an elaborate extortion scheme with her family, coercing victims into giving them millions of dollars under threats of harm. Joe has the story of social media giant Meta saying sextortion scams are increasing, with criminals from Nigeria often targeting adult men in the U.S.. Our catch of the day comes from an anonymous listener, who shared a post they found on the social media platform "Shared," about a scammer getting messed with. </p><p><em>Please take a moment to fill out an </em><a href="https://www.surveymonkey.com/r/cwcv-listener"><em>audience survey</em></a><em>! Let us know how we are doing! </em> </p><p>Links to the stories:</p><ul>
<li><a href="https://www.fortinet.com/blog/threat-research/phishing-campaign-targeting-mobile-users-in-india-using-india-post-lures">Phishing Campaign Targeting Mobile Users in India Using India Post Lures</a></li>
<li><a href="https://www.cbsnews.com/news/meta-sextortion-scam-nigeria-facebook-instagram-crackdown/">Sextortion scams run by Nigerian criminals are targeting American men, Meta says</a></li>
<li><a href="https://washingtonpost.com/dc-md-va/2024/07/23/gina-russell-sentenced-extortion-psychic/">‘Psychic’ and family of extortionists scam Md. man out of $4.2 million</a></li>
</ul><p><br></p><p>You can hear more from the T-Minus space daily show <a href="https://space.n2k.com/podcasts/t-minus">here</a>.</p><p>Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com.</p>]]>
      </content:encoded>
      <itunes:duration>2868</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[fa1f3ac6-ac02-11ee-b598-e778c1d5023a]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW9229616620.mp3?updated=1722443290" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Encore: cloud computing (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/42/notes</link>
      <description>On-demand pay-as-you-go Internet delivered compute, storage, infrastructure, and security services that are partially managed by the cloud provider and partially managed by the customer.</description>
      <pubDate>Tue, 30 Jul 2024 07:00:00 -0000</pubDate>
      <itunes:title>Encore: cloud computing (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>42</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>On-demand pay-as-you-go Internet delivered compute, storage, infrastructure, and security services that are partially managed by the cloud provider and partially managed by the customer.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>On-demand pay-as-you-go Internet delivered compute, storage, infrastructure, and security services that are partially managed by the cloud provider and partially managed by the customer.</p>]]>
      </content:encoded>
      <itunes:duration>376</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[88daa3b4-4df1-11ef-9042-13cee72d7032]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW6769553838.mp3?updated=1722288739" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Healthcare hassles and hefty heists.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/299/notes</link>
      <description>This week, Maria Varmazis host of the N2K daily space show, T-Minus, joins Dave and Joe, as they celebrate Maria joining the Hacking Humans podcast every week! Maria's story is from a listener this week who writes in with a story on an IT company that is a third party for a healthcare company, and the dangers that can come from that. Dave and Joe share some listener follow up from Michael, who shares some thoughts on AI. Dave's story follows how a recent study found that 40% of elderly adults in the UK regularly face phone-based fraud attempts, with significant impacts on their mental health and quality of life. Joe follows a Scottsdale couple, Alexandra Gehrke and Jeffrey King, and how they have been indicted for a $900 million fraud scheme targeting hospice patients, receiving $330 million in illegal kickbacks used to purchase luxury items. Our catch of the day comes from listener Jim who writes in with a letter about a concerned beneficiary who received a letter from the FBI about their overdue inheritance with the National Bank of Belgium. The message confirmed the legitimacy of their claim but warned of potential scams by individuals impersonating bank officials.
Please take a moment to fill out an audience survey! Let us know how we are doing!  
Links to the stories:

Two-Fifths of Senior Citizens Suffer Frequent Fraud Attempts

‘It’s really disgusting’: Scottsdale couple accused of $900 million fraud scheme targeting hospice patients, according to DOJ


You can hear more from the T-Minus space daily show here.
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com.</description>
      <pubDate>Thu, 25 Jul 2024 05:00:00 -0000</pubDate>
      <itunes:title>Healthcare hassles and hefty heists.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>299</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>This week, Maria Varmazis host of the N2K daily space show, T-Minus, joins Dave and Joe, as they celebrate Maria joining the Hacking Humans podcast every week! Maria's story is from a listener this week who writes in with a story on an IT company that is a third party for a healthcare company, and the dangers that can come from that. Dave and Joe share some listener follow up from Michael, who shares some thoughts on AI. Dave's story follows how a recent study found that 40% of elderly adults in the UK regularly face phone-based fraud attempts, with significant impacts on their mental health and quality of life. Joe follows a Scottsdale couple, Alexandra Gehrke and Jeffrey King, and how they have been indicted for a $900 million fraud scheme targeting hospice patients, receiving $330 million in illegal kickbacks used to purchase luxury items. Our catch of the day comes from listener Jim who writes in with a letter about a concerned beneficiary who received a letter from the FBI about their overdue inheritance with the National Bank of Belgium. The message confirmed the legitimacy of their claim but warned of potential scams by individuals impersonating bank officials.
Please take a moment to fill out an audience survey! Let us know how we are doing!  
Links to the stories:

Two-Fifths of Senior Citizens Suffer Frequent Fraud Attempts

‘It’s really disgusting’: Scottsdale couple accused of $900 million fraud scheme targeting hospice patients, according to DOJ


You can hear more from the T-Minus space daily show here.
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This week, Maria Varmazis host of the N2K daily space show, T-Minus, joins Dave and Joe, as they celebrate Maria joining the Hacking Humans podcast every week! Maria's story is from a listener this week who writes in with a story on an IT company that is a third party for a healthcare company, and the dangers that can come from that. Dave and Joe share some listener follow up from Michael, who shares some thoughts on AI. Dave's story follows how a recent study found that 40% of elderly adults in the UK regularly face phone-based fraud attempts, with significant impacts on their mental health and quality of life. Joe follows a Scottsdale couple, Alexandra Gehrke and Jeffrey King, and how they have been indicted for a $900 million fraud scheme targeting hospice patients, receiving $330 million in illegal kickbacks used to purchase luxury items. Our catch of the day comes from listener Jim who writes in with a letter about a concerned beneficiary who received a letter from the FBI about their overdue inheritance with the National Bank of Belgium. The message confirmed the legitimacy of their claim but warned of potential scams by individuals impersonating bank officials.</p><p><em>Please take a moment to fill out an </em><a href="https://www.surveymonkey.com/r/cwcv-listener"><em>audience survey</em></a><em>! Let us know how we are doing! </em> </p><p>Links to the stories:</p><ul>
<li><a href="https://www.infosecurity-magazine.com/news/senior-citizens-frequent-fraud/">Two-Fifths of Senior Citizens Suffer Frequent Fraud Attempts</a></li>
<li><a href="https://www.12news.com/article/news/crime/scottsdale-couple-accused-of-900-million-fraud-scheme-targeting-hospice-patients-according-to-doj/75-4ebd65a7-3699-4587-9792-f8615713ac93">‘It’s really disgusting’: Scottsdale couple accused of $900 million fraud scheme targeting hospice patients, according to DOJ</a></li>
</ul><p><br></p><p>You can hear more from the T-Minus space daily show <a href="https://space.n2k.com/podcasts/t-minus">here</a>.</p><p>Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com.</p>]]>
      </content:encoded>
      <itunes:duration>2961</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[f9f28472-ac02-11ee-b598-9348406ac645]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW6061280609.mp3?updated=1721843504" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Encore: APT (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/41/notes</link>
      <description>An acronym for Advanced Persistent Threat to describe hacker groups or campaigns normally, but not always, associated with nation state cyber espionage and continuous low-level cyber conflict operations.</description>
      <pubDate>Tue, 23 Jul 2024 07:00:00 -0000</pubDate>
      <itunes:title>Encore: APT (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>41</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>An acronym for Advanced Persistent Threat to describe hacker groups or campaigns normally, but not always, associated with nation state cyber espionage and continuous low-level cyber conflict operations.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>An acronym for Advanced Persistent Threat to describe hacker groups or campaigns normally, but not always, associated with nation state cyber espionage and continuous low-level cyber conflict operations.</p>]]>
      </content:encoded>
      <itunes:duration>412</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[68bcfcb8-4869-11ef-8fc4-2f5fa0cef3bd]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW7186657439.mp3?updated=1721680563" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Welcome to a new age in digital deception.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/298/notes</link>
      <description>This week, Maria Varmazis host of the N2K daily space show, T-Minus, joins Dave and Joe, as they celebrate Maria joining the Hacking Humans podcast every week! Maria's story is on supplement scams, as there has been a significant surge in health-related supplement scams on social media platforms, utilizing advanced technologies like AI-generated images and deepfake videos to promote fake products endorsed by celebrities and medical professionals. Joe's story follows Airplane WiFi, now essential for many travelers, and how it poses unexpected risks as recent incidents highlight dangers like "evil twin" attacks, urging caution with VPNs and verifying network legitimacy to safeguard personal data midair. Dave has the story on 2 women charged in a romance scheme, defrauding elderly men out of $7 million.
Please take a moment to fill out an audience survey! Let us know how we are doing!  
Links to the stories:

Deep Dive on Supplement Scams: How AI Drives ‘Miracle Cures’ and Sponsored Health-Related Scams on Social Media

Federal Agency Issues New Security Advice If You Use Airplane WiFi

2 women charged in 'romance schemes' to defraud elderly men out of $7 million, feds say


You can hear more from the T-Minus space daily show here.
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com.</description>
      <pubDate>Thu, 18 Jul 2024 05:00:00 -0000</pubDate>
      <itunes:title>Welcome to a new age in digital deception.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>298</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>This week, Maria Varmazis host of the N2K daily space show, T-Minus, joins Dave and Joe, as they celebrate Maria joining the Hacking Humans podcast every week! Maria's story is on supplement scams, as there has been a significant surge in health-related supplement scams on social media platforms, utilizing advanced technologies like AI-generated images and deepfake videos to promote fake products endorsed by celebrities and medical professionals. Joe's story follows Airplane WiFi, now essential for many travelers, and how it poses unexpected risks as recent incidents highlight dangers like "evil twin" attacks, urging caution with VPNs and verifying network legitimacy to safeguard personal data midair. Dave has the story on 2 women charged in a romance scheme, defrauding elderly men out of $7 million.
Please take a moment to fill out an audience survey! Let us know how we are doing!  
Links to the stories:

Deep Dive on Supplement Scams: How AI Drives ‘Miracle Cures’ and Sponsored Health-Related Scams on Social Media

Federal Agency Issues New Security Advice If You Use Airplane WiFi

2 women charged in 'romance schemes' to defraud elderly men out of $7 million, feds say


You can hear more from the T-Minus space daily show here.
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This week, Maria Varmazis host of the N2K daily space show, T-Minus, joins Dave and Joe, as they celebrate Maria joining the Hacking Humans podcast every week! Maria's story is on supplement scams, as there has been a significant surge in health-related supplement scams on social media platforms, utilizing advanced technologies like AI-generated images and deepfake videos to promote fake products endorsed by celebrities and medical professionals. Joe's story follows Airplane WiFi, now essential for many travelers, and how it poses unexpected risks as recent incidents highlight dangers like "evil twin" attacks, urging caution with VPNs and verifying network legitimacy to safeguard personal data midair. Dave has the story on 2 women charged in a romance scheme, defrauding elderly men out of $7 million.</p><p><em>Please take a moment to fill out an </em><a href="https://www.surveymonkey.com/r/cwcv-listener"><em>audience survey</em></a><em>! Let us know how we are doing! </em> </p><p>Links to the stories:</p><ul>
<li><a href="https://www.bitdefender.com/blog/labs/deep-dive-on-supplement-scams-how-ai-drives-miracle-cures-and-sponsored-health-related-scams-on-social-media/">Deep Dive on Supplement Scams: How AI Drives ‘Miracle Cures’ and Sponsored Health-Related Scams on Social Media</a></li>
<li><a href="https://www.forbes.com/sites/zakdoffman/2024/07/02/warning-for-iphone-and-android-users-connecting-to-in-flight-wifi/">Federal Agency Issues New Security Advice If You Use Airplane WiFi</a></li>
<li><a href="https://www.nbcnews.com/news/us-news/2-women-charged-romance-schemes-defraud-elderly-men-7-million-feds-say-rcna160559">2 women charged in 'romance schemes' to defraud elderly men out of $7 million, feds say</a></li>
</ul><p><br></p><p>You can hear more from the T-Minus space daily show <a href="https://space.n2k.com/podcasts/t-minus">here</a>.</p><p>Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com.</p>]]>
      </content:encoded>
      <itunes:duration>2257</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[f9c63d72-ac02-11ee-b598-73a52de79feb]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW4539930705.mp3?updated=1721235978" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Encore: backdoor (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/40/notes</link>
      <description>An undocumented or publicly unknown method to access a computer system undetected or to break a cypher used to encode messages.</description>
      <pubDate>Tue, 16 Jul 2024 07:00:00 -0000</pubDate>
      <itunes:title>Encore: backdoor (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>40</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>An undocumented or publicly unknown method to access a computer system undetected or to break a cypher used to encode messages.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>An undocumented or publicly unknown method to access a computer system undetected or to break a cypher used to encode messages.</p>]]>
      </content:encoded>
      <itunes:duration>354</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[38c5ef02-42cd-11ef-bd6f-4351a8270f85]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW3991762859.mp3?updated=1721060887" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The costly consequences of communication scams.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/297/notes</link>
      <description>This week Dave shares a story on Business email compromise (BEC) scams, and how they are a major threat, costing $26 billion annually. The story shares how it's crucial for employees to verify suspicious emails through a secondary channel and for companies to foster transparent communication to mitigate such risks. Joe shares two stories with us this week. The first is from a listener named Jay, who received a story from a relative. In this story, someone claiming to be a constable calls to warn about a person who has gift cards with the victim's name on them, then tries to get the caller to call the police to confirm. Joe's second story comes from Allison Gormly at Consumer reporter at WTHR in Indianapolis. Allison share's videos videos on Instagram that all start with “Hey Allison,” this one starts with Hey Allison, a stranger sent me money on Venmo, should I send it back? Our catch of the day comes from listener Cameron, who shares how he is a business owner with a public-facing email address, and how he gets his fair share of scam emails, but this one takes the cake.
Please take a moment to fill out an audience survey! Let us know how we are doing!
Links to the stories:

How to Spot a Business Email Compromise Scam

Scam alert on Venmo, CashApp &amp; Zelle!

Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com.</description>
      <pubDate>Thu, 11 Jul 2024 05:00:00 -0000</pubDate>
      <itunes:title>The costly consequences of communication scams.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>297</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>This week Dave shares a story on Business email compromise (BEC) scams, and how they are a major threat, costing $26 billion annually. The story shares how it's crucial for employees to verify suspicious emails through a secondary channel and for companies to foster transparent communication to mitigate such risks. Joe shares two stories with us this week. The first is from a listener named Jay, who received a story from a relative. In this story, someone claiming to be a constable calls to warn about a person who has gift cards with the victim's name on them, then tries to get the caller to call the police to confirm. Joe's second story comes from Allison Gormly at Consumer reporter at WTHR in Indianapolis. Allison share's videos videos on Instagram that all start with “Hey Allison,” this one starts with Hey Allison, a stranger sent me money on Venmo, should I send it back? Our catch of the day comes from listener Cameron, who shares how he is a business owner with a public-facing email address, and how he gets his fair share of scam emails, but this one takes the cake.
Please take a moment to fill out an audience survey! Let us know how we are doing!
Links to the stories:

How to Spot a Business Email Compromise Scam

Scam alert on Venmo, CashApp &amp; Zelle!

Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This week Dave shares a story on Business email compromise (BEC) scams, and how they are a major threat, costing $26 billion annually. The story shares how it's crucial for employees to verify suspicious emails through a secondary channel and for companies to foster transparent communication to mitigate such risks. Joe shares two stories with us this week. The first is from a listener named Jay, who received a story from a relative. In this story, someone claiming to be a constable calls to warn about a person who has gift cards with the victim's name on them, then tries to get the caller to call the police to confirm. Joe's second story comes from Allison Gormly at Consumer reporter at WTHR in Indianapolis. Allison share's videos videos on Instagram that all start with “Hey Allison,” this one starts with Hey Allison, a stranger sent me money on Venmo, should I send it back? Our catch of the day comes from listener Cameron, who shares how he is a business owner with a public-facing email address, and how he gets his fair share of scam emails, but this one takes the cake.</p><p><em>Please take a moment to fill out an </em><a href="https://www.surveymonkey.com/r/cwcv-listener"><em>audience survey</em></a><em>! Let us know how we are doing!</em></p><p>Links to the stories:</p><ul>
<li><a href="https://www.wired.com/story/how-to-spot-business-email-compromise-scam/">How to Spot a Business Email Compromise Scam</a></li>
<li><a href="https://www.instagram.com/reel/C7DTXJ2r74O/">Scam alert on Venmo, CashApp &amp; Zelle!</a></li>
</ul><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a>.</p>]]>
      </content:encoded>
      <itunes:duration>1866</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[f998669a-ac02-11ee-b598-ff83b6999299]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW3071807942.mp3?updated=1720630500" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Encore: watering hole attack (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/39/notes</link>
      <description>From the intrusion kill chain model, a technique where the hacker compromises sites commonly visited by members of a targeted community in order to deliver a malicious payload to the intended victim.</description>
      <pubDate>Tue, 09 Jul 2024 07:00:00 -0000</pubDate>
      <itunes:title>Encore: watering hole attack (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>39</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle>https://thecyberwire.com/podcasts/word-notes/39/notes</itunes:subtitle>
      <itunes:summary>From the intrusion kill chain model, a technique where the hacker compromises sites commonly visited by members of a targeted community in order to deliver a malicious payload to the intended victim.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>From the intrusion kill chain model, a technique where the hacker compromises sites commonly visited by members of a targeted community in order to deliver a malicious payload to the intended victim.</p>]]>
      </content:encoded>
      <itunes:duration>330</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[a05de9d6-3d63-11ef-a4bd-afa2668f2da9]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW6281394560.mp3?updated=1720468647" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Encore: AI versus AI. </title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/255/notes</link>
      <description>Blair Cohen from AuthenticID joins Dave to discuss how generative AI and authentication go hand in hand. Joe and Dave share some follow up from listener Robert who discusses an ad for a device that uses ChatGPT to record phone calls on your device. Dave helps his dad out with his computer and shares the tale. Dave also shares a story this week on the FBI warning against scammers who are posing as NFT devs to try and steal your crypto. Joe and Dave test their scammer catching skills while taking a test to see if they are smarter than the average scammer. Our catch of the day comes from listener Steve who writes in to share a receipt he received that looked quite suspicious.
Links to stories:

FBI warns of scammers posing as NFT devs to steal your crypto

Are you smarter than a scammer? Play this game.


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 04 Jul 2024 05:00:00 -0000</pubDate>
      <itunes:title>Encore: AI versus AI. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>255</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Blair Cohen from AuthenticID joins Dave to discuss how generative AI and authentication go hand in hand. Joe and Dave share some follow up from listener Robert who discusses an ad for a device that uses ChatGPT to record phone calls on your device. Dave helps his dad out with his computer and shares the tale. Dave also shares a story this week on the FBI warning against scammers who are posing as NFT devs to try and steal your crypto. Joe and Dave test their scammer catching skills while taking a test to see if they are smarter than the average scammer. Our catch of the day comes from listener Steve who writes in to share a receipt he received that looked quite suspicious.
Links to stories:

FBI warns of scammers posing as NFT devs to steal your crypto

Are you smarter than a scammer? Play this game.


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Blair Cohen from AuthenticID joins Dave to discuss how generative AI and authentication go hand in hand. Joe and Dave share some follow up from listener Robert who discusses an ad for a device that uses ChatGPT to record phone calls on your device. Dave helps his dad out with his computer and shares the tale. Dave also shares a story this week on the FBI warning against scammers who are posing as NFT devs to try and steal your crypto. Joe and Dave test their scammer catching skills while taking a test to see if they are smarter than the average scammer. Our catch of the day comes from listener Steve who writes in to share a receipt he received that looked quite suspicious.</p><p>Links to stories:</p><ul>
<li><a href="https://www.bleepingcomputer.com/news/security/fbi-warns-of-scammers-posing-as-nft-devs-to-steal-your-crypto/">FBI warns of scammers posing as NFT devs to steal your crypto</a></li>
<li><a href="https://www.washingtonpost.com/technology/interactive/2023/identify-scam-quiz-zelle-email-text/?utm_campaign=wp_post_most&amp;utm_medium=email&amp;utm_source=newsletter&amp;wpisrc=nl_most">Are you smarter than a scammer? Play this game.</a></li>
</ul><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>3268</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[f96b9822-ac02-11ee-b598-cbc8351d97a4]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW8716912310.mp3?updated=1720032604" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Operation Endgame: The ultimate troll patrol. [Only Malware in the Building]</title>
      <link>https://thecyberwire.com/podcasts/only-malware-in-the-building/2/notes</link>
      <description>Welcome in! You’ve entered, Only Malware in the Building. Join us each month to sip tea and solve mysteries about today’s most interesting threats. Your host is Selena Larson, Proofpoint intelligence analyst and host of their podcast DISCARDED. Inspired by the residents of a building in New York’s exclusive upper west side, Selena is joined by N2K Networks Dave Bittner and Rick Howard to uncover the stories behind notable cyberattacks. 
Being a security researcher is a bit like being a detective: you gather clues, analyze the evidence, and consult the experts to solve the cyber puzzle. On this episode, we talk about "Operation Endgame." 
Operation Endgame is a strategy by Western law enforcement to counter Russian cybercriminals through psychological tactics. This involves creating distrust among hackers, exposing their internal communications, and dismantling their anonymity to hinder their operations. You can find more information on Operation Endgame here. 
Today we look at the new tactics used to disrupt these criminals by eroding trust among them and undermining their anonymity.</description>
      <pubDate>Tue, 02 Jul 2024 11:00:00 -0000</pubDate>
      <itunes:title>Operation Endgame: The ultimate troll patrol. [Only Malware in the Building]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>2</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Welcome in! You’ve entered, Only Malware in the Building. Join us each month to sip tea and solve mysteries about today’s most interesting threats. Your host is Selena Larson, Proofpoint intelligence analyst and host of their podcast DISCARDED. Inspired by the residents of a building in New York’s exclusive upper west side, Selena is joined by N2K Networks Dave Bittner and Rick Howard to uncover the stories behind notable cyberattacks. 
Being a security researcher is a bit like being a detective: you gather clues, analyze the evidence, and consult the experts to solve the cyber puzzle. On this episode, we talk about "Operation Endgame." 
Operation Endgame is a strategy by Western law enforcement to counter Russian cybercriminals through psychological tactics. This involves creating distrust among hackers, exposing their internal communications, and dismantling their anonymity to hinder their operations. You can find more information on Operation Endgame here. 
Today we look at the new tactics used to disrupt these criminals by eroding trust among them and undermining their anonymity.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Welcome in! You’ve entered, Only Malware in the Building. Join us each month to sip tea and solve mysteries about today’s most interesting threats. Your host is <a href="https://www.linkedin.com/in/selenalarson/">Selena Larson</a>, <a href="https://www.proofpoint.com/">Proofpoint</a> intelligence analyst and host of their podcast <a href="https://www.proofpoint.com/us/podcasts/discarded">DISCARDED</a>. Inspired by the residents of a building in New York’s exclusive upper west side, Selena is joined by <a href="https://www.n2k.com/">N2K</a> Networks <a href="https://www.linkedin.com/in/dave-bittner-27231a4/">Dave Bittner</a> and <a href="https://www.linkedin.com/in/rickhoward/">Rick Howard</a> to uncover the stories behind notable cyberattacks. </p><p>Being a security researcher is a bit like being a detective: you gather clues, analyze the evidence, and consult the experts to solve the cyber puzzle. On this episode, we talk about "<a href="https://operation-endgame.com/">Operation Endgame</a>." </p><p>Operation Endgame is a strategy by Western law enforcement to counter Russian cybercriminals through psychological tactics. This involves creating distrust among hackers, exposing their internal communications, and dismantling their anonymity to hinder their operations. You can find more information on Operation Endgame <a href="https://www.wired.com/story/cop-cybercriminal-hacker-psyops/">here.</a> </p><p>Today we look at the new tactics used to disrupt these criminals by eroding trust among them and undermining their anonymity. </p>]]>
      </content:encoded>
      <itunes:duration>1714</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[9801833e-37db-11ef-9c32-d7ce98f3ca81]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW6479289509.mp3?updated=1719861178" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Encore: network telescope (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/38/notes</link>
      <description>Network observation systems designed to monitor globally unreachable but unused Internet address space or the Deep Web in order to study a wide range of interesting Internet phenomena.</description>
      <pubDate>Tue, 02 Jul 2024 07:00:00 -0000</pubDate>
      <itunes:title>Encore: network telescope (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>38</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Network observation systems designed to monitor globally unreachable but unused Internet address space or the Deep Web in order to study a wide range of interesting Internet phenomena.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Network observation systems designed to monitor globally unreachable but unused Internet address space or the Deep Web in order to study a wide range of interesting Internet phenomena.</p>]]>
      </content:encoded>
      <itunes:duration>318</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[0433df3a-37db-11ef-aa8e-93df2ec501fa]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW5749849818.mp3?updated=1719860339" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Public pianos and private scams.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/296/notes</link>
      <description>This week Joe and Dave share some interesting follow up from a few episodes ago where Dave shared his love for baby grand pianos and how scammers we're using that to lure people into traps. Listener George wrote in to share about a show on UK Channel 4, called "The Piano," it's a music competition where visitors play a public piano in a train station, judged by hidden famous pianists, with winners performing at the UK Royal Festival Hall. Joe's story is a warning to travel goers using booking.com, as they share scams are at a all time high. Dave's story follows some neighborhood Facebook groups, and how they are inundated with posts about air duct cleaning services, prompting an investigation that reveals a scam involving fake profiles, telemarketers in Pakistan, and local technicians. Our catch of the day comes from listener Christopher, who writes in to share an outlandish message he received from a hacker with too much time on their hands.
Please take a moment to fill out an audience survey! Let us know how we are doing!
Links to the stories:

Note by Note: The Making of a Steinway Piano | Musical Instrument | ENDEVR Documentary


Booking.com warns of up to 900% increase in travel scams


Air Duct Cleaning Scam Exposed!

Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com.</description>
      <pubDate>Thu, 27 Jun 2024 05:00:00 -0000</pubDate>
      <itunes:title>Public pianos and private scams.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>296</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>This week Joe and Dave share some interesting follow up from a few episodes ago where Dave shared his love for baby grand pianos and how scammers we're using that to lure people into traps. Listener George wrote in to share about a show on UK Channel 4, called "The Piano," it's a music competition where visitors play a public piano in a train station, judged by hidden famous pianists, with winners performing at the UK Royal Festival Hall. Joe's story is a warning to travel goers using booking.com, as they share scams are at a all time high. Dave's story follows some neighborhood Facebook groups, and how they are inundated with posts about air duct cleaning services, prompting an investigation that reveals a scam involving fake profiles, telemarketers in Pakistan, and local technicians. Our catch of the day comes from listener Christopher, who writes in to share an outlandish message he received from a hacker with too much time on their hands.
Please take a moment to fill out an audience survey! Let us know how we are doing!
Links to the stories:

Note by Note: The Making of a Steinway Piano | Musical Instrument | ENDEVR Documentary


Booking.com warns of up to 900% increase in travel scams


Air Duct Cleaning Scam Exposed!

Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This week Joe and Dave share some interesting follow up from a few episodes ago where Dave shared his love for baby grand pianos and how scammers we're using that to lure people into traps. Listener George wrote in to share about a show on UK Channel 4, called "The Piano," it's a music competition where visitors play a public piano in a train station, judged by hidden famous pianists, with winners performing at the UK Royal Festival Hall. Joe's story is a warning to travel goers using <a href="http://booking.com/">booking.com</a>, as they share scams are at a all time high. Dave's story follows some neighborhood Facebook groups, and how they are inundated with posts about air duct cleaning services, prompting an investigation that reveals a scam involving fake profiles, telemarketers in Pakistan, and local technicians. Our catch of the day comes from listener Christopher, who writes in to share an outlandish message he received from a hacker with too much time on their hands.</p><p><em>Please take a moment to fill out an </em><a href="https://www.surveymonkey.com/r/cwcv-listener"><em>audience survey</em></a><em>! Let us know how we are doing!</em></p><p>Links to the stories:</p><ul>
<li><a href="https://www.youtube.com/watch?v=6rAhps4AkT8">Note by Note: The Making of a Steinway Piano | Musical Instrument | ENDEVR Documentary</a></li>
<li>
<a href="http://booking.com/">Booking.com</a><a href="https://www.bbc.com/news/articles/c8003dd8jzeo"> warns of up to 900% increase in travel scams</a>
</li>
<li><a href="https://www.youtube.com/watch?v=J_FMXc7F_bM">Air Duct Cleaning Scam Exposed!</a></li>
</ul><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a>.</p>]]>
      </content:encoded>
      <itunes:duration>2349</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[f93f0dd4-ac02-11ee-b598-1fe4e109bb91]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW8304550256.mp3?updated=1719424107" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Encore: SOC Triad (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/37/notes</link>
      <description>A best practice for framing cyber intelligence critical information requirements that recommends collecting and consolidating data from three specific sources: endpoint, network and log.</description>
      <pubDate>Tue, 25 Jun 2024 07:00:00 -0000</pubDate>
      <itunes:title>Encore: SOC Triad (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>37</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A best practice for framing cyber intelligence critical information requirements that recommends collecting and consolidating data from three specific sources: endpoint, network and log.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A best practice for framing cyber intelligence critical information requirements that recommends collecting and consolidating data from three specific sources: endpoint, network and log.</p>]]>
      </content:encoded>
      <itunes:duration>321</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[5ad03cfc-3264-11ef-98c9-d3de8fcf794d]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW8347942236.mp3?updated=1719259873" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>From dark shadows to main stage.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/295/notes</link>
      <description>Brandon Kovacs, a Senior Red Team Consultant at Bishop Fox, is talking about how Artificial Intelligence is shaping the future of social engineering. Listener Adina wrote in to share their thoughts on an earlier episode on Google. Dave share's listener Tony's write in for his story this week. Joe and Dave discuss some questions Tony shared about preparing for an overseas trip when his bank account was locked due to security measures triggered by setting up a backup phone and using a VPN. Joe has two stories for this week, one from Blair Young at WBAL, where Maryland Lottery is warning the public about a phone scam claiming Powerball winnings. The second comes from listener Don who shares a story on people who hold posters up saying they need money for children's funerals. Our catch of the day comes from a listener that found a "task scam" on Reddit. 
Please take a moment to fill out an audience survey! Let us know how we are doing!  
Links to the stories:

Maryland Lottery warns public about phone scam claiming Powerball winnings

‘It’s a scam’: Poster-holders aren’t really raising money for a child’s funeral


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com.</description>
      <pubDate>Thu, 20 Jun 2024 05:00:00 -0000</pubDate>
      <itunes:title>From dark shadows to main stage.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>295</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Brandon Kovacs, a Senior Red Team Consultant at Bishop Fox, is talking about how Artificial Intelligence is shaping the future of social engineering. Listener Adina wrote in to share their thoughts on an earlier episode on Google. Dave share's listener Tony's write in for his story this week. Joe and Dave discuss some questions Tony shared about preparing for an overseas trip when his bank account was locked due to security measures triggered by setting up a backup phone and using a VPN. Joe has two stories for this week, one from Blair Young at WBAL, where Maryland Lottery is warning the public about a phone scam claiming Powerball winnings. The second comes from listener Don who shares a story on people who hold posters up saying they need money for children's funerals. Our catch of the day comes from a listener that found a "task scam" on Reddit. 
Please take a moment to fill out an audience survey! Let us know how we are doing!  
Links to the stories:

Maryland Lottery warns public about phone scam claiming Powerball winnings

‘It’s a scam’: Poster-holders aren’t really raising money for a child’s funeral


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Brandon Kovacs, a Senior Red Team Consultant at Bishop Fox, is talking about how Artificial Intelligence is shaping the future of social engineering. Listener Adina wrote in to share their thoughts on an earlier episode on Google. Dave share's listener Tony's write in for his story this week. Joe and Dave discuss some questions Tony shared about preparing for an overseas trip when his bank account was locked due to security measures triggered by setting up a backup phone and using a VPN. Joe has two stories for this week, one from Blair Young at WBAL, where Maryland Lottery is warning the public about a phone scam claiming Powerball winnings. The second comes from listener Don who shares a story on people who hold posters up saying they need money for children's funerals. Our catch of the day comes from a listener that found a "task scam" on Reddit. </p><p><em>Please take a moment to fill out an </em><a href="https://www.surveymonkey.com/r/cwcv-listener"><em>audience survey</em></a><em>! Let us know how we are doing! </em> </p><p>Links to the stories:</p><ul>
<li><a href="https://www.wbaltv.com/article/maryland-lottery-warns-public-phone-scam-claiming-powerball-winnings/61095038">Maryland Lottery warns public about phone scam claiming Powerball winnings</a></li>
<li><a href="https://www.youtube.com/watch?v=P_Gy2bLpx74">‘It’s a scam’: Poster-holders aren’t really raising money for a child’s funeral</a></li>
</ul><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com.</p>]]>
      </content:encoded>
      <itunes:duration>3398</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[f90f6912-ac02-11ee-b598-032a5a1b09a7]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW5260847263.mp3?updated=1718746081" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Encore: supply chain attacks (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/36/notes</link>
      <description>Also known as a third-party attack or a value-chain attack, advisory groups gain access to a targeted victims network by first infiltrating a business partner's network that has access to the victim's systems or data.</description>
      <pubDate>Tue, 18 Jun 2024 07:00:00 -0000</pubDate>
      <itunes:title>Encore: supply chain attacks (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>36</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Also known as a third-party attack or a value-chain attack, advisory groups gain access to a targeted victims network by first infiltrating a business partner's network that has access to the victim's systems or data.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Also known as a third-party attack or a value-chain attack, advisory groups gain access to a targeted victims network by first infiltrating a business partner's network that has access to the victim's systems or data.</p>]]>
      </content:encoded>
      <itunes:duration>328</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[e07207fe-2cd4-11ef-910a-f7ea79c5dec7]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW2992261566.mp3?updated=1718647964" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>False flags and fake voices.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/294/notes</link>
      <description>This week we are joined by Maria Varmazis, host of the N2K daily space show, T-Minus. Maria's story covers the escalating efforts of pro-Russian propagandists to tarnish the Paris Summer Olympics and erode Western support for Ukraine, employing bold tactics like using AI to mimic Tom Cruise's voice. Joe and Dave share quite a bit of listener follow up, the first on is regarding the AirBnB story from a few weeks ago, the second one is from listener Lawrence who wrote in to verify dave’s comments about American Express, and the last one is from listener Tait, who shares some info on how they stay safe with banking. Joe has two stories for this week, the first one is on how the FBI is investigating the city of Gooding after they sent $1 million to a contractor for a wastewater project but later learned it was the victim of a scam. Joe's second story follows how a scammer dupes a Las Vegas woman out of $9,000 using a simple trick after turning up on her doorstep. Dave shares Avast's Q1, 2024 threat report. Our catch of the day comes from listener Clinton who wrote in to share and invoice he received from Apple Global requesting almost $1400. 
Please take a moment to fill out an audience survey! Let us know how we are doing!  
Links to the stories:

City of Gooding scammed out of $1 million, officials say

Scammer dupes Las Vegas woman out of $9,000 using a simple trick after turning up on her doorstep... so can you spot it?

Avast Q1/2024 Threat Report

Russians target Olympics with fake AI-generated Tom Cruise video


You can hear more from the T-Minus space daily show here.
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com.</description>
      <pubDate>Thu, 13 Jun 2024 05:00:00 -0000</pubDate>
      <itunes:title>False flags and fake voices.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>294</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>This week we are joined by Maria Varmazis, host of the N2K daily space show, T-Minus. Maria's story covers the escalating efforts of pro-Russian propagandists to tarnish the Paris Summer Olympics and erode Western support for Ukraine, employing bold tactics like using AI to mimic Tom Cruise's voice. Joe and Dave share quite a bit of listener follow up, the first on is regarding the AirBnB story from a few weeks ago, the second one is from listener Lawrence who wrote in to verify dave’s comments about American Express, and the last one is from listener Tait, who shares some info on how they stay safe with banking. Joe has two stories for this week, the first one is on how the FBI is investigating the city of Gooding after they sent $1 million to a contractor for a wastewater project but later learned it was the victim of a scam. Joe's second story follows how a scammer dupes a Las Vegas woman out of $9,000 using a simple trick after turning up on her doorstep. Dave shares Avast's Q1, 2024 threat report. Our catch of the day comes from listener Clinton who wrote in to share and invoice he received from Apple Global requesting almost $1400. 
Please take a moment to fill out an audience survey! Let us know how we are doing!  
Links to the stories:

City of Gooding scammed out of $1 million, officials say

Scammer dupes Las Vegas woman out of $9,000 using a simple trick after turning up on her doorstep... so can you spot it?

Avast Q1/2024 Threat Report

Russians target Olympics with fake AI-generated Tom Cruise video


You can hear more from the T-Minus space daily show here.
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This week we are joined by Maria Varmazis, host of the N2K daily space show, T-Minus. Maria's story covers the escalating efforts of pro-Russian propagandists to tarnish the Paris Summer Olympics and erode Western support for Ukraine, employing bold tactics like using AI to mimic Tom Cruise's voice. Joe and Dave share quite a bit of listener follow up, the first on is regarding the AirBnB story from a few weeks ago, the second one is from listener Lawrence who wrote in to verify dave’s comments about American Express, and the last one is from listener Tait, who shares some info on how they stay safe with banking. Joe has two stories for this week, the first one is on how the FBI is investigating the city of Gooding after they sent $1 million to a contractor for a wastewater project but later learned it was the victim of a scam. Joe's second story follows how a scammer dupes a Las Vegas woman out of $9,000 using a simple trick after turning up on her doorstep. Dave shares Avast's Q1, 2024 threat report. Our catch of the day comes from listener Clinton who wrote in to share and invoice he received from Apple Global requesting almost $1400. </p><p><em>Please take a moment to fill out an </em><a href="https://www.surveymonkey.com/r/cwcv-listener"><em>audience survey</em></a><em>! Let us know how we are doing! </em> </p><p>Links to the stories:</p><ul>
<li><a href="https://www.ktvb.com/article/news/local/officials-city-of-gooding-1-million-social-engineering-scam/277-1f255b11-7fad-4815-a475-de436225b296">City of Gooding scammed out of $1 million, officials say</a></li>
<li><a href="https://www.dailymail.co.uk/news/article-13500419/Scam-victim-Las-Vegas-home-cut-card.html">Scammer dupes Las Vegas woman out of $9,000 using a simple trick after turning up on her doorstep... so can you spot it?</a></li>
<li><a href="https://decoded.avast.io/threatresearch/avast-q1-2024-threat-report/">Avast Q1/2024 Threat Report</a></li>
<li><a href="https://www.cnn.com/2024/06/04/business/video/tom-cruise-fake-ai-olympics-russians-newsnight-digvid">Russians target Olympics with fake AI-generated Tom Cruise video</a></li>
</ul><p><br></p><p>You can hear more from the T-Minus space daily show <a href="https://space.n2k.com/podcasts/t-minus">here</a>.</p><p>Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com.</p>]]>
      </content:encoded>
      <itunes:duration>2434</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[f8df4e1c-ac02-11ee-b598-0fa5d02542cc]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW2255010271.mp3?updated=1718210057" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Encore: taint analysis (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/35/notes</link>
      <description>The process of software engineers checking the flow of user input in application code to determine if unanticipated input can affect program execution in malicious ways.</description>
      <pubDate>Tue, 11 Jun 2024 07:00:00 -0000</pubDate>
      <itunes:title>Encore: taint analysis (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>35</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>The process of software engineers checking the flow of user input in application code to determine if unanticipated input can affect program execution in malicious ways.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The process of software engineers checking the flow of user input in application code to determine if unanticipated input can affect program execution in malicious ways.</p>]]>
      </content:encoded>
      <itunes:duration>260</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[f476feba-2740-11ef-8b63-534674e9c4f6]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW5467928257.mp3?updated=1718031941" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Spotting social engineering in the shadows.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/293/notes</link>
      <description>This week, we are joined by Dr. Chris Pierson CEO at Black Cloak, and he is talking about some of the social engineering attacks his team is tracking. Joe's story follows how Microsoft Threat Intelligence has observed the financially motivated cybercriminal group Storm-1811 misusing the client management tool Quick Assist in social engineering attacks. Dave share's the story of the lure of a free baby grand piano to deceive over 125,000 email recipients, mainly targeting North American university students and faculty, earning at least $900,000. Our catch of the day comes from listener Chuck who writes in to share some of his junk mail he has been receiving recently, and shares concerns for other listeners. 
Please take a moment to fill out an audience survey! Let us know how we are doing! 
Links to the stories:

Threat actors misusing Quick Assist in social engineering attacks leading to ransomware

Free Piano phish targets American university students, staff


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com.</description>
      <pubDate>Thu, 06 Jun 2024 05:00:00 -0000</pubDate>
      <itunes:title>Spotting social engineering in the shadows.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>293</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>This week, we are joined by Dr. Chris Pierson CEO at Black Cloak, and he is talking about some of the social engineering attacks his team is tracking. Joe's story follows how Microsoft Threat Intelligence has observed the financially motivated cybercriminal group Storm-1811 misusing the client management tool Quick Assist in social engineering attacks. Dave share's the story of the lure of a free baby grand piano to deceive over 125,000 email recipients, mainly targeting North American university students and faculty, earning at least $900,000. Our catch of the day comes from listener Chuck who writes in to share some of his junk mail he has been receiving recently, and shares concerns for other listeners. 
Please take a moment to fill out an audience survey! Let us know how we are doing! 
Links to the stories:

Threat actors misusing Quick Assist in social engineering attacks leading to ransomware

Free Piano phish targets American university students, staff


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This week, we are joined by Dr. Chris Pierson CEO at Black Cloak, and he is talking about some of the social engineering attacks his team is tracking. Joe's story follows how Microsoft Threat Intelligence has observed the financially motivated cybercriminal group Storm-1811 misusing the client management tool Quick Assist in social engineering attacks. Dave share's the story of the lure of a free baby grand piano to deceive over 125,000 email recipients, mainly targeting North American university students and faculty, earning at least $900,000. Our catch of the day comes from listener Chuck who writes in to share some of his junk mail he has been receiving recently, and shares concerns for other listeners. </p><p><em>Please take a moment to fill out an </em><a href="https://www.surveymonkey.com/r/cwcv-listener"><em>audience survey</em></a><em>! Let us know how we are doing! </em></p><p>Links to the stories:</p><ul>
<li><a href="https://www.microsoft.com/en-us/security/blog/2024/05/15/threat-actors-misusing-quick-assist-in-social-engineering-attacks-leading-to-ransomware/">Threat actors misusing Quick Assist in social engineering attacks leading to ransomware</a></li>
<li><a href="https://www.bleepingcomputer.com/news/security/free-piano-phish-targets-american-university-students-staff/#google_vignette">Free Piano phish targets American university students, staff</a></li>
</ul><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com.</p>]]>
      </content:encoded>
      <itunes:duration>3681</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[f8af7246-ac02-11ee-b598-87162915b872]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW9246129699.mp3?updated=1717601334" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The curious case of the missing IcedID. [Only Malware in the Building]</title>
      <link>https://thecyberwire.com/podcasts/only-malware-in-the-building/1/notes</link>
      <description>Welcome in! You’ve entered, Only Malware in the Building. Join us each month to sip tea and solve mysteries about today’s most interesting threats. Your host is Selena Larson, Proofpoint intelligence analyst and host of their podcast DISCARDED. Inspired by the residents of a building in New York’s exclusive upper west side, Selena is joined by N2K Networks Dave Bittner and Rick Howard to uncover the stories behind notable cyberattacks. 
Being a security researcher is a bit like being a detective: you gather clues, analyze the evidence, and consult the experts to solve the cyber puzzle. On this episode, we talk about "The curious case of the missing IcedID." 
IcedID is a malware originally classified as a banking trojan and was first observed in 2017. It also acts as a loader for other malware, including ransomware, and was a favored payload used by multiple cybercriminal threat actors until fall 2023. 
Then, it all but disappeared. In its place, a new threat crawled: Latrodectus. Named after a spider, this new malware, created by the same people as IcedID, is now poised to take over where IcedID melted off. 
Today we look back at what happened to the once prominent payload, and what its successor’s spinning web of activity means for the overall landscape.</description>
      <pubDate>Tue, 04 Jun 2024 11:00:00 -0000</pubDate>
      <itunes:title>The curious case of the missing IcedID. [Only Malware in the Building]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>1</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/9e980e9a-21d1-11ef-a467-5fe9aa602b1c/image/95ecb6d2b9e194294da7f74a784bbfa0.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Welcome in! You’ve entered, Only Malware in the Building. Join us each month to sip tea and solve mysteries about today’s most interesting threats. Your host is Selena Larson, Proofpoint intelligence analyst and host of their podcast DISCARDED. Inspired by the residents of a building in New York’s exclusive upper west side, Selena is joined by N2K Networks Dave Bittner and Rick Howard to uncover the stories behind notable cyberattacks. 
Being a security researcher is a bit like being a detective: you gather clues, analyze the evidence, and consult the experts to solve the cyber puzzle. On this episode, we talk about "The curious case of the missing IcedID." 
IcedID is a malware originally classified as a banking trojan and was first observed in 2017. It also acts as a loader for other malware, including ransomware, and was a favored payload used by multiple cybercriminal threat actors until fall 2023. 
Then, it all but disappeared. In its place, a new threat crawled: Latrodectus. Named after a spider, this new malware, created by the same people as IcedID, is now poised to take over where IcedID melted off. 
Today we look back at what happened to the once prominent payload, and what its successor’s spinning web of activity means for the overall landscape.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Welcome in! You’ve entered, Only Malware in the Building. Join us each month to sip tea and solve mysteries about today’s most interesting threats. Your host is <a href="https://www.linkedin.com/in/selenalarson/">Selena Larson</a>, <a href="https://www.proofpoint.com/">Proofpoint</a> intelligence analyst and host of their podcast <a href="https://www.proofpoint.com/us/podcasts/discarded">DISCARDED</a>. Inspired by the residents of a building in New York’s exclusive upper west side, Selena is joined by <a href="https://www.n2k.com/">N2K</a> Networks <a href="https://www.linkedin.com/in/dave-bittner-27231a4/">Dave Bittner</a> and <a href="https://www.linkedin.com/in/rickhoward/">Rick Howard</a> to uncover the stories behind notable cyberattacks. </p><p>Being a security researcher is a bit like being a detective: you gather clues, analyze the evidence, and consult the experts to solve the cyber puzzle. On this episode, we talk about "The curious case of the missing IcedID." </p><p>IcedID is a malware originally classified as a banking trojan and was first observed in 2017. It also acts as a loader for other malware, including ransomware, and was a favored payload used by multiple cybercriminal threat actors until fall 2023. </p><p>Then, it all but disappeared. In its place, a new threat crawled: Latrodectus. Named after a spider, this new malware, created by the same people as IcedID, is now poised to take over where IcedID melted off. </p><p>Today we look back at what happened to the once prominent payload, and what its successor’s spinning web of activity means for the overall landscape. </p>]]>
      </content:encoded>
      <itunes:duration>1318</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[9e980e9a-21d1-11ef-a467-5fe9aa602b1c]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW2976423807.mp3?updated=1717450961" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Encore: ATM skimming (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/34/notes</link>
      <description>The process of stealing ATM customer credentials by means of physically and covertly installing one or more devices onto a public ATM machine.</description>
      <pubDate>Tue, 04 Jun 2024 07:00:00 -0000</pubDate>
      <itunes:title>Encore: ATM skimming (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>34</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>The process of stealing ATM customer credentials by means of physically and covertly installing one or more devices onto a public ATM machine.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The process of stealing ATM customer credentials by means of physically and covertly installing one or more devices onto a public ATM machine.</p>]]>
      </content:encoded>
      <itunes:duration>297</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b1b682e4-1f98-11ef-9125-f729a01e0bc0]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW8662075047.mp3?updated=1718030713" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The AirBnB booking that wasn’t.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/292/notes</link>
      <description>This week we are joined by Maria Varmazis, host of the N2K daily space show, T-Minus. Maria shares an interesting story from a listener, who writes in on an AirBnB debacle he was dealing with. Joe shares the newly released 2024 Data Breach Investigations Report from Verizon. Dave shares a story From the New York Magazine, written by Ezra Marcus, on a college sophomore from University of Miami who was found to be tangled up in a refund fraud scam that granted him a lavish lifestyle. Our catch of the day comes from Joe's mother this week. She happened to receive an email with the subject line being "your order is confirmed," coming from what looks to be "McAfee." 
Please take a moment to fill out an audience survey! Let us know how we are doing! 
Links to the stories:

The Package King of Miami

2024 Data Breach Investigations Report


You can hear more from the T-Minus space daily show here.
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com.</description>
      <pubDate>Thu, 30 May 2024 05:00:00 -0000</pubDate>
      <itunes:title>The AirBnB booking that wasn’t.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>292</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>This week we are joined by Maria Varmazis, host of the N2K daily space show, T-Minus. Maria shares an interesting story from a listener, who writes in on an AirBnB debacle he was dealing with. Joe shares the newly released 2024 Data Breach Investigations Report from Verizon. Dave shares a story From the New York Magazine, written by Ezra Marcus, on a college sophomore from University of Miami who was found to be tangled up in a refund fraud scam that granted him a lavish lifestyle. Our catch of the day comes from Joe's mother this week. She happened to receive an email with the subject line being "your order is confirmed," coming from what looks to be "McAfee." 
Please take a moment to fill out an audience survey! Let us know how we are doing! 
Links to the stories:

The Package King of Miami

2024 Data Breach Investigations Report


You can hear more from the T-Minus space daily show here.
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This week we are joined by Maria Varmazis, host of the N2K daily space show, T-Minus. Maria shares an interesting story from a listener, who writes in on an AirBnB debacle he was dealing with. Joe shares the newly released 2024 Data Breach Investigations Report from Verizon. Dave shares a story From the New York Magazine, written by Ezra Marcus, on a college sophomore from University of Miami who was found to be tangled up in a refund fraud scam that granted him a lavish lifestyle. Our catch of the day comes from Joe's mother this week. She happened to receive an email with the subject line being "your order is confirmed," coming from what looks to be "McAfee." </p><p><em>Please take a moment to fill out an </em><a href="https://www.surveymonkey.com/r/cwcv-listener"><em>audience survey</em></a><em>! Let us know how we are doing! </em></p><p>Links to the stories:</p><ul>
<li><a href="https://nymag.com/intelligencer/article/matthew-bergwall-miami-amazon-package-scam-package-refund.html">The Package King of Miami</a></li>
<li><a href="https://www.verizon.com/business/resources/t23a/reports/2024-dbir-data-breach-investigations-report.pdf">2024 Data Breach Investigations Report</a></li>
</ul><p><br></p><p>You can hear more from the T-Minus space daily show <a href="https://space.n2k.com/podcasts/t-minus">here</a>.</p><p>Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com.</p>]]>
      </content:encoded>
      <itunes:duration>3078</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[f87fe5c6-ac02-11ee-b598-9b50e6430da1]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW3586658654.mp3?updated=1717001353" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Encore: APT side hustle (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/33/notes</link>
      <description>A nation-state hacking group’s practice of funding its town activities through cybercrime or cyber mercenary work.</description>
      <pubDate>Tue, 28 May 2024 07:00:00 -0000</pubDate>
      <itunes:title>Encore: APT side hustle (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>33</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A nation-state hacking group’s practice of funding its town activities through cybercrime or cyber mercenary work.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A nation-state hacking group’s practice of funding its town activities through cybercrime or cyber mercenary work.</p>]]>
      </content:encoded>
      <itunes:duration>329</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[96abb25a-1c5d-11ef-9d11-03b119ead7c1]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW5348005287.mp3?updated=1717192700" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Awareness, behavior, &amp; beyond.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/291/notes</link>
      <description>This week, we are joined by host of 8th Layer Insights, Perry Carpenter from KnowBe4 and Dr. Jessica Barker from Cygenta to discuss human risk: awareness, behavior and beyond. Joe and Dave share some listener follow up, the first being from Richard, who writes in to share some tips and tricks regarding relationship scams mentioned in a previous show. The second is from Michael, who writes in with some thoughts on social engineering to compromise open source projects from episode 288. Dave shares a story on researchers observing millions of daily emails from "Jenny Green," facilitated by the Phorpiex botnet, distributing LockBit 3.0 ransomware that has affected millions of people. Joe share's Paul Raffile's story, a gentleman who got fired from Facebook before he even started. Our catch of the day comes from listener Gordy who shared an email with us regarding his "McAfee security." 
Please take a moment to fill out an audience survey! Let us know how we are doing! 
Links to the stories:

Security Experts Issue Jenny Green Email Warning For Millions


LinkedIn Paul Raffile (Part 1)


LinkedIn Paul Raffile (Part 2)


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com.</description>
      <pubDate>Thu, 23 May 2024 05:00:00 -0000</pubDate>
      <itunes:title>Awareness, behavior, &amp; beyond.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>291</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>This week, we are joined by host of 8th Layer Insights, Perry Carpenter from KnowBe4 and Dr. Jessica Barker from Cygenta to discuss human risk: awareness, behavior and beyond. Joe and Dave share some listener follow up, the first being from Richard, who writes in to share some tips and tricks regarding relationship scams mentioned in a previous show. The second is from Michael, who writes in with some thoughts on social engineering to compromise open source projects from episode 288. Dave shares a story on researchers observing millions of daily emails from "Jenny Green," facilitated by the Phorpiex botnet, distributing LockBit 3.0 ransomware that has affected millions of people. Joe share's Paul Raffile's story, a gentleman who got fired from Facebook before he even started. Our catch of the day comes from listener Gordy who shared an email with us regarding his "McAfee security." 
Please take a moment to fill out an audience survey! Let us know how we are doing! 
Links to the stories:

Security Experts Issue Jenny Green Email Warning For Millions


LinkedIn Paul Raffile (Part 1)


LinkedIn Paul Raffile (Part 2)


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This week, we are joined by host of 8th Layer Insights, Perry Carpenter from KnowBe4 and Dr. Jessica Barker from Cygenta to discuss human risk: awareness, behavior and beyond. Joe and Dave share some listener follow up, the first being from Richard, who writes in to share some tips and tricks regarding relationship scams mentioned in a previous show. The second is from Michael, who writes in with some thoughts on social engineering to compromise open source projects from episode 288. Dave shares a story on researchers observing millions of daily emails from "Jenny Green," facilitated by the Phorpiex botnet, distributing LockBit 3.0 ransomware that has affected millions of people. Joe share's Paul Raffile's story, a gentleman who got fired from Facebook before he even started. Our catch of the day comes from listener Gordy who shared an email with us regarding his "McAfee security." </p><p><em>Please take a moment to fill out an </em><a href="https://www.surveymonkey.com/r/cwcv-listener"><em>audience survey</em></a><em>! Let us know how we are doing! </em></p><p>Links to the stories:</p><ul>
<li><a href="https://www.forbes.com/sites/daveywinder/2024/05/14/security-experts-issue-jenny-green-email-warning-for-millions/?sh=53fa9d425895">Security Experts Issue Jenny Green Email Warning For Millions</a></li>
<li>
<a href="https://www.linkedin.com/posts/raffile_meta-fired-me-before-i-even-started-activity-7192095001290395651--aXt/">LinkedIn Paul Raffile</a> (Part 1)</li>
<li>
<a href="https://www.linkedin.com/posts/raffile_sextortion-tv-reporter-confronts-a-nigerian-activity-7192780212651143168-Urlp/?utm_source=share&amp;utm_medium=member_desktop">LinkedIn Paul Raffile</a> (Part 2)</li>
</ul><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com.</p>]]>
      </content:encoded>
      <itunes:duration>3862</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[f8502cd2-ac02-11ee-b598-07e9fe308c5b]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW4443315155.mp3?updated=1717448924" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Encore: endpoint (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/32/notes</link>
      <description>A device connected to a network that accepts communications from other endpoints like laptops, mobile devices, IoT equipment, routers, switches, and any tool on the security stack.</description>
      <pubDate>Tue, 21 May 2024 07:00:00 -0000</pubDate>
      <itunes:title>Encore: endpoint (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>32</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A device connected to a network that accepts communications from other endpoints like laptops, mobile devices, IoT equipment, routers, switches, and any tool on the security stack.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A device connected to a network that accepts communications from other endpoints like laptops, mobile devices, IoT equipment, routers, switches, and any tool on the security stack.</p>]]>
      </content:encoded>
      <itunes:duration>365</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[93dbb356-16e3-11ef-8dc2-3fded0501714]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW7781734772.mp3?updated=1716236432" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Psychology and scams.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/290/notes</link>
      <description>This week we are joined by Maria Varmazis, host of the N2K daily space show, T-Minus. Maria shares an interesting story about how ransomware infections are beginning to change to form a more psychological attack against victims' organizations, as criminals are using personal and aggressive tactics to force them to pay. Dave and Joe share some listener follow up, from Bob, who writes in to share how he shares stories with his family members, and mentions one specifically on a Best Buy Geek Squad scam. Dave share's a story on bank scams, and how scammers are using genuine push notifications to trick their victims. Joe shares a story regarding email security loopholes, and how these loopholes are the latest path for North Korean social engineering attacks. Our catch of the day is from our follow up listener Bob, as he shares the story of trying to figure out the difference between a real email from the U.S social security department and a fake one. 
Please take a moment to fill out an audience survey! Let us know how we are doing! 
Links to the stories:

Ransomware crooks now SIM swap executives' kids to pressure their parents

Bank scammers using genuine push notifications to trick their victims

Email security loopholes are latest path for North Korean social engineering attacks


You can hear more from the T-Minus space daily show here.
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com.</description>
      <pubDate>Thu, 16 May 2024 05:00:00 -0000</pubDate>
      <itunes:title>Psychology and scams.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>290</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>This week we are joined by Maria Varmazis, host of the N2K daily space show, T-Minus. Maria shares an interesting story about how ransomware infections are beginning to change to form a more psychological attack against victims' organizations, as criminals are using personal and aggressive tactics to force them to pay. Dave and Joe share some listener follow up, from Bob, who writes in to share how he shares stories with his family members, and mentions one specifically on a Best Buy Geek Squad scam. Dave share's a story on bank scams, and how scammers are using genuine push notifications to trick their victims. Joe shares a story regarding email security loopholes, and how these loopholes are the latest path for North Korean social engineering attacks. Our catch of the day is from our follow up listener Bob, as he shares the story of trying to figure out the difference between a real email from the U.S social security department and a fake one. 
Please take a moment to fill out an audience survey! Let us know how we are doing! 
Links to the stories:

Ransomware crooks now SIM swap executives' kids to pressure their parents

Bank scammers using genuine push notifications to trick their victims

Email security loopholes are latest path for North Korean social engineering attacks


You can hear more from the T-Minus space daily show here.
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This week we are joined by Maria Varmazis, host of the N2K daily space show, T-Minus. Maria shares an interesting story about how ransomware infections are beginning to change to form a more psychological attack against victims' organizations, as criminals are using personal and aggressive tactics to force them to pay. Dave and Joe share some listener follow up, from Bob, who writes in to share how he shares stories with his family members, and mentions one specifically on a Best Buy Geek Squad scam. Dave share's a story on bank scams, and how scammers are using genuine push notifications to trick their victims. Joe shares a story regarding email security loopholes, and how these loopholes are the latest path for North Korean social engineering attacks. Our catch of the day is from our follow up listener Bob, as he shares the story of trying to figure out the difference between a real email from the U.S social security department and a fake one. </p><p><em>Please take a moment to fill out an </em><a href="https://www.surveymonkey.com/r/cwcv-listener"><em>audience survey</em></a><em>! Let us know how we are doing! </em></p><p>Links to the stories:</p><ul>
<li><a href="https://www.theregister.com/2024/05/07/ransomware_evolves_from_mere_extortion/">Ransomware crooks now SIM swap executives' kids to pressure their parents</a></li>
<li><a href="https://shkspr.mobi/blog/2024/05/bank-scammers-using-genuine-push-notifications-to-trick-their-victims/">Bank scammers using genuine push notifications to trick their victims</a></li>
<li><a href="https://therecord.media/north-korea-kimsuky-hackers-dmarc-emails">Email security loopholes are latest path for North Korean social engineering attacks</a></li>
</ul><p><br></p><p>You can hear more from the T-Minus space daily show <a href="https://space.n2k.com/podcasts/t-minus">here</a>.</p><p>Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com.</p>]]>
      </content:encoded>
      <itunes:duration>2635</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[f8208f68-ac02-11ee-b598-1b9e0b9026ca]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW7664448788.mp3?updated=1715792645" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Encore: unified extensible firmware interface (UEFI) (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/31/notes</link>
      <description>An extension of the traditional Basic Input/Output System or BIOS that, during the boot process, facilitates the communication between the computer’s firmware and the computer’s operating system.</description>
      <pubDate>Tue, 14 May 2024 07:00:00 -0000</pubDate>
      <itunes:title>Encore: unified extensible firmware interface (UEFI) (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>31</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>An extension of the traditional Basic Input/Output System or BIOS that, during the boot process, facilitates the communication between the computer’s firmware and the computer’s operating system.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>An extension of the traditional Basic Input/Output System or BIOS that, during the boot process, facilitates the communication between the computer’s firmware and the computer’s operating system.</p>]]>
      </content:encoded>
      <itunes:duration>356</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[1a60063e-1158-11ef-9234-d7318b611849]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW2354186179.mp3?updated=1715626524" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The illusion of influence.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/289/notes</link>
      <description>Bogdan Botezatu from Bitdefender is discussing research on "Audio deepfakes: Celebrity-endorsed giveaway scams and fraudulent investment opportunities flood social media platforms." Dave and Joe shares some follow up from listener Lara, who writes in to discuss a few topics regarding a previous episode. Joe's story is sharing a game changer in the social engineering world. Dave shares the story of a listener's grandmother who had fallen victim to a pig butchering scam. Our catch of the day comes from listener Kenneth who shares an email he received from a "Cardiologist" on some puppies. 
Please take a moment to fill out an audience survey! Let us know how we are doing! 
Links to the stories:

Audio deepfakes: Celebrity-endorsed giveaway scams and fraudulent investment opportunities flood social media platforms

PCI DSS v4.0 a game-changer in social engineering awareness, prevention


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com.</description>
      <pubDate>Thu, 09 May 2024 05:00:00 -0000</pubDate>
      <itunes:title>The illusion of influence.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>289</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Bogdan Botezatu from Bitdefender is discussing research on "Audio deepfakes: Celebrity-endorsed giveaway scams and fraudulent investment opportunities flood social media platforms." Dave and Joe shares some follow up from listener Lara, who writes in to discuss a few topics regarding a previous episode. Joe's story is sharing a game changer in the social engineering world. Dave shares the story of a listener's grandmother who had fallen victim to a pig butchering scam. Our catch of the day comes from listener Kenneth who shares an email he received from a "Cardiologist" on some puppies. 
Please take a moment to fill out an audience survey! Let us know how we are doing! 
Links to the stories:

Audio deepfakes: Celebrity-endorsed giveaway scams and fraudulent investment opportunities flood social media platforms

PCI DSS v4.0 a game-changer in social engineering awareness, prevention


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Bogdan Botezatu from Bitdefender is discussing research on "Audio deepfakes: Celebrity-endorsed giveaway scams and fraudulent investment opportunities flood social media platforms." Dave and Joe shares some follow up from listener Lara, who writes in to discuss a few topics regarding a previous episode. Joe's story is sharing a game changer in the social engineering world. Dave shares the story of a listener's grandmother who had fallen victim to a pig butchering scam. Our catch of the day comes from listener Kenneth who shares an email he received from a "Cardiologist" on some puppies. </p><p><em>Please take a moment to fill out an </em><a href="https://www.surveymonkey.com/r/cwcv-listener"><em>audience survey</em></a><em>! Let us know how we are doing! </em></p><p>Links to the stories:</p><ul>
<li><a href="https://www.bitdefender.com/blog/labs/audio-deepfakes-celebrity-endorsed-giveaway-scams-and-fraudulent-investment-opportunities-flood-social-media-platforms/">Audio deepfakes: Celebrity-endorsed giveaway scams and fraudulent investment opportunities flood social media platforms</a></li>
<li><a href="https://it-online.co.za/2024/05/02/pci-dss-v4-0-a-game-changer-in-social-engineering-awareness-prevention/">PCI DSS v4.0 a game-changer in social engineering awareness, prevention</a></li>
</ul><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com.</p>]]>
      </content:encoded>
      <itunes:duration>3713</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[f7f1749e-ac02-11ee-b598-d3d84ba546c8]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW9270700802.mp3?updated=1715189813" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Encore: Daemon (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/30/notes</link>
      <description>An operating system program running in the background designed to perform a specific task when certain conditions or events occur.</description>
      <pubDate>Tue, 07 May 2024 05:00:00 -0000</pubDate>
      <itunes:title>Encore: Daemon (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>30</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>An operating system program running in the background designed to perform a specific task when certain conditions or events occur.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>An operating system program running in the background designed to perform a specific task when certain conditions or events occur.</p>]]>
      </content:encoded>
      <itunes:duration>289</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[56f250aa-0bf1-11ef-bb4f-77ff32885392]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW5039597558.mp3?updated=1715032084" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>From support to scam.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/288/notes</link>
      <description>This week we are joined by Maria Varmazis, host of the N2K daily space show, T-Minus. Maria shares an interesting story from Canada on a gentleman who thought he was calling Best Buy's Geek Squad, but instead ended up getting scammed out of $25,000. Dave and Joe share quite a bit of listener follow up, the first one is from Raul who shares how they saw an infamous Facebook scam. The second one is from listener Alec who shares some thoughts on episode 286's catch of the day. Lastly, Paula shares some thoughts on a recent discussion on why people are on the phone when a flight gets cancelled. Joe brings back answers to an old scam featured on an episode back in January on toll scams, as well as sharing about how the OpenSSF and OpenJS Foundations have issued an alert for social engineering takeovers of open source projects. Dave shares updates from the ex-athletic director accused of framing principal with AI and how he was arrested at the airport with a gun. Our catch of the day comes from listener Kenneth who shares an email from a "doctor" who has puppies for sale. 
Please take a moment to fill out an audience survey! Let us know how we are doing! 
Links to the stories:

An Ontario senior thought he called Geek Squad for help with his printer. Instead, he got scammed out of $25,000

Smishing Scam Regarding Debt for Road Toll Services

Open Source Security (OpenSSF) and OpenJS Foundations Issue Alert for Social Engineering Takeovers of Open Source Projects

Ex-athletic director accused of framing principal with AI arrested at airport with gun


You can hear more from the T-Minus space daily show here.
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com.</description>
      <pubDate>Thu, 02 May 2024 05:00:00 -0000</pubDate>
      <itunes:title>From support to scam.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>288</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>This week we are joined by Maria Varmazis, host of the N2K daily space show, T-Minus. Maria shares an interesting story from Canada on a gentleman who thought he was calling Best Buy's Geek Squad, but instead ended up getting scammed out of $25,000. Dave and Joe share quite a bit of listener follow up, the first one is from Raul who shares how they saw an infamous Facebook scam. The second one is from listener Alec who shares some thoughts on episode 286's catch of the day. Lastly, Paula shares some thoughts on a recent discussion on why people are on the phone when a flight gets cancelled. Joe brings back answers to an old scam featured on an episode back in January on toll scams, as well as sharing about how the OpenSSF and OpenJS Foundations have issued an alert for social engineering takeovers of open source projects. Dave shares updates from the ex-athletic director accused of framing principal with AI and how he was arrested at the airport with a gun. Our catch of the day comes from listener Kenneth who shares an email from a "doctor" who has puppies for sale. 
Please take a moment to fill out an audience survey! Let us know how we are doing! 
Links to the stories:

An Ontario senior thought he called Geek Squad for help with his printer. Instead, he got scammed out of $25,000

Smishing Scam Regarding Debt for Road Toll Services

Open Source Security (OpenSSF) and OpenJS Foundations Issue Alert for Social Engineering Takeovers of Open Source Projects

Ex-athletic director accused of framing principal with AI arrested at airport with gun


You can hear more from the T-Minus space daily show here.
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This week we are joined by Maria Varmazis, host of the N2K daily space show, T-Minus. Maria shares an interesting story from Canada on a gentleman who thought he was calling Best Buy's Geek Squad, but instead ended up getting scammed out of $25,000. Dave and Joe share quite a bit of listener follow up, the first one is from Raul who shares how they saw an infamous Facebook scam. The second one is from listener Alec who shares some thoughts on episode 286's catch of the day. Lastly, Paula shares some thoughts on a recent discussion on why people are on the phone when a flight gets cancelled. Joe brings back answers to an old scam featured on an episode back in January on toll scams, as well as sharing about how the OpenSSF and OpenJS Foundations have issued an alert for social engineering takeovers of open source projects. Dave shares updates from the ex-athletic director accused of framing principal with AI and how he was arrested at the airport with a gun. Our catch of the day comes from listener Kenneth who shares an email from a "doctor" who has puppies for sale. </p><p><em>Please take a moment to fill out an </em><a href="https://www.surveymonkey.com/r/cwcv-listener"><em>audience survey</em></a><em>! Let us know how we are doing! </em></p><p>Links to the stories:</p><ul>
<li><a href="https://toronto.ctvnews.ca/an-ontario-senior-thought-he-called-geek-squad-for-help-with-his-printer-instead-he-got-scammed-out-of-25-000-1.6859230?__vfz=medium%3Dsharebar">An Ontario senior thought he called Geek Squad for help with his printer. Instead, he got scammed out of $25,000</a></li>
<li><a href="https://www.ic3.gov/Media/Y2024/PSA240412">Smishing Scam Regarding Debt for Road Toll Services</a></li>
<li><a href="https://openjsf.org/blog/openssf-openjs-alert-social-engineering-takeovers?utm_source=newsletter&amp;utm_medium=email&amp;utm_campaign=sendto_newslettertest_technology&amp;stream=top#_ga=2.254700544.900621688.1714057832-1969938898.1714057832">Open Source Security (OpenSSF) and OpenJS Foundations Issue Alert for Social Engineering Takeovers of Open Source Projects</a></li>
<li><a href="https://www.thebaltimorebanner.com/education/k-12-schools/eric-eiswert-ai-audio-baltimore-county-YBJNJAS6OZEE5OQVF5LFOFYN6M/">Ex-athletic director accused of framing principal with AI arrested at airport with gun</a></li>
</ul><p><br></p><p>You can hear more from the T-Minus space daily show <a href="https://space.n2k.com/podcasts/t-minus">here</a>.</p><p>Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com.</p>]]>
      </content:encoded>
      <itunes:duration>2960</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[f7c1f5ac-ac02-11ee-b598-1f470f88ae68]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW6801213266.mp3?updated=1714581245" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Encore: greyware (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/29/notes</link>
      <description>Also known as spyware and adware, it is a software category where developers design the application neither to cause explicit harm nor to accomplish some conventional legitimate purpose, but when run, usually annoys the user and often performs actions that the developer did not disclose, and that the user regards as undesirable.</description>
      <pubDate>Tue, 30 Apr 2024 07:00:00 -0000</pubDate>
      <itunes:title>Encore: greyware (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>29</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Also known as spyware and adware, it is a software category where developers design the application neither to cause explicit harm nor to accomplish some conventional legitimate purpose, but when run, usually annoys the user and often performs actions that the developer did not disclose, and that the user regards as undesirable.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Also known as spyware and adware, it is a software category where developers design the application neither to cause explicit harm nor to accomplish some conventional legitimate purpose, but when run, usually annoys the user and often performs actions that the developer did not disclose, and that the user regards as undesirable.</p>]]>
      </content:encoded>
      <itunes:duration>318</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[fcce5f0e-0652-11ef-93bd-6f3b974927f5]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW1907032967.mp3?updated=1714413672" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Fighting off phishing.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/287/notes</link>
      <description>Roger Grimes, a Data Driven Defense Evangelist from KnowBe4 and author is discussing his new book, "Fighting Phishing: Everything You Can Do to Fight Social Engineering and Phishing." Dave and Joe share some listener follow up, the first being from listener Tim, who shares a story of him almost falling for a scam involving some of his investment assets. Lastly, Dave and Joe share a story from an anonymous listener who wrote in to share about a LinkedIn imposter nightmare. Dave's story focuses on a how the LabHost PhaaS platform was disrupted by a year-long global law enforcement operation, resulting in the arrest of 37 suspects, including the original developer. Joe shares the story of an 81 year old Ohio man, who was arrested after shooting a woman after both of them got wrapped up in a phone call scam. Our catch of the day comes from Robert, who writes in with what he believes is a email scam from a Chinese company called "Infoonity." 
Please take a moment to fill out an audience survey! Let us know how we are doing! 
Links to the stories:

LabHost phishing service with 40,000 domains disrupted, 37 arrested

Ohio Man - Daily Mail


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com.</description>
      <pubDate>Thu, 25 Apr 2024 05:00:00 -0000</pubDate>
      <itunes:title>Fighting off phishing.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>287</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Roger Grimes, a Data Driven Defense Evangelist from KnowBe4 and author is discussing his new book, "Fighting Phishing: Everything You Can Do to Fight Social Engineering and Phishing." Dave and Joe share some listener follow up, the first being from listener Tim, who shares a story of him almost falling for a scam involving some of his investment assets. Lastly, Dave and Joe share a story from an anonymous listener who wrote in to share about a LinkedIn imposter nightmare. Dave's story focuses on a how the LabHost PhaaS platform was disrupted by a year-long global law enforcement operation, resulting in the arrest of 37 suspects, including the original developer. Joe shares the story of an 81 year old Ohio man, who was arrested after shooting a woman after both of them got wrapped up in a phone call scam. Our catch of the day comes from Robert, who writes in with what he believes is a email scam from a Chinese company called "Infoonity." 
Please take a moment to fill out an audience survey! Let us know how we are doing! 
Links to the stories:

LabHost phishing service with 40,000 domains disrupted, 37 arrested

Ohio Man - Daily Mail


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Roger Grimes, a Data Driven Defense Evangelist from KnowBe4 and author is discussing his new book, "Fighting Phishing: Everything You Can Do to Fight Social Engineering and Phishing." Dave and Joe share some listener follow up, the first being from listener Tim, who shares a story of him almost falling for a scam involving some of his investment assets. Lastly, Dave and Joe share a story from an anonymous listener who wrote in to share about a LinkedIn imposter nightmare. Dave's story focuses on a how the LabHost PhaaS platform was disrupted by a year-long global law enforcement operation, resulting in the arrest of 37 suspects, including the original developer. Joe shares the story of an 81 year old Ohio man, who was arrested after shooting a woman after both of them got wrapped up in a phone call scam. Our catch of the day comes from Robert, who writes in with what he believes is a email scam from a Chinese company called "Infoonity." </p><p><em>Please take a moment to fill out an </em><a href="https://www.surveymonkey.com/r/cwcv-listener"><em>audience survey</em></a><em>! Let us know how we are doing! </em></p><p>Links to the stories:</p><ul>
<li><a href="https://www.bleepingcomputer.com/news/security/labhost-phishing-service-with-40-000-domains-disrupted-37-arrested/#google_vignette">LabHost phishing service with 40,000 domains disrupted, 37 arrested</a></li>
<li><a href="https://www.dailymail.co.uk/news/article-13308215/Ohio-man-charged-murder-shooting-dead-female-Uber-driver-scammer.html">Ohio Man - Daily Mail</a></li>
</ul><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com.</p>]]>
      </content:encoded>
      <itunes:duration>3098</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[f7925a2c-ac02-11ee-b598-d7605b41deec]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW7156677769.mp3?updated=1713975534" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Encore: fuzzing (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/28/notes</link>
      <description>An automatic software bug and vulnerability discovery technique that inputs invalid, unexpected and/or random data or fuzz into a program and then monitors the program's reaction to it.</description>
      <pubDate>Tue, 23 Apr 2024 07:00:00 -0000</pubDate>
      <itunes:title>Encore: fuzzing (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>28</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>An automatic software bug and vulnerability discovery technique that inputs invalid, unexpected and/or random data or fuzz into a program and then monitors the program's reaction to it.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>An automatic software bug and vulnerability discovery technique that inputs invalid, unexpected and/or random data or fuzz into a program and then monitors the program's reaction to it.</p>]]>
      </content:encoded>
      <itunes:duration>315</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[dfd65ffa-00c1-11ef-8cf8-db8a40567a75]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW2221189046.mp3?updated=1713802033" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Is change presenting a window of opportunity for attackers?</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/286/notes</link>
      <description>Trevin Edgeworth, Red Team Practice Director at Bishop Fox, is discussing how change, like M&amp;A, staff, tech, lack of clarity or even self-promotion within and around security environments presents windows of opportunity for attackers. Joe and Dave share some listener follow up, the first one comes from Erin, who writes in from Northern Ireland, shares an interesting new find about scammers now keeping up with the news. The second one comes from listener Johnathan who shared thoughts on reconsidering his view on defining Apple's non-rate-limited MFA notifications as a "vulnerability." Lastly, we have follow up from listener Anders who shares an article on AI. Joe shares a story from Amazon sellers, and how they are being plagued in scam returns. Dave brings us the story of how to save yourself and your loved ones from AI robocalls. 
Please take a moment to fill out an audience survey! Let us know how we are doing! 
Links to the stories:

Theory Is All You Need: AI, Human Cognition, and Decision Making

Amazon Sellers Plagued by Surge in Scam Returns

How to Protect Yourself (and Your Loved Ones) From AI Scam Calls

News Insights: Does X Mark a Target? with Trevin Edgeworth, Director of Red Team


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com.</description>
      <pubDate>Thu, 18 Apr 2024 05:00:00 -0000</pubDate>
      <itunes:title>Is change presenting a window of opportunity for attackers?</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>286</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Trevin Edgeworth, Red Team Practice Director at Bishop Fox, is discussing how change, like M&amp;A, staff, tech, lack of clarity or even self-promotion within and around security environments presents windows of opportunity for attackers. Joe and Dave share some listener follow up, the first one comes from Erin, who writes in from Northern Ireland, shares an interesting new find about scammers now keeping up with the news. The second one comes from listener Johnathan who shared thoughts on reconsidering his view on defining Apple's non-rate-limited MFA notifications as a "vulnerability." Lastly, we have follow up from listener Anders who shares an article on AI. Joe shares a story from Amazon sellers, and how they are being plagued in scam returns. Dave brings us the story of how to save yourself and your loved ones from AI robocalls. 
Please take a moment to fill out an audience survey! Let us know how we are doing! 
Links to the stories:

Theory Is All You Need: AI, Human Cognition, and Decision Making

Amazon Sellers Plagued by Surge in Scam Returns

How to Protect Yourself (and Your Loved Ones) From AI Scam Calls

News Insights: Does X Mark a Target? with Trevin Edgeworth, Director of Red Team


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Trevin Edgeworth, Red Team Practice Director at Bishop Fox, is discussing how change, like M&amp;A, staff, tech, lack of clarity or even self-promotion within and around security environments presents windows of opportunity for attackers. Joe and Dave share some listener follow up, the first one comes from Erin, who writes in from Northern Ireland, shares an interesting new find about scammers now keeping up with the news. The second one comes from listener Johnathan who shared thoughts on reconsidering his view on defining Apple's non-rate-limited MFA notifications as a "vulnerability." Lastly, we have follow up from listener Anders who shares an article on AI. Joe shares a story from Amazon sellers, and how they are being plagued in scam returns. Dave brings us the story of how to save yourself and your loved ones from AI robocalls. </p><p><em>Please take a moment to fill out an </em><a href="https://www.surveymonkey.com/r/cwcv-listener"><em>audience survey</em></a><em>! Let us know how we are doing! </em></p><p>Links to the stories:</p><ul>
<li><a href="https://papers.ssrn.com/sol3/papers.cfm?abstract_id=4737265">Theory Is All You Need: AI, Human Cognition, and Decision Making</a></li>
<li><a href="https://www.wsj.com/business/retail/amazon-sellers-plagued-by-surge-in-scam-returns-04c86665">Amazon Sellers Plagued by Surge in Scam Returns</a></li>
<li><a href="https://www.wired.com/story/how-to-protect-yourself-ai-scam-calls-detect/">How to Protect Yourself (and Your Loved Ones) From AI Scam Calls</a></li>
<li><a href="https://bishopfox.com/resources/news-insights-twitter-x-video">News Insights: Does X Mark a Target? with Trevin Edgeworth, Director of Red Team</a></li>
</ul><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com.</p>]]>
      </content:encoded>
      <itunes:duration>3862</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[f763103c-ac02-11ee-b598-8bfe3e2b2b4e]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW4874030655.mp3?updated=1713369085" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Encore: Unix (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/27/notes</link>
      <description>A family of multitasking, multi-user computer operating systems that derive from the original Unix system built by Ken Thompson and Dennis Ritchie in the 1960s.</description>
      <pubDate>Tue, 16 Apr 2024 07:00:00 -0000</pubDate>
      <itunes:title>Encore: Unix (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>27</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A family of multitasking, multi-user computer operating systems that derive from the original Unix system built by Ken Thompson and Dennis Ritchie in the 1960s.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A family of multitasking, multi-user computer operating systems that derive from the original Unix system built by Ken Thompson and Dennis Ritchie in the 1960s.</p>]]>
      </content:encoded>
      <itunes:duration>315</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[8a86aa28-fb4e-11ee-ac4b-3f5ebc623c42]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW6486776633.mp3?updated=1713196539" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Could AI's doomsday be deferred? </title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/285/notes</link>
      <description>Dr. Robert Blumofe, CTO at Akamai, sits down to talk about the AI doomsday versus a "very bad day" scenario. Dave shares a story from The Knowledge Project Podcast, where the host talks to Adam Robinson, a multifaceted individual known for his work as an author, educator, entrepreneur, and hedge fund advisor, and he talks about what is all incorporated into the term "stupidity." Dave goes on to share that while most people may feel stupid when falling for a scam, this research suggests otherwise, and you should never feel that way for falling for any scam. Joe's story comes from Hayley Compton at BBC, and is on a Facebook scam sneaking it's way into a family's home after a couple just had their first child. Our catch of the day comes from listener Michael, who shares an email he received that caught him off guard at first. 
Please take a moment to fill out an audience survey! Let us know how we are doing! 
Links to the stories:

How Not to Be Stupid

'Facebook scammer tricked his way into our home'


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com.</description>
      <pubDate>Thu, 11 Apr 2024 05:00:00 -0000</pubDate>
      <itunes:title>Could AI's doomsday be deferred? </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>285</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Dr. Robert Blumofe, CTO at Akamai, sits down to talk about the AI doomsday versus a "very bad day" scenario. Dave shares a story from The Knowledge Project Podcast, where the host talks to Adam Robinson, a multifaceted individual known for his work as an author, educator, entrepreneur, and hedge fund advisor, and he talks about what is all incorporated into the term "stupidity." Dave goes on to share that while most people may feel stupid when falling for a scam, this research suggests otherwise, and you should never feel that way for falling for any scam. Joe's story comes from Hayley Compton at BBC, and is on a Facebook scam sneaking it's way into a family's home after a couple just had their first child. Our catch of the day comes from listener Michael, who shares an email he received that caught him off guard at first. 
Please take a moment to fill out an audience survey! Let us know how we are doing! 
Links to the stories:

How Not to Be Stupid

'Facebook scammer tricked his way into our home'


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Dr. Robert Blumofe, CTO at Akamai, sits down to talk about the AI doomsday versus a "very bad day" scenario. Dave shares a story from The Knowledge Project Podcast, where the host talks to Adam Robinson, a multifaceted individual known for his work as an author, educator, entrepreneur, and hedge fund advisor, and he talks about what is all incorporated into the term "stupidity." Dave goes on to share that while most people may feel stupid when falling for a scam, this research suggests otherwise, and you should never feel that way for falling for any scam. Joe's story comes from Hayley Compton at BBC, and is on a Facebook scam sneaking it's way into a family's home after a couple just had their first child. Our catch of the day comes from listener Michael, who shares an email he received that caught him off guard at first. </p><p><em>Please take a moment to fill out an </em><a href="https://www.surveymonkey.com/r/cwcv-listener"><em>audience survey</em></a><em>! Let us know how we are doing! </em></p><p>Links to the stories:</p><ul>
<li><a href="https://fs.blog/how-not-to-be-stupid/">How Not to Be Stupid</a></li>
<li><a href="https://www.bbc.com/news/articles/cermdkj009mo">'Facebook scammer tricked his way into our home'</a></li>
</ul><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com.</p>]]>
      </content:encoded>
      <itunes:duration>3281</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[f7339dc0-ac02-11ee-b598-9fe5428523e6]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW7289397990.mp3?updated=1712690068" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Encore: deep packet inspection (DPI) (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/26/notes</link>
      <description>A network monitoring and filtering technique that examines both the header information and the payload of every packet traversing a network access point.</description>
      <pubDate>Tue, 09 Apr 2024 07:00:00 -0000</pubDate>
      <itunes:title>Encore: deep packet inspection (DPI) (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>26</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A network monitoring and filtering technique that examines both the header information and the payload of every packet traversing a network access point.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A network monitoring and filtering technique that examines both the header information and the payload of every packet traversing a network access point.</p>]]>
      </content:encoded>
      <itunes:duration>334</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[2becbd44-f5c8-11ee-a24a-17ab08cf516a]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW9152385711.mp3?updated=1712595303" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Cyber crime chronicles featuring scams, spies, and cartel schemes.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/284/notes</link>
      <description>This week we are joined by Maria Varmazis, host of the N2K daily space show, T-Minus. Maria shares an interesting story about Apple users reporting that they are being targeted in elaborate phishing attacks that involve's a bug in Apple’s password reset feature. Joe and Dave share some listener follow up from Leo who shares some thoughts on episode 282 and the recruiter scam that was discussed. Dave shares a story from Mexico on one of the most violent criminal groups and drug cartels, Jalisco New Generation. They have been running call centers that offer to buy retirees’ vacation properties and then empty the victims’ bank accounts. Joe has the story of Facebook spying on users' Snapchats in a secret project. Our catch of the day comes from listener Van, who writes in to share a voicemail they received related to a tax scam. 
Please take a moment to fill out an audience survey! Let us know how we are doing! 
Links to the stories:

Recent ‘MFA Bombing’ Attacks Targeting Apple Users

A Mexican Drug Cartel’s New Target? Seniors and Their Timeshares

Facebook snooped on users’ Snapchat traffic in secret project, documents reveal


You can hear more from the T-Minus space daily show here.
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com.</description>
      <pubDate>Thu, 04 Apr 2024 05:00:00 -0000</pubDate>
      <itunes:title>Cyber crime chronicles featuring scams, spies, and cartel schemes.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>284</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>This week we are joined by Maria Varmazis, host of the N2K daily space show, T-Minus. Maria shares an interesting story about Apple users reporting that they are being targeted in elaborate phishing attacks that involve's a bug in Apple’s password reset feature. Joe and Dave share some listener follow up from Leo who shares some thoughts on episode 282 and the recruiter scam that was discussed. Dave shares a story from Mexico on one of the most violent criminal groups and drug cartels, Jalisco New Generation. They have been running call centers that offer to buy retirees’ vacation properties and then empty the victims’ bank accounts. Joe has the story of Facebook spying on users' Snapchats in a secret project. Our catch of the day comes from listener Van, who writes in to share a voicemail they received related to a tax scam. 
Please take a moment to fill out an audience survey! Let us know how we are doing! 
Links to the stories:

Recent ‘MFA Bombing’ Attacks Targeting Apple Users

A Mexican Drug Cartel’s New Target? Seniors and Their Timeshares

Facebook snooped on users’ Snapchat traffic in secret project, documents reveal


You can hear more from the T-Minus space daily show here.
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This week we are joined by Maria Varmazis, host of the N2K daily space show, T-Minus. Maria shares an interesting story about Apple users reporting that they are being targeted in elaborate phishing attacks that involve's a bug in Apple’s password reset feature. Joe and Dave share some listener follow up from Leo who shares some thoughts on episode 282 and the recruiter scam that was discussed. Dave shares a story from Mexico on one of the most violent criminal groups and drug cartels, Jalisco New Generation. They have been running call centers that offer to buy retirees’ vacation properties and then empty the victims’ bank accounts. Joe has the story of Facebook spying on users' Snapchats in a secret project. Our catch of the day comes from listener Van, who writes in to share a voicemail they received related to a tax scam. </p><p><em>Please take a moment to fill out an </em><a href="https://www.surveymonkey.com/r/cwcv-listener"><em>audience survey</em></a><em>! Let us know how we are doing! </em></p><p>Links to the stories:</p><ul>
<li><a href="https://krebsonsecurity.com/2024/03/recent-mfa-bombing-attacks-targeting-apple-users/">Recent ‘MFA Bombing’ Attacks Targeting Apple Users</a></li>
<li><a href="https://www.nytimes.com/2024/03/21/world/americas/mexico-timeshare-fraud-cartel.html">A Mexican Drug Cartel’s New Target? Seniors and Their Timeshares</a></li>
<li><a href="https://techcrunch.com/2024/03/26/facebook-secret-project-snooped-snapchat-user-traffic/">Facebook snooped on users’ Snapchat traffic in secret project, documents reveal</a></li>
</ul><p><br></p><p>You can hear more from the T-Minus space daily show <a href="https://space.n2k.com/podcasts/t-minus">here</a>.</p><p>Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com.</p>]]>
      </content:encoded>
      <itunes:duration>2792</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[f6ffceb4-ac02-11ee-b598-77e28087bf25]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW9962645606.mp3?updated=1712165658" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Encore: rootkit (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/25/notes</link>
      <description>A clandestine set of applications designed to give hackers access and control over a target device.</description>
      <pubDate>Tue, 02 Apr 2024 07:00:00 -0000</pubDate>
      <itunes:title>Encore: rootkit (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>25</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A clandestine set of applications designed to give hackers access and control over a target device.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A clandestine set of applications designed to give hackers access and control over a target device.</p>]]>
      </content:encoded>
      <itunes:duration>417</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[7d41cf46-f040-11ee-b9db-ffdafe187712]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW7513276411.mp3?updated=1711987268" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Exploring emerging trends in online scamming.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/283/notes</link>
      <description>Graham Cluley joins to discuss trends he’s been seeing lately in online scams. N2K's very own Gina Johnson shares some insights on a discussion a few episode ago on why people need a prescription for oxygen in the US. Joe brings up the topic of getting and exploiting access to your infrastructure, and shares an article that deals with the rise of social engineering fraud in business email compromise. Dave shares a personal story this week, on how he got scammed from a Facebook post, sharing that it can happen to anyone. Our catch of the day comes from listener Vance, who writes in to share a scam he found via "snail mail," regarding a life insurance policy that he needs to collect on. 
Please take a moment to fill out an audience survey! Let us know how we are doing! 
Links to the stories:

The Rise of Social Engineering Fraud in Business Email Compromise

How Sophisticated Social Engineering Attacks Are Targeting IT Service Desks


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com.</description>
      <pubDate>Thu, 28 Mar 2024 05:00:00 -0000</pubDate>
      <itunes:title>Exploring emerging trends in online scamming.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>283</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Graham Cluley joins to discuss trends he’s been seeing lately in online scams. N2K's very own Gina Johnson shares some insights on a discussion a few episode ago on why people need a prescription for oxygen in the US. Joe brings up the topic of getting and exploiting access to your infrastructure, and shares an article that deals with the rise of social engineering fraud in business email compromise. Dave shares a personal story this week, on how he got scammed from a Facebook post, sharing that it can happen to anyone. Our catch of the day comes from listener Vance, who writes in to share a scam he found via "snail mail," regarding a life insurance policy that he needs to collect on. 
Please take a moment to fill out an audience survey! Let us know how we are doing! 
Links to the stories:

The Rise of Social Engineering Fraud in Business Email Compromise

How Sophisticated Social Engineering Attacks Are Targeting IT Service Desks


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Graham Cluley joins to discuss trends he’s been seeing lately in online scams. N2K's very own Gina Johnson shares some insights on a discussion a few episode ago on why people need a prescription for oxygen in the US. Joe brings up the topic of getting and exploiting access to your infrastructure, and shares an article that deals with the rise of social engineering fraud in business email compromise. Dave shares a personal story this week, on how he got scammed from a Facebook post, sharing that it can happen to anyone. Our catch of the day comes from listener Vance, who writes in to share a scam he found via "snail mail," regarding a life insurance policy that he needs to collect on. </p><p><em>Please take a moment to fill out an </em><a href="https://www.surveymonkey.com/r/cwcv-listener"><em>audience survey</em></a><em>! Let us know how we are doing! </em></p><p>Links to the stories:</p><ul>
<li><a href="https://www.darkreading.com/cyberattacks-data-breaches/the-rise-of-social-engineering-fraud-in-business-email-compromise">The Rise of Social Engineering Fraud in Business Email Compromise</a></li>
<li><a href="https://www.infosecurity-magazine.com/blogs/how-social-engineering-targets/">How Sophisticated Social Engineering Attacks Are Targeting IT Service Desks</a></li>
</ul><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com.</p>]]>
      </content:encoded>
      <itunes:duration>3643</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[f6d09aae-ac02-11ee-b598-a7c73b770213]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW4109810803.mp3?updated=1711550410" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Encore: tactics, techniques and procedures (TTPs) (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/24/notes</link>
      <description>A set of behaviors that precisely describes a cyber adversary attack campaign.</description>
      <pubDate>Tue, 26 Mar 2024 07:00:00 -0000</pubDate>
      <itunes:title>Encore: tactics, techniques and procedures (TTPs) (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>24</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A set of behaviors that precisely describes a cyber adversary attack campaign.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A set of behaviors that precisely describes a cyber adversary attack campaign.</p>]]>
      </content:encoded>
      <itunes:duration>403</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[a07163de-ead0-11ee-be23-cf0e85d26186]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW2588892722.mp3?updated=1711986664" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Job seeker beware: Spotting sneaky scammers on job boards.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/282/notes</link>
      <description>This week we are joined by Maria Varmazis, host of the N2K daily space show, T-Minus. She shares the story on scammers posing as recruiters on LinkedIn to get you to fall for an age old phishing scam. Dave and Joe share some listener follow up, the first being from listener Alex who shared a video on scammers being forced to prove they are not robots. Listener Chloe wrote in with a question, asking about a potential scam she encountered. Joe has a story from the BBC this week regarding a love scam in the Philippines. Finally, Dave shares the story on the FCC approving a voluntary cybersecurity labeling program for wireless IoT products. Our catch of the say comes from Mark, who shares a personal story on a recruiting scam nightmare. 
Please take a moment to fill out an audience survey! Let us know how we are doing! 
Links to the stories:

Heads Up, Tech Professionals: Protect Yourself From Phishing Scams Presenting as Recruiters

Forcing Scammers To Prove They're Not Robots

Hundreds rescued from love scam centre in the Philippines

FCC adopts voluntary 'Cyber Trust Mark' labeling rule for IoT devices


You can hear more from the T-Minus space daily show here.
And be sure to join our live webinar: CISOs are the new Architects (of the Workforce)
Join N2K’s Simone Petrella and Intuit’s Kim Jones on Wednesday, March 27th for an online discussion about the pivotal role security leaders play in shaping the security workforce landscape, and how we can start showing up for the future of our industry. Learn more and register on the event page.
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com.</description>
      <pubDate>Thu, 21 Mar 2024 05:00:00 -0000</pubDate>
      <itunes:title>Job seeker beware: Spotting sneaky scammers on job boards.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>282</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>This week we are joined by Maria Varmazis, host of the N2K daily space show, T-Minus. She shares the story on scammers posing as recruiters on LinkedIn to get you to fall for an age old phishing scam. Dave and Joe share some listener follow up, the first being from listener Alex who shared a video on scammers being forced to prove they are not robots. Listener Chloe wrote in with a question, asking about a potential scam she encountered. Joe has a story from the BBC this week regarding a love scam in the Philippines. Finally, Dave shares the story on the FCC approving a voluntary cybersecurity labeling program for wireless IoT products. Our catch of the say comes from Mark, who shares a personal story on a recruiting scam nightmare. 
Please take a moment to fill out an audience survey! Let us know how we are doing! 
Links to the stories:

Heads Up, Tech Professionals: Protect Yourself From Phishing Scams Presenting as Recruiters

Forcing Scammers To Prove They're Not Robots

Hundreds rescued from love scam centre in the Philippines

FCC adopts voluntary 'Cyber Trust Mark' labeling rule for IoT devices


You can hear more from the T-Minus space daily show here.
And be sure to join our live webinar: CISOs are the new Architects (of the Workforce)
Join N2K’s Simone Petrella and Intuit’s Kim Jones on Wednesday, March 27th for an online discussion about the pivotal role security leaders play in shaping the security workforce landscape, and how we can start showing up for the future of our industry. Learn more and register on the event page.
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This week we are joined by Maria Varmazis, host of the N2K daily space show, T-Minus. She shares the story on scammers posing as recruiters on LinkedIn to get you to fall for an age old phishing scam. Dave and Joe share some listener follow up, the first being from listener Alex who shared a video on scammers being forced to prove they are not robots. Listener Chloe wrote in with a question, asking about a potential scam she encountered. Joe has a story from the BBC this week regarding a love scam in the Philippines. Finally, Dave shares the story on the FCC approving a voluntary cybersecurity labeling program for wireless IoT products. Our catch of the say comes from Mark, who shares a personal story on a recruiting scam nightmare. </p><p><em>Please take a moment to fill out an </em><a href="https://www.surveymonkey.com/r/cwcv-listener"><em>audience survey</em></a><em>! Let us know how we are doing! </em></p><p>Links to the stories:</p><ul>
<li><a href="https://www.dice.com/career-advice/heads-up-tech-professionals-phishing-scam">Heads Up, Tech Professionals: Protect Yourself From Phishing Scams Presenting as Recruiters</a></li>
<li><a href="https://www.youtube.com/watch?v=S89fT5yPbpk">Forcing Scammers To Prove They're Not Robots</a></li>
<li><a href="https://www.bbc.com/news/world-asia-68562643">Hundreds rescued from love scam centre in the Philippines</a></li>
<li><a href="https://therecord.media/cyber-trust-mark-internet-of-things-devices-fcc-approval">FCC adopts voluntary 'Cyber Trust Mark' labeling rule for IoT devices</a></li>
</ul><p><br></p><p>You can hear more from the T-Minus space daily show <a href="https://space.n2k.com/podcasts/t-minus">here</a>.</p><p><strong>And be sure to join our live webinar: CISOs are the new Architects (of the Workforce)</strong></p><p>Join N2K’s Simone Petrella and Intuit’s Kim Jones on Wednesday, March 27th for an online discussion about the pivotal role security leaders play in shaping the security workforce landscape, and how we can start showing up for the future of our industry. Learn more and register on the <a href="https://www.brighttalk.com/webcast/18820/607438?bt_tok=%7B%7Brecord.BT_fastpass_token%7D%7D&amp;utm_source=N2KNetworks&amp;utm_medium=brighttalk&amp;utm_campaign=607438">event page</a>.</p><p>Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com.</p>]]>
      </content:encoded>
      <itunes:duration>2661</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[f6a0c91e-ac02-11ee-b598-5b99a0a7d7f7]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW5839739254.mp3?updated=1710946346" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Encore: cyber threat intelligence (CTI) (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/23/notes</link>
      <description>Information used by leadership to make decisions regarding the cybersecurity posture of their organization.</description>
      <pubDate>Tue, 19 Mar 2024 07:00:00 -0000</pubDate>
      <itunes:title>Encore: cyber threat intelligence (CTI) (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>23</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Information used by leadership to make decisions regarding the cybersecurity posture of their organization.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Information used by leadership to make decisions regarding the cybersecurity posture of their organization.</p>]]>
      </content:encoded>
      <itunes:duration>362</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[0650a53e-e53b-11ee-98bd-9b6b1e8cf8b5]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW1100798927.mp3?updated=1710774984" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Cyberattack chaos and the impact on families. </title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/281/notes</link>
      <description>This week we are joined by N2K CyberWire's very own Catherine Murphy, and she is sharing her family's experiences with Lurie Children's Hospital's recent cybersecurity incident. Dave shares a story on the dangers of Googling airline customer service numbers when an issue occurs. Joe shares another story on scary scams that are costing people millions of dollars, now getting the FBI involved. Our catch of the day was found from the Washington University in St. Louis from their Scam of the Month posting, which shares another tale of a scam, this time trying to recruit for an open vacancy as a research assistant for undergraduates. The scammers pose as a Professor of Computer Science and Engineering to try and get students to sign up for this fake job posting. 
Please take a moment to fill out an audience survey! Let us know how we are doing! 
Links to the stories:

I’m begging you not to Google for airline customer service numbers

Elaborate scam involves gold bars and couriers; cost a Maryland woman $2 million

Scammers Use Couriers to Retrieve Cash and Precious Metals from Victims of Tech Support and Government Impersonation Scams

Scam of the Month: RESEARCH ASSISTANT VACANCY FOR UNDERGRADUATE

Ransomware gang claims to have made $3.4 million after attacking children’s hospital


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com.</description>
      <pubDate>Thu, 14 Mar 2024 05:00:00 -0000</pubDate>
      <itunes:title>Cyberattack chaos and the impact on families. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>281</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>This week we are joined by N2K CyberWire's very own Catherine Murphy, and she is sharing her family's experiences with Lurie Children's Hospital's recent cybersecurity incident. Dave shares a story on the dangers of Googling airline customer service numbers when an issue occurs. Joe shares another story on scary scams that are costing people millions of dollars, now getting the FBI involved. Our catch of the day was found from the Washington University in St. Louis from their Scam of the Month posting, which shares another tale of a scam, this time trying to recruit for an open vacancy as a research assistant for undergraduates. The scammers pose as a Professor of Computer Science and Engineering to try and get students to sign up for this fake job posting. 
Please take a moment to fill out an audience survey! Let us know how we are doing! 
Links to the stories:

I’m begging you not to Google for airline customer service numbers

Elaborate scam involves gold bars and couriers; cost a Maryland woman $2 million

Scammers Use Couriers to Retrieve Cash and Precious Metals from Victims of Tech Support and Government Impersonation Scams

Scam of the Month: RESEARCH ASSISTANT VACANCY FOR UNDERGRADUATE

Ransomware gang claims to have made $3.4 million after attacking children’s hospital


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This week we are joined by N2K CyberWire's very own Catherine Murphy, and she is sharing her family's experiences with Lurie Children's Hospital's recent cybersecurity incident. Dave shares a story on the dangers of Googling airline customer service numbers when an issue occurs. Joe shares another story on scary scams that are costing people millions of dollars, now getting the FBI involved. Our catch of the day was found from the Washington University in St. Louis from their Scam of the Month posting, which shares another tale of a scam, this time trying to recruit for an open vacancy as a research assistant for undergraduates. The scammers pose as a Professor of Computer Science and Engineering to try and get students to sign up for this fake job posting. </p><p><em>Please take a moment to fill out an </em><a href="https://www.surveymonkey.com/r/cwcv-listener"><em>audience survey</em></a><em>! Let us know how we are doing! </em></p><p>Links to the stories:</p><ul>
<li><a href="https://www.washingtonpost.com/technology/2024/02/27/airline-customer-service-phone-numbers/">I’m begging you not to Google for airline customer service numbers</a></li>
<li><a href="https://www.wmar2news.com/matterformallory/elaborate-scam-involves-gold-bars-and-couriers-cost-a-maryland-woman-2-million">Elaborate scam involves gold bars and couriers; cost a Maryland woman $2 million</a></li>
<li><a href="https://www.ic3.gov/Media/Y2024/PSA240129">Scammers Use Couriers to Retrieve Cash and Precious Metals from Victims of Tech Support and Government Impersonation Scams</a></li>
<li><a href="https://informationsecurity.wustl.edu/scam-of-the-month-research-assistant-vacancy-for-undergraduate/">Scam of the Month: RESEARCH ASSISTANT VACANCY FOR UNDERGRADUATE</a></li>
<li><a href="https://therecord.media/ransomware-gang-claims-payment-luries">Ransomware gang claims to have made $3.4 million after attacking children’s hospital</a></li>
</ul><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com.</p>]]>
      </content:encoded>
      <itunes:duration>3206</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[f67158e6-ac02-11ee-b598-7741e7ddf1dd]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW5205945886.mp3?updated=1710340458" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Encore: identity theft (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/22/notes</link>
      <description>In this case Identity is the set of credentials, usually electronic that vouch for who you are and theft is to steal. The theft of a person's identity for purposes of fraud.</description>
      <pubDate>Tue, 12 Mar 2024 07:00:00 -0000</pubDate>
      <itunes:title>Encore: identity theft (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>22</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>In this case Identity is the set of credentials, usually electronic that vouch for who you are and theft is to steal. The theft of a person's identity for purposes of fraud.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In this case Identity is the set of credentials, usually electronic that vouch for who you are and theft is to steal. The theft of a person's identity for purposes of fraud.</p>]]>
      </content:encoded>
      <itunes:duration>240</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[a7e8e2aa-dfdf-11ee-b2da-5b049494d433]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW4134881790.mp3?updated=1710186436" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>New tools, old problems.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/280/notes</link>
      <description>This week we are joined by Maria Varmazis, host of the N2K daily space show, T-Minus. She discusses how AI is being used as a possible solution to one of the oldest scams in the book in Japan. Dave and Joe share some listener follow up, one from listener Alan and one from Clinton, who both write in about a recent episode and they share their thoughts on the story of Charlotte Cowles being scammed out of $50,000. Dave shares a story about calendar meeting links, from Calendly, a popular application for scheduling appointments and meetings, being used to spread mac malware. Joe shares write ins from several listeners, some writing in to share experiences with scams they have come across, others writing to warn others on scams they have seen used in the real world. Our catch of the day comes from Zach with an oddity, getting scammed by mail! 
Please take a moment to fill out an audience survey! Let us know how we are doing! 
Links to the stories:

Japan’s new ATMs automatically play anti-fraud videos to people talking on mobile phones【Video】

Fraudsters in Japan use foreigners' bank accounts in cash grab

【警察庁】ATMで携帯電話…AIで検知し警告表示 特殊詐欺の被害増受け

Calendar Meeting Links Used to Spread Mac Malware

IDcare


You can hear more from the T-Minus space daily show here.
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com.</description>
      <pubDate>Thu, 07 Mar 2024 06:00:00 -0000</pubDate>
      <itunes:title>New tools, old problems.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>280</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>This week we are joined by Maria Varmazis, host of the N2K daily space show, T-Minus. She discusses how AI is being used as a possible solution to one of the oldest scams in the book in Japan. Dave and Joe share some listener follow up, one from listener Alan and one from Clinton, who both write in about a recent episode and they share their thoughts on the story of Charlotte Cowles being scammed out of $50,000. Dave shares a story about calendar meeting links, from Calendly, a popular application for scheduling appointments and meetings, being used to spread mac malware. Joe shares write ins from several listeners, some writing in to share experiences with scams they have come across, others writing to warn others on scams they have seen used in the real world. Our catch of the day comes from Zach with an oddity, getting scammed by mail! 
Please take a moment to fill out an audience survey! Let us know how we are doing! 
Links to the stories:

Japan’s new ATMs automatically play anti-fraud videos to people talking on mobile phones【Video】

Fraudsters in Japan use foreigners' bank accounts in cash grab

【警察庁】ATMで携帯電話…AIで検知し警告表示 特殊詐欺の被害増受け

Calendar Meeting Links Used to Spread Mac Malware

IDcare


You can hear more from the T-Minus space daily show here.
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This week we are joined by Maria Varmazis, host of the N2K daily space show, T-Minus. She discusses how AI is being used as a possible solution to one of the oldest scams in the book in Japan. Dave and Joe share some listener follow up, one from listener Alan and one from Clinton, who both write in about a recent episode and they share their thoughts on the story of Charlotte Cowles being scammed out of $50,000. Dave shares a story about calendar meeting links, from Calendly, a popular application for scheduling appointments and meetings, being used to spread mac malware. Joe shares write ins from several listeners, some writing in to share experiences with scams they have come across, others writing to warn others on scams they have seen used in the real world. Our catch of the day comes from Zach with an oddity, getting scammed by mail! </p><p><em>Please take a moment to fill out an </em><a href="https://www.surveymonkey.com/r/cwcv-listener"><em>audience survey</em></a><em>! Let us know how we are doing! </em></p><p>Links to the stories:</p><ul>
<li><a href="https://soranews24.com/2024/02/25/atms-that-automatically-play-anti-fraud-videos-to-people-talking-on-mobile-phones-in-development/">Japan’s new ATMs automatically play anti-fraud videos to people talking on mobile phones【Video】</a></li>
<li><a href="https://www3.nhk.or.jp/nhkworld/en/news/backstories/2860/">Fraudsters in Japan use foreigners' bank accounts in cash grab</a></li>
<li><a href="https://www.youtube.com/watch?v=F-QuIIBI6OY&amp;t=44s">【警察庁】ATMで携帯電話…AIで検知し警告表示 特殊詐欺の被害増受け</a></li>
<li><a href="https://krebsonsecurity.com/2024/02/calendar-meeting-links-used-to-spread-mac-malware/">Calendar Meeting Links Used to Spread Mac Malware</a></li>
<li><a href="https://www.idcare.org/">IDcare</a></li>
</ul><p><br></p><p>You can hear more from the T-Minus space daily show here.</p><p>Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com.</p>]]>
      </content:encoded>
      <itunes:duration>2948</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[f641204a-ac02-11ee-b598-0f89c5265b67]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW8814286802.mp3?updated=1709830682" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Encore: Monte Carlo Simulation (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/21/notes</link>
      <description>A probability simulation technique used to understand the impact of risk and uncertainty in complex problems.</description>
      <pubDate>Tue, 05 Mar 2024 08:00:00 -0000</pubDate>
      <itunes:title>Encore: Monte Carlo Simulation (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>21</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A probability simulation technique used to understand the impact of risk and uncertainty in complex problems.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A probability simulation technique used to understand the impact of risk and uncertainty in complex problems.</p>]]>
      </content:encoded>
      <itunes:duration>387</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[9e3a7a3a-da57-11ee-a3c3-eb3af2ed2a23]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW6617762917.mp3?updated=1709578418" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Navigating the post-password landscape.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/279/notes</link>
      <description>Mike Kosak, Principal Intelligence Analyst at LastPass, is discussing passkeys, threat actors, and Volt Typhoon. Joe shares a new free certification you could get if you are looking to get into the field. Joe also shares a terrifying story about how everyone can be conned, and it's not as obvious as it may seem sometimes. Dave's story is warning Costco members of a new phishing scam that attempts to steal their credit card information. Our catch of the day comes from listener Pryce who shares an email they received regarding a charge they are getting from "NortonLifeLock." 
Links to the stories:

FREE Entry-level Cybersecurity Training + Certification Exam

Put your smugness away. You are not too clever to be conned.

New Costco Membership Scam Targets Members' Credit Card Information


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com.</description>
      <pubDate>Thu, 29 Feb 2024 06:00:00 -0000</pubDate>
      <itunes:title>Navigating the post-password landscape.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>279</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Mike Kosak, Principal Intelligence Analyst at LastPass, is discussing passkeys, threat actors, and Volt Typhoon. Joe shares a new free certification you could get if you are looking to get into the field. Joe also shares a terrifying story about how everyone can be conned, and it's not as obvious as it may seem sometimes. Dave's story is warning Costco members of a new phishing scam that attempts to steal their credit card information. Our catch of the day comes from listener Pryce who shares an email they received regarding a charge they are getting from "NortonLifeLock." 
Links to the stories:

FREE Entry-level Cybersecurity Training + Certification Exam

Put your smugness away. You are not too clever to be conned.

New Costco Membership Scam Targets Members' Credit Card Information


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Mike Kosak, Principal Intelligence Analyst at LastPass, is discussing passkeys, threat actors, and Volt Typhoon. Joe shares a new free certification you could get if you are looking to get into the field. Joe also shares a terrifying story about how everyone can be conned, and it's not as obvious as it may seem sometimes. Dave's story is warning Costco members of a new phishing scam that attempts to steal their credit card information. Our catch of the day comes from listener Pryce who shares an email they received regarding a charge they are getting from "NortonLifeLock." </p><p>Links to the stories:</p><ul>
<li><a href="https://www.isc2.org/landing/1mcc">FREE Entry-level Cybersecurity Training + Certification Exam</a></li>
<li><a href="https://www.washingtonpost.com/business/2024/02/21/not-too-clever-for-scam/">Put your smugness away. You are not too clever to be conned.</a></li>
<li><a href="https://www.delish.com/food-news/a46867621/costco-membership-scam-credit-card/">New Costco Membership Scam Targets Members' Credit Card Information</a></li>
</ul><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a>.</p>]]>
      </content:encoded>
      <itunes:duration>2754</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[f61166c0-ac02-11ee-b598-0ff5c67e53d4]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW1122162707.mp3?updated=1709140934" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Encore: Virtual Private Network (VPN) (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/20/notes</link>
      <description>A software, hardware or hybrid encryption layer between two devices on the network that makes the traffic between the sites opaque to the other devices on the same network.</description>
      <pubDate>Tue, 27 Feb 2024 08:00:00 -0000</pubDate>
      <itunes:title>Encore: Virtual Private Network (VPN) (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>20</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A software, hardware or hybrid encryption layer between two devices on the network that makes the traffic between the sites opaque to the other devices on the same network.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A software, hardware or hybrid encryption layer between two devices on the network that makes the traffic between the sites opaque to the other devices on the same network.</p>]]>
      </content:encoded>
      <itunes:duration>385</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c24c98ca-d4d7-11ee-9557-0b248c89e982]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW2762598771.mp3?updated=1708973585" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Scamming the innocent.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/278/notes</link>
      <description>This week we are joined by Maria Varmazis, host of the N2K daily space show, T-Minus. She brings us a scary story from a woman who never thought she'd ever be scammed. Dave and Joe shares some follow up before getting into their stories, they share a story from a listener who sent in a LinkedIn link about scammers targeting Walmart. They also share a question from listener Cynthia, who asks about bank scam covered before, and how to respond to these scams. Dave shares a story from an anonymous source this week, who writes in about the dangers of crypto scams. Joe has two stories for us this week, the first one being from a friend of his that works for a company that specializes in military contracts. This company was hiring an employee and received three emails that all were very similar to one another, sharing that this is a red flag and wanted to write in to share the dangers of this scam. The second story is a very similar story to the one covered on Andy Cohen a few episode ago, and shares how a Jefferson county couple were scammed out of hundreds of thousands of dollars. Our catch of the day comes from listener Thomas who shares a story on AI voices sounding like famous people and his experience. 
Links to the stories:

The Day I Put $50,000 in a Shoe Box and Handed It to a Stranger I never thought I was the kind of person to fall for a scam.

Phishing scam dupes Jefferson County couple out of $137K

Phishing bank scam dupes Golden couple out of $137K

SCAM HELL Walmart ‘gift card scammers’ caught spending $15k on jewelry, big-screen TVs and lobster tails at Sam’s Club


You can hear more from the T-Minus space daily show here.
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com.</description>
      <pubDate>Thu, 22 Feb 2024 06:00:00 -0000</pubDate>
      <itunes:title>Scamming the innocent.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>278</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>This week we are joined by Maria Varmazis, host of the N2K daily space show, T-Minus. She brings us a scary story from a woman who never thought she'd ever be scammed. Dave and Joe shares some follow up before getting into their stories, they share a story from a listener who sent in a LinkedIn link about scammers targeting Walmart. They also share a question from listener Cynthia, who asks about bank scam covered before, and how to respond to these scams. Dave shares a story from an anonymous source this week, who writes in about the dangers of crypto scams. Joe has two stories for us this week, the first one being from a friend of his that works for a company that specializes in military contracts. This company was hiring an employee and received three emails that all were very similar to one another, sharing that this is a red flag and wanted to write in to share the dangers of this scam. The second story is a very similar story to the one covered on Andy Cohen a few episode ago, and shares how a Jefferson county couple were scammed out of hundreds of thousands of dollars. Our catch of the day comes from listener Thomas who shares a story on AI voices sounding like famous people and his experience. 
Links to the stories:

The Day I Put $50,000 in a Shoe Box and Handed It to a Stranger I never thought I was the kind of person to fall for a scam.

Phishing scam dupes Jefferson County couple out of $137K

Phishing bank scam dupes Golden couple out of $137K

SCAM HELL Walmart ‘gift card scammers’ caught spending $15k on jewelry, big-screen TVs and lobster tails at Sam’s Club


You can hear more from the T-Minus space daily show here.
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This week we are joined by Maria Varmazis, host of the N2K daily space show, T-Minus. She brings us a scary story from a woman who never thought she'd ever be scammed. Dave and Joe shares some follow up before getting into their stories, they share a story from a listener who sent in a LinkedIn link about scammers targeting Walmart. They also share a question from listener Cynthia, who asks about bank scam covered before, and how to respond to these scams. Dave shares a story from an anonymous source this week, who writes in about the dangers of crypto scams. Joe has two stories for us this week, the first one being from a friend of his that works for a company that specializes in military contracts. This company was hiring an employee and received three emails that all were very similar to one another, sharing that this is a red flag and wanted to write in to share the dangers of this scam. The second story is a very similar story to the one covered on Andy Cohen a few episode ago, and shares how a Jefferson county couple were scammed out of hundreds of thousands of dollars. Our catch of the day comes from listener Thomas who shares a story on AI voices sounding like famous people and his experience. </p><p>Links to the stories:</p><ul>
<li><a href="https://www.thecut.com/article/amazon-scam-call-ftc-arrest-warrants.html">The Day I Put $50,000 in a Shoe Box and Handed It to a Stranger I never thought I was the kind of person to fall for a scam.</a></li>
<li><a href="https://kdvr.com/news/local/phishing-scam-dupes-jefferson-county-couple-out-of-137k/">Phishing scam dupes Jefferson County couple out of $137K</a></li>
<li><a href="https://www.youtube.com/watch?v=l5Xi7UFYnas">Phishing bank scam dupes Golden couple out of $137K</a></li>
<li><a href="https://www.the-sun.com/news/10149551/walmart-gift-card-scam-thousands-victims-fraud/">SCAM HELL Walmart ‘gift card scammers’ caught spending $15k on jewelry, big-screen TVs and lobster tails at Sam’s Club</a></li>
</ul><p><br></p><p>You can hear more from the T-Minus space daily show <a href="https://space.n2k.com/podcasts/t-minus">here</a>.</p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a>.</p>]]>
      </content:encoded>
      <itunes:duration>2820</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[f5e12a6e-ac02-11ee-b598-0323f31c291f]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW5974775511.mp3?updated=1708541363" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Encore: smishing (SMS phishing) (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/18/notes</link>
      <description>From the intrusion kill-chain model, the delivery of a “lure” via a text message to a potential victim by pretending to be some trustworthy person or organization in order to trick the victim into revealing sensitive information. Smishing is a portmanteau word made of two other words, the acronym “SMS” and the cyber coinage “Phishing“. It’s a text-message-centric variation of the email-based phishing scams that have been around since the 1990s. The term “Smishing” arose in the late 2000s. </description>
      <pubDate>Tue, 20 Feb 2024 08:00:00 -0000</pubDate>
      <itunes:title>Encore: smishing (SMS phishing) (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>18</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>From the intrusion kill-chain model, the delivery of a “lure” via a text message to a potential victim by pretending to be some trustworthy person or organization in order to trick the victim into revealing sensitive information. Smishing is a portmanteau word made of two other words, the acronym “SMS” and the cyber coinage “Phishing“. It’s a text-message-centric variation of the email-based phishing scams that have been around since the 1990s. The term “Smishing” arose in the late 2000s. </itunes:summary>
      <content:encoded>
        <![CDATA[<p>From the intrusion kill-chain model, the delivery of a “lure” via a text message to a potential victim by pretending to be some trustworthy person or organization in order to trick the victim into revealing sensitive information. Smishing is a portmanteau word made of two other words, the acronym “SMS” and the cyber coinage “Phishing“. It’s a text-message-centric variation of the email-based phishing scams that have been around since the 1990s. The term “Smishing” arose in the late 2000s. </p>]]>
      </content:encoded>
      <itunes:duration>277</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[7e7862b8-cd12-11ee-9fce-ff684d7e8eab]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW8420967081.mp3?updated=1708119201" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Looking forward in 2024.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/277/notes</link>
      <description>Aaron Walton, Threat Intel Analyst from Expel is discussing some things to look out for in 2024. Joe and Dave share some listener follow up from Mateusz, who shares some positive news with us. Dave's story is about a romance scammer coming clean after failing to woo CBS News reporter, Erica Johnson. Joe's story is on the latest decision from the FCC, and how they voted to ban scam robocalls that use AI-generated voices. Our catch of the day comes from listener Chuck, just in time for tax season, he warns against a phishing scam he received about his taxes. 
Links to the stories:

Romance scammer reveals how he tricks women after failing to fool Go Public reporter

FCC votes to ban scam robocalls that use AI-generated voices


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com.</description>
      <pubDate>Thu, 15 Feb 2024 06:00:00 -0000</pubDate>
      <itunes:title>Looking forward in 2024.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>277</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Aaron Walton, Threat Intel Analyst from Expel is discussing some things to look out for in 2024. Joe and Dave share some listener follow up from Mateusz, who shares some positive news with us. Dave's story is about a romance scammer coming clean after failing to woo CBS News reporter, Erica Johnson. Joe's story is on the latest decision from the FCC, and how they voted to ban scam robocalls that use AI-generated voices. Our catch of the day comes from listener Chuck, just in time for tax season, he warns against a phishing scam he received about his taxes. 
Links to the stories:

Romance scammer reveals how he tricks women after failing to fool Go Public reporter

FCC votes to ban scam robocalls that use AI-generated voices


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Aaron Walton, Threat Intel Analyst from Expel is discussing some things to look out for in 2024. Joe and Dave share some listener follow up from Mateusz, who shares some positive news with us. Dave's story is about a romance scammer coming clean after failing to woo CBS News reporter, Erica Johnson. Joe's story is on the latest decision from the FCC, and how they voted to ban scam robocalls that use AI-generated voices. Our catch of the day comes from listener Chuck, just in time for tax season, he warns against a phishing scam he received about his taxes. </p><p>Links to the stories:</p><ul>
<li><a href="https://www.cbc.ca/news/canada/go-public-romance-scams-1.7088334">Romance scammer reveals how he tricks women after failing to fool Go Public reporter</a></li>
<li><a href="https://www.cnn.com/2024/02/08/tech/fcc-scam-robocalls-ai-generated-voices/index.html">FCC votes to ban scam robocalls that use AI-generated voices</a></li>
</ul><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a>.</p>]]>
      </content:encoded>
      <itunes:duration>2562</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[f5afe8e6-ac02-11ee-b598-6bdd809de2b3]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW8854231465.mp3?updated=1707924606" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Encore: port mirroring (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/17/notes</link>
      <description>A network switch configuration setting that forwards a copy of each incoming and outgoing packet to a third switch port. Also known as SPAN or Switched Port Analyzer, RAP or Roving Analysis Port, and TAP or Test Access Point. When network managers and security investigators want to capture packets for analysis, they need some sort of generic TAP or Test Access Point. You can buy specialized equipment for this operation but most modern switches have this capability built in. </description>
      <pubDate>Tue, 13 Feb 2024 08:00:00 -0000</pubDate>
      <itunes:title>Encore: port mirroring (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>17</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A network switch configuration setting that forwards a copy of each incoming and outgoing packet to a third switch port. Also known as SPAN or Switched Port Analyzer, RAP or Roving Analysis Port, and TAP or Test Access Point. When network managers and security investigators want to capture packets for analysis, they need some sort of generic TAP or Test Access Point. You can buy specialized equipment for this operation but most modern switches have this capability built in. </itunes:summary>
      <content:encoded>
        <![CDATA[<p>A network switch configuration setting that forwards a copy of each incoming and outgoing packet to a third switch port. Also known as SPAN or Switched Port Analyzer, RAP or Roving Analysis Port, and TAP or Test Access Point. When network managers and security investigators want to capture packets for analysis, they need some sort of generic TAP or Test Access Point. You can buy specialized equipment for this operation but most modern switches have this capability built in. </p>]]>
      </content:encoded>
      <itunes:duration>277</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[1fd2ecfe-c9d1-11ee-a45b-cb9793da1895]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW3403143220.mp3?updated=1708973475" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Scamming just isn't what it used to be. </title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/276/notes</link>
      <description>This week, we are joined by host of N2K's T-Minus Space Daily podcast, Maria Varmazis, she sits down with Joe and Dave to discuss sextorion materials that were found on popular social media apps such as, TikTok, Instagram, Snapchat and YouTube. Joe and Dave share quite a bit of follow up, Joe starts with an anonymous listener writing in sharing their story on gift card scams. Dave shares another anonymous listeners comments, sharing about what they think of Andy Cohen going public on how he got scammed. Finally, Joe and Dave hear from a listener by the name of "The Computrix," who says they need to defend Walmart. Dave share's his story about the most common phishing email themes of 2023. Joe's got the story of ransomware not being paid the same way as it used to be by companies, and share the two different angles on that. Our catch of the day comes from listener William, who writes in with a phishing scam that caught his eye. 
Links to the stories:

Sextortion training materials found on TikTok, Instagram, Snapchat and YouTube, according to new report

Most Common Phishing Email Themes of 2023

Companies aren’t paying ransoms like they used to

New Ransomware Reporting Requirements Kick in as Victims Increasingly Avoid Paying

FBI: Scammers Are Sending Couriers to Collect Cash From Victims


You can hear more from the T-Minus space daily show here.
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com.</description>
      <pubDate>Thu, 08 Feb 2024 06:00:00 -0000</pubDate>
      <itunes:title>Scamming just isn't what it used to be. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>276</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>This week, we are joined by host of N2K's T-Minus Space Daily podcast, Maria Varmazis, she sits down with Joe and Dave to discuss sextorion materials that were found on popular social media apps such as, TikTok, Instagram, Snapchat and YouTube. Joe and Dave share quite a bit of follow up, Joe starts with an anonymous listener writing in sharing their story on gift card scams. Dave shares another anonymous listeners comments, sharing about what they think of Andy Cohen going public on how he got scammed. Finally, Joe and Dave hear from a listener by the name of "The Computrix," who says they need to defend Walmart. Dave share's his story about the most common phishing email themes of 2023. Joe's got the story of ransomware not being paid the same way as it used to be by companies, and share the two different angles on that. Our catch of the day comes from listener William, who writes in with a phishing scam that caught his eye. 
Links to the stories:

Sextortion training materials found on TikTok, Instagram, Snapchat and YouTube, according to new report

Most Common Phishing Email Themes of 2023

Companies aren’t paying ransoms like they used to

New Ransomware Reporting Requirements Kick in as Victims Increasingly Avoid Paying

FBI: Scammers Are Sending Couriers to Collect Cash From Victims


You can hear more from the T-Minus space daily show here.
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This week, we are joined by host of N2K's T-Minus Space Daily podcast, Maria Varmazis, she sits down with Joe and Dave to discuss sextorion materials that were found on popular social media apps such as, TikTok, Instagram, Snapchat and YouTube. Joe and Dave share quite a bit of follow up, Joe starts with an anonymous listener writing in sharing their story on gift card scams. Dave shares another anonymous listeners comments, sharing about what they think of Andy Cohen going public on how he got scammed. Finally, Joe and Dave hear from a listener by the name of "The Computrix," who says they need to defend Walmart. Dave share's his story about the most common phishing email themes of 2023. Joe's got the story of ransomware not being paid the same way as it used to be by companies, and share the two different angles on that. Our catch of the day comes from listener William, who writes in with a phishing scam that caught his eye. </p><p>Links to the stories:</p><ul>
<li><a href="https://www.nbcnews.com/tech/internet/sextortion-yahoo-boys-snapchat-tiktok-teen-wizz-rcna134200">Sextortion training materials found on TikTok, Instagram, Snapchat and YouTube, according to new report</a></li>
<li><a href="https://cofense.com/blog/most-common-phishing-email-themes-of-2023/">Most Common Phishing Email Themes of 2023</a></li>
<li><a href="https://www.axios.com/2024/01/30/ransomware-pay-out-decline-chart">Companies aren’t paying ransoms like they used to</a></li>
<li><a href="https://www.coveware.com/blog/2024/1/25/new-ransomware-reporting-requirements-kick-in-as-victims-increasingly-avoid-paying">New Ransomware Reporting Requirements Kick in as Victims Increasingly Avoid Paying</a></li>
<li><a href="https://www.infosecurity-magazine.com/news/fbi-scammers-couriers-collect-cash/">FBI: Scammers Are Sending Couriers to Collect Cash From Victims</a></li>
</ul><p><br></p><p>You can hear more from the T-Minus space daily show <a href="https://space.n2k.com/podcasts/t-minus">here</a>.</p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a>.</p>]]>
      </content:encoded>
      <itunes:duration>2857</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[f580581a-ac02-11ee-b598-cb66117c0216]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW4024516295.mp3?updated=1707327224" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Encore: Network Time Protocol (NTP) attack (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/19/notes</link>
      <description>A reflection or amplification distributed denial-of-service attack in which hackers query Internet network time protocol servers, NTP servers for short, for the correct time, but spoof the destination address of their target victims.</description>
      <pubDate>Tue, 06 Feb 2024 08:10:00 -0000</pubDate>
      <itunes:title>Encore: Network Time Protocol (NTP) attack (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>19</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A reflection or amplification distributed denial-of-service attack in which hackers query Internet network time protocol servers, NTP servers for short, for the correct time, but spoof the destination address of their target victims.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A reflection or amplification distributed denial-of-service attack in which hackers query Internet network time protocol servers, NTP servers for short, for the correct time, but spoof the destination address of their target victims.</p>]]>
      </content:encoded>
      <itunes:duration>397</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[cf9c0f0e-c46c-11ee-895f-97dec8c3b90c]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW8477578665.mp3?updated=1707167739" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Quiz scam nightmare. </title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/275/notes</link>
      <description>Jaeson Schultz, Technical Leader from Cisco Talos, is discussing "Spammers abuse Google Forms’ quiz to deliver scams."  Dave's story discusses the disturbing new trick up a scammers sleeve to get you to fall for their schemes. Joe has two stories this week, the first a warning to those who pick up scammers phone calls and what that can lead to after gaining access to your voice. Joe's second story follows  a band of organized thieves and how they have been targeting high-end homes across Metro Detroit. Our catch of the day comes from listener Van, who writes in to share a fun catch from a scammer who left a voicemail. 
Links to the stories:

Spammers abuse Google Forms’ quiz to deliver scams

Scammers are stealing people's faces for live video calls

All it takes is one sentence for AI to clone your voice

Expert says alleged recording of racist, antisemitic rant by Pikesville High principal could be fake

Videos: Organized crews smash glass, use jammers to break into high-end Metro Detroit homes


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com.</description>
      <pubDate>Thu, 01 Feb 2024 06:00:00 -0000</pubDate>
      <itunes:title>Quiz scam nightmare. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>275</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Jaeson Schultz, Technical Leader from Cisco Talos, is discussing "Spammers abuse Google Forms’ quiz to deliver scams."  Dave's story discusses the disturbing new trick up a scammers sleeve to get you to fall for their schemes. Joe has two stories this week, the first a warning to those who pick up scammers phone calls and what that can lead to after gaining access to your voice. Joe's second story follows  a band of organized thieves and how they have been targeting high-end homes across Metro Detroit. Our catch of the day comes from listener Van, who writes in to share a fun catch from a scammer who left a voicemail. 
Links to the stories:

Spammers abuse Google Forms’ quiz to deliver scams

Scammers are stealing people's faces for live video calls

All it takes is one sentence for AI to clone your voice

Expert says alleged recording of racist, antisemitic rant by Pikesville High principal could be fake

Videos: Organized crews smash glass, use jammers to break into high-end Metro Detroit homes


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Jaeson Schultz, Technical Leader from Cisco Talos, is discussing "Spammers abuse Google Forms’ quiz to deliver scams."  Dave's story discusses the disturbing new trick up a scammers sleeve to get you to fall for their schemes. Joe has two stories this week, the first a warning to those who pick up scammers phone calls and what that can lead to after gaining access to your voice. Joe's second story follows  a band of organized thieves and how they have been targeting high-end homes across Metro Detroit. Our catch of the day comes from listener Van, who writes in to share a fun catch from a scammer who left a voicemail. </p><p>Links to the stories:</p><ul>
<li><a href="https://blog.talosintelligence.com/google-forms-quiz-spam/">Spammers abuse Google Forms’ quiz to deliver scams</a></li>
<li><a href="https://www.amperesec.com/newsarchive/scammers-are-stealing-peoples-faces-for-live-video-calls">Scammers are stealing people's faces for live video calls</a></li>
<li><a href="https://www.wmar2news.com/local/all-it-takes-is-one-sentence-for-ai-to-clone-your-voice">All it takes is one sentence for AI to clone your voice</a></li>
<li><a href="https://www.cbsnews.com/baltimore/news/expert-says-authenticity-of-antisemitic-rant-recording-may-be-questionable/">Expert says alleged recording of racist, antisemitic rant by Pikesville High principal could be fake</a></li>
<li><a href="https://www.clickondetroit.com/news/local/2023/12/07/videos-organized-crews-smash-glass-use-jammers-to-break-into-high-end-metro-detroit-homes/">Videos: Organized crews smash glass, use jammers to break into high-end Metro Detroit homes</a></li>
</ul><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a>.</p>]]>
      </content:encoded>
      <itunes:duration>2847</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[f550307c-ac02-11ee-b598-d71cc64304dc]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW9804306802.mp3?updated=1706724316" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Encore: smishing (SMS phishing) (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/18/notes</link>
      <description>From the intrusion kill-chain model, the delivery of a “lure” via a text message to a potential victim by pretending to be some trustworthy person or organization in order to trick the victim into revealing sensitive information. Smishing is a portmanteau word made of two other words, the acronym “SMS” and the cyber coinage “Phishing“. It’s a text-message-centric variation of the email-based phishing scams that have been around since the 1990s. The term “Smishing” arose in the late 2000s. </description>
      <pubDate>Tue, 30 Jan 2024 08:10:00 -0000</pubDate>
      <itunes:title>Encore: smishing (SMS phishing) (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>18</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>From the intrusion kill-chain model, the delivery of a “lure” via a text message to a potential victim by pretending to be some trustworthy person or organization in order to trick the victim into revealing sensitive information. Smishing is a portmanteau word made of two other words, the acronym “SMS” and the cyber coinage “Phishing“. It’s a text-message-centric variation of the email-based phishing scams that have been around since the 1990s. The term “Smishing” arose in the late 2000s. </itunes:summary>
      <content:encoded>
        <![CDATA[<p>From the intrusion kill-chain model, the delivery of a “lure” via a text message to a potential victim by pretending to be some trustworthy person or organization in order to trick the victim into revealing sensitive information. Smishing is a portmanteau word made of two other words, the acronym “SMS” and the cyber coinage “Phishing“. It’s a text-message-centric variation of the email-based phishing scams that have been around since the 1990s. The term “Smishing” arose in the late 2000s. </p>]]>
      </content:encoded>
      <itunes:duration>277</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[f4065c1e-bedb-11ee-bc2a-23b8c4951d99]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW4081560512.mp3?updated=1706548128" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Phishing for mail.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/274/notes</link>
      <description>Abhilash Garimella from Bolster joins to discuss a USPS phishing campaign abusing freemium dynamic DNS and SaaS providers. Dave and Joe share some follow up, one was from listener Mike who wrote in to tell us about a breach at Resend, another was regarding a previous episode on grief and the internet, and finally Joe and Dave discuss a listeners response to a previous episode regarding an SMS scam a listener wrote in about. Dave shares a story on Walmarts relaxed security methods and how scammers may be exploiting them. Joe shares a couple articles relating to the ever growing pop star Taylor Swift and how criminals are using her face to scam. Our catch of the day comes from Joe this week, and he shares an interesting looking email he received from "Apple."
Links to the stories:

Facebook users targeted with “I’ll miss him so much” scam

Incident report for January 10, 2024

How Walmart’s Financial Services Became a Fraud Magnet

Taylor Swift, Selena Gomez deepfakes used in Le Creuset giveaway scam

No, That’s Not Taylor Swift Peddling Le Creuset Cookware


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com.</description>
      <pubDate>Thu, 25 Jan 2024 06:00:00 -0000</pubDate>
      <itunes:title>Phishing for mail.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>274</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Abhilash Garimella from Bolster joins to discuss a USPS phishing campaign abusing freemium dynamic DNS and SaaS providers. Dave and Joe share some follow up, one was from listener Mike who wrote in to tell us about a breach at Resend, another was regarding a previous episode on grief and the internet, and finally Joe and Dave discuss a listeners response to a previous episode regarding an SMS scam a listener wrote in about. Dave shares a story on Walmarts relaxed security methods and how scammers may be exploiting them. Joe shares a couple articles relating to the ever growing pop star Taylor Swift and how criminals are using her face to scam. Our catch of the day comes from Joe this week, and he shares an interesting looking email he received from "Apple."
Links to the stories:

Facebook users targeted with “I’ll miss him so much” scam

Incident report for January 10, 2024

How Walmart’s Financial Services Became a Fraud Magnet

Taylor Swift, Selena Gomez deepfakes used in Le Creuset giveaway scam

No, That’s Not Taylor Swift Peddling Le Creuset Cookware


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Abhilash Garimella from Bolster joins to discuss a USPS phishing campaign abusing freemium dynamic DNS and SaaS providers. Dave and Joe share some follow up, one was from listener Mike who wrote in to tell us about a breach at Resend, another was regarding a previous episode on grief and the internet, and finally Joe and Dave discuss a listeners response to a previous episode regarding an SMS scam a listener wrote in about. Dave shares a story on Walmarts relaxed security methods and how scammers may be exploiting them. Joe shares a couple articles relating to the ever growing pop star Taylor Swift and how criminals are using her face to scam. Our catch of the day comes from Joe this week, and he shares an interesting looking email he received from "Apple."</p><p>Links to the stories:</p><ul>
<li><a href="https://cybernews.com/security/facebook-targeted-miss-him-so-much-scam/#google_vignette">Facebook users targeted with “I’ll miss him so much” scam</a></li>
<li><a href="https://resend.com/blog/incident-report-for-january-10-2024">Incident report for January 10, 2024</a></li>
<li><a href="https://www.propublica.org/article/walmart-financial-services-became-fraud-magnet-gift-cards-money-laundering">How Walmart’s Financial Services Became a Fraud Magnet</a></li>
<li><a href="https://mashable.com/article/taylor-swift-selena-gomez-le-creuset-deepfake-scam">Taylor Swift, Selena Gomez deepfakes used in Le Creuset giveaway scam</a></li>
<li><a href="https://www.nytimes.com/2024/01/09/technology/taylor-swift-le-creuset-ai-deepfake.html"><em>No, That’s Not Taylor Swift Peddling Le Creuset Cookware</em></a></li>
</ul><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a>.</p>]]>
      </content:encoded>
      <itunes:duration>3146</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[f5201e1e-ac02-11ee-b598-f37b8827c4af]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW2467446545.mp3?updated=1706115715" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Encore: port mirroring (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/17/notes</link>
      <description>A network switch configuration setting that forwards a copy of each incoming and outgoing packet to a third switch port. Also known as SPAN or Switched Port Analyzer, RAP or Roving Analysis Port, and TAP or Test Access Point. When network managers and security investigators want to capture packets for analysis, they need some sort of generic TAP or Test Access Point. You can buy specialized equipment for this operation but most modern switches have this capability built in. </description>
      <pubDate>Tue, 23 Jan 2024 08:10:00 -0000</pubDate>
      <itunes:title>Encore: port mirroring (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>17</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A network switch configuration setting that forwards a copy of each incoming and outgoing packet to a third switch port. Also known as SPAN or Switched Port Analyzer, RAP or Roving Analysis Port, and TAP or Test Access Point. When network managers and security investigators want to capture packets for analysis, they need some sort of generic TAP or Test Access Point. You can buy specialized equipment for this operation but most modern switches have this capability built in. </itunes:summary>
      <content:encoded>
        <![CDATA[<p>A network switch configuration setting that forwards a copy of each incoming and outgoing packet to a third switch port. Also known as SPAN or Switched Port Analyzer, RAP or Roving Analysis Port, and TAP or Test Access Point. When network managers and security investigators want to capture packets for analysis, they need some sort of generic TAP or Test Access Point. You can buy specialized equipment for this operation but most modern switches have this capability built in. </p>]]>
      </content:encoded>
      <itunes:duration>277</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[8abc4586-b95c-11ee-b5fc-eb2e37e7ee43]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW2401290720.mp3?updated=1705951099" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>It's the intricate deceptions that get you.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/273/notes</link>
      <description>This week we are joined by the host of T-Minus, N2Ks very own Maria Varmazis brings her own story and discusses with Dave and Joe. We start off with Joe, and he brings in the story of Andy Cohen and how he fell victim to a credit card scam and shares what he had learned through the experience. Maria shares Arctic Wolf Labs' story and how they have investigated several cases of Royal and Akira ransomware victims being targeted in follow-on extortion attacks dating back to October of 2023. Lastly, Dave shares his story warning YouTube users about videos promoting cracked software that is distributing Lumma Stealer. Our catch of the day comes from listener Jon, he shares and email that had made it through his spam filter. 
You can hear more from the T-Minus space daily show here.
Links to the stories:















Exclusive: Andy Cohen fell victim to a credit card scam. Here's what he learned















 Follow-On Extortion Campaign Targeting Victims of Akira and Royal Ransomware















Beware! YouTube Videos Promoting Cracked Software Distribute Lumma Stealer
















Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com.</description>
      <pubDate>Thu, 18 Jan 2024 06:00:00 -0000</pubDate>
      <itunes:title>It's the intricate deceptions that get you.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>273</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>This week we are joined by the host of T-Minus, N2Ks very own Maria Varmazis brings her own story and discusses with Dave and Joe. We start off with Joe, and he brings in the story of Andy Cohen and how he fell victim to a credit card scam and shares what he had learned through the experience. Maria shares Arctic Wolf Labs' story and how they have investigated several cases of Royal and Akira ransomware victims being targeted in follow-on extortion attacks dating back to October of 2023. Lastly, Dave shares his story warning YouTube users about videos promoting cracked software that is distributing Lumma Stealer. Our catch of the day comes from listener Jon, he shares and email that had made it through his spam filter. 
You can hear more from the T-Minus space daily show here.
Links to the stories:















Exclusive: Andy Cohen fell victim to a credit card scam. Here's what he learned















 Follow-On Extortion Campaign Targeting Victims of Akira and Royal Ransomware















Beware! YouTube Videos Promoting Cracked Software Distribute Lumma Stealer
















Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This week we are joined by the host of T-Minus, N2Ks very own Maria Varmazis brings her own story and discusses with Dave and Joe. We start off with Joe, and he brings in the story of Andy Cohen and how he fell victim to a credit card scam and shares what he had learned through the experience. Maria shares Arctic Wolf Labs' story and how they have investigated several cases of Royal and Akira ransomware victims being targeted in follow-on extortion attacks dating back to October of 2023. Lastly, Dave shares his story warning YouTube users about videos promoting cracked software that is distributing Lumma Stealer. Our catch of the day comes from listener Jon, he shares and email that had made it through his spam filter. </p><p>You can hear more from the T-Minus space daily show <a href="https://space.n2k.com/podcasts/t-minus">here</a>.</p><p>Links to the stories:</p><ul>
<li><br></li>
<li><br></li>
<li><br></li>
<li><br></li>
<li><br></li>
<li><br></li>
<li><br></li>
<li><a href="https://www.today.com/news/andy-cohen-credit-card-scam-victim-lessons-learned-rcna133211">Exclusive: Andy Cohen fell victim to a credit card scam. Here's what he learned</a></li>
<li><br></li>
<li><br></li>
<li><br></li>
<li><br></li>
<li><br></li>
<li><br></li>
<li><br></li>
<li><a href="https://arcticwolf.com/resources/blog/follow-on-extortion-campaign-targeting-victims-of-akira-and-royal-ransomware/"> Follow-On Extortion Campaign Targeting Victims of Akira and Royal Ransomware</a></li>
<li><br></li>
<li><br></li>
<li><br></li>
<li><br></li>
<li><br></li>
<li><br></li>
<li><br></li>
<li><a href="https://thehackernews.com/2024/01/beware-youtube-videos-promoting-cracked.html">Beware! YouTube Videos Promoting Cracked Software Distribute Lumma Stealer</a></li>
<li><br></li>
<li><br></li>
<li><br></li>
<li><br></li>
<li><br></li>
<li><br></li>
<li><br></li>
</ul><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a>.</p>]]>
      </content:encoded>
      <itunes:duration>2294</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[f4efaa7c-ac02-11ee-b598-bf302be16a29]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW2148354537.mp3?updated=1705527438" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Encore: Network Detection and Response (NDR) (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/16/notes</link>
      <description>NDR tools provide anomaly detection and potential attack prevention by collecting telemetry across the entire intrusion kill chain on transactions across the network, between servers, hosts, and cloud-workloads, and running machine learning algorithms against this compiled and very large data set. NDR is an extension of the EDR, or endpoint detection and response idea that emerged in 2013. </description>
      <pubDate>Tue, 16 Jan 2024 08:10:00 -0000</pubDate>
      <itunes:title>Encore: Network Detection and Response (NDR) (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>16</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>NDR tools provide anomaly detection and potential attack prevention by collecting telemetry across the entire intrusion kill chain on transactions across the network, between servers, hosts, and cloud-workloads, and running machine learning algorithms against this compiled and very large data set. NDR is an extension of the EDR, or endpoint detection and response idea that emerged in 2013. </itunes:summary>
      <content:encoded>
        <![CDATA[<p>NDR tools provide anomaly detection and potential attack prevention by collecting telemetry across the entire intrusion kill chain on transactions across the network, between servers, hosts, and cloud-workloads, and running machine learning algorithms against this compiled and very large data set. NDR is an extension of the EDR, or endpoint detection and response idea that emerged in 2013. </p>]]>
      </content:encoded>
      <itunes:duration>379</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[901e3d22-b191-11ee-8ef1-571ef254432b]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW6455947785.mp3?updated=1705095140" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Password Perils: The threat of credential stuffing exploits.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/272/notes</link>
      <description>Frank Riccardi sits down to discuss how cybercriminals exploit people’s fondness for reused passwords to launch credential stuffing attacks. Dave and Joe share a bit of follow up, one from a listener named Steve who shares some push back from the 23andMe story from last week, and the other from a listener named Michael who shares a story of unpaid toll scams. Joe shares the story of a Utah exchange student and how he fell victim to a cybersecurity kidnapping, and now authorities are trying to figure out how it happened. Dave shares a scam about tragic fake posts that lead to a "win now" website, that has been flooding his Facebook feed. Our catch of the day comes from Jon who writes in to share a suspicious email that made it through the spam filter in Google. 
Links to the stories:
After Utah exchange student cyber kidnapping, we're looking at how the scam works

Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com.</description>
      <pubDate>Thu, 11 Jan 2024 06:00:00 -0000</pubDate>
      <itunes:title>Password Perils: The threat of credential stuffing exploits.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>272</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Frank Riccardi sits down to discuss how cybercriminals exploit people’s fondness for reused passwords to launch credential stuffing attacks. Dave and Joe share a bit of follow up, one from a listener named Steve who shares some push back from the 23andMe story from last week, and the other from a listener named Michael who shares a story of unpaid toll scams. Joe shares the story of a Utah exchange student and how he fell victim to a cybersecurity kidnapping, and now authorities are trying to figure out how it happened. Dave shares a scam about tragic fake posts that lead to a "win now" website, that has been flooding his Facebook feed. Our catch of the day comes from Jon who writes in to share a suspicious email that made it through the spam filter in Google. 
Links to the stories:
After Utah exchange student cyber kidnapping, we're looking at how the scam works

Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Frank Riccardi sits down to discuss how cybercriminals exploit people’s fondness for reused passwords to launch credential stuffing attacks. Dave and Joe share a bit of follow up, one from a listener named Steve who shares some push back from the 23andMe story from last week, and the other from a listener named Michael who shares a story of unpaid toll scams. Joe shares the story of a Utah exchange student and how he fell victim to a cybersecurity kidnapping, and now authorities are trying to figure out how it happened. Dave shares a scam about tragic fake posts that lead to a "win now" website, that has been flooding his Facebook feed. Our catch of the day comes from Jon who writes in to share a suspicious email that made it through the spam filter in Google. </p><p>Links to the stories:</p><ul><li><a href="https://www.usatoday.com/story/news/nation/2024/01/03/what-is-a-cyber-kidnapping/72095095007/">After Utah exchange student cyber kidnapping, we're looking at how the scam works</a></li></ul><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a>.</p>]]>
      </content:encoded>
      <itunes:duration>3615</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[f4bd5f40-ac02-11ee-b598-57088789e986]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW3039390051.mp3?updated=1704906171" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Encore: shadow IT (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/15/notes</link>
      <description>Technology, software and hardware deployed without explicit organizational approval. In the early days of the computer era from the 1980s through the 2000s security and information system practitioners considered shadow IT as completely negative. Those unauthorized systems were nothing more than a hindrance that created more technical debt in organizations that were already swimming in it with the known and authorized systems. </description>
      <pubDate>Tue, 09 Jan 2024 08:10:00 -0000</pubDate>
      <itunes:title>Encore: shadow IT (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>15</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Technology, software and hardware deployed without explicit organizational approval. In the early days of the computer era from the 1980s through the 2000s security and information system practitioners considered shadow IT as completely negative. Those unauthorized systems were nothing more than a hindrance that created more technical debt in organizations that were already swimming in it with the known and authorized systems. </itunes:summary>
      <content:encoded>
        <![CDATA[<p>Technology, software and hardware deployed without explicit organizational approval. In the early days of the computer era from the 1980s through the 2000s security and information system practitioners considered shadow IT as completely negative. Those unauthorized systems were nothing more than a hindrance that created more technical debt in organizations that were already swimming in it with the known and authorized systems. </p>]]>
      </content:encoded>
      <itunes:duration>294</itunes:duration>
      <guid isPermaLink="false"><![CDATA[79ab2424-b191-11ee-901f-4f91364217bb]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW7084657209.mp3?updated=1704728738" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The DNA dilemma: Unraveling a 23AndMe breach.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/271/notes</link>
      <description>Alethe Denis from Bishop Fox is talking with Dave and Joe with her take on the 23AndMe breach. Dave and Joe share some follow up from listener Michael, who writes in to share thoughts on our catch of the day from last episode, regarding the voice mail from Spectrum. Dave shares a story on email security, and how human factors have a heavy influence on it, especially with people's vulnerability to phishing and social engineering. Joe has two stories this week, his first story is a good wrap on the holiday's and gift card scams. Joe's second story is a jump on tax season quickly approaching, and how the IRS is helping taxpayers by providing penalty relief. Our catch of the day is a good example of what not to do when phishing/scamming people, luckily the receiver was smarter than the sender. 
Links to the stories:







How Human Elements Impact Email Security







"Vanilla Gift" card issuer faces lawsuit over card-draining scam risk







IRS helps taxpayers by providing penalty relief on nearly 5 million 2020 and 2021 tax returns; restart of collection notices in 2024 marks end of pandemic-related pause



News Insights: 23AndMe with Alethe Denis, Security Expert - Red Team




Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com.</description>
      <pubDate>Thu, 04 Jan 2024 06:00:00 -0000</pubDate>
      <itunes:title>The DNA dilemma: Unraveling a 23AndMe breach.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>271</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Alethe Denis from Bishop Fox is talking with Dave and Joe with her take on the 23AndMe breach. Dave and Joe share some follow up from listener Michael, who writes in to share thoughts on our catch of the day from last episode, regarding the voice mail from Spectrum. Dave shares a story on email security, and how human factors have a heavy influence on it, especially with people's vulnerability to phishing and social engineering. Joe has two stories this week, his first story is a good wrap on the holiday's and gift card scams. Joe's second story is a jump on tax season quickly approaching, and how the IRS is helping taxpayers by providing penalty relief. Our catch of the day is a good example of what not to do when phishing/scamming people, luckily the receiver was smarter than the sender. 
Links to the stories:







How Human Elements Impact Email Security







"Vanilla Gift" card issuer faces lawsuit over card-draining scam risk







IRS helps taxpayers by providing penalty relief on nearly 5 million 2020 and 2021 tax returns; restart of collection notices in 2024 marks end of pandemic-related pause



News Insights: 23AndMe with Alethe Denis, Security Expert - Red Team




Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Alethe Denis from Bishop Fox is talking with Dave and Joe with her take on the 23AndMe breach. Dave and Joe share some follow up from listener Michael, who writes in to share thoughts on our catch of the day from last episode, regarding the voice mail from Spectrum. Dave shares a story on email security, and how human factors have a heavy influence on it, especially with people's vulnerability to phishing and social engineering. Joe has two stories this week, his first story is a good wrap on the holiday's and gift card scams. Joe's second story is a jump on tax season quickly approaching, and how the IRS is helping taxpayers by providing penalty relief. Our catch of the day is a good example of what not to do when phishing/scamming people, luckily the receiver was smarter than the sender. </p><p>Links to the stories:</p><ul>
<li><br></li>
<li><br></li>
<li><br></li>
<li><a href="https://www.hackread.com/how-human-elements-impact-email-security/">How Human Elements Impact Email Security</a></li>
<li><br></li>
<li><br></li>
<li><br></li>
<li><a href="https://www.cbsnews.com/news/gift-card-vanilla-scam-lawsuit-draining-incomm/">"Vanilla Gift" card issuer faces lawsuit over card-draining scam risk</a></li>
<li><br></li>
<li><br></li>
<li><br></li>
<li><a href="https://www.irs.gov/newsroom/irs-helps-taxpayers-by-providing-penalty-relief-on-nearly-5-million-2020-and-2021-tax-returns-restart-of-collection-notices-in-2024-marks-end-of-pandemic-related-pause">IRS helps taxpayers by providing penalty relief on nearly 5 million 2020 and 2021 tax returns; restart of collection notices in 2024 marks end of pandemic-related pause</a></li>
<li><br></li>
<li><a href="https://bishopfox.com/resources/news-insights-23andme-alethe-denis%20">News Insights: 23AndMe with Alethe Denis, Security Expert - Red Team</a></li>
<li><br></li>
</ul><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a>.</p>]]>
      </content:encoded>
      <itunes:duration>2947</itunes:duration>
      <guid isPermaLink="false"><![CDATA[ac3a9f04-aa4e-11ee-821e-4bd8bb9a6f35]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW2874786094.mp3?updated=1704301694" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Stolen personality? </title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/270/notes</link>
      <description>Matt Lewis from the NCC Group joins to discuss how cybercriminals can decode your personality through AI conversations to launch targeted attacks at you. Dave and Joe share some follow up from listener Sydney, who writes in to share her thoughts on an FCC proceeding and how it could be of greater relevance to IoT security than SBOMs and HBOMs. Dave also shares a story from a listener from last Christmas, sending a warning to holiday shoppers. Dave has two stories this week, he shares one regarding an announcement on holiday scams coming out. His other story follows Zelle finally caving in to provide some relief to scam victims. Joe's story follows new crypto-theft attacks and warns people against the new tactics. 
Links to the stories:







2023 Holiday Shopping Scams







Zelle finally caves after years of refusing to refund scam victims







Microsoft: BlueNoroff hackers plan new crypto-theft attacks








Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com.</description>
      <pubDate>Thu, 28 Dec 2023 06:00:00 -0000</pubDate>
      <itunes:title>Stolen personality? </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>269</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Matt Lewis from the NCC Group joins to discuss how cybercriminals can decode your personality through AI conversations to launch targeted attacks at you. Dave and Joe share some follow up from listener Sydney, who writes in to share her thoughts on an FCC proceeding and how it could be of greater relevance to IoT security than SBOMs and HBOMs. Dave also shares a story from a listener from last Christmas, sending a warning to holiday shoppers. Dave has two stories this week, he shares one regarding an announcement on holiday scams coming out. His other story follows Zelle finally caving in to provide some relief to scam victims. Joe's story follows new crypto-theft attacks and warns people against the new tactics. 
Links to the stories:







2023 Holiday Shopping Scams







Zelle finally caves after years of refusing to refund scam victims







Microsoft: BlueNoroff hackers plan new crypto-theft attacks








Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Matt Lewis from the NCC Group joins to discuss how cybercriminals can decode your personality through AI conversations to launch targeted attacks at you. Dave and Joe share some follow up from listener Sydney, who writes in to share her thoughts on an FCC proceeding and how it could be of greater relevance to IoT security than SBOMs and HBOMs. Dave also shares a story from a listener from last Christmas, sending a warning to holiday shoppers. Dave has two stories this week, he shares one regarding an announcement on holiday scams coming out. His other story follows Zelle finally caving in to provide some relief to scam victims. Joe's story follows new crypto-theft attacks and warns people against the new tactics. </p><p>Links to the stories:</p><ul>
<li><br></li>
<li><br></li>
<li><br></li>
<li><a href="https://www.ic3.gov/Media/Y2023/PSA231115">2023 Holiday Shopping Scams</a></li>
<li><br></li>
<li><br></li>
<li><br></li>
<li><a href="https://arstechnica.com/tech-policy/2023/11/zelle-finally-caves-after-years-of-refusing-to-refund-scam-victims/">Zelle finally caves after years of refusing to refund scam victims</a></li>
<li><br></li>
<li><br></li>
<li><br></li>
<li><a href="https://www.bleepingcomputer.com/news/security/microsoft-bluenoroff-hackers-plan-new-crypto-theft-attacks/">Microsoft: BlueNoroff hackers plan new crypto-theft attacks</a></li>
<li><br></li>
<li><br></li>
<li><br></li>
</ul><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a>.</p>]]>
      </content:encoded>
      <itunes:duration>2721</itunes:duration>
      <guid isPermaLink="false"><![CDATA[ab43a7c6-9f59-11ee-8e84-d3cb8e077452]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW8247366341.mp3?updated=1703092702" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The grinch who hacked Christmas. [Hacking humans goes to the movies]</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans-goes-to-the-movies/25/notes</link>
      <description>Thanks for joining us again for another episode of a fun project brought to you by the team of Hacking Humans, the CyberWire's social engineering podcast. Hacking Humans co-host Dave Bittner is joined by Rick Howard in this series where they view clips from their favorite movies and television shows with examples of the social engineering scams and schemes you hear Dave and co-host Joe Carrigan talk about on Hacking Humans. In this episode, Dave and Rick watch some holiday classics, describe the on-screen action for you, and then they deconstruct what they saw. Grab your Christmas cookies and join us for some fantastic scams and frauds.
Links to this episode's clips if you'd like to watch along:



How The Grinch Stole Christmas (2000)






How The Grinch Stole Christmas (Cartoon)






The Greening of the Grinch (magazine)</description>
      <pubDate>Sun, 24 Dec 2023 08:10:00 -0000</pubDate>
      <itunes:title>The grinch who hacked Christmas. [Hacking humans goes to the movies]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>25</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Thanks for joining us again for another episode of a fun project brought to you by the team of Hacking Humans, the CyberWire's social engineering podcast. Hacking Humans co-host Dave Bittner is joined by Rick Howard in this series where they view clips from their favorite movies and television shows with examples of the social engineering scams and schemes you hear Dave and co-host Joe Carrigan talk about on Hacking Humans. In this episode, Dave and Rick watch some holiday classics, describe the on-screen action for you, and then they deconstruct what they saw. Grab your Christmas cookies and join us for some fantastic scams and frauds.
Links to this episode's clips if you'd like to watch along:



How The Grinch Stole Christmas (2000)






How The Grinch Stole Christmas (Cartoon)






The Greening of the Grinch (magazine)</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Thanks for joining us again for another episode of a fun project brought to you by the team of Hacking Humans, the CyberWire's social engineering podcast. Hacking Humans co-host Dave Bittner is joined by Rick Howard in this series where they view clips from their favorite movies and television shows with examples of the social engineering scams and schemes you hear Dave and co-host Joe Carrigan talk about on Hacking Humans. In this episode, Dave and Rick watch some holiday classics, describe the on-screen action for you, and then they deconstruct what they saw. Grab your Christmas cookies and join us for some fantastic scams and frauds.</p><p>Links to this episode's clips if you'd like to watch along:</p><ul>
<li><br></li>
<li><a href="https://www.youtube.com/watch?v=7tFp4f837UM&amp;t=157s">How The Grinch Stole Christmas (2000)</a></li>
<li><br></li>
<li><br></li>
<li>
<a href="https://www.youtube.com/watch?v=e4AQdMQZhNQ&amp;list=PLEGoZ3wfI_bZLN0fT7AMnZtfaQ4-F7Vn8&amp;index=4">How The Grinch Stole Christmas</a> (Cartoon)</li>
<li><br></li>
<li><br></li>
<li>
<a href="https://brianjayjones.com/2021/12/14/the-greening-of-the-grinch/">The Greening of the Grinch</a> (magazine)</li>
<li><br></li>
</ul>]]>
      </content:encoded>
      <itunes:duration>1992</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[bd823564-a0ea-11ee-a2ff-27287977091c]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW8232097418.mp3?updated=1703194120" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Reeling in some phishing trends.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/269/notes</link>
      <description>Adam Bateman, Co-Founder &amp; CEO at Push Security, is sharing some of the latest phishing trends his team has been observing. Dave and Joe share some listener follow up from Michael, who writes in with a new idea, calling it "eDeception." With the holiday season practically here, Joe shares a story about gift card scams, reminding everyone to be safe this holiday season. Dave's story follows a new iPhone update regarding stolen device protection in an upcoming version of iOS. Our catch of the day comes from listener Van who sent in an audio catch about Spectrum users. 
Links to the stories:



Amid holiday shopping, thieves utilize new scam eliminating gift card balances



iOS 17.3, Now in Beta, Includes New ‘Stolen Device Protection’ Feature




Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com.</description>
      <pubDate>Thu, 21 Dec 2023 06:00:00 -0000</pubDate>
      <itunes:title>Reeling in some phishing trends.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>269</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Adam Bateman, Co-Founder &amp; CEO at Push Security, is sharing some of the latest phishing trends his team has been observing. Dave and Joe share some listener follow up from Michael, who writes in with a new idea, calling it "eDeception." With the holiday season practically here, Joe shares a story about gift card scams, reminding everyone to be safe this holiday season. Dave's story follows a new iPhone update regarding stolen device protection in an upcoming version of iOS. Our catch of the day comes from listener Van who sent in an audio catch about Spectrum users. 
Links to the stories:



Amid holiday shopping, thieves utilize new scam eliminating gift card balances



iOS 17.3, Now in Beta, Includes New ‘Stolen Device Protection’ Feature




Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Adam Bateman, Co-Founder &amp; CEO at Push Security, is sharing some of the latest phishing trends his team has been observing. Dave and Joe share some listener follow up from Michael, who writes in with a new idea, calling it "eDeception." With the holiday season practically here, Joe shares a story about gift card scams, reminding everyone to be safe this holiday season. Dave's story follows a new iPhone update regarding stolen device protection in an upcoming version of iOS. Our catch of the day comes from listener Van who sent in an audio catch about Spectrum users. </p><p>Links to the stories:</p><ul>
<li><br></li>
<li><a href="https://www.cbsnews.com/minnesota/news/amid-holiday-shopping-thieves-utilize-new-scam-eliminating-gift-card-balances/">Amid holiday shopping, thieves utilize new scam eliminating gift card balances</a></li>
<li><br></li>
<li><a href="https://daringfireball.net/2023/12/ios_17-3_stolen_device_protection">iOS 17.3, Now in Beta, Includes New ‘Stolen Device Protection’ Feature</a></li>
<li><br></li>
</ul><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a>.</p>]]>
      </content:encoded>
      <itunes:duration>3328</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[8a40a3de-7ff3-11ed-8345-670eb1f693e9]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW9484653318.mp3?updated=1703023892" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>chaos engineering (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/164/notes</link>
      <description>The resilience discipline of controlled stress test experimentation in continuous integration/continuous delivery environments, CI/CD environments, to uncover systemic weaknesses.
CyberWire Glossary link: https://thecyberwire.com/glossary/chaos-engineering
Audio reference link: Farnam Street, 2009. Richard Feynman Teaches you the Scientific Method [Website]. Farnam Street. URL https://fs.blog/mental-model-scientific-method/</description>
      <pubDate>Tue, 19 Dec 2023 08:10:00 -0000</pubDate>
      <itunes:title>chaos engineering (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>164</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>The resilience discipline of controlled stress test experimentation in continuous integration/continuous delivery environments, CI/CD environments, to uncover systemic weaknesses.
CyberWire Glossary link: https://thecyberwire.com/glossary/chaos-engineering
Audio reference link: Farnam Street, 2009. Richard Feynman Teaches you the Scientific Method [Website]. Farnam Street. URL https://fs.blog/mental-model-scientific-method/</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The resilience discipline of controlled stress test experimentation in continuous integration/continuous delivery environments, CI/CD environments, to uncover systemic weaknesses.</p><p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/chaos-engineering">https://thecyberwire.com/glossary/chaos-engineering</a></p><p>Audio reference link: Farnam Street, 2009. Richard Feynman Teaches you the Scientific Method [Website]. Farnam Street. URL <a href="https://fs.blog/mental-model-scientific-method/">https://fs.blog/mental-model-scientific-method/</a></p>]]>
      </content:encoded>
      <itunes:duration>631</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[818c5d12-9dea-11ee-b23d-2f4bac967313]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW9944472783.mp3?updated=1702934205" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Shielding your inbox. </title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/268/notes</link>
      <description>Seth Blank, CTO of Valimail, joins to discuss the implications on email security on behalf of DMARC. Joe and Dave share some follow up regarding Meta, who is the parent company to Facebook and Instagram, and how they are now in a lawsuit over steering predators to children in New Mexico. Joe shares how he was almost hacked, as scammers used Peacock to lure him in. Dave's story continues with popular streaming apps being impersonated, this time with Disney+ falling victim. Joe's story follows the U.S. Attorney’s Office, the FBI, and State and Local Law Enforcement Officials sharing another "Don't click December" PSA. Our catch of the day comes from listener Mauricio, who writes in sharing a phishing email, from "PayPal," saying he has an invoice of almost $600. 
Links to the stories:



Facebook and Instagram Steer Predators to Children, New Mexico Attorney General Alleges in Lawsuit



Threat actors impersonate Disney+ with considerable guile



U.S. Attorney’s Office, the FBI, and State and Local Law Enforcement Officials Release Second “Don’t Click December” PSA




Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com.</description>
      <pubDate>Thu, 14 Dec 2023 06:00:00 -0000</pubDate>
      <itunes:title>Shielding your inbox. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>268</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Seth Blank, CTO of Valimail, joins to discuss the implications on email security on behalf of DMARC. Joe and Dave share some follow up regarding Meta, who is the parent company to Facebook and Instagram, and how they are now in a lawsuit over steering predators to children in New Mexico. Joe shares how he was almost hacked, as scammers used Peacock to lure him in. Dave's story continues with popular streaming apps being impersonated, this time with Disney+ falling victim. Joe's story follows the U.S. Attorney’s Office, the FBI, and State and Local Law Enforcement Officials sharing another "Don't click December" PSA. Our catch of the day comes from listener Mauricio, who writes in sharing a phishing email, from "PayPal," saying he has an invoice of almost $600. 
Links to the stories:



Facebook and Instagram Steer Predators to Children, New Mexico Attorney General Alleges in Lawsuit



Threat actors impersonate Disney+ with considerable guile



U.S. Attorney’s Office, the FBI, and State and Local Law Enforcement Officials Release Second “Don’t Click December” PSA




Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Seth Blank, CTO of Valimail, joins to discuss the implications on email security on behalf of DMARC. Joe and Dave share some follow up regarding Meta, who is the parent company to Facebook and Instagram, and how they are now in a lawsuit over steering predators to children in New Mexico. Joe shares how he was almost hacked, as scammers used Peacock to lure him in. Dave's story continues with popular streaming apps being impersonated, this time with Disney+ falling victim. Joe's story follows the U.S. Attorney’s Office, the FBI, and State and Local Law Enforcement Officials sharing another "Don't click December" PSA. Our catch of the day comes from listener Mauricio, who writes in sharing a phishing email, from "PayPal," saying he has an invoice of almost $600. </p><p>Links to the stories:</p><ul>
<li><br></li>
<li><a href="https://www.wsj.com/tech/facebook-and-instagram-steer-predators-to-children-new-mexico-attorney-general-alleges-in-lawsuit-b76a5b04">Facebook and Instagram Steer Predators to Children, New Mexico Attorney General Alleges in Lawsuit</a></li>
<li><br></li>
<li><a href="https://cybernews.com/news/disney-plus-email-brand-impersonation-attack/">Threat actors impersonate Disney+ with considerable guile</a></li>
<li><br></li>
<li><a href="https://www.justice.gov/usao-id/pr/us-attorneys-office-fbi-and-state-and-local-law-enforcement-officials-release-second">U.S. Attorney’s Office, the FBI, and State and Local Law Enforcement Officials Release Second “Don’t Click December” PSA</a></li>
<li><br></li>
</ul><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a>.</p>]]>
      </content:encoded>
      <itunes:duration>3199</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[8a2ca366-7ff3-11ed-8345-8b13b2eaf946]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW7115880920.mp3?updated=1702486677" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Encore: remote access Trojan or RAT (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/14/notes</link>
      <description>From the intrusion kill chain model, a program that provides command and control services for an attack campaign. While the first ever deployed RAT is unknown, one early example is Back Orifice made famous by the notorious hacktivist group called “The Cult of the Dead Cow,” or cDc, Back Orifice was written by the hacker, Sir Dystic AKA Josh Bookbinder and released to the public at DEFCON in 1998.</description>
      <pubDate>Tue, 12 Dec 2023 08:10:00 -0000</pubDate>
      <itunes:title>Encore: remote access Trojan or RAT (noun)</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>14</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>From the intrusion kill chain model, a program that provides command and control services for an attack campaign. While the first ever deployed RAT is unknown, one early example is Back Orifice made famous by the notorious hacktivist group called “The Cult of the Dead Cow,” or cDc, Back Orifice was written by the hacker, Sir Dystic AKA Josh Bookbinder and released to the public at DEFCON in 1998.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>From the intrusion kill chain model, a program that provides command and control services for an attack campaign. While the first ever deployed RAT is unknown, one early example is Back Orifice made famous by the notorious hacktivist group called “The Cult of the Dead Cow,” or cDc, Back Orifice was written by the hacker, Sir Dystic AKA Josh Bookbinder and released to the public at DEFCON in 1998.</p>]]>
      </content:encoded>
      <itunes:duration>282</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[1cba9366-954a-11ee-8fc1-83b1de9cef2b]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW7808930475.mp3?updated=1701985826" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Small, medium, and large phishing trends of 2023.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/267/notes</link>
      <description>Mike Price from ZeroFox sits down to discuss what 2023 phishing trends mean for the broader industry as we quickly approach 2024. Dave and Joe share a serious write in from listener Michelle who shares her pleads for her aunt, who she believes is being catfished. Listener Marc also writes in with an email that claims to be from "Walmart," that he is quite suspicious of. Joe's story follows Meta, and how they have designed products to target and harm kids. Dave's story is on bad bots and the dangers they pose with fake businesses that are maximizing their illicit earnings. Our catch of the day comes from listener Konstantin, who shares and email received from scammers claiming to be "McAfee," trying to get payment of almost $600. 
Links to the stories:

Meta Designed Products to Capitalize on Teen Vulnerabilities, States Allege

Breaking (Bad) Bots: Bot Abuse Analysis and Other Fraud Benchmarks


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com.</description>
      <pubDate>Thu, 07 Dec 2023 06:00:00 -0000</pubDate>
      <itunes:title>Small, medium, and large phishing trends of 2023.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>267</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Mike Price from ZeroFox sits down to discuss what 2023 phishing trends mean for the broader industry as we quickly approach 2024. Dave and Joe share a serious write in from listener Michelle who shares her pleads for her aunt, who she believes is being catfished. Listener Marc also writes in with an email that claims to be from "Walmart," that he is quite suspicious of. Joe's story follows Meta, and how they have designed products to target and harm kids. Dave's story is on bad bots and the dangers they pose with fake businesses that are maximizing their illicit earnings. Our catch of the day comes from listener Konstantin, who shares and email received from scammers claiming to be "McAfee," trying to get payment of almost $600. 
Links to the stories:

Meta Designed Products to Capitalize on Teen Vulnerabilities, States Allege

Breaking (Bad) Bots: Bot Abuse Analysis and Other Fraud Benchmarks


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Mike Price from ZeroFox sits down to discuss what 2023 phishing trends mean for the broader industry as we quickly approach 2024. Dave and Joe share a serious write in from listener Michelle who shares her pleads for her aunt, who she believes is being catfished. Listener Marc also writes in with an email that claims to be from "Walmart," that he is quite suspicious of. Joe's story follows Meta, and how they have designed products to target and harm kids. Dave's story is on bad bots and the dangers they pose with fake businesses that are maximizing their illicit earnings. Our catch of the day comes from listener Konstantin, who shares and email received from scammers claiming to be "McAfee," trying to get payment of almost $600. </p><p>Links to the stories:</p><ul>
<li><a href="https://www.wsj.com/business/media/meta-designed-products-to-capitalize-on-teen-vulnerabilities-states-allege-6791dad5?mod=Searchresults_pos3&amp;page=1">Meta Designed Products to Capitalize on Teen Vulnerabilities, States Allege</a></li>
<li><a href="https://www.arkoselabs.com/resourceasset/bot-abuse-analysis-report">Breaking (Bad) Bots: Bot Abuse Analysis and Other Fraud Benchmarks</a></li>
</ul><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a>.</p>]]>
      </content:encoded>
      <itunes:duration>3234</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[8a189c2c-7ff3-11ed-8345-832e19ad7df6]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW4735745427.mp3?updated=1701878691" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>zero knowledge proof (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/163/notes</link>
      <description>A mathematical method by which one party (the prover) can prove to another party (the verifier) that something is true, without revealing any information apart from the fact that this specific statement is true.
CyberWire Glossary link: https://thecyberwire.com/glossary/zero-knowledge-proof
Audio reference link: Staff, 2022. Zero Knowledge Proofs [Video]. YouTube. URL https://www.youtube.com/watch?v=5qzNe1hk0oY</description>
      <pubDate>Tue, 05 Dec 2023 08:10:00 -0000</pubDate>
      <itunes:title>zero knowledge proof (noun)</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>163</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A mathematical method by which one party (the prover) can prove to another party (the verifier) that something is true, without revealing any information apart from the fact that this specific statement is true.
CyberWire Glossary link: https://thecyberwire.com/glossary/zero-knowledge-proof
Audio reference link: Staff, 2022. Zero Knowledge Proofs [Video]. YouTube. URL https://www.youtube.com/watch?v=5qzNe1hk0oY</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A mathematical method by which one party (the prover) can prove to another party (the verifier) that something is true, without revealing any information apart from the fact that this specific statement is true.</p><p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/zero-knowledge-proof">https://thecyberwire.com/glossary/zero-knowledge-proof</a></p><p>Audio reference link: Staff, 2022. Zero Knowledge Proofs [Video]. YouTube. URL <a href="https://www.youtube.com/watch?v=5qzNe1hk0oY">https://www.youtube.com/watch?v=5qzNe1hk0oY</a></p>]]>
      </content:encoded>
      <itunes:duration>400</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[05c09aa2-954a-11ee-a026-0719d2d0f5e8]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW9456891329.mp3?updated=1701709283" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Encore: The age old battle between social engineering and banking.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/227/notes</link>
      <description>Chip Gibbons, CISO at Thrive, sits down with Dave to talk about how to defend against social engineering attacks in banking. Dave starts us off this week with a story about Amazon opening up its selling market to Pakistani residents, and what consequences that led to for the organization’s business. Joe's story follows a scam targeting soldiers in the Army. The Army warns against unknown individuals purporting to be noncommissioned officers that are calling said soldiers and asking them for money to fix a "pay problem" and, if questioned, threatening them with a punishment. Our catch of the day comes from listener Manie who writes in about a scam found when trying to download a HDRI (High Dynamic Range Image). The scam involves a fake ad asking for people’s cell phone numbers as soon as they click on a button that reads "download here". Manie shares how after she clicked the ad, she realized the mistake and immediately researched more before proceeding further.
Links to stories:

Amazon finally authorized Pakistani sellers. A wave of scammers followed

Army Warns of Scam Targeting New Soldiers


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 30 Nov 2023 06:00:00 -0000</pubDate>
      <itunes:title>Encore: The age old battle between social engineering and banking.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>227</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Chip Gibbons, CISO at Thrive, sits down with Dave to talk about how to defend against social engineering attacks in banking. Dave starts us off this week with a story about Amazon opening up its selling market to Pakistani residents, and what consequences that led to for the organization’s business. Joe's story follows a scam targeting soldiers in the Army. The Army warns against unknown individuals purporting to be noncommissioned officers that are calling said soldiers and asking them for money to fix a "pay problem" and, if questioned, threatening them with a punishment. Our catch of the day comes from listener Manie who writes in about a scam found when trying to download a HDRI (High Dynamic Range Image). The scam involves a fake ad asking for people’s cell phone numbers as soon as they click on a button that reads "download here". Manie shares how after she clicked the ad, she realized the mistake and immediately researched more before proceeding further.
Links to stories:

Amazon finally authorized Pakistani sellers. A wave of scammers followed

Army Warns of Scam Targeting New Soldiers


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Chip Gibbons, CISO at Thrive, sits down with Dave to talk about how to defend against social engineering attacks in banking. Dave starts us off this week with a story about Amazon opening up its selling market to Pakistani residents, and what consequences that led to for the organization’s business. Joe's story follows a scam targeting soldiers in the Army. The Army warns against unknown individuals purporting to be noncommissioned officers that are calling said soldiers and asking them for money to fix a "pay problem" and, if questioned, threatening them with a punishment. Our catch of the day comes from listener Manie who writes in about a scam found when trying to download a HDRI (High Dynamic Range Image). The scam involves a fake ad asking for people’s cell phone numbers as soon as they click on a button that reads "download here". Manie shares how after she clicked the ad, she realized the mistake and immediately researched more before proceeding further.</p><p>Links to stories:</p><ul>
<li><a href="https://restofworld.org/2023/amazon-pakistani-sellers-scammers/">Amazon finally authorized Pakistani sellers. A wave of scammers followed</a></li>
<li><a href="https://www.military.com/daily-news/2023/01/04/army-warns-of-scam-targeting-new-soldiers.html">Army Warns of Scam Targeting New Soldiers</a></li>
</ul><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>3214</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[8a047a80-7ff3-11ed-8345-eb02ffbaaa72]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW9703009598.mp3?updated=1701122536" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Encore: business email compromise or BEC (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/13/notes</link>
      <description>A social engineering scam where fraudsters spoof an email message from a trusted company officer that directs a staff member to transfer funds to an account controlled by the criminal. </description>
      <pubDate>Tue, 28 Nov 2023 08:10:00 -0000</pubDate>
      <itunes:title>Encore: business email compromise or BEC (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>13</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A social engineering scam where fraudsters spoof an email message from a trusted company officer that directs a staff member to transfer funds to an account controlled by the criminal. </itunes:summary>
      <content:encoded>
        <![CDATA[<p>A social engineering scam where fraudsters spoof an email message from a trusted company officer that directs a staff member to transfer funds to an account controlled by the criminal. </p>]]>
      </content:encoded>
      <itunes:duration>227</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[1fc3982e-8d56-11ee-afe9-ffc3145fe489]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW1645974053.mp3?updated=1701103457" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Cops in the catfish game.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans-goes-to-the-movies/24/notes</link>
      <description>Thanks for joining us again for another episode of fun project brought to you by the team of Hacking Humans, the CyberWire's social engineering podcast. Hacking Humans co-host Dave Bittner is joined by Rick Howard in this series where they view clips from their favorite movies and television shows with examples of the social engineering scams and schemes you hear Dave and co-host Joe Carrigan talk about on Hacking Humans. In this episode, Dave and Rick watch each of the selected scenes, describe the on-screen action for you, and then they deconstruct what they saw. Grab your bowl of popcorn and join us for some fantastic scams and frauds.
Links to this episode's clips if you'd like to watch along:

Dave's clip from the movie: Chicago P.D.


Rick's clip from the movie: The Imitation Game</description>
      <pubDate>Thu, 23 Nov 2023 08:10:00 -0000</pubDate>
      <itunes:title>Cops in the catfish game.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>24</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Thanks for joining us again for another episode of fun project brought to you by the team of Hacking Humans, the CyberWire's social engineering podcast. Hacking Humans co-host Dave Bittner is joined by Rick Howard in this series where they view clips from their favorite movies and television shows with examples of the social engineering scams and schemes you hear Dave and co-host Joe Carrigan talk about on Hacking Humans. In this episode, Dave and Rick watch each of the selected scenes, describe the on-screen action for you, and then they deconstruct what they saw. Grab your bowl of popcorn and join us for some fantastic scams and frauds.
Links to this episode's clips if you'd like to watch along:

Dave's clip from the movie: Chicago P.D.


Rick's clip from the movie: The Imitation Game</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Thanks for joining us again for another episode of fun project brought to you by the team of Hacking Humans, the CyberWire's social engineering podcast. Hacking Humans co-host Dave Bittner is joined by Rick Howard in this series where they view clips from their favorite movies and television shows with examples of the social engineering scams and schemes you hear Dave and co-host Joe Carrigan talk about on Hacking Humans. In this episode, Dave and Rick watch each of the selected scenes, describe the on-screen action for you, and then they deconstruct what they saw. Grab your bowl of popcorn and join us for some fantastic scams and frauds.</p><p>Links to this episode's clips if you'd like to watch along:</p><ul>
<li>Dave's clip from the movie: <a href="https://www.youtube.com/watch?v=n7KrUo7ZehA">Chicago P.D.</a>
</li>
<li>Rick's clip from the movie: <a href="https://www.imdb.com/title/tt2084970/">The Imitation Game</a>
</li>
</ul>]]>
      </content:encoded>
      <itunes:duration>1758</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[64707346-8885-11ee-aeaf-6327f268f076]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW9755470104.mp3?updated=1700580462" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>HIPAA (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/162/notes</link>
      <description>A U.S. law designed to improve the portability and accountability of health insurance coverage.
CyberWire Glossary link: https://thecyberwire.com/glossary/hipaa
Audio reference link: Dr. Dana Brems, 2021. Doctor reacts to “HIPAA violations” [Video]. YouTube. URL https://www.youtube.com/shorts/Ksk00s8a_IU</description>
      <pubDate>Tue, 21 Nov 2023 08:10:00 -0000</pubDate>
      <itunes:title>HIPAA (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>162</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A U.S. law designed to improve the portability and accountability of health insurance coverage.
CyberWire Glossary link: https://thecyberwire.com/glossary/hipaa
Audio reference link: Dr. Dana Brems, 2021. Doctor reacts to “HIPAA violations” [Video]. YouTube. URL https://www.youtube.com/shorts/Ksk00s8a_IU</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A U.S. law designed to improve the portability and accountability of health insurance coverage.</p><p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/hipaa">https://thecyberwire.com/glossary/hipaa</a></p><p>Audio reference link: Dr. Dana Brems, 2021. Doctor reacts to “HIPAA violations” [Video]. YouTube. URL <a href="https://www.youtube.com/shorts/Ksk00s8a_IU">https://www.youtube.com/shorts/Ksk00s8a_IU</a></p>]]>
      </content:encoded>
      <itunes:duration>603</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[61b15c6c-87d4-11ee-92ac-5b53ef146b94]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW5407712510.mp3?updated=1700504430" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Unmasking the deceptive. </title>
      <description>John Wilson, Senior Fellow, Threat Research at Fortra, joins to discuss email impersonation attacks which found that nearly 99% of these threats can be classified as business email compromise. Dave and Joe share some listener follow up from Terry, who writes in with some comments on episode 262 regarding cybersecurity jargon used. Joe's story comes from a listener this week, this individual writes in sharing the horror story he had to deal with when him and his wife ended up on a target list for scammers. Dave's story follows Elon Musk and ￼Joanna Gaines, co-host of the HGTV show "Fixer Upper," and how they are selling a scam device that claims to lower your electricity bills. Our catch of the day comes from listener William, who writes in sharing an email he received from the"Tampa International Airport Police Department Florida," saying they want to release his fund with the service of DHL Courier Company.
Links to the stories:

Worst fake "power saver" plug yet

Better Business Bureau

Elon Musk Energy Saving Device: The Scam You Need to Know About


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com.</description>
      <pubDate>Thu, 16 Nov 2023 06:00:00 -0000</pubDate>
      <itunes:title>Unmasking the deceptive. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>266</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle>https://thecyberwire.com/podcasts/hacking-humans/266/notes</itunes:subtitle>
      <itunes:summary>John Wilson, Senior Fellow, Threat Research at Fortra, joins to discuss email impersonation attacks which found that nearly 99% of these threats can be classified as business email compromise. Dave and Joe share some listener follow up from Terry, who writes in with some comments on episode 262 regarding cybersecurity jargon used. Joe's story comes from a listener this week, this individual writes in sharing the horror story he had to deal with when him and his wife ended up on a target list for scammers. Dave's story follows Elon Musk and ￼Joanna Gaines, co-host of the HGTV show "Fixer Upper," and how they are selling a scam device that claims to lower your electricity bills. Our catch of the day comes from listener William, who writes in sharing an email he received from the"Tampa International Airport Police Department Florida," saying they want to release his fund with the service of DHL Courier Company.
Links to the stories:

Worst fake "power saver" plug yet

Better Business Bureau

Elon Musk Energy Saving Device: The Scam You Need to Know About


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>John Wilson, Senior Fellow, Threat Research at Fortra, joins to discuss email impersonation attacks which found that nearly 99% of these threats can be classified as business email compromise. Dave and Joe share some listener follow up from Terry, who writes in with some comments on episode 262 regarding cybersecurity jargon used. Joe's story comes from a listener this week, this individual writes in sharing the horror story he had to deal with when him and his wife ended up on a target list for scammers. Dave's story follows Elon Musk and ￼Joanna Gaines, co-host of the HGTV show "Fixer Upper," and how they are selling a scam device that claims to lower your electricity bills. Our catch of the day comes from listener William, who writes in sharing an email he received from the"Tampa International Airport Police Department Florida," saying they want to release his fund with the service of DHL Courier Company.</p><p>Links to the stories:</p><ul>
<li><a href="https://www.youtube.com/watch?v=yA5G7kR_xa8">Worst fake "power saver" plug yet</a></li>
<li><a href="https://www.bbb.org/us/oh/dublin/profile/energy-conservation-products/stopwatt-0302-70141367/complaints">Better Business Bureau</a></li>
<li><a href="https://www.myantispyware.com/2023/08/21/elon-musk-energy-saving-device-the-scam-you-need-to-know-about/">Elon Musk Energy Saving Device: The Scam You Need to Know About</a></li>
</ul><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a>.</p>]]>
      </content:encoded>
      <itunes:duration>3209</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[89d9146c-7ff3-11ed-8345-d3d21dd008be]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW3366461534.mp3?updated=1700065285" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Encore: man trap (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/12/notes</link>
      <description>A physical security access control device consisting of an enclosed hallway with interlocking doors on each end where both doors can’t be open at the same time. A person presents credentials to the entry doorway. If authorized, the entry door opens and the person walks into the mantrap. The man trap exit door will not open until the entry door closes. The person presents credentials to the exit door. If authorized, the exit door will open. If not, the person is captured in the man trap until security arrives to handle the situation. Physical security leadership installs man traps to separate unrestricted areas from restricted areas, to prevent tailgating by uncleared personnel, and to impede access by unauthorized persons.</description>
      <pubDate>Tue, 14 Nov 2023 08:10:00 -0000</pubDate>
      <itunes:title>Encore: man trap (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>12</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A physical security access control device consisting of an enclosed hallway with interlocking doors on each end where both doors can’t be open at the same time. A person presents credentials to the entry doorway. If authorized, the entry door opens and the person walks into the mantrap. The man trap exit door will not open until the entry door closes. The person presents credentials to the exit door. If authorized, the exit door will open. If not, the person is captured in the man trap until security arrives to handle the situation. Physical security leadership installs man traps to separate unrestricted areas from restricted areas, to prevent tailgating by uncleared personnel, and to impede access by unauthorized persons.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A physical security access control device consisting of an enclosed hallway with interlocking doors on each end where both doors can’t be open at the same time. A person presents credentials to the entry doorway. If authorized, the entry door opens and the person walks into the mantrap. The man trap exit door will not open until the entry door closes. The person presents credentials to the exit door. If authorized, the exit door will open. If not, the person is captured in the man trap until security arrives to handle the situation. Physical security leadership installs man traps to separate unrestricted areas from restricted areas, to prevent tailgating by uncleared personnel, and to impede access by unauthorized persons.</p>]]>
      </content:encoded>
      <itunes:duration>282</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c8f66a32-824a-11ee-867d-9330ce5f4c37]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW6137055904.mp3?updated=1699893832" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Leaving a trail of digital breadcrumbs.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/265/notes</link>
      <description>This week we are joined by Harry Maugans from Privacy Bee who sits down to discuss how our digital breadcrumbs, old and new, are coming back to haunt us. Joe and Dave discuss some follow up from listener Phil, who writes in with a question about the safety of IoT and consumer devices. Dave's story follows the ever so popular YouTube, and its implemented measures to prevent users with ad blockers from watching videos. Joe shares a personal story from a friend regarding a scam he had fallen for, where the scammer got personal information and threatened him, asking for $500. Our catch of the day comes from listener John who found a hilarious text conversation on reddit that he just had to share.
Links to the stories:
YouTube's ‘War’ on Adblockers Shows How Google Controls the Internet

Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com.</description>
      <pubDate>Thu, 09 Nov 2023 06:00:00 -0000</pubDate>
      <itunes:title>Leaving a trail of digital breadcrumbs.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>265</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>This week we are joined by Harry Maugans from Privacy Bee who sits down to discuss how our digital breadcrumbs, old and new, are coming back to haunt us. Joe and Dave discuss some follow up from listener Phil, who writes in with a question about the safety of IoT and consumer devices. Dave's story follows the ever so popular YouTube, and its implemented measures to prevent users with ad blockers from watching videos. Joe shares a personal story from a friend regarding a scam he had fallen for, where the scammer got personal information and threatened him, asking for $500. Our catch of the day comes from listener John who found a hilarious text conversation on reddit that he just had to share.
Links to the stories:
YouTube's ‘War’ on Adblockers Shows How Google Controls the Internet

Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This week we are joined by Harry Maugans from Privacy Bee who sits down to discuss how our digital breadcrumbs, old and new, are coming back to haunt us. Joe and Dave discuss some follow up from listener Phil, who writes in with a question about the safety of IoT and consumer devices. Dave's story follows the ever so popular YouTube, and its implemented measures to prevent users with ad blockers from watching videos. Joe shares a personal story from a friend regarding a scam he had fallen for, where the scammer got personal information and threatened him, asking for $500. Our catch of the day comes from listener John who found a hilarious text conversation on reddit that he just had to share.</p><p>Links to the stories:</p><ul><li><a href="https://www.404media.co/youtubes-war-on-adblockers-shows-how-google-controls-the-internet/?action=subscribe&amp;success=true">YouTube's ‘War’ on Adblockers Shows How Google Controls the Internet</a></li></ul><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a>.</p>]]>
      </content:encoded>
      <itunes:duration>3694</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[89c41e5e-7ff3-11ed-8345-3f49ba852f4d]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW5557660563.mp3?updated=1699391261" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Common Vulnerability Scoring System (CVSS) (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/161/notes</link>
      <description>A qualitative public framework for rating the severity of security vulnerabilities in software.
CyberWire Glossary link: https://thecyberwire.com/glossary/common-vulnerability-scoring-system
Audio reference link: Peter Silva, 2020. What is Common Vulnerability Scoring System (CVSS) [Video]. YouTube. URL https://www.youtube.com/watch?v=rR63F_lfKf0</description>
      <pubDate>Tue, 07 Nov 2023 08:00:00 -0000</pubDate>
      <itunes:title>Common Vulnerability Scoring System (CVSS) (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>161</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A qualitative public framework for rating the severity of security vulnerabilities in software.
CyberWire Glossary link: https://thecyberwire.com/glossary/common-vulnerability-scoring-system
Audio reference link: Peter Silva, 2020. What is Common Vulnerability Scoring System (CVSS) [Video]. YouTube. URL https://www.youtube.com/watch?v=rR63F_lfKf0</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A qualitative public framework for rating the severity of security vulnerabilities in software.</p><p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/common-vulnerability-scoring-system">https://thecyberwire.com/glossary/common-vulnerability-scoring-system</a></p><p>Audio reference link: Peter Silva, 2020. What is Common Vulnerability Scoring System (CVSS) [Video]. YouTube. URL <a href="https://www.youtube.com/watch?v=rR63F_lfKf0">https://www.youtube.com/watch?v=rR63F_lfKf0</a></p>]]>
      </content:encoded>
      <itunes:duration>456</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[8a29abc0-7e4e-11ee-ae99-d7fcd4212dc6]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW9531344624.mp3?updated=1699291888" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Weaponizing your out-of-office replies.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/264/notes</link>
      <description>James Dyer and Jack Chapman of Egress join to discuss "Cybercriminals don’t take holidays: How bad actors use this two-step phishing campaign to weaponize out-of-office replies." Dave and Joe share some listener follow up from Ron, who has a suggestion about registration specific email accounts. Joe has two stories this week, one where he shares some good news on a scammer who received some justice after taking part in a $66K romance scam. His second story is on social media and how it is a breeding ground for scammers. Dave's story this week follows how Google-hosted malvertising leads to a fake keepass site that looks genuine. Our catch of the day comes from our very own editorial staff who share an interesting email they received from the infamous National Security Department.
Links to the stories:

N.J. man sentenced to prison for taking part in $66K romance scam

Social media: a golden goose for scammers

Google-hosted malvertising leads to fake Keepass site that looks genuine


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com.</description>
      <pubDate>Thu, 02 Nov 2023 05:00:00 -0000</pubDate>
      <itunes:title>Weaponizing your out-of-office replies.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>264</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>James Dyer and Jack Chapman of Egress join to discuss "Cybercriminals don’t take holidays: How bad actors use this two-step phishing campaign to weaponize out-of-office replies." Dave and Joe share some listener follow up from Ron, who has a suggestion about registration specific email accounts. Joe has two stories this week, one where he shares some good news on a scammer who received some justice after taking part in a $66K romance scam. His second story is on social media and how it is a breeding ground for scammers. Dave's story this week follows how Google-hosted malvertising leads to a fake keepass site that looks genuine. Our catch of the day comes from our very own editorial staff who share an interesting email they received from the infamous National Security Department.
Links to the stories:

N.J. man sentenced to prison for taking part in $66K romance scam

Social media: a golden goose for scammers

Google-hosted malvertising leads to fake Keepass site that looks genuine


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>James Dyer and Jack Chapman of Egress join to discuss "Cybercriminals don’t take holidays: How bad actors use this two-step phishing campaign to weaponize out-of-office replies." Dave and Joe share some listener follow up from Ron, who has a suggestion about registration specific email accounts. Joe has two stories this week, one where he shares some good news on a scammer who received some justice after taking part in a $66K romance scam. His second story is on social media and how it is a breeding ground for scammers. Dave's story this week follows how Google-hosted malvertising leads to a fake keepass site that looks genuine. Our catch of the day comes from our very own editorial staff who share an interesting email they received from the infamous National Security Department.</p><p>Links to the stories:</p><ul>
<li><a href="https://www.nj.com/news/2023/10/nj-man-sentenced-to-federal-prison-for-taking-part-in-romance-scam-cost-woman-66k.html">N.J. man sentenced to prison for taking part in $66K romance scam</a></li>
<li><a href="https://www.ftc.gov/news-events/data-visualizations/data-spotlight/2023/10/social-media-golden-goose-scammers">Social media: a golden goose for scammers</a></li>
<li><a href="https://arstechnica.com/security/2023/10/google-hosted-malvertising-leads-to-fake-keepass-site-that-looks-genuine/">Google-hosted malvertising leads to fake Keepass site that looks genuine</a></li>
</ul><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a>.</p>]]>
      </content:encoded>
      <itunes:duration>3136</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[89af8a20-7ff3-11ed-8345-eff3a9b8fbbd]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW2502401081.mp3?updated=1698853341" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Encore: anagram (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/11/notes</link>
      <description>A word, phrase, or sentence formed from another by rearranging its letters. For example, cracking a columnar transposition cipher by hand involves looking for anagrams.</description>
      <pubDate>Tue, 31 Oct 2023 07:00:00 -0000</pubDate>
      <itunes:title>Encore: anagram (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>11</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A word, phrase, or sentence formed from another by rearranging its letters. For example, cracking a columnar transposition cipher by hand involves looking for anagrams.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A word, phrase, or sentence formed from another by rearranging its letters. For example, cracking a columnar transposition cipher by hand involves looking for anagrams.</p>]]>
      </content:encoded>
      <itunes:duration>214</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[badea958-773e-11ee-9e77-330b51e8979c]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW9999781165.mp3?updated=1698681087" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Spooky, scary, skeletons at the movies. [Hacking humans goes to the movies]</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans-goes-to-the-movies/23/notes</link>
      <description>Thanks for joining us again for a very special and scary episode brought to you by the team of Hacking Humans, the CyberWire's social engineering podcast. Hacking Humans co-host Dave Bittner is joined by Rick Howard in this series where they view clips from their favorite movies and television shows with examples of the social engineering, scams, and schemes you hear Dave and co-host Joe Carrigan talk about on Hacking Humans. In this episode, Dave and Rick watch each of the selected scenes, describe the on-screen action for you, and then they deconstruct what they saw. Grab your bowl of popcorn and join us for some frightfully fantastic scams and frauds.
Links to this episode's clips if you'd like to watch along:

Dave's clip from the movie: Halloween III


Rick's clip from the movie: Get Out</description>
      <pubDate>Sun, 29 Oct 2023 07:01:00 -0000</pubDate>
      <itunes:title>Spooky, scary, skeletons at the movies. [Hacking humans goes to the movies]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>23</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Thanks for joining us again for a very special and scary episode brought to you by the team of Hacking Humans, the CyberWire's social engineering podcast. Hacking Humans co-host Dave Bittner is joined by Rick Howard in this series where they view clips from their favorite movies and television shows with examples of the social engineering, scams, and schemes you hear Dave and co-host Joe Carrigan talk about on Hacking Humans. In this episode, Dave and Rick watch each of the selected scenes, describe the on-screen action for you, and then they deconstruct what they saw. Grab your bowl of popcorn and join us for some frightfully fantastic scams and frauds.
Links to this episode's clips if you'd like to watch along:

Dave's clip from the movie: Halloween III


Rick's clip from the movie: Get Out</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Thanks for joining us again for a very special and scary episode brought to you by the team of Hacking Humans, the CyberWire's social engineering podcast. Hacking Humans co-host Dave Bittner is joined by Rick Howard in this series where they view clips from their favorite movies and television shows with examples of the social engineering, scams, and schemes you hear Dave and co-host Joe Carrigan talk about on Hacking Humans. In this episode, Dave and Rick watch each of the selected scenes, describe the on-screen action for you, and then they deconstruct what they saw. Grab your bowl of popcorn and join us for some frightfully fantastic scams and frauds.</p><p>Links to this episode's clips if you'd like to watch along:</p><ul>
<li>Dave's clip from the movie: <a href="https://docs.google.com/document/d/1vfvwM08kPUBlFMs0yIzrTw3v9b19_VACVvEAL3sA-lg/edit">Halloween III</a>
</li>
<li>Rick's clip from the movie: <a href="https://www.youtube.com/watch?v=363rpSx81EY">Get Out </a>
</li>
</ul>]]>
      </content:encoded>
      <itunes:duration>2203</itunes:duration>
      <itunes:explicit>yes</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[60aa5810-74fa-11ee-b60a-1fbddebbb244]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW7196605567.mp3?updated=1698423847" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Scams, scams, and more scams.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/263/notes</link>
      <description>Mallory Sofastaii, a consumer investigative reporter from WMAR TV, is joining Dave and Joe to discuss some recent scams she's seen in her reporting. Dave and Joe share some listener follow up from Kenneth who writes in with a suggestion on creating separate email addresses. Dave's story this week follows fake browser scams and how one has gotten a face lift, and what it looks like now. Joe's story is on a new term WIRED is calling "obituary pirates," people who create YouTube videos themselves casually reciting information about loved ones deaths. Our catch of the day comes from Joe this week, he shares an email he received from one of his old email addresses.
Links to the stories:

Widow loses life savings in romance scam that started on a gaming app

Tech support scams escalating: Victims’ computers locked, accounts emptied

The Fake Browser Update Scam Gets a Makeover

The Bizarre Cottage Industry of YouTube Obituary Pirates


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com.</description>
      <pubDate>Thu, 26 Oct 2023 05:00:00 -0000</pubDate>
      <itunes:title>Scams, scams, and more scams.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>263</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Mallory Sofastaii, a consumer investigative reporter from WMAR TV, is joining Dave and Joe to discuss some recent scams she's seen in her reporting. Dave and Joe share some listener follow up from Kenneth who writes in with a suggestion on creating separate email addresses. Dave's story this week follows fake browser scams and how one has gotten a face lift, and what it looks like now. Joe's story is on a new term WIRED is calling "obituary pirates," people who create YouTube videos themselves casually reciting information about loved ones deaths. Our catch of the day comes from Joe this week, he shares an email he received from one of his old email addresses.
Links to the stories:

Widow loses life savings in romance scam that started on a gaming app

Tech support scams escalating: Victims’ computers locked, accounts emptied

The Fake Browser Update Scam Gets a Makeover

The Bizarre Cottage Industry of YouTube Obituary Pirates


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Mallory Sofastaii, a consumer investigative reporter from WMAR TV, is joining Dave and Joe to discuss some recent scams she's seen in her reporting. Dave and Joe share some listener follow up from Kenneth who writes in with a suggestion on creating separate email addresses. Dave's story this week follows fake browser scams and how one has gotten a face lift, and what it looks like now. Joe's story is on a new term WIRED is calling "obituary pirates," people who create YouTube videos themselves casually reciting information about loved ones deaths. Our catch of the day comes from Joe this week, he shares an email he received from one of his old email addresses.</p><p>Links to the stories:</p><ul>
<li><a href="https://www.wmar2news.com/matterformallory/widow-loses-life-savings-in-romance-scam-that-started-on-a-gaming-app">Widow loses life savings in romance scam that started on a gaming app</a></li>
<li><a href="https://www.wmar2news.com/matterformallory/tech-support-scams-escalating-victims-computers-locked-accounts-emptied">Tech support scams escalating: Victims’ computers locked, accounts emptied</a></li>
<li><a href="https://krebsonsecurity.com/2023/10/the-fake-browser-update-scam-gets-a-makeover/">The Fake Browser Update Scam Gets a Makeover</a></li>
<li><a href="https://www.wired.com/story/youtube-obituary-pirates/?bxid=5c48f5722ddf9c4807ae7e57&amp;cndid=9590145&amp;esrc=Wired_etl_load&amp;mbid=mbid%3DCRMWIR012019%0A%0A&amp;source=Email_0_EDT_WIR_NEWSLETTER_0_DAILY_ZZ&amp;utm_brand=wired&amp;utm_campaign=aud-dev&amp;utm_content=WIR_Daily_092223&amp;utm_mailing=WIR_Daily_092223&amp;utm_medium=email&amp;utm_source=nl&amp;utm_term=P2">The Bizarre Cottage Industry of YouTube Obituary Pirates</a></li>
</ul><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a>.</p>]]>
      </content:encoded>
      <itunes:duration>3038</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[899b28c8-7ff3-11ed-8345-ab856d51582d]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW5584451461.mp3?updated=1698174350" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Encore: zero-day (adjective) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/2/notes</link>
      <description>A class of software-security-weakness-issues where independent researchers discover a software flaw before the owners of the code discover it. Zero-day, or 0-day in hacker slang, refers to the moment the race starts, on day zero, between network defenders who are trying to fix the flaw before hackers leverage it to cause damage. It is a race because on day zero, there is no known fix to the issue.</description>
      <pubDate>Tue, 24 Oct 2023 07:01:00 -0000</pubDate>
      <itunes:title>Encore: zero-day (adjective) [Word Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>2</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A class of software-security-weakness-issues where independent researchers discover a software flaw before the owners of the code discover it. Zero-day, or 0-day in hacker slang, refers to the moment the race starts, on day zero, between network defenders who are trying to fix the flaw before hackers leverage it to cause damage. It is a race because on day zero, there is no known fix to the issue.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A class of software-security-weakness-issues where independent researchers discover a software flaw before the owners of the code discover it. Zero-day, or 0-day in hacker slang, refers to the moment the race starts, on day zero, between network defenders who are trying to fix the flaw before hackers leverage it to cause damage. It is a race because on day zero, there is no known fix to the issue.</p>]]>
      </content:encoded>
      <itunes:duration>237</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[e9c78fe4-71be-11ee-bfae-57c4c5ee0b4b]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW6322992236.mp3?updated=1698077691" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Scoring cybersecurity in the NFL.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/262/notes</link>
      <description>Joe Oregon, Chief of Cybersecurity at CISA, sits down to discuss the tabletop exercise that CISA, the NFL, and local partners conducted in preparation for Super Bowl LVIII. Joe and Dave share some listener follow up from Rory who wirtes in to talk tin foil hats. Joe's story shares the interesting finds after conducting a cybersecurity survey at ISI. Dave's story follows the 77 year old woman, Marjorie Bloom, who ended up losing over $600,000, her whole lifes savings by falling for a common tech scam. Our catch of the day comes from listener Damien who writes in with an email from the "federal reserve bank of USA" to inform him that he has received a car with $16.7million attached to it and he needs to claim it.
Links to the stories:

How this 77-year-old widow lost $661,000 in a common tech scam: ‘I realized I had been defrauded of everything’

CISA, NFL, and Local Partners Conduct Cybersecurity Exercise in Preparation for Super Bowl LVIII


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com.</description>
      <pubDate>Thu, 19 Oct 2023 05:00:00 -0000</pubDate>
      <itunes:title>Scoring cybersecurity in the NFL.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>262</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Joe Oregon, Chief of Cybersecurity at CISA, sits down to discuss the tabletop exercise that CISA, the NFL, and local partners conducted in preparation for Super Bowl LVIII. Joe and Dave share some listener follow up from Rory who wirtes in to talk tin foil hats. Joe's story shares the interesting finds after conducting a cybersecurity survey at ISI. Dave's story follows the 77 year old woman, Marjorie Bloom, who ended up losing over $600,000, her whole lifes savings by falling for a common tech scam. Our catch of the day comes from listener Damien who writes in with an email from the "federal reserve bank of USA" to inform him that he has received a car with $16.7million attached to it and he needs to claim it.
Links to the stories:

How this 77-year-old widow lost $661,000 in a common tech scam: ‘I realized I had been defrauded of everything’

CISA, NFL, and Local Partners Conduct Cybersecurity Exercise in Preparation for Super Bowl LVIII


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Joe Oregon, Chief of Cybersecurity at CISA, sits down to discuss the tabletop exercise that CISA, the NFL, and local partners conducted in preparation for Super Bowl LVIII. Joe and Dave share some listener follow up from Rory who wirtes in to talk tin foil hats. Joe's story shares the interesting finds after conducting a cybersecurity survey at ISI. Dave's story follows the 77 year old woman, Marjorie Bloom, who ended up losing over $600,000, her whole lifes savings by falling for a common tech scam. Our catch of the day comes from listener Damien who writes in with an email from the "federal reserve bank of USA" to inform him that he has received a car with $16.7million attached to it and he needs to claim it.</p><p>Links to the stories:</p><ul>
<li><a href="https://www.cnbc.com/2023/10/08/how-one-retired-woman-lost-her-life-savings-in-a-common-elder-fraud-scheme.html">How this 77-year-old widow lost $661,000 in a common tech scam: ‘I realized I had been defrauded of everything’</a></li>
<li><a href="https://www.cisa.gov/news-events/news/cisa-nfl-and-local-partners-conduct-cybersecurity-exercise-preparation-super-bowl-lviii">CISA, NFL, and Local Partners Conduct Cybersecurity Exercise in Preparation for Super Bowl LVIII</a></li>
</ul><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a>.</p>]]>
      </content:encoded>
      <itunes:duration>3312</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[8986c784-7ff3-11ed-8345-43179dc147d7]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW3355097568.mp3?updated=1697644271" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>extended detection response (XDR) (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/160/notes</link>
      <description>A unified security incident detection and response platform that connects to multiple tools in the security stack via APIs, collects telemetry from each, and attempts to correlate that telemetry into a coherent threat picture.
CyberWire Glossary link: https://thecyberwire.com/glossary/extended-detection-and-response
Audio reference link: Film Major. 2022. Enemy of the State (1998) Faraday Cage HD Tony Scott; Will Smith, Gene Hackman Jon Voight [Video]. YouTube. URL https://www.youtube.com/watch?v=n3gy4otg-24</description>
      <pubDate>Tue, 17 Oct 2023 07:00:00 -0000</pubDate>
      <itunes:title>extended detection response (XDR) (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>160</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A unified security incident detection and response platform that connects to multiple tools in the security stack via APIs, collects telemetry from each, and attempts to correlate that telemetry into a coherent threat picture.
CyberWire Glossary link: https://thecyberwire.com/glossary/extended-detection-and-response
Audio reference link: Film Major. 2022. Enemy of the State (1998) Faraday Cage HD Tony Scott; Will Smith, Gene Hackman Jon Voight [Video]. YouTube. URL https://www.youtube.com/watch?v=n3gy4otg-24</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A unified security incident detection and response platform that connects to multiple tools in the security stack via APIs, collects telemetry from each, and attempts to correlate that telemetry into a coherent threat picture.</p><p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/extended-detection-and-response">https://thecyberwire.com/glossary/extended-detection-and-response</a></p><p>Audio reference link: Film Major. 2022. Enemy of the State (1998) Faraday Cage HD Tony Scott; Will Smith, Gene Hackman Jon Voight [Video]. YouTube. URL <a href="https://www.youtube.com/watch?v=n3gy4otg-24">https://www.youtube.com/watch?v=n3gy4otg-24</a></p>]]>
      </content:encoded>
      <itunes:duration>500</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b91eb8f4-71be-11ee-94a4-3f52d4542f66]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW9067732932.mp3?updated=1697474795" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Encore: Ways to make fraud less lucrative.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/221/notes</link>
      <description>Brett Johnson, Chief Criminal Officer at Arkose Labs, sits down with Dave to discuss his history &amp; ways to make fraud efforts less lucrative for bad actors. Dave and Joe share some listener follow up from Graham about one way that helps him stay safe against fake URLs. Dave's story is about bomb email attacks, in which someones email is spammed with hundreds to thousands of emails in hopes of hiding important information contained in one of the thousands of emails, perhaps from a financial institute. Joe's story is on how the FBI is warning the public to beware of tech support scammers and how they are targeting financial accounts using remote desktop software. Our catch of the day comes from listener Norman, who shares a story about how his Steam account got hijacked and how a hacker impersonating a Steam employee was trying to help him.
Links to stories:

New Registration Bomb Email Attack Distracts Victims of Financial Fraud

FBI Warns Public to Beware of Tech Support Scammers Targeting Financial Accounts Using Remote Desktop Software


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 12 Oct 2023 05:00:00 -0000</pubDate>
      <itunes:title>Encore: Ways to make fraud less lucrative.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>221</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Brett Johnson, Chief Criminal Officer at Arkose Labs, sits down with Dave to discuss his history &amp; ways to make fraud efforts less lucrative for bad actors. Dave and Joe share some listener follow up from Graham about one way that helps him stay safe against fake URLs. Dave's story is about bomb email attacks, in which someones email is spammed with hundreds to thousands of emails in hopes of hiding important information contained in one of the thousands of emails, perhaps from a financial institute. Joe's story is on how the FBI is warning the public to beware of tech support scammers and how they are targeting financial accounts using remote desktop software. Our catch of the day comes from listener Norman, who shares a story about how his Steam account got hijacked and how a hacker impersonating a Steam employee was trying to help him.
Links to stories:

New Registration Bomb Email Attack Distracts Victims of Financial Fraud

FBI Warns Public to Beware of Tech Support Scammers Targeting Financial Accounts Using Remote Desktop Software


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Brett Johnson, Chief Criminal Officer at Arkose Labs, sits down with Dave to discuss his history &amp; ways to make fraud efforts less lucrative for bad actors. Dave and Joe share some listener follow up from Graham about one way that helps him stay safe against fake URLs. Dave's story is about bomb email attacks, in which someones email is spammed with hundreds to thousands of emails in hopes of hiding important information contained in one of the thousands of emails, perhaps from a financial institute. Joe's story is on how the FBI is warning the public to beware of tech support scammers and how they are targeting financial accounts using remote desktop software. Our catch of the day comes from listener Norman, who shares a story about how his Steam account got hijacked and how a hacker impersonating a Steam employee was trying to help him.</p><p>Links to stories:</p><ul>
<li><a href="https://blackcloak.io/new-registration-bomb-email-attack-distracts-victims-of-financial-fraud/">New Registration Bomb Email Attack Distracts Victims of Financial Fraud</a></li>
<li><a href="https://www.fbi.gov/contact-us/field-offices/boston/news/press-releases/fbi-warns-public-to-beware-of-tech-support-scammers-targeting-financial-accounts-using-remote-desktop-software">FBI Warns Public to Beware of Tech Support Scammers Targeting Financial Accounts Using Remote Desktop Software</a></li>
</ul><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>3102</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[897202ae-7ff3-11ed-8345-9371ad62563c]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW1899034054.mp3?updated=1697043350" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Encore: social engineering (noun) </title>
      <link>https://thecyberwire.com/podcasts/word-notes/3/notes</link>
      <description>The art of convincing a person or persons to take an action that may or may not be in their best interests. Social engineering in some form or the other has been around since the beginning of time. The biblical story of Esau and Jacob might be considered one of the earliest written social engineering stories. As applied to cybersecurity, it usually involves hackers obtaining information illegitimately by deceiving or manipulating people who have legitimate access to that information. Common tactics involve phishing attacks and watering hole attacks.</description>
      <pubDate>Tue, 10 Oct 2023 05:00:00 -0000</pubDate>
      <itunes:title>Encore: social engineering (noun) </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>The art of convincing a person or persons to take an action that may or may not be in their best interests. Social engineering in some form or the other has been around since the beginning of time. The biblical story of Esau and Jacob might be considered one of the earliest written social engineering stories. As applied to cybersecurity, it usually involves hackers obtaining information illegitimately by deceiving or manipulating people who have legitimate access to that information. Common tactics involve phishing attacks and watering hole attacks.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The art of convincing a person or persons to take an action that may or may not be in their best interests. Social engineering in some form or the other has been around since the beginning of time. The biblical story of Esau and Jacob might be considered one of the earliest written social engineering stories. As applied to cybersecurity, it usually involves hackers obtaining information illegitimately by deceiving or manipulating people who have legitimate access to that information. Common tactics involve phishing attacks and watering hole attacks.</p>]]>
      </content:encoded>
      <itunes:duration>250</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[68cd3202-66b2-11ee-a8b4-c3b5a7c69f41]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW3436118892.mp3?updated=1696862962" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Encore: Is inflation affecting the Dark Web?</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/212/notes</link>
      <description>Dov Lerner, a Security Research Lead from Cybersixgill, sits down with Dave to discuss how inflation hasn't affected the Dark Web, including how the cratering of cryptocurrency may have affected things. Joe and Dave share some follow up from listener Pelle, who writes in about their grandmother who was scammed over the phone for her PIN, among other information, allowing the scammers to get away with much more than money. This week, Joe's story comes from a listener named Kyle, who shared an article about protecting against AiTM (adversary-in-the-middle) phishing techniques that bypass multi-factor authentication. Dave's story is about a new video being released that shares the most common WhatsApp scams and how to avoid them. Our catch of the day comes from listener Vlad, who shares his story regarding an email he received stating he is owed 1 million dollars, and how he's not falling for the scammer’s latest attempt.
Links to stories:

Protect against AiTM/ MFA phishing attacks using Microsoft technology

How to avoid the most common WhatsApp Scams 2022

WhatsApp Scams in 2022: What to Look out for


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 05 Oct 2023 05:00:00 -0000</pubDate>
      <itunes:title>Encore: Is inflation affecting the Dark Web?</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>212</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Dov Lerner, a Security Research Lead from Cybersixgill, sits down with Dave to discuss how inflation hasn't affected the Dark Web, including how the cratering of cryptocurrency may have affected things. Joe and Dave share some follow up from listener Pelle, who writes in about their grandmother who was scammed over the phone for her PIN, among other information, allowing the scammers to get away with much more than money. This week, Joe's story comes from a listener named Kyle, who shared an article about protecting against AiTM (adversary-in-the-middle) phishing techniques that bypass multi-factor authentication. Dave's story is about a new video being released that shares the most common WhatsApp scams and how to avoid them. Our catch of the day comes from listener Vlad, who shares his story regarding an email he received stating he is owed 1 million dollars, and how he's not falling for the scammer’s latest attempt.
Links to stories:

Protect against AiTM/ MFA phishing attacks using Microsoft technology

How to avoid the most common WhatsApp Scams 2022

WhatsApp Scams in 2022: What to Look out for


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Dov Lerner, a Security Research Lead from Cybersixgill, sits down with Dave to discuss how inflation hasn't affected the Dark Web, including how the cratering of cryptocurrency may have affected things. Joe and Dave share some follow up from listener Pelle, who writes in about their grandmother who was scammed over the phone for her PIN, among other information, allowing the scammers to get away with much more than money. This week, Joe's story comes from a listener named Kyle, who shared an article about protecting against AiTM (adversary-in-the-middle) phishing techniques that bypass multi-factor authentication. Dave's story is about a new video being released that shares the most common WhatsApp scams and how to avoid them. Our catch of the day comes from listener Vlad, who shares his story regarding an email he received stating he is owed 1 million dollars, and how he's not falling for the scammer’s latest attempt.</p><p>Links to stories:</p><ul>
<li><a href="https://jeffreyappel.nl/protect-against-aitm-mfa-phishing-attacks-using-microsoft-technology/">Protect against AiTM/ MFA phishing attacks using Microsoft technology</a></li>
<li><a href="https://www.youtube.com/watch?v=6xejzya19yE&amp;t=404s">How to avoid the most common WhatsApp Scams 2022</a></li>
<li><a href="https://www.tripwire.com/state-of-security/security-data-protection/cyber-security/whatsapp-scams-what-to-look-out-for/">WhatsApp Scams in 2022: What to Look out for</a></li>
</ul><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>3126</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[895d7230-7ff3-11ed-8345-8b49c1056b05]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW7310880266.mp3?updated=1696435144" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>joint cyber defense collaborative (JCDC) (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/159/notes</link>
      <description>A cyber information-sharing U.S. Government organization designed to foster the public-private partnership.
CyberWire Glossary link: https://thecyberwire.com/glossary/joint-cyber-defense-collaborative
Audio reference link: Jen Easterly. 2021. CISA Director Addresses the National Technology Security Coalition [Video]. YouTube. URL https://www.youtube.com/watch?v=ucb1FQXqsao</description>
      <pubDate>Tue, 03 Oct 2023 07:00:00 -0000</pubDate>
      <itunes:title>joint cyber defense collaborative (JCDC) (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>159</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A cyber information-sharing U.S. Government organization designed to foster the public-private partnership.
CyberWire Glossary link: https://thecyberwire.com/glossary/joint-cyber-defense-collaborative
Audio reference link: Jen Easterly. 2021. CISA Director Addresses the National Technology Security Coalition [Video]. YouTube. URL https://www.youtube.com/watch?v=ucb1FQXqsao</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A cyber information-sharing U.S. Government organization designed to foster the public-private partnership.</p><p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/joint-cyber-defense-collaborative">https://thecyberwire.com/glossary/joint-cyber-defense-collaborative</a></p><p>Audio reference link: Jen Easterly. 2021. CISA Director Addresses the National Technology Security Coalition [Video]. YouTube. URL <a href="https://www.youtube.com/watch?v=ucb1FQXqsao">https://www.youtube.com/watch?v=ucb1FQXqsao</a></p>]]>
      </content:encoded>
      <itunes:duration>445</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[2a5ea1c8-613e-11ee-baed-876a3e261066]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW3335313766.mp3?updated=1696261721" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Stealing your car's identity.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/261/notes</link>
      <description>This week our guest is, Sam Crowther, Kasada CEO, he's sharing his team's findings on "Stolen Auto Accounts: The $2 Price Tag on Your Car’s Identity." Joe and Dave share some listener follow up from Steve who writes in sharing an email he thought to be a scam, but turned out it was real. Listener Derek writes in with a question regarding AI and phishing emails. Joe's story comes from Proofpoint as they share their 2023 State of the Phish report. Dave's story follows an email that was sent out saying that the receiver has had a sexually explicit video leaked to an adults-only website, and to remove the video in question from the site, the receiver can send $200. Our catch of the day comes from listener Tony who writes in to share an email he and his school received claiming that the person who sent the email found pornographic material on the schools website.
Links to follow-up and stories:

2023 State of the Phish

Yikes! My sex video has been uploaded to YouPorn, apparently


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 28 Sep 2023 05:00:00 -0000</pubDate>
      <itunes:title>Stealing your cars identity.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>251</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>This week our guest is, Sam Crowther, Kasada CEO, he's sharing his team's findings on "Stolen Auto Accounts: The $2 Price Tag on Your Car’s Identity." Joe and Dave share some listener follow up from Steve who writes in sharing an email he thought to be a scam, but turned out it was real. Listener Derek writes in with a question regarding AI and phishing emails. Joe's story comes from Proofpoint as they share their 2023 State of the Phish report. Dave's story follows an email that was sent out saying that the receiver has had a sexually explicit video leaked to an adults-only website, and to remove the video in question from the site, the receiver can send $200. Our catch of the day comes from listener Tony who writes in to share an email he and his school received claiming that the person who sent the email found pornographic material on the schools website.
Links to follow-up and stories:

2023 State of the Phish

Yikes! My sex video has been uploaded to YouPorn, apparently


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This week our guest is, Sam Crowther, Kasada CEO, he's sharing his team's findings on "Stolen Auto Accounts: The $2 Price Tag on Your Car’s Identity." Joe and Dave share some listener follow up from Steve who writes in sharing an email he thought to be a scam, but turned out it was real. Listener Derek writes in with a question regarding AI and phishing emails. Joe's story comes from Proofpoint as they share their 2023 State of the Phish report. Dave's story follows an email that was sent out saying that the receiver has had a sexually explicit video leaked to an adults-only website, and to remove the video in question from the site, the receiver can send $200. Our catch of the day comes from listener Tony who writes in to share an email he and his school received claiming that the person who sent the email found pornographic material on the schools website.</p><p>Links to follow-up and stories:</p><ul>
<li><a href="https://www.proofpoint.com/us/resources/threat-reports/state-of-phish">2023 State of the Phish</a></li>
<li><a href="https://grahamcluley.com/xxx-video-youporn-warning/">Yikes! My sex video has been uploaded to YouPorn, apparently</a></li>
</ul><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>3530</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[29c58724-e856-11ed-8ec9-6b39f40b2881]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW8222951659.mp3?updated=1695834157" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Encore: penetration test (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/4/notes</link>
      <description>The process of evaluating the security of a system or network by simulating an attack on it. Sometimes called "ethical hacking" or white hat hacking. The phrase started to appear in U.S. military circles in the mid 1960s as time sharing computers became more necessary for daily operations. Computer security experts from Rand Corporation began describing computer compromises as “penetrations.” By the early 1970s, government leaders formed tiger teams of penetration testers to probe for weaknesses in various government systems.</description>
      <pubDate>Tue, 26 Sep 2023 07:00:00 -0000</pubDate>
      <itunes:title>Encore: penetration test (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>4</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>The process of evaluating the security of a system or network by simulating an attack on it. Sometimes called "ethical hacking" or white hat hacking. The phrase started to appear in U.S. military circles in the mid 1960s as time sharing computers became more necessary for daily operations. Computer security experts from Rand Corporation began describing computer compromises as “penetrations.” By the early 1970s, government leaders formed tiger teams of penetration testers to probe for weaknesses in various government systems.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The process of evaluating the security of a system or network by simulating an attack on it. Sometimes called "ethical hacking" or white hat hacking. The phrase started to appear in U.S. military circles in the mid 1960s as time sharing computers became more necessary for daily operations. Computer security experts from Rand Corporation began describing computer compromises as “penetrations.” By the early 1970s, government leaders formed tiger teams of penetration testers to probe for weaknesses in various government systems.</p>]]>
      </content:encoded>
      <itunes:duration>248</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[7b31360c-5bbb-11ee-ad67-7342d2586717]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW2888129217.mp3?updated=1695656880" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Rooting vs routing. [Hacking Humans Goes to the Movies]</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans-goes-to-the-movies/22/notes</link>
      <description>Thanks for joining us again for another episode of fun project brought to you by the team of Hacking Humans, the CyberWire's social engineering podcast. Hacking Humans co-host Dave Bittner is joined by Rick Howard in this series where they view clips from their favorite movies and television shows with examples of the social engineering scams and schemes you hear Dave and co-host Joe Carrigan talk about on Hacking Humans. In this episode, Dave and Rick watch each of the selected scenes, describe the on-screen action for you, and then they deconstruct what they saw. Grab your bowl of popcorn and join us for some fantastic scams and frauds.
Links to this episode's clips if you'd like to watch along:

Dave's clip from the movie: Matchstick Men


Rick's clip from the movie: Mr. Robot</description>
      <pubDate>Sun, 24 Sep 2023 07:00:00 -0000</pubDate>
      <itunes:title>Rooting vs routing. [Hacking Humans Goes to the Movies]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>22</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Thanks for joining us again for another episode of fun project brought to you by the team of Hacking Humans, the CyberWire's social engineering podcast. Hacking Humans co-host Dave Bittner is joined by Rick Howard in this series where they view clips from their favorite movies and television shows with examples of the social engineering scams and schemes you hear Dave and co-host Joe Carrigan talk about on Hacking Humans. In this episode, Dave and Rick watch each of the selected scenes, describe the on-screen action for you, and then they deconstruct what they saw. Grab your bowl of popcorn and join us for some fantastic scams and frauds.
Links to this episode's clips if you'd like to watch along:

Dave's clip from the movie: Matchstick Men


Rick's clip from the movie: Mr. Robot</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Thanks for joining us again for another episode of fun project brought to you by the team of Hacking Humans, the CyberWire's social engineering podcast. Hacking Humans co-host Dave Bittner is joined by Rick Howard in this series where they view clips from their favorite movies and television shows with examples of the social engineering scams and schemes you hear Dave and co-host Joe Carrigan talk about on Hacking Humans. In this episode, Dave and Rick watch each of the selected scenes, describe the on-screen action for you, and then they deconstruct what they saw. Grab your bowl of popcorn and join us for some fantastic scams and frauds.</p><p>Links to this episode's clips if you'd like to watch along:</p><ul>
<li>Dave's clip from the movie: <a href="https://www.youtube.com/watch?v=GwQdBsTpmOM">Matchstick Men</a>
</li>
<li>Rick's clip from the movie: <a href="https://www.youtube.com/watch?v=r1z5y8mMi6M">Mr. Robot</a>
</li>
</ul>]]>
      </content:encoded>
      <itunes:duration>1690</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[ddb54820-5983-11ee-8c3f-e33b79e21eeb]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW3801003090.mp3?updated=1695414242" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Hackers play the evasion game. </title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/260/notes</link>
      <description>This week our guest is, John Hammond from Huntress and he sits down to talk about spoofing and evasion techniques used by hackers. Dave and Joe share a bit of follow up, including a question form listener John who writes in asking about a passkey discussion in the last episode. Joe has a story from Reddit this week, where someone posted about a dispute they are having with their wedding caterer, where the company is saying the couple still owes them over $5,000 after the wedding has happened for umbrellas, the person posting wants to know what they should do about this argument. Dave's story is from Retool, where they are warning customers after an employee of theirs fell victim to a phishing scheme through SMS. Our catch of the day comes from the University of Alabama department of engineering, where the receiver of a suspicious looking email is being "sued" after owing $300 and not paying it back.
Links to follow-up and stories:

Accelerating the Availability of Simpler, Stronger Passwordless Sign-Ins

When MFA isn't actually MFA

Wedding caterer charging us $5,000 post-wedding for their accountant’s error


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 21 Sep 2023 05:00:00 -0000</pubDate>
      <itunes:title>Hackers play the evasion game. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>260</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>This week our guest is, John Hammond from Huntress and he sits down to talk about spoofing and evasion techniques used by hackers. Dave and Joe share a bit of follow up, including a question form listener John who writes in asking about a passkey discussion in the last episode. Joe has a story from Reddit this week, where someone posted about a dispute they are having with their wedding caterer, where the company is saying the couple still owes them over $5,000 after the wedding has happened for umbrellas, the person posting wants to know what they should do about this argument. Dave's story is from Retool, where they are warning customers after an employee of theirs fell victim to a phishing scheme through SMS. Our catch of the day comes from the University of Alabama department of engineering, where the receiver of a suspicious looking email is being "sued" after owing $300 and not paying it back.
Links to follow-up and stories:

Accelerating the Availability of Simpler, Stronger Passwordless Sign-Ins

When MFA isn't actually MFA

Wedding caterer charging us $5,000 post-wedding for their accountant’s error


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This week our guest is, John Hammond from Huntress and he sits down to talk about spoofing and evasion techniques used by hackers. Dave and Joe share a bit of follow up, including a question form listener John who writes in asking about a passkey discussion in the last episode. Joe has a story from Reddit this week, where someone posted about a dispute they are having with their wedding caterer, where the company is saying the couple still owes them over $5,000 after the wedding has happened for umbrellas, the person posting wants to know what they should do about this argument. Dave's story is from Retool, where they are warning customers after an employee of theirs fell victim to a phishing scheme through SMS. Our catch of the day comes from the University of Alabama department of engineering, where the receiver of a suspicious looking email is being "sued" after owing $300 and not paying it back.</p><p>Links to follow-up and stories:</p><ul>
<li><a href="https://fidoalliance.org/passkeys/">Accelerating the Availability of Simpler, Stronger Passwordless Sign-Ins</a></li>
<li><a href="https://retool.com/blog/mfa-isnt-mfa/">When MFA isn't actually MFA</a></li>
<li><a href="https://www.reddit.com/r/legaladvice/comments/16dn5rp/wedding_caterer_charging_us_5000_postwedding_for/?rdt=62691">Wedding caterer charging us $5,000 post-wedding for their accountant’s error</a></li>
</ul><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>3226</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[89497424-7ff3-11ed-8345-f796832162b7]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW8453715571.mp3?updated=1695413716" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Cloud Security Posture Management (CSPM) (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/158/notes</link>
      <description>Tools that automate the identification and remediation of cloud misconfigurations. 
CyberWire Glossary link: https://thecyberwire.com/glossary/cloud-security-posture-management
Audio reference link: Josh Whedon. 2005. Serenity [Movie]. IMDb. URL https://www.imdb.com/title/tt0379786/</description>
      <pubDate>Tue, 19 Sep 2023 07:00:00 -0000</pubDate>
      <itunes:title>Cloud Security Posture Management (CSPM) (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>158</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Tools that automate the identification and remediation of cloud misconfigurations. 
CyberWire Glossary link: https://thecyberwire.com/glossary/cloud-security-posture-management
Audio reference link: Josh Whedon. 2005. Serenity [Movie]. IMDb. URL https://www.imdb.com/title/tt0379786/</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Tools that automate the identification and remediation of cloud misconfigurations. </p><p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/cloud-security-posture-management">https://thecyberwire.com/glossary/cloud-security-posture-management</a></p><p>Audio reference link: Josh Whedon. 2005. Serenity [Movie]. IMDb. URL <a href="https://www.imdb.com/title/tt0379786/">https://www.imdb.com/title/tt0379786/</a></p>]]>
      </content:encoded>
      <itunes:duration>438</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[842f3a1a-58b4-11ee-9a94-c7975a8d5eaa]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW1465161284.mp3?updated=1695060926" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The online dating world is a jungle. </title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/259/notes</link>
      <description>Andrew Hendel, CEO at Marshmallo, joins to share tips to safeguard your feelings and identity in the online dating world. Dave and Joe share some listener follow up from Gareth, who writes in to discuss strange emails he has been receiving. Dave's story follows a woman who was spared jail time after being manipulated by hackers into money laundering. Joe's story is from listener Doug who wrote in to the show to talk about the site he is in charge of and discusses a website he uses called "Buy me a coffee," where his viewers can buy him a coffee, and how he has been experiencing some weird instances with the payment methods of that website. Our catch of the day comes from listener Brandyon who shares an interesting way he was offered to make $600 a week.
Links to follow-up and stories:
Woman 'manipulated' by hackers into money laundering

Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 14 Sep 2023 05:00:00 -0000</pubDate>
      <itunes:title>The online dating world is a jungle. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>259</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Andrew Hendel, CEO at Marshmallo, joins to share tips to safeguard your feelings and identity in the online dating world. Dave and Joe share some listener follow up from Gareth, who writes in to discuss strange emails he has been receiving. Dave's story follows a woman who was spared jail time after being manipulated by hackers into money laundering. Joe's story is from listener Doug who wrote in to the show to talk about the site he is in charge of and discusses a website he uses called "Buy me a coffee," where his viewers can buy him a coffee, and how he has been experiencing some weird instances with the payment methods of that website. Our catch of the day comes from listener Brandyon who shares an interesting way he was offered to make $600 a week.
Links to follow-up and stories:
Woman 'manipulated' by hackers into money laundering

Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Andrew Hendel, CEO at Marshmallo, joins to share tips to safeguard your feelings and identity in the online dating world. Dave and Joe share some listener follow up from Gareth, who writes in to discuss strange emails he has been receiving. Dave's story follows a woman who was spared jail time after being manipulated by hackers into money laundering. Joe's story is from listener Doug who wrote in to the show to talk about the site he is in charge of and discusses a website he uses called "Buy me a coffee," where his viewers can buy him a coffee, and how he has been experiencing some weird instances with the payment methods of that website. Our catch of the day comes from listener Brandyon who shares an interesting way he was offered to make $600 a week.</p><p>Links to follow-up and stories:</p><ul><li><a href="https://au.news.yahoo.com/woman-manipulated-hackers-money-laundering-034832276.html?guccounter=1&amp;guce_referrer=aHR0cHM6Ly93d3cuZ29vZ2xlLmNvbS8&amp;guce_referrer_sig=AQAAACoO7q4vRhd33ftG3Ak2pN42Aw23uyziwT35V0ggRRHVx1EEkH46nZkEOoHn8vaeSYg_8jknuCkpTYYilp5WPyGjngMUZAO_VtrltdU4LNsMCULF_RUqpv98tSe5S0GDER8kHHa_1Rmpyjh9fRrbJSPr9Kr5IIxrlLLzbAYFn6Gv">Woman 'manipulated' by hackers into money laundering</a></li></ul><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>3000</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[8930b790-7ff3-11ed-8345-4f7f3e1e16a8]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW4945762083.mp3?updated=1694712738" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Encore: The Bombe (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/5/notes</link>
      <description>An electro-mechanical device used to break Enigma-enciphered messages about enemy military operations during the Second World War. The first bombe–named Victory and designed by Alan Turning and Gordon Welchman– started code-breaking at Bletchley Park on 14 March 1940, a year after WWII began. By the end of the war, five years later, almost 2000, mostly women, sailors and airmen operated 211 bombe machines in the effort. The allies essentially knew what the German forces were going to do before the German commanders in the field knew. Historians speculate that the effort at Bletchley Park shortened the war by years and estimate the number of lives saved to be between 14 and 21 million.</description>
      <pubDate>Tue, 12 Sep 2023 07:00:00 -0000</pubDate>
      <itunes:title>Encore: The Bombe (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>5</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>An electro-mechanical device used to break Enigma-enciphered messages about enemy military operations during the Second World War. The first bombe–named Victory and designed by Alan Turning and Gordon Welchman– started code-breaking at Bletchley Park on 14 March 1940, a year after WWII began. By the end of the war, five years later, almost 2000, mostly women, sailors and airmen operated 211 bombe machines in the effort. The allies essentially knew what the German forces were going to do before the German commanders in the field knew. Historians speculate that the effort at Bletchley Park shortened the war by years and estimate the number of lives saved to be between 14 and 21 million.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>An electro-mechanical device used to break Enigma-enciphered messages about enemy military operations during the Second World War. The first bombe–named Victory and designed by Alan Turning and Gordon Welchman– started code-breaking at Bletchley Park on 14 March 1940, a year after WWII began. By the end of the war, five years later, almost 2000, mostly women, sailors and airmen operated 211 bombe machines in the effort. The allies essentially knew what the German forces were going to do before the German commanders in the field knew. Historians speculate that the effort at Bletchley Park shortened the war by years and estimate the number of lives saved to be between 14 and 21 million.</p>]]>
      </content:encoded>
      <itunes:duration>255</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[1f868f2c-4e6a-11ee-bbea-238940ff1fd8]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW6428327849.mp3?updated=1694193079" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Passkeys: consumer-friendly password killers?</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/258/notes</link>
      <description>Guest Chris Sherwood, owner of Crosstalk Solutions, joins Dave to talk about passkeys. Joe shares some listener follow-up about "revert" and side-loading applications on Android phones. Joe's story came from a listener named Kyle who sent this as a Catch of the Day (COTD) about a phishing scam email conversation about event sponsorship. Dave discusses something he saw on Mastodon from user Bjorn about some fraudulent bank charges and stopping a scam in process. Our COTD is from listener Alec about a potential dating scam offering over Instagram.
Links to follow-up and stories:


Follow-up on side-loading applications (Note, we do not recommend you install any of these applications.) 



Mastodon thread about social engineering involving fraudulent banking charges.

Chris Sherwood's passkey explainer video on YouTube



Passkeys directory website


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 07 Sep 2023 05:00:00 -0000</pubDate>
      <itunes:title>Passkeys: consumer-friendly password killers?</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>258</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Guest Chris Sherwood, owner of Crosstalk Solutions, joins Dave to talk about passkeys. Joe shares some listener follow-up about "revert" and side-loading applications on Android phones. Joe's story came from a listener named Kyle who sent this as a Catch of the Day (COTD) about a phishing scam email conversation about event sponsorship. Dave discusses something he saw on Mastodon from user Bjorn about some fraudulent bank charges and stopping a scam in process. Our COTD is from listener Alec about a potential dating scam offering over Instagram.
Links to follow-up and stories:


Follow-up on side-loading applications (Note, we do not recommend you install any of these applications.) 



Mastodon thread about social engineering involving fraudulent banking charges.

Chris Sherwood's passkey explainer video on YouTube



Passkeys directory website


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Guest Chris Sherwood, owner of Crosstalk Solutions, joins Dave to talk about passkeys. Joe shares some listener follow-up about "revert" and side-loading applications on Android phones. Joe's story came from a listener named Kyle who sent this as a Catch of the Day (COTD) about a phishing scam email conversation about event sponsorship. Dave discusses something he saw on Mastodon from user Bjorn about some fraudulent bank charges and stopping a scam in process. Our COTD is from listener Alec about a potential dating scam offering over Instagram.</p><p>Links to follow-up and stories:</p><ul>
<li>
<a href="https://www.google.com/search?q=site%3Asites.google.com++%22apk%22+%22free%22">Follow-up on side-loading applications</a> <em>(Note, we do not recommend you install any of these applications.) </em>
</li>
<li>
<a href="https://social.coop/@BjornToftMadsen/110971514208956658">Mastodon thread about social engineering</a> involving fraudulent banking charges.</li>
<li>Chris Sherwood's <a href="https://www.youtube.com/watch?v=FTweNDAc9Fs">passkey explainer video on YouTube</a>
</li>
<li>
<a href="https://passkeys.directory/">Passkeys directory</a> website</li>
</ul><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>2803</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[891be84c-7ff3-11ed-8345-c7174bc7a23c]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW3344226060.mp3?updated=1693857211" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>single sign-on (SSO) (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/157/notes</link>
      <description>A session and user authentication Zero Trust tactic that allows a user to access multiple applications with one set of login credentials.
CyberWire Glossary link: https://thecyberwire.com/glossary/single-sign-on
Audio reference link: English, J., 2020. What is Single Sign-On (SSO)? SSO Benefits and Risks [Video]. YouTube. URL https://www.youtube.com/watch?v=YvHmP2WyBVY</description>
      <pubDate>Tue, 05 Sep 2023 07:00:00 -0000</pubDate>
      <itunes:title>Single sign-on (SSO) (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>157</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A session and user authentication Zero Trust tactic that allows a user to access multiple applications with one set of login credentials.
CyberWire Glossary link: https://thecyberwire.com/glossary/single-sign-on
Audio reference link: English, J., 2020. What is Single Sign-On (SSO)? SSO Benefits and Risks [Video]. YouTube. URL https://www.youtube.com/watch?v=YvHmP2WyBVY</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A session and user authentication Zero Trust tactic that allows a user to access multiple applications with one set of login credentials.</p><p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/single-sign-on">https://thecyberwire.com/glossary/single-sign-on</a></p><p>Audio reference link: English, J., 2020. What is Single Sign-On (SSO)? SSO Benefits and Risks [Video]. YouTube. URL <a href="https://www.youtube.com/watch?v=YvHmP2WyBVY">https://www.youtube.com/watch?v=YvHmP2WyBVY</a></p>]]>
      </content:encoded>
      <itunes:duration>500</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[fa6c3200-48e2-11ee-a872-b3ea1749d9c8]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW9277284627.mp3?updated=1693936036" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Exercise caution: online shopping edition.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/257/notes</link>
      <description>Oren Koren, CPO and Co-Founder of Veriti, is discussing the need for vigilance and caution when navigating the online shopping landscape. Dave and Joe share quite a bit of listener follow up, one listener writes in for some clarification on the "AI versus AI" episode regarding Google giving their source code so they can do business in China, when in fact it was 2 other companies. Listener Miguel brings our next bit of follow up, he writes in to discuss financial crimes and shares a story based on a story shared on the show. Our last piece of follow up is from listener Will, who shares a way to expand your website links the best way that works for him. Dave's got the story on an Amazon ad in Google search that looks so real, it's been scamming people redirecting visitors to a Microsoft Defender tech support scam that locks up their browser, the one that Dave had to help his father with a couple weeks back. Joe's story follows a Cambridge shed builder who thought he was getting an award, when in fact all he got was a scam. Our catch of the day comes from the European union agency for cybersecurity that received a suspicious looking email from Ebay.
Links to stories:

Sneaky Amazon Google ad leads to Microsoft support scam

Cambridge shed builder thought he was getting an award, but it was a vanity scam


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 31 Aug 2023 05:00:00 -0000</pubDate>
      <itunes:title>Exercise caution: online shopping edition.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>257</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Oren Koren, CPO and Co-Founder of Veriti, is discussing the need for vigilance and caution when navigating the online shopping landscape. Dave and Joe share quite a bit of listener follow up, one listener writes in for some clarification on the "AI versus AI" episode regarding Google giving their source code so they can do business in China, when in fact it was 2 other companies. Listener Miguel brings our next bit of follow up, he writes in to discuss financial crimes and shares a story based on a story shared on the show. Our last piece of follow up is from listener Will, who shares a way to expand your website links the best way that works for him. Dave's got the story on an Amazon ad in Google search that looks so real, it's been scamming people redirecting visitors to a Microsoft Defender tech support scam that locks up their browser, the one that Dave had to help his father with a couple weeks back. Joe's story follows a Cambridge shed builder who thought he was getting an award, when in fact all he got was a scam. Our catch of the day comes from the European union agency for cybersecurity that received a suspicious looking email from Ebay.
Links to stories:

Sneaky Amazon Google ad leads to Microsoft support scam

Cambridge shed builder thought he was getting an award, but it was a vanity scam


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Oren Koren, CPO and Co-Founder of Veriti, is discussing the need for vigilance and caution when navigating the online shopping landscape. Dave and Joe share quite a bit of listener follow up, one listener writes in for some clarification on the "AI versus AI" episode regarding Google giving their source code so they can do business in China, when in fact it was 2 other companies. Listener Miguel brings our next bit of follow up, he writes in to discuss financial crimes and shares a story based on a story shared on the show. Our last piece of follow up is from listener Will, who shares a way to expand your website links the best way that works for him. Dave's got the story on an Amazon ad in Google search that looks so real, it's been scamming people redirecting visitors to a Microsoft Defender tech support scam that locks up their browser, the one that Dave had to help his father with a couple weeks back. Joe's story follows a Cambridge shed builder who thought he was getting an award, when in fact all he got was a scam. Our catch of the day comes from the European union agency for cybersecurity that received a suspicious looking email from Ebay.</p><p>Links to stories:</p><ul>
<li><a href="https://www.bleepingcomputer.com/news/security/sneaky-amazon-google-ad-leads-to-microsoft-support-scam/">Sneaky Amazon Google ad leads to Microsoft support scam</a></li>
<li><a href="https://www.cbsnews.com/boston/news/cambridge-craftsman-business-owner-kevin-richard-warns-about-award-vanity-scam/">Cambridge shed builder thought he was getting an award, but it was a vanity scam</a></li>
</ul><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>3325</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[890722d6-7ff3-11ed-8345-eb0e2e54374b]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW2567242589.mp3?updated=1693407605" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Encore: cross-site scripting (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/6/notes</link>
      <description>From the intrusion kill chain model, a malicious code delivery technique that allows hackers to send code of their choosing to their victim’s browser. XSS takes advantage of the fact that roughly 90% of web developers use the JavaScript scripting language to create dynamic content on their websites. Through various methods, hackers store their own malicious javascript code on unprotected websites. When the victim browses the site, the web server delivers that malicious code to the victim’s computer and the victim’s browser runs the code.</description>
      <pubDate>Tue, 29 Aug 2023 07:00:00 -0000</pubDate>
      <itunes:title>Encore: cross-site scripting (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>6</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>From the intrusion kill chain model, a malicious code delivery technique that allows hackers to send code of their choosing to their victim’s browser. XSS takes advantage of the fact that roughly 90% of web developers use the JavaScript scripting language to create dynamic content on their websites. Through various methods, hackers store their own malicious javascript code on unprotected websites. When the victim browses the site, the web server delivers that malicious code to the victim’s computer and the victim’s browser runs the code.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>From the intrusion kill chain model, a malicious code delivery technique that allows hackers to send code of their choosing to their victim’s browser. XSS takes advantage of the fact that roughly 90% of web developers use the JavaScript scripting language to create dynamic content on their websites. Through various methods, hackers store their own malicious javascript code on unprotected websites. When the victim browses the site, the web server delivers that malicious code to the victim’s computer and the victim’s browser runs the code.</p>]]>
      </content:encoded>
      <itunes:duration>226</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[f34c12b0-45b3-11ee-9c32-1be93e45dc38]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW6079082466.mp3?updated=1693235194" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Hunting the hackers.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/256/notes</link>
      <description>Selena Larson and Tim Utzig discussing research titled "Twitter Scammers Stole $1,000 From My Friend—So I Hunted Them Down." Joe and Dave share a bit of follow up this week, they discuss Hawaii fire scams, and listener Steve writes in regarding some comments about the recent scammer quiz Joe and Dave took, lastly listener John writes in and shares his thoughts on a discussion a couple weeks ago regarding Google Maps. Joe has two stories this week, one is regarding how Joe was close to being scammed by a fake website, the second story is from listener George who wrote in this week sharing about the Bank of Ireland and the latest banking scam causing a technical issue tricking people into thinking they had money, when they really didn't. Dave's story is from the FBI, on a new scam where people are being tricked through mobile beta-testing applications. Our catch of the day comes from listener Richard, who writes in with "a new tip on Crypto."
Links to stories:

Bank of Ireland glitch let customers withdraw money they didn’t have

Cyber Criminals Targeting Victims through Mobile Beta-Testing Applications


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 24 Aug 2023 05:00:00 -0000</pubDate>
      <itunes:title>Hunting the hackers.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>256</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Selena Larson and Tim Utzig discussing research titled "Twitter Scammers Stole $1,000 From My Friend—So I Hunted Them Down." Joe and Dave share a bit of follow up this week, they discuss Hawaii fire scams, and listener Steve writes in regarding some comments about the recent scammer quiz Joe and Dave took, lastly listener John writes in and shares his thoughts on a discussion a couple weeks ago regarding Google Maps. Joe has two stories this week, one is regarding how Joe was close to being scammed by a fake website, the second story is from listener George who wrote in this week sharing about the Bank of Ireland and the latest banking scam causing a technical issue tricking people into thinking they had money, when they really didn't. Dave's story is from the FBI, on a new scam where people are being tricked through mobile beta-testing applications. Our catch of the day comes from listener Richard, who writes in with "a new tip on Crypto."
Links to stories:

Bank of Ireland glitch let customers withdraw money they didn’t have

Cyber Criminals Targeting Victims through Mobile Beta-Testing Applications


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Selena Larson and Tim Utzig discussing research titled "Twitter Scammers Stole $1,000 From My Friend—So I Hunted Them Down." Joe and Dave share a bit of follow up this week, they discuss Hawaii fire scams, and listener Steve writes in regarding some comments about the recent scammer quiz Joe and Dave took, lastly listener John writes in and shares his thoughts on a discussion a couple weeks ago regarding Google Maps. Joe has two stories this week, one is regarding how Joe was close to being scammed by a fake website, the second story is from listener George who wrote in this week sharing about the Bank of Ireland and the latest banking scam causing a technical issue tricking people into thinking they had money, when they really didn't. Dave's story is from the FBI, on a new scam where people are being tricked through mobile beta-testing applications. Our catch of the day comes from listener Richard, who writes in with "a new tip on Crypto."</p><p>Links to stories:</p><ul>
<li><a href="https://www.theguardian.com/business/2023/aug/16/bank-of-ireland-apologises-after-it-glitch-let-customers-withdraw-money-they-didnt-have">Bank of Ireland glitch let customers withdraw money they didn’t have</a></li>
<li><a href="https://www.ic3.gov/Media/Y2023/PSA230814">Cyber Criminals Targeting Victims through Mobile Beta-Testing Applications</a></li>
</ul><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>3006</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[88f20ed2-7ff3-11ed-8345-53efb95065d4]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW3207459238.mp3?updated=1727719315" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Encore: credential stealing (verb) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/7/notes</link>
      <description>From the intrusion kill chain model, the first part of an exploitation technique where the hacker tricks their victims into revealing their login credentials. In the second part of the technique, hackers legitimately log into the targeted system and gain access to the underlying network with the same permissions as the victim. Hackers use this method 80% of the time compared to other ways to gain access to a system like developing zero day exploits for known software packages. The most common way hackers steal credentials is with some version of a phishing attack.</description>
      <pubDate>Tue, 22 Aug 2023 07:00:00 -0000</pubDate>
      <itunes:title>Encore: credential stealing (verb) [Word Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>7</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>From the intrusion kill chain model, the first part of an exploitation technique where the hacker tricks their victims into revealing their login credentials. In the second part of the technique, hackers legitimately log into the targeted system and gain access to the underlying network with the same permissions as the victim. Hackers use this method 80% of the time compared to other ways to gain access to a system like developing zero day exploits for known software packages. The most common way hackers steal credentials is with some version of a phishing attack.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>From the intrusion kill chain model, the first part of an exploitation technique where the hacker tricks their victims into revealing their login credentials. In the second part of the technique, hackers legitimately log into the targeted system and gain access to the underlying network with the same permissions as the victim. Hackers use this method 80% of the time compared to other ways to gain access to a system like developing zero day exploits for known software packages. The most common way hackers steal credentials is with some version of a phishing attack.</p>]]>
      </content:encoded>
      <itunes:duration>229</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[d0a7ea1a-45b1-11ee-bab8-bb17a4872d76]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW1291478353.mp3?updated=1693234264" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>AI versus AI. </title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/255/notes</link>
      <description>Blair Cohen from AuthenticID joins Dave to discuss how generative AI and authentication go hand in hand. Joe and Dave share some follow up from listener Robert who discusses an ad for a device that uses ChatGPT to record phone calls on your device. Dave helps his dad out with his computer and shares the tale. Dave also shares a story this week on the FBI warning against scammers who are posing as NFT devs to try and steal your crypto. Joe and Dave test their scammer catching skills while taking a test to see if they are smarter than the average scammer. Our catch of the day comes from listener Steve who writes in to share a receipt he received that looked quite suspicious.
Links to stories:

FBI warns of scammers posing as NFT devs to steal your crypto

Are you smarter than a scammer? Play this game.


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 17 Aug 2023 05:00:00 -0000</pubDate>
      <itunes:title>AI versus AI. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>255</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Blair Cohen from AuthenticID joins Dave to discuss how generative AI and authentication go hand in hand. Joe and Dave share some follow up from listener Robert who discusses an ad for a device that uses ChatGPT to record phone calls on your device. Dave helps his dad out with his computer and shares the tale. Dave also shares a story this week on the FBI warning against scammers who are posing as NFT devs to try and steal your crypto. Joe and Dave test their scammer catching skills while taking a test to see if they are smarter than the average scammer. Our catch of the day comes from listener Steve who writes in to share a receipt he received that looked quite suspicious.
Links to stories:

FBI warns of scammers posing as NFT devs to steal your crypto

Are you smarter than a scammer? Play this game.


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Blair Cohen from AuthenticID joins Dave to discuss how generative AI and authentication go hand in hand. Joe and Dave share some follow up from listener Robert who discusses an ad for a device that uses ChatGPT to record phone calls on your device. Dave helps his dad out with his computer and shares the tale. Dave also shares a story this week on the FBI warning against scammers who are posing as NFT devs to try and steal your crypto. Joe and Dave test their scammer catching skills while taking a test to see if they are smarter than the average scammer. Our catch of the day comes from listener Steve who writes in to share a receipt he received that looked quite suspicious.</p><p>Links to stories:</p><ul>
<li><a href="https://www.bleepingcomputer.com/news/security/fbi-warns-of-scammers-posing-as-nft-devs-to-steal-your-crypto/">FBI warns of scammers posing as NFT devs to steal your crypto</a></li>
<li><a href="https://www.washingtonpost.com/technology/interactive/2023/identify-scam-quiz-zelle-email-text/?utm_campaign=wp_post_most&amp;utm_medium=email&amp;utm_source=newsletter&amp;wpisrc=nl_most">Are you smarter than a scammer? Play this game.</a></li>
</ul><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>3268</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[88dced0e-7ff3-11ed-8345-335c3dad04af]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW5386578461.mp3?updated=1720031104" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>two-factor authentication (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/156/notes</link>
      <description>An authentication process that requires two different factors before granting access.
CyberWire Glossary link: https://thecyberwire.com/glossary/two-factor-authentication</description>
      <pubDate>Tue, 15 Aug 2023 07:00:00 -0000</pubDate>
      <itunes:title>two-factor authentication (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>156</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>An authentication process that requires two different factors before granting access.
CyberWire Glossary link: https://thecyberwire.com/glossary/two-factor-authentication</itunes:summary>
      <content:encoded>
        <![CDATA[<p>An authentication process that requires two different factors before granting access.</p><p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/two-factor-authentication">https://thecyberwire.com/glossary/two-factor-authentication</a></p>]]>
      </content:encoded>
      <itunes:duration>547</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[023b1c7e-3acb-11ee-a5d2-db60b6a9b69b]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW1132021291.mp3?updated=1692035508" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>AI: A battle between heroes and villains.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/254/notes</link>
      <description>Dave Baggett from INKY joins Dave to dive into the latest phishing trends and discuss a broader view of how AI is being used by both the good guys and the bad guys. Joe's story this week dives into the APT with an entirely too cool name, Midnight Blizzard, that has been conducting targeted social engineering towards the popular Microsoft Teams. Dave's story this week follows a Facebook Market user who dodged one scam, just to fall right back into another one. Our catch of the day comes from listener Mauricio who writes in an shares a funny voicemail regarding a "potential W-2 refund."
Links to stories:

Midnight Blizzard conducts targeted social engineering over Microsoft Teams

Seller dodges Facebook Marketplace scam only to fall into another trap


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 10 Aug 2023 05:00:00 -0000</pubDate>
      <itunes:title>AI: A battle between heroes and villains.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>254</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Dave Baggett from INKY joins Dave to dive into the latest phishing trends and discuss a broader view of how AI is being used by both the good guys and the bad guys. Joe's story this week dives into the APT with an entirely too cool name, Midnight Blizzard, that has been conducting targeted social engineering towards the popular Microsoft Teams. Dave's story this week follows a Facebook Market user who dodged one scam, just to fall right back into another one. Our catch of the day comes from listener Mauricio who writes in an shares a funny voicemail regarding a "potential W-2 refund."
Links to stories:

Midnight Blizzard conducts targeted social engineering over Microsoft Teams

Seller dodges Facebook Marketplace scam only to fall into another trap


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Dave Baggett from INKY joins Dave to dive into the latest phishing trends and discuss a broader view of how AI is being used by both the good guys and the bad guys. Joe's story this week dives into the APT with an entirely too cool name, Midnight Blizzard, that has been conducting targeted social engineering towards the popular Microsoft Teams. Dave's story this week follows a Facebook Market user who dodged one scam, just to fall right back into another one. Our catch of the day comes from listener Mauricio who writes in an shares a funny voicemail regarding a "potential W-2 refund."</p><p>Links to stories:</p><ul>
<li><a href="https://www.microsoft.com/en-us/security/blog/2023/08/02/midnight-blizzard-conducts-targeted-social-engineering-over-microsoft-teams/">Midnight Blizzard conducts targeted social engineering over Microsoft Teams</a></li>
<li><a href="https://www.wmar2news.com/matterformallory/seller-dodges-facebook-marketplace-scam-only-to-fall-into-another-trap">Seller dodges Facebook Marketplace scam only to fall into another trap</a></li>
</ul><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>3496</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[88c88e90-7ff3-11ed-8345-875fe79255fe]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW8345253820.mp3?updated=1691595818" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Encore: phishing (verb) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/8/notes</link>
      <description>From the intrusion kill chain model, the delivery of a “lure” to a potential victim by pretending to be some trustworthy person or organization in order to trick the victim into revealing sensitive information. According to Knowbe4, the word “phishing” first appeared in a Usenet newsgroup called AOHell in 1996 and some of the very first phishing attacks used AOL Instant Messenger to deliver fake messages purportedly from AOL employees in the early 2000s. The word is part of l33tspeak that started in the early days of the internet (1980s) as a shorthand to let readers know the author was part of the hacker community. In this case, the letters “ph” replace the letter “f” in the word fishing, as in “I fish, with an ‘f,’ for bass in the lake.” In hacking, “I Phish, with a ‘ph,’ for login credentials from key employees at my target’s organization.</description>
      <pubDate>Tue, 08 Aug 2023 07:00:00 -0000</pubDate>
      <itunes:title>Encore: phishing (verb) [Word Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>8</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>From the intrusion kill chain model, the delivery of a “lure” to a potential victim by pretending to be some trustworthy person or organization in order to trick the victim into revealing sensitive information. According to Knowbe4, the word “phishing” first appeared in a Usenet newsgroup called AOHell in 1996 and some of the very first phishing attacks used AOL Instant Messenger to deliver fake messages purportedly from AOL employees in the early 2000s. The word is part of l33tspeak that started in the early days of the internet (1980s) as a shorthand to let readers know the author was part of the hacker community. In this case, the letters “ph” replace the letter “f” in the word fishing, as in “I fish, with an ‘f,’ for bass in the lake.” In hacking, “I Phish, with a ‘ph,’ for login credentials from key employees at my target’s organization.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>From the intrusion kill chain model, the delivery of a “lure” to a potential victim by pretending to be some trustworthy person or organization in order to trick the victim into revealing sensitive information. According to Knowbe4, the word “phishing” first appeared in a Usenet newsgroup called AOHell in 1996 and some of the very first phishing attacks used AOL Instant Messenger to deliver fake messages purportedly from AOL employees in the early 2000s. The word is part of l33tspeak that started in the early days of the internet (1980s) as a shorthand to let readers know the author was part of the hacker community. In this case, the letters “ph” replace the letter “f” in the word fishing, as in “I fish, with an ‘f,’ for bass in the lake.” In hacking, “I Phish, with a ‘ph,’ for login credentials from key employees at my target’s organization.</p>]]>
      </content:encoded>
      <itunes:duration>257</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[9e8217f0-3543-11ee-a797-f3aae95b5aea]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW4689976676.mp3?updated=1691427769" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Are you pretending to be Russian? [Hacking humans goes to the movies]</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans-goes-to-the-movies/21/notes</link>
      <description>Thanks for joining us again for another episode of fun project brought to you by the team of Hacking Humans, the CyberWire's social engineering podcast. Hacking Humans co-host Dave Bittner is joined by Rick Howard in this series where they view clips from their favorite movies and television shows with examples of the social engineering scams and schemes you hear Dave and co-host Joe Carrigan talk about on Hacking Humans. In this episode, Dave and Rick watch each of the selected scenes, describe the on-screen action for you, and then they deconstruct what they saw. Grab your bowl of popcorn and join us for some fantastic scams and frauds.
Links to this episode's clips if you'd like to watch along:

Dave's clip from the movie: HEARTBREAKERS


Rick's clip from the movie: Star Trek: The Wrath of Khan


Dave's Second clip: Russian Restaurant


Dave's Third clip: Funny scene 3</description>
      <pubDate>Sat, 05 Aug 2023 07:00:00 -0000</pubDate>
      <itunes:title>Are you pretending to be Russian? [Hacking humans goes to the movies]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>21</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Thanks for joining us again for another episode of fun project brought to you by the team of Hacking Humans, the CyberWire's social engineering podcast. Hacking Humans co-host Dave Bittner is joined by Rick Howard in this series where they view clips from their favorite movies and television shows with examples of the social engineering scams and schemes you hear Dave and co-host Joe Carrigan talk about on Hacking Humans. In this episode, Dave and Rick watch each of the selected scenes, describe the on-screen action for you, and then they deconstruct what they saw. Grab your bowl of popcorn and join us for some fantastic scams and frauds.
Links to this episode's clips if you'd like to watch along:

Dave's clip from the movie: HEARTBREAKERS


Rick's clip from the movie: Star Trek: The Wrath of Khan


Dave's Second clip: Russian Restaurant


Dave's Third clip: Funny scene 3</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Thanks for joining us again for another episode of fun project brought to you by the team of Hacking Humans, the CyberWire's social engineering podcast. Hacking Humans co-host Dave Bittner is joined by Rick Howard in this series where they view clips from their favorite movies and television shows with examples of the social engineering scams and schemes you hear Dave and co-host Joe Carrigan talk about on Hacking Humans. In this episode, Dave and Rick watch each of the selected scenes, describe the on-screen action for you, and then they deconstruct what they saw. Grab your bowl of popcorn and join us for some fantastic scams and frauds.</p><p>Links to this episode's clips if you'd like to watch along:</p><ul>
<li>Dave's clip from the movie: <a href="https://www.youtube.com/watch?v=W1hog8CRrw4&amp;t=107s">HEARTBREAKERS</a>
</li>
<li>Rick's clip from the movie: <a href="https://www.youtube.com/watch?v=gl_y5wTeJtk">Star Trek: The Wrath of Khan</a>
</li>
<li>Dave's Second clip: <a href="https://www.youtube.com/watch?v=Lv3uUV-tEs8">Russian Restaurant</a>
</li>
<li>Dave's Third clip: <a href="https://www.youtube.com/watch?v=feM5H3WwF4o">Funny scene 3</a>
</li>
</ul>]]>
      </content:encoded>
      <itunes:duration>1740</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[6462efaa-3303-11ee-8fc8-b31b322f8808]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW8388983958.mp3?updated=1691176653" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Privacy matters when it comes to ChatGPT.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/253/notes</link>
      <description>Raj Ananthanpillai from Trua joins Dave to discuss privacy concerns and what you shouldn't share with ChatGPT. Dave and Joe share some listener follow up from Clayton who shares some comments on a previous episode where Dave discusses bomb threats to retail stores for ransom. Dave's story follows Google rapidly trying to correct bogus airline phone numbers that were discovered this week. Joe's story is on an Android app called "Spyhide" which is a phone surveillance app, that has been collecting private phone data from tens of thousands of Android devices around the world. Our catch of the day is from listener Isak who writes in to share a comedic spam email he received.
Links to stories:

Called a bogus airline customer support number? Google is hustling to fix that

Spyhide stalkerware is spying on tens of thousands of phones


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 03 Aug 2023 05:00:00 -0000</pubDate>
      <itunes:title>Privacy matters when it comes to ChatGPT.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>253</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Raj Ananthanpillai from Trua joins Dave to discuss privacy concerns and what you shouldn't share with ChatGPT. Dave and Joe share some listener follow up from Clayton who shares some comments on a previous episode where Dave discusses bomb threats to retail stores for ransom. Dave's story follows Google rapidly trying to correct bogus airline phone numbers that were discovered this week. Joe's story is on an Android app called "Spyhide" which is a phone surveillance app, that has been collecting private phone data from tens of thousands of Android devices around the world. Our catch of the day is from listener Isak who writes in to share a comedic spam email he received.
Links to stories:

Called a bogus airline customer support number? Google is hustling to fix that

Spyhide stalkerware is spying on tens of thousands of phones


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Raj Ananthanpillai from Trua joins Dave to discuss privacy concerns and what you shouldn't share with ChatGPT. Dave and Joe share some listener follow up from Clayton who shares some comments on a previous episode where Dave discusses bomb threats to retail stores for ransom. Dave's story follows Google rapidly trying to correct bogus airline phone numbers that were discovered this week. Joe's story is on an Android app called "Spyhide" which is a phone surveillance app, that has been collecting private phone data from tens of thousands of Android devices around the world. Our catch of the day is from listener Isak who writes in to share a comedic spam email he received.</p><p>Links to stories:</p><ul>
<li><a href="https://therecord.media/airline-customer-support-phone-number-fraud-google">Called a bogus airline customer support number? Google is hustling to fix that</a></li>
<li><a href="https://techcrunch.com/2023/07/24/spyhide-stalkerware-android/">Spyhide stalkerware is spying on tens of thousands of phones</a></li>
</ul><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>2670</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[88b44458-7ff3-11ed-8345-e3b56e67f2c8]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW2459510253.mp3?updated=1690988925" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>iCloud keychain (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/155/notes</link>
      <description>A cloud based sensitive information management system that allows users access across multiple devices.
CyberWire Glossary link: https://thecyberwire.com/glossary/icloud-keychain
Audio reference link: Ellen’s Tips For iOS, 2022. How To Master iCloud Keychain to Keep Your Passwords Safe and Secure [Video]. YouTube. https://www.youtube.com/watch?v=Tl3E29iUvgE </description>
      <pubDate>Tue, 01 Aug 2023 07:00:00 -0000</pubDate>
      <itunes:title>iCloud keychain (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>155</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A cloud based sensitive information management system that allows users access across multiple devices.
CyberWire Glossary link: https://thecyberwire.com/glossary/icloud-keychain
Audio reference link: Ellen’s Tips For iOS, 2022. How To Master iCloud Keychain to Keep Your Passwords Safe and Secure [Video]. YouTube. https://www.youtube.com/watch?v=Tl3E29iUvgE </itunes:summary>
      <content:encoded>
        <![CDATA[<p>A cloud based sensitive information management system that allows users access across multiple devices.</p><p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/icloud-keychain">https://thecyberwire.com/glossary/icloud-keychain</a></p><p>Audio reference link: Ellen’s Tips For iOS, 2022. How To Master iCloud Keychain to Keep Your Passwords Safe and Secure [Video]. YouTube. <a href="https://www.youtube.com/watch?v=Tl3E29iUvgE%C2%A0">https://www.youtube.com/watch?v=Tl3E29iUvgE </a></p>]]>
      </content:encoded>
      <itunes:duration>388</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b0edfdb4-3084-11ee-bc2b-1b33b6f114fb]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW5161815545.mp3?updated=1690838948" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Reducing risk in the cyber community.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/252/notes</link>
      <description>Perry Carpenter joins Dave to discuss his book "The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer." Joe and Dave share some listener follow up on messing with scammers, and how dangerous that actually can be. Joe's story follows hackers trying to steal your secrets using infected USB drives. Dave's story is on a tech executive and how they fell victim to a dating site scam, where the perpetrator was able to gain $450,000 from someone who just thought they found their soulmate. Our catch of the day this week comes from listener Ryan, who writes in sharing a renew license scam from New Zealand, with a carefully crafted email, made to look like the real thing.
Links to stories:

Tech Executive Falls Victim to $450K Scam on Dating Site: The Cruel 'Pig-Butchering' Scheme Going Around

The Spies Who Loved You: Infected USB Drives to Steal Secrets


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 27 Jul 2023 05:00:00 -0000</pubDate>
      <itunes:title>Reducing risk in the cyber community.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>252</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Perry Carpenter joins Dave to discuss his book "The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer." Joe and Dave share some listener follow up on messing with scammers, and how dangerous that actually can be. Joe's story follows hackers trying to steal your secrets using infected USB drives. Dave's story is on a tech executive and how they fell victim to a dating site scam, where the perpetrator was able to gain $450,000 from someone who just thought they found their soulmate. Our catch of the day this week comes from listener Ryan, who writes in sharing a renew license scam from New Zealand, with a carefully crafted email, made to look like the real thing.
Links to stories:

Tech Executive Falls Victim to $450K Scam on Dating Site: The Cruel 'Pig-Butchering' Scheme Going Around

The Spies Who Loved You: Infected USB Drives to Steal Secrets


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Perry Carpenter joins Dave to discuss his book "The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer." Joe and Dave share some listener follow up on messing with scammers, and how dangerous that actually can be. Joe's story follows hackers trying to steal your secrets using infected USB drives. Dave's story is on a tech executive and how they fell victim to a dating site scam, where the perpetrator was able to gain $450,000 from someone who just thought they found their soulmate. Our catch of the day this week comes from listener Ryan, who writes in sharing a renew license scam from New Zealand, with a carefully crafted email, made to look like the real thing.</p><p>Links to stories:</p><ul>
<li><a href="https://finance.yahoo.com/news/tech-executive-falls-victim-450k-190411822.html?guccounter=1&amp;guce_referrer=aHR0cHM6Ly93d3cuZ29vZ2xlLmNvbS8&amp;guce_referrer_sig=AQAAACoO7q4vRhd33ftG3Ak2pN42Aw23uyziwT35V0ggRRHVx1EEkH46nZkEOoHn8vaeSYg_8jknuCkpTYYilp5WPyGjngMUZAO_VtrltdU4LNsMCULF_RUqpv98tSe5S0GDER8kHHa_1Rmpyjh9fRrbJSPr9Kr5IIxrlLLzbAYFn6Gv">Tech Executive Falls Victim to $450K Scam on Dating Site: The Cruel 'Pig-Butchering' Scheme Going Around</a></li>
<li><a href="https://www.mandiant.com/resources/blog/infected-usb-steal-secrets">The Spies Who Loved You: Infected USB Drives to Steal Secrets</a></li>
</ul><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>3448</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[88a0039e-7ff3-11ed-8345-772c0004a974]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW4724169465.mp3?updated=1690392570" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Encore: darknet (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/9/notes</link>
      <description>A subset of the internet where communications between two parties or client-server transactions are obscured from search engines and surveillance systems by layers of encryption. The U.S. Navy designed the original Darknet by developing The Onion Router network, or TOR, back in the 1990s. Roger Dingledine and Nick Mathewson deployed the first alpha implementation in 2002 with some initial funding by the Electronic Frontier Foundation (EFF.) The TOR Project became a non-profit in 2006 and is funded by the U.S, Sweden, different NGOs, and individual sponsors.</description>
      <pubDate>Tue, 25 Jul 2023 07:00:00 -0000</pubDate>
      <itunes:title>Encore: darknet (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>3</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A subset of the internet where communications between two parties or client-server transactions are obscured from search engines and surveillance systems by layers of encryption. The U.S. Navy designed the original Darknet by developing The Onion Router network, or TOR, back in the 1990s. Roger Dingledine and Nick Mathewson deployed the first alpha implementation in 2002 with some initial funding by the Electronic Frontier Foundation (EFF.) The TOR Project became a non-profit in 2006 and is funded by the U.S, Sweden, different NGOs, and individual sponsors.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A subset of the internet where communications between two parties or client-server transactions are obscured from search engines and surveillance systems by layers of encryption. The U.S. Navy designed the original Darknet by developing The Onion Router network, or TOR, back in the 1990s. Roger Dingledine and Nick Mathewson deployed the first alpha implementation in 2002 with some initial funding by the Electronic Frontier Foundation (EFF.) The TOR Project became a non-profit in 2006 and is funded by the U.S, Sweden, different NGOs, and individual sponsors.</p>]]>
      </content:encoded>
      <itunes:duration>287</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b39c405e-2fc4-11ee-9966-572bffce1738]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW2844260853.mp3?updated=1690219697" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Barking up the wrong Facebook page. </title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/251/notes</link>
      <description>Mallory Sofastaii, consumer investigative reporter from WMAR TV, is discussing animal rescue organizations on Facebook pages being taken over by hackers. Listener George writes in to share how his bank is not doing enough to protect against fraud going on. Dave's story follows scammers using new tricks, across the nation, to receive bitcoin and gift cards after threatening stores with bomb scares. Joe has the story on Chinese hackers that have targeted the Commerce Secretary Gina Raimondo and other State and Commerce Department officials. Our catch of the day comes from listener Steve who shares a fishy looking email stating that he is going to be the beneficiary to "Thirty Nine Nine million, eight hundred thousand dollars."
Links to stories:

Scammers Target Stores With Bomb Threats, Seeking Bitcoin and Gift Cards

Chinese Hackers Targeted Commerce Secretary and Other U.S. Officials


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 20 Jul 2023 05:00:00 -0000</pubDate>
      <itunes:title>Barking up the wrong Facebook page. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>251</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Mallory Sofastaii, consumer investigative reporter from WMAR TV, is discussing animal rescue organizations on Facebook pages being taken over by hackers. Listener George writes in to share how his bank is not doing enough to protect against fraud going on. Dave's story follows scammers using new tricks, across the nation, to receive bitcoin and gift cards after threatening stores with bomb scares. Joe has the story on Chinese hackers that have targeted the Commerce Secretary Gina Raimondo and other State and Commerce Department officials. Our catch of the day comes from listener Steve who shares a fishy looking email stating that he is going to be the beneficiary to "Thirty Nine Nine million, eight hundred thousand dollars."
Links to stories:

Scammers Target Stores With Bomb Threats, Seeking Bitcoin and Gift Cards

Chinese Hackers Targeted Commerce Secretary and Other U.S. Officials


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Mallory Sofastaii, consumer investigative reporter from WMAR TV, is discussing animal rescue organizations on Facebook pages being taken over by hackers. Listener George writes in to share how his bank is not doing enough to protect against fraud going on. Dave's story follows scammers using new tricks, across the nation, to receive bitcoin and gift cards after threatening stores with bomb scares. Joe has the story on Chinese hackers that have targeted the Commerce Secretary Gina Raimondo and other State and Commerce Department officials. Our catch of the day comes from listener Steve who shares a fishy looking email stating that he is going to be the beneficiary to "Thirty Nine Nine million, eight hundred thousand dollars."</p><p>Links to stories:</p><ul>
<li><a href="https://www.wsj.com/articles/scammers-target-stores-with-bomb-threats-seeking-bitcoin-and-gift-cards-49a2e87c">Scammers Target Stores With Bomb Threats, Seeking Bitcoin and Gift Cards</a></li>
<li><a href="https://www.nytimes.com/2023/07/12/us/politics/china-state-department-emails-microsoft-hack.html"><em>Chinese Hackers Targeted Commerce Secretary and Other U.S. Officials</em></a></li>
</ul><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>3292</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[888bc1c2-7ff3-11ed-8345-17cf01980600]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW4252943741.mp3?updated=1689780648" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Encore: rogue access point (noun) [Word notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/10/notes</link>
      <description>1. A wireless access point installed by employees in an office or data center environment as a convenience to connectivity without the consent or the knowledge of the network manager. 2. A wireless access point, sometimes called an Evil Twin, installed by a cyber adversary in or near an office or data center environment designed to bypass security controls, gain access, and/or surveil the network traffic of the victim’s network. Both kinds, the employee installed and the adversary installed rogue access points, increase the attack surface of the organization. The employee installed device, because of its electronic footprint range, might make it easier for hackers and mischief makers outside of the organization’s network to bypass the corporate security controls and gain access without permission. The adversary installed device is designed specifically to bypass the security controls of the target network.</description>
      <pubDate>Tue, 18 Jul 2023 07:00:00 -0000</pubDate>
      <itunes:title>Encore: rogue access point (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>10</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>1. A wireless access point installed by employees in an office or data center environment as a convenience to connectivity without the consent or the knowledge of the network manager. 2. A wireless access point, sometimes called an Evil Twin, installed by a cyber adversary in or near an office or data center environment designed to bypass security controls, gain access, and/or surveil the network traffic of the victim’s network. Both kinds, the employee installed and the adversary installed rogue access points, increase the attack surface of the organization. The employee installed device, because of its electronic footprint range, might make it easier for hackers and mischief makers outside of the organization’s network to bypass the corporate security controls and gain access without permission. The adversary installed device is designed specifically to bypass the security controls of the target network.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>1. A wireless access point installed by employees in an office or data center environment as a convenience to connectivity without the consent or the knowledge of the network manager. 2. A wireless access point, sometimes called an Evil Twin, installed by a cyber adversary in or near an office or data center environment designed to bypass security controls, gain access, and/or surveil the network traffic of the victim’s network. Both kinds, the employee installed and the adversary installed rogue access points, increase the attack surface of the organization. The employee installed device, because of its electronic footprint range, might make it easier for hackers and mischief makers outside of the organization’s network to bypass the corporate security controls and gain access without permission. The adversary installed device is designed specifically to bypass the security controls of the target network.</p>]]>
      </content:encoded>
      <itunes:duration>247</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[d5ff04e0-257b-11ee-a967-df23718752b4]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW9177568455.mp3?updated=1689692619" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Encore: The rise in fraudulent online content.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/214/notes</link>
      <description>Guest Jane Lee, Trust and Safety Architect from Sift joins Dave to discuss the rise of fraudulent online content and fake crypto platforms. Dave and Joe share some listener follow up regarding the debate over "mum" versus "mom" and who speaks which pronunciation more. Dave has two stories this week, one story follows a Twitter thread about a man who shared his story about selling a desk on Facebook and the dangers that come with that. His second story is about how hackers are using a clever new phishing technique to create email threads with multiple responses to trick potential victims into thinking bogus messages are legitimate. Joe shares the story of hackers new way to get information positioning themselves in the middle of your browser between the server and your computer. Our catch of the day has a little bit of everything from Peter who writes in about an email he received pulling out all the stops to get him to give over his information.
Links to stories:

Twitter thread

https://www.cyberscoop.com/phishing-scheme-targeting-mideast-researchers/

Serious Security: Browser-in-the-browser attacks – watch out for windows that aren’t!


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 13 Jul 2023 05:00:00 -0000</pubDate>
      <itunes:title>Encore: The rise in fraudulent online content.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>213</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Guest Jane Lee, Trust and Safety Architect from Sift joins Dave to discuss the rise of fraudulent online content and fake crypto platforms. Dave and Joe share some listener follow up regarding the debate over "mum" versus "mom" and who speaks which pronunciation more. Dave has two stories this week, one story follows a Twitter thread about a man who shared his story about selling a desk on Facebook and the dangers that come with that. His second story is about how hackers are using a clever new phishing technique to create email threads with multiple responses to trick potential victims into thinking bogus messages are legitimate. Joe shares the story of hackers new way to get information positioning themselves in the middle of your browser between the server and your computer. Our catch of the day has a little bit of everything from Peter who writes in about an email he received pulling out all the stops to get him to give over his information.
Links to stories:

Twitter thread

https://www.cyberscoop.com/phishing-scheme-targeting-mideast-researchers/

Serious Security: Browser-in-the-browser attacks – watch out for windows that aren’t!


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Guest Jane Lee, Trust and Safety Architect from Sift joins Dave to discuss the rise of fraudulent online content and fake crypto platforms. Dave and Joe share some listener follow up regarding the debate over "mum" versus "mom" and who speaks which pronunciation more. Dave has two stories this week, one story follows a Twitter thread about a man who shared his story about selling a desk on Facebook and the dangers that come with that. His second story is about how hackers are using a clever new phishing technique to create email threads with multiple responses to trick potential victims into thinking bogus messages are legitimate. Joe shares the story of hackers new way to get information positioning themselves in the middle of your browser between the server and your computer. Our catch of the day has a little bit of everything from Peter who writes in about an email he received pulling out all the stops to get him to give over his information.</p><p>Links to stories:</p><ul>
<li><a href="https://twitter.com/_larry0/status/1568991780988719104?s=51&amp;t=Curz6kinRQbKk5LE-s442g">Twitter thread</a></li>
<li><a href="https://www.cyberscoop.com/phishing-scheme-targeting-mideast-researchers/">https://www.cyberscoop.com/phishing-scheme-targeting-mideast-researchers/</a></li>
<li><a href="https://nakedsecurity.sophos.com/2022/09/13/serious-security-browser-in-the-browser-attacks-watch-out-for-windows-that-arent/">Serious Security: Browser-in-the-browser attacks – watch out for windows that aren’t!</a></li>
</ul><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>3032</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[8877f25a-7ff3-11ed-8345-1fe807d4d42c]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW7466897193.mp3?updated=1689096228" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Encore: NMAP (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/1/notes</link>
      <description>A network mapping tool that pings IP addresses looking for a response and can discover host names, open communications ports, operating system names and versions. Written and maintained by Gordon Lyon, a.k.a. Fyodor, it is a free and open source software application used by both system admins and hackers alike and has been a staple in the security community for well over two decades.
CyberWire Glossary link: https://thecyberwire.com/glossary/nmap</description>
      <pubDate>Tue, 11 Jul 2023 07:00:00 -0000</pubDate>
      <itunes:title>Encore: NMAP (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>1</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A network mapping tool that pings IP addresses looking for a response and can discover host names, open communications ports, operating system names and versions. Written and maintained by Gordon Lyon, a.k.a. Fyodor, it is a free and open source software application used by both system admins and hackers alike and has been a staple in the security community for well over two decades.
CyberWire Glossary link: https://thecyberwire.com/glossary/nmap</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A network mapping tool that pings IP addresses looking for a response and can discover host names, open communications ports, operating system names and versions. Written and maintained by Gordon Lyon, a.k.a. Fyodor, it is a free and open source software application used by both system admins and hackers alike and has been a staple in the security community for well over two decades.</p><p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/nmap">https://thecyberwire.com/glossary/nmap</a></p>]]>
      </content:encoded>
      <itunes:duration>233</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[932bef0e-1f39-11ee-8dd1-f39297e3bb64]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW1326204052.mp3?updated=1689003999" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Indicators to insider threats.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/250/notes</link>
      <description>Our UK correspondent Carole Theriault is talking with London insurance market CISO Thom Langford about insider threats. Joe and Dave share some listener follow up from Waldo who writes in to share a video explaining how bad guys are able to hack users. Joe shares a report from Verizon, one of the industries leading phone companies, about social engineering. Dave's story follows a gentleman who was able to steal one million dollars from at least 700 DoorDash drivers, and now police are warning against this sophisticated phishing scam. Our catch of the day comes from listener Ami who writes in to share her victory in catching a scammer after receiving a weird voicemail from a so called police officer.
Links to stories:

2023 Data Breach Investigations Report

A Stamford man allegedly stole $1M from 700 DoorDash drivers. Police say his victims are hard to ID.


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 06 Jul 2023 05:00:00 -0000</pubDate>
      <itunes:title>Indicators to insider threats.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>250</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Our UK correspondent Carole Theriault is talking with London insurance market CISO Thom Langford about insider threats. Joe and Dave share some listener follow up from Waldo who writes in to share a video explaining how bad guys are able to hack users. Joe shares a report from Verizon, one of the industries leading phone companies, about social engineering. Dave's story follows a gentleman who was able to steal one million dollars from at least 700 DoorDash drivers, and now police are warning against this sophisticated phishing scam. Our catch of the day comes from listener Ami who writes in to share her victory in catching a scammer after receiving a weird voicemail from a so called police officer.
Links to stories:

2023 Data Breach Investigations Report

A Stamford man allegedly stole $1M from 700 DoorDash drivers. Police say his victims are hard to ID.


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Our UK correspondent Carole Theriault is talking with London insurance market CISO Thom Langford about insider threats. Joe and Dave share some listener follow up from Waldo who writes in to share a video explaining how bad guys are able to hack users. Joe shares a report from Verizon, one of the industries leading phone companies, about social engineering. Dave's story follows a gentleman who was able to steal one million dollars from at least 700 DoorDash drivers, and now police are warning against this sophisticated phishing scam. Our catch of the day comes from listener Ami who writes in to share her victory in catching a scammer after receiving a weird voicemail from a so called police officer.</p><p>Links to stories:</p><ul>
<li><a href="https://www.verizon.com/business/resources/T444/reports/2023-data-breach-investigations-report-dbir.pdf">2023 Data Breach Investigations Report</a></li>
<li><a href="https://www.stamfordadvocate.com/news/article/stamford-david-smith-stole-1m-doordash-phishing-18153897.php">A Stamford man allegedly stole $1M from 700 DoorDash drivers. Police say his victims are hard to ID.</a></li>
</ul><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>2419</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[88634544-7ff3-11ed-8345-c3cf8c387002]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW1898854942.mp3?updated=1688407024" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Encore: Diamond Model (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/100/notes</link>
      <description>A cyber threat intelligence analysis model that defines relationship pairs between four core components in the shape of a diamond of adversary playbook activity across the intrusion kill chain: the adversary, their capability, the infrastructure used or attacked, and the victim.
CyberWire Glossary link: https://thecyberwire.com/glossary/diamond-model 
Audio reference link: “Diamond Presentation v2 0: Diamond Model for Intrusion Analysis – Applied to Star Wars’ Battles,” Andy Pendergrast and Wade Baker, ThreatConnect, YouTube, 4 February 2020.</description>
      <pubDate>Tue, 04 Jul 2023 07:00:00 -0000</pubDate>
      <itunes:title>Encore: Diamond Model (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>100</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A cyber threat intelligence analysis model that defines relationship pairs between four core components in the shape of a diamond of adversary playbook activity across the intrusion kill chain: the adversary, their capability, the infrastructure used or attacked, and the victim.
CyberWire Glossary link: https://thecyberwire.com/glossary/diamond-model 
Audio reference link: “Diamond Presentation v2 0: Diamond Model for Intrusion Analysis – Applied to Star Wars’ Battles,” Andy Pendergrast and Wade Baker, ThreatConnect, YouTube, 4 February 2020.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A cyber threat intelligence analysis model that defines relationship pairs between four core components in the shape of a diamond of adversary playbook activity across the intrusion kill chain: the adversary, their capability, the infrastructure used or attacked, and the victim.</p><p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/diamond-model">https://thecyberwire.com/glossary/diamond-model </a></p><p>Audio reference link: “<a href="https://www.youtube.com/watch?v=0QHUS8SNTNc">Diamond Presentation v2 0: Diamond Model for Intrusion Analysis – Applied to Star Wars’ Battles</a>,” Andy Pendergrast and Wade Baker, ThreatConnect, YouTube, 4 February 2020.</p>]]>
      </content:encoded>
      <itunes:duration>467</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c7c1fee4-16af-11ee-be53-b3546ff47b15]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW3817774123.mp3?updated=1688065686" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Beware ChatGPT curious: Fleece-ware chabot apps.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/249/notes</link>
      <description>Guest Sean Gallagher, Principal Researcher with Sophos Xops team, joins us to discuss "'FleeceGPT' mobile apps target AI-curious to rake in cash. Joe shares some listener feedback from Jon about "No Stupid Questions" podcast. Dave's story is from Reddit about a free piano scam. Joe's got a story on a woman pleading with her bank to stop a fake wire transfer, but they were too busy. Our Catch of the Day comes from Rob about a fake student loan help ticket.
Links to stories:

“FleeceGPT” mobile apps target AI-curious to rake in cash

Just ran into the most sophisticated "free piano" scam I've ever seen

Wells Fargo bankers tell East Bay customer they're too busy to stop wire scam


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 29 Jun 2023 05:00:00 -0000</pubDate>
      <itunes:title>Beware ChatGPT curious: Fleece-ware chabot apps.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>249</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Guest Sean Gallagher, Principal Researcher with Sophos Xops team, joins us to discuss "'FleeceGPT' mobile apps target AI-curious to rake in cash. Joe shares some listener feedback from Jon about "No Stupid Questions" podcast. Dave's story is from Reddit about a free piano scam. Joe's got a story on a woman pleading with her bank to stop a fake wire transfer, but they were too busy. Our Catch of the Day comes from Rob about a fake student loan help ticket.
Links to stories:

“FleeceGPT” mobile apps target AI-curious to rake in cash

Just ran into the most sophisticated "free piano" scam I've ever seen

Wells Fargo bankers tell East Bay customer they're too busy to stop wire scam


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Guest Sean Gallagher, Principal Researcher with Sophos Xops team, joins us to discuss "'FleeceGPT' mobile apps target AI-curious to rake in cash. Joe shares some listener feedback from Jon about "No Stupid Questions" podcast. Dave's story is from Reddit about a free piano scam. Joe's got a story on a woman pleading with her bank to stop a fake wire transfer, but they were too busy. Our Catch of the Day comes from Rob about a fake student loan help ticket.</p><p>Links to stories:</p><ul>
<li><a href="https://news.sophos.com/en-us/2023/05/17/fleecegpt-mobile-apps-target-ai-curious-to-rake-in-cash/">“FleeceGPT” mobile apps target AI-curious to rake in cash</a></li>
<li><a href="https://www.reddit.com/r/piano/comments/14b6qvc/just_ran_into_the_most_sophisticated_free_piano/?utm_source=share&amp;utm_medium=ios_app&amp;utm_name=iossmf&amp;utm_content=1&amp;utm_term=22">Just ran into the most sophisticated "free piano" scam I've ever seen</a></li>
<li><a href="https://abc7news.com/bank-impostor-scam-wells-fargo-wire-transfer-fraud-scammer-pretends-to-be/13407340/">Wells Fargo bankers tell East Bay customer they're too busy to stop wire scam</a></li>
</ul><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>2921</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[884f20c8-7ff3-11ed-8345-bb34d1363022]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW8625938713.mp3?updated=1688405594" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>CISA (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/153/notes</link>
      <description>A US Department of Homeland Security agency tasked with supporting cyber and physical security for US critical infrastructure.
CyberWire Glossary link: https://thecyberwire.com/glossary/cybersecurity-and-infrastructure-security-agency
Audio reference link: CISA, 2021. CISA Director Jen Easterly’s Keynote at Black Hat USA 2021 [Video]. YouTube. URL https://www.youtube.com/watch?v=q7bu-L-m4K4.</description>
      <pubDate>Tue, 27 Jun 2023 14:39:34 -0000</pubDate>
      <itunes:title>CISA (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>153</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A US Department of Homeland Security agency tasked with supporting cyber and physical security for US critical infrastructure.
CyberWire Glossary link: https://thecyberwire.com/glossary/cybersecurity-and-infrastructure-security-agency
Audio reference link: CISA, 2021. CISA Director Jen Easterly’s Keynote at Black Hat USA 2021 [Video]. YouTube. URL https://www.youtube.com/watch?v=q7bu-L-m4K4.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A US Department of Homeland Security agency tasked with supporting cyber and physical security for US critical infrastructure.</p><p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/cybersecurity-and-infrastructure-security-agency">https://thecyberwire.com/glossary/cybersecurity-and-infrastructure-security-agency</a></p><p>Audio reference link: CISA, 2021. CISA Director Jen Easterly’s Keynote at Black Hat USA 2021 [Video]. YouTube. URL <a href="https://www.youtube.com/watch?v=q7bu-L-m4K4">https://www.youtube.com/watch?v=q7bu-L-m4K4</a>.</p>]]>
      </content:encoded>
      <itunes:duration>448</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[4c3e62ce-0c89-11ee-826b-cf6a7b587250]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW5464075310.mp3?updated=1687442484" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>spam (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/154/notes</link>
      <description>Unsolicited, unwanted, and sometimes malicious electronic messages indiscriminately transmitted to a large number of people.
CyberWire Glossary link: https://thecyberwire.com/glossary/spam
Audio reference link: zumpzump, 2007. Monty Python - Spam [Video]. YouTube. URL https://www.youtube.com/watch?v=anwy2MPT5RE.</description>
      <pubDate>Tue, 27 Jun 2023 07:00:00 -0000</pubDate>
      <itunes:title>spam (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>154</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Unsolicited, unwanted, and sometimes malicious electronic messages indiscriminately transmitted to a large number of people.
CyberWire Glossary link: https://thecyberwire.com/glossary/spam
Audio reference link: zumpzump, 2007. Monty Python - Spam [Video]. YouTube. URL https://www.youtube.com/watch?v=anwy2MPT5RE.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Unsolicited, unwanted, and sometimes malicious electronic messages indiscriminately transmitted to a large number of people.</p><p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/spam">https://thecyberwire.com/glossary/spam</a></p><p>Audio reference link: zumpzump, 2007. Monty Python - Spam [Video]. YouTube. URL <a href="https://www.youtube.com/watch?v=anwy2MPT5RE">https://www.youtube.com/watch?v=anwy2MPT5RE</a>.</p>]]>
      </content:encoded>
      <itunes:duration>469</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[38502f52-11f4-11ee-bfa3-9778b693bbe9]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW3438998798.mp3?updated=1687544324" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Risky chat applications.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/248/notes</link>
      <description>Toby Pischl, Head of Information &amp; Email Security at Broadcom, sits down with Dave to discuss how Slack and Microsoft Teams phishing is an open door into businesses. Joe and Dave share some follow up regarding a case of a woman claiming to have cancer to receive over $37,000 from donors on GoFundMe. Joe has the terrible story out of Michigan where a high schooler committed suicide after a sextortion scam. Dave has a story on job seekers around the country and how likely they are to fall for a job scam. Our catch of the day comes from listener Albert, who writes in regarding the German phishing emails he keeps receiving.
Links to stories:

Madison Russo pleads guilty to theft in cancer scheme

High school football player Jordan DeMay driven to suicide after Nigerian sextortion scam, anguished family reveals

Michigan family sounds alarm on son's 'sextortion' suicide after arrests of 3 Nigerian men

Three Nigerian Men Awaiting Extradition For Committing Sexual Extortion

1 in 3 Recent Job Seekers Have Been Tricked Into Applying for a Fake Job Scam


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 22 Jun 2023 05:00:00 -0000</pubDate>
      <itunes:title>Risky chat applications.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>248</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Toby Pischl, Head of Information &amp; Email Security at Broadcom, sits down with Dave to discuss how Slack and Microsoft Teams phishing is an open door into businesses. Joe and Dave share some follow up regarding a case of a woman claiming to have cancer to receive over $37,000 from donors on GoFundMe. Joe has the terrible story out of Michigan where a high schooler committed suicide after a sextortion scam. Dave has a story on job seekers around the country and how likely they are to fall for a job scam. Our catch of the day comes from listener Albert, who writes in regarding the German phishing emails he keeps receiving.
Links to stories:

Madison Russo pleads guilty to theft in cancer scheme

High school football player Jordan DeMay driven to suicide after Nigerian sextortion scam, anguished family reveals

Michigan family sounds alarm on son's 'sextortion' suicide after arrests of 3 Nigerian men

Three Nigerian Men Awaiting Extradition For Committing Sexual Extortion

1 in 3 Recent Job Seekers Have Been Tricked Into Applying for a Fake Job Scam


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Toby Pischl, Head of Information &amp; Email Security at Broadcom, sits down with Dave to discuss how Slack and Microsoft Teams phishing is an open door into businesses. Joe and Dave share some follow up regarding a case of a woman claiming to have cancer to receive over $37,000 from donors on GoFundMe. Joe has the terrible story out of Michigan where a high schooler committed suicide after a sextortion scam. Dave has a story on job seekers around the country and how likely they are to fall for a job scam. Our catch of the day comes from listener Albert, who writes in regarding the German phishing emails he keeps receiving.</p><p>Links to stories:</p><ul>
<li><a href="https://www.wqad.com/article/news/crime/madison-russo-pleads-guilty-theft-gofundme-scam/526-985cb45d-87a0-42fe-9843-797801ef60ab">Madison Russo pleads guilty to theft in cancer scheme</a></li>
<li><a href="https://nypost.com/2023/06/14/mich-family-speaks-out-about-sons-sextortion-suicide-after-nigerian-scam/">High school football player Jordan DeMay driven to suicide after Nigerian sextortion scam, anguished family reveals</a></li>
<li><a href="https://www.foxnews.com/us/michigan-family-sounds-alarm-sons-sextortion-suicide-arrests-3-nigerian-men">Michigan family sounds alarm on son's 'sextortion' suicide after arrests of 3 Nigerian men</a></li>
<li><a href="https://www.justice.gov/usao-wdmi/pr/2023_0503_Sextortion_Indictment">Three Nigerian Men Awaiting Extradition For Committing Sexual Extortion</a></li>
<li><a href="https://www.passwordmanager.com/1-in-3-recent-job-seekers-have-been-tricked-into-applying-for-a-fake-job-scam/">1 in 3 Recent Job Seekers Have Been Tricked Into Applying for a Fake Job Scam</a></li>
</ul><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>3118</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[883960ee-7ff3-11ed-8345-376985940e0c]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW9389415874.mp3?updated=1687363590" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>CISA (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/153/notes</link>
      <description>A US Department of Homeland Security agency tasked with supporting cyber and physical security for US critical infrastructure.
CyberWire Glossary link: https://thecyberwire.com/glossary/cybersecurity-and-infrastructure-security-agency
Audio reference link: CISA, 2021. CISA Director Jen Easterly’s Keynote at Black Hat USA 2021 [Video]. YouTube. URL https://www.youtube.com/watch?v=q7bu-L-m4K4.</description>
      <pubDate>Tue, 20 Jun 2023 07:00:00 -0000</pubDate>
      <itunes:title>CISA (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>153</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A US Department of Homeland Security agency tasked with supporting cyber and physical security for US critical infrastructure.
CyberWire Glossary link: https://thecyberwire.com/glossary/cybersecurity-and-infrastructure-security-agency
Audio reference link: CISA, 2021. CISA Director Jen Easterly’s Keynote at Black Hat USA 2021 [Video]. YouTube. URL https://www.youtube.com/watch?v=q7bu-L-m4K4.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A US Department of Homeland Security agency tasked with supporting cyber and physical security for US critical infrastructure.</p><p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/cybersecurity-and-infrastructure-security-agency">https://thecyberwire.com/glossary/cybersecurity-and-infrastructure-security-agency</a></p><p>Audio reference link: CISA, 2021. CISA Director Jen Easterly’s Keynote at Black Hat USA 2021 [Video]. YouTube. URL <a href="https://www.youtube.com/watch?v=q7bu-L-m4K4">https://www.youtube.com/watch?v=q7bu-L-m4K4</a>.</p>]]>
      </content:encoded>
      <itunes:duration>448</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[5bb82864-11f4-11ee-aba2-67c961706425]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW8053396965.mp3?updated=1687442484" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Replier attacks: the latest tool in a hacker's arsenal. </title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/247/notes</link>
      <description>This week, Jeremy Fuchs from Avanan joins Dave to discuss how hackers are using replier attacks. Replier attacks are attacks in which hackers change the reply-to address to send emails from what appears to be a reputable company, when in reality it's a spoofed account. Joe and Dave share some follow up from listeners Wayne who writes in with some comments on episode 245, and listener Michael, who writes about his first ChatGPT experience. Dave's story follows the alarming new trend happening, where sextortionists are making AI nudes from people's social media images. Joe's story uncovers the social engineering trick hackers use from their personal scammers handbook. Our catch of the day comes from listener Tim, who shares a message from a "dear friend."
Links to stories:

Sextortionists are making AI nudes from your social media images

Offbeat Social Engineering Tricks in a Scammer’s Handbook


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 15 Jun 2023 05:00:00 -0000</pubDate>
      <itunes:title>Replier attacks: the latest tool in a hacker's arsenal. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>247</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>This week, Jeremy Fuchs from Avanan joins Dave to discuss how hackers are using replier attacks. Replier attacks are attacks in which hackers change the reply-to address to send emails from what appears to be a reputable company, when in reality it's a spoofed account. Joe and Dave share some follow up from listeners Wayne who writes in with some comments on episode 245, and listener Michael, who writes about his first ChatGPT experience. Dave's story follows the alarming new trend happening, where sextortionists are making AI nudes from people's social media images. Joe's story uncovers the social engineering trick hackers use from their personal scammers handbook. Our catch of the day comes from listener Tim, who shares a message from a "dear friend."
Links to stories:

Sextortionists are making AI nudes from your social media images

Offbeat Social Engineering Tricks in a Scammer’s Handbook


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This week, Jeremy Fuchs from Avanan joins Dave to discuss how hackers are using replier attacks. Replier attacks are attacks in which hackers change the reply-to address to send emails from what appears to be a reputable company, when in reality it's a spoofed account. Joe and Dave share some follow up from listeners Wayne who writes in with some comments on episode 245, and listener Michael, who writes about his first ChatGPT experience. Dave's story follows the alarming new trend happening, where sextortionists are making AI nudes from people's social media images. Joe's story uncovers the social engineering trick hackers use from their personal scammers handbook. Our catch of the day comes from listener Tim, who shares a message from a "dear friend."</p><p>Links to stories:</p><ul>
<li><a href="https://www.bleepingcomputer.com/news/security/sextortionists-are-making-ai-nudes-from-your-social-media-images/">Sextortionists are making AI nudes from your social media images</a></li>
<li><a href="https://www.tripwire.com/state-of-security/offbeat-social-engineering-tricks-scammers-handbook">Offbeat Social Engineering Tricks in a Scammer’s Handbook</a></li>
</ul><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>3158</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[8824ce18-7ff3-11ed-8345-4b1b35705fd7]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW2643548524.mp3?updated=1686754965" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>dumpster diving (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/152/notes</link>
      <description>The act of searching through an organization's trash for discarded sensitive material. 
CyberWire Glossary link: https://thecyberwire.com/glossary/dumpster-diving
Audio reference link: “Better Call Saul jimmy digs in the Sandpiper trash scene,” uploaded by Robert Bowersock, 18 September 2022.</description>
      <pubDate>Tue, 13 Jun 2023 07:00:00 -0000</pubDate>
      <itunes:title>dumpster diving (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>152</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>The act of searching through an organization's trash for discarded sensitive material. 
CyberWire Glossary link: https://thecyberwire.com/glossary/dumpster-diving
Audio reference link: “Better Call Saul jimmy digs in the Sandpiper trash scene,” uploaded by Robert Bowersock, 18 September 2022.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The act of searching through an organization's trash for discarded sensitive material. </p><p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/dumpster-diving">https://thecyberwire.com/glossary/dumpster-diving</a></p><p>Audio reference link: “<a href="https://www.youtube.com/watch?v=e7gCn2H7pnw">Better Call Saul jimmy digs in the Sandpiper trash scene</a>,” uploaded by Robert Bowersock, 18 September 2022.</p>]]>
      </content:encoded>
      <itunes:duration>428</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[dc9e40c6-09fc-11ee-88df-4fd4c5eab1e5]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW5073500871.mp3?updated=1686595336" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Criminals...assemble! [Hacking humans goes to the movies]</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans-goes-to-the-movies/20/notes</link>
      <description>Thanks for joining us again for another episode of fun project brought to you by the team of Hacking Humans, the CyberWire's social engineering podcast. Hacking Humans co-host Dave Bittner is joined by Rick Howard in this series where they view clips from their favorite movies and television shows with examples of the social engineering scams and schemes you hear Dave and co-host Joe Carrigan talk about on Hacking Humans. In this episode, Dave and Rick watch each of the selected scenes, describe the on-screen action for you, and then they deconstruct what they saw. Grab your bowl of popcorn and join us for some fantastic scams and frauds.
Links to this episode's clips if you'd like to watch along:

Dave's clip from the movie: Ocean's 8


Rick's clip from the movie: Avengers Endgame</description>
      <pubDate>Sun, 11 Jun 2023 07:00:00 -0000</pubDate>
      <itunes:title>Criminals...assemble! [Hacking humans goes to the movies]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>20</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Thanks for joining us again for another episode of fun project brought to you by the team of Hacking Humans, the CyberWire's social engineering podcast. Hacking Humans co-host Dave Bittner is joined by Rick Howard in this series where they view clips from their favorite movies and television shows with examples of the social engineering scams and schemes you hear Dave and co-host Joe Carrigan talk about on Hacking Humans. In this episode, Dave and Rick watch each of the selected scenes, describe the on-screen action for you, and then they deconstruct what they saw. Grab your bowl of popcorn and join us for some fantastic scams and frauds.
Links to this episode's clips if you'd like to watch along:

Dave's clip from the movie: Ocean's 8


Rick's clip from the movie: Avengers Endgame</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Thanks for joining us again for another episode of fun project brought to you by the team of Hacking Humans, the CyberWire's social engineering podcast. Hacking Humans co-host Dave Bittner is joined by Rick Howard in this series where they view clips from their favorite movies and television shows with examples of the social engineering scams and schemes you hear Dave and co-host Joe Carrigan talk about on Hacking Humans. In this episode, Dave and Rick watch each of the selected scenes, describe the on-screen action for you, and then they deconstruct what they saw. Grab your bowl of popcorn and join us for some fantastic scams and frauds.</p><p>Links to this episode's clips if you'd like to watch along:</p><ul>
<li>Dave's clip from the movie: <a href="https://www.youtube.com/watch?v=rA_h1TuwC8g">Ocean's 8</a>
</li>
<li>Rick's clip from the movie: <a href="https://www.youtube.com/watch?v=uKndgvIu5MY">Avengers Endgame</a>
</li>
</ul>]]>
      </content:encoded>
      <itunes:duration>1851</itunes:duration>
      <guid isPermaLink="false"><![CDATA[0d6aca76-06f6-11ee-abe2-d70d690f29cc]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW7955249587.mp3?updated=1686333760" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The rise of ChatGPT: A look into the future of chatbots.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/246/notes</link>
      <description>This week, our CyberWire UK Correspondent Carole Theriault is talking with Paul Ducklin from Sophos about where ChatGPT could be going in the future. Joe and Dave share quite a bit of follow up from listeners, discussing several people writing in about dating apps and the men who use them, along with a question from listener Bryan who asks about an email scheme an intern working for his company received. Joe's story hones in on AI, discussing in particular how artificial intelligence is changing the social engineering game forever. Dave has the story on how hackers hide malicious links within pictures to redirect users to phishing sites. Our catch of the day comes from listener Cyrus, who shares an email they received about benefits with a hilarious twist.
Links to stories:

How AI Is Changing Social Engineering Forever

The Picture in Picture Attack


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 08 Jun 2023 05:00:00 -0000</pubDate>
      <itunes:title>The rise of ChatGPT: A look into the future of chatbots.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>246</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>This week, our CyberWire UK Correspondent Carole Theriault is talking with Paul Ducklin from Sophos about where ChatGPT could be going in the future. Joe and Dave share quite a bit of follow up from listeners, discussing several people writing in about dating apps and the men who use them, along with a question from listener Bryan who asks about an email scheme an intern working for his company received. Joe's story hones in on AI, discussing in particular how artificial intelligence is changing the social engineering game forever. Dave has the story on how hackers hide malicious links within pictures to redirect users to phishing sites. Our catch of the day comes from listener Cyrus, who shares an email they received about benefits with a hilarious twist.
Links to stories:

How AI Is Changing Social Engineering Forever

The Picture in Picture Attack


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This week, our CyberWire UK Correspondent Carole Theriault is talking with Paul Ducklin from Sophos about where ChatGPT could be going in the future. Joe and Dave share quite a bit of follow up from listeners, discussing several people writing in about dating apps and the men who use them, along with a question from listener Bryan who asks about an email scheme an intern working for his company received. Joe's story hones in on AI, discussing in particular how artificial intelligence is changing the social engineering game forever. Dave has the story on how hackers hide malicious links within pictures to redirect users to phishing sites. Our catch of the day comes from listener Cyrus, who shares an email they received about benefits with a hilarious twist.</p><p>Links to stories:</p><ul>
<li><a href="https://www.forbes.com/sites/forbestechcouncil/2023/05/26/how-ai-is-changing-social-engineering-forever/?sh=1687cac3321b">How AI Is Changing Social Engineering Forever</a></li>
<li><a href="https://www.avanan.com/blog/the-picture-in-picture-attack?hs_preview=ZnhmLxTb-117347602219">The Picture in Picture Attack</a></li>
</ul><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>3205</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[880b529e-7ff3-11ed-8345-6bdb96adf697]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW1639920163.mp3?updated=1686156371" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>SEO poisoning (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/151/notes</link>
      <description>The manipulation of search engine optimization, SEO, to promote malicious sites in search engine results.
CyberWire Glossary link: https://thecyberwire.com/glossary/search-engine-optimization-poisoning
Audio reference link: Brown, B.E., 2021. The Ending Of The Waldo Moment Explained [Video]. YouTube. URL https://www.youtube.com/watch?v=HsWja44-EMg.</description>
      <pubDate>Tue, 06 Jun 2023 07:00:00 -0000</pubDate>
      <itunes:title>SEO poisoning (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>151</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>The manipulation of search engine optimization, SEO, to promote malicious sites in search engine results.
CyberWire Glossary link: https://thecyberwire.com/glossary/search-engine-optimization-poisoning
Audio reference link: Brown, B.E., 2021. The Ending Of The Waldo Moment Explained [Video]. YouTube. URL https://www.youtube.com/watch?v=HsWja44-EMg.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The manipulation of search engine optimization, SEO, to promote malicious sites in search engine results.</p><p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/search-engine-optimization-poisoning">https://thecyberwire.com/glossary/search-engine-optimization-poisoning</a></p><p>Audio reference link: Brown, B.E., 2021. The Ending Of The Waldo Moment Explained [Video]. YouTube. URL <a href="https://www.youtube.com/watch?v=HsWja44-EMg">https://www.youtube.com/watch?v=HsWja44-EMg</a>.</p>]]>
      </content:encoded>
      <itunes:duration>379</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[3fbcc59a-03ce-11ee-a7d6-0ff73caca194]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW2899909951.mp3?updated=1685988500" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Are you who you say you are? </title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/245/notes</link>
      <description>Bala Kumar of Jumio joins to discuss how travel companies can combat the exponential rise in fraud and ensure their traveler is who they say they are. Dave and Joe share some listener follow up, with the first from Matt, who writes in with a strange Dick's Sporting Goods story about gift cards and credit cards. Our second follow up comes from listener King, who writes in regarding the QR discussion in episode 243. Dave's story follows how almost every US state has sued a telecom company after being accused of routing billions of illegal robocalls to millions of US residents on the do not call list. Joe's story is about a family losing $730,000 in a wire fraud scam, but with a twist ending. Our catch of the day comes from listener William, who writes in with an email laced with so much fraud, Gmail didn't even want Joe to open it to read it for this episode.
Links to stories:

48 states sue phone company that allegedly catered to needs of robocallers

Family loses $730K in wire fraud scam — and gets it all back


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 01 Jun 2023 05:00:00 -0000</pubDate>
      <itunes:title>Are you who you say you are? </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>245</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Bala Kumar of Jumio joins to discuss how travel companies can combat the exponential rise in fraud and ensure their traveler is who they say they are. Dave and Joe share some listener follow up, with the first from Matt, who writes in with a strange Dick's Sporting Goods story about gift cards and credit cards. Our second follow up comes from listener King, who writes in regarding the QR discussion in episode 243. Dave's story follows how almost every US state has sued a telecom company after being accused of routing billions of illegal robocalls to millions of US residents on the do not call list. Joe's story is about a family losing $730,000 in a wire fraud scam, but with a twist ending. Our catch of the day comes from listener William, who writes in with an email laced with so much fraud, Gmail didn't even want Joe to open it to read it for this episode.
Links to stories:

48 states sue phone company that allegedly catered to needs of robocallers

Family loses $730K in wire fraud scam — and gets it all back


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Bala Kumar of Jumio joins to discuss how travel companies can combat the exponential rise in fraud and ensure their traveler is who they say they are. Dave and Joe share some listener follow up, with the first from Matt, who writes in with a strange Dick's Sporting Goods story about gift cards and credit cards. Our second follow up comes from listener King, who writes in regarding the QR discussion in episode 243. Dave's story follows how almost every US state has sued a telecom company after being accused of routing billions of illegal robocalls to millions of US residents on the do not call list. Joe's story is about a family losing $730,000 in a wire fraud scam, but with a twist ending. Our catch of the day comes from listener William, who writes in with an email laced with so much fraud, Gmail didn't even want Joe to open it to read it for this episode.</p><p>Links to stories:</p><ul>
<li><a href="https://arstechnica.com/tech-policy/2023/05/48-states-sue-phone-company-that-allegedly-catered-to-needs-of-robocallers/">48 states sue phone company that allegedly catered to needs of robocallers</a></li>
<li><a href="https://www.9news.com/article/news/local/police-recover-730k-stolen-wire-fraud/73-fd9c1a37-61fb-4324-947d-4832dfe46907">Family loses $730K in wire fraud scam — and gets it all back</a></li>
</ul><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>2949</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[87f2a9a6-7ff3-11ed-8345-83446803ff16]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW1009487004.mp3?updated=1685550845" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>passkey (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/149/notes</link>
      <description>A passwordless authentication protocol based on the FIDO2 standard.
CyberWire Glossary link: https://thecyberwire.com/glossary/passkey
Audio reference link: Summers, J., 2023. Google Passkeys Have Arrived (here’s how to use them) [All Things Secured Channel]. YouTube. URL https://www.youtube.com/watch?v=oFO7JgUx-bU.</description>
      <pubDate>Tue, 30 May 2023 07:00:00 -0000</pubDate>
      <itunes:title>passkey (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>149</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A passwordless authentication protocol based on the FIDO2 standard.
CyberWire Glossary link: https://thecyberwire.com/glossary/passkey
Audio reference link: Summers, J., 2023. Google Passkeys Have Arrived (here’s how to use them) [All Things Secured Channel]. YouTube. URL https://www.youtube.com/watch?v=oFO7JgUx-bU.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A passwordless authentication protocol based on the FIDO2 standard.</p><p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/passkey">https://thecyberwire.com/glossary/passkey</a></p><p>Audio reference link: Summers, J., 2023. Google Passkeys Have Arrived (here’s how to use them) [All Things Secured Channel]. YouTube. URL <a href="https://www.youtube.com/watch?v=oFO7JgUx-bU">https://www.youtube.com/watch?v=oFO7JgUx-bU</a>.</p>]]>
      </content:encoded>
      <itunes:duration>448</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[66598e38-f8be-11ed-ba81-b33826896e52]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW8813161555.mp3?updated=1684772986" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>catfish (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/150/notes</link>
      <description>The practice of crafting a fake online persona for malicious purposes.
CyberWire Glossary link: https://thecyberwire.com/glossary/catfish
Audio reference link: netbunny, 2013. Catfish - The Movie - Ending Scene [Movie Scene]. YouTube. URL https://www.youtube.com/watch?v=qR_NIN6zy0U</description>
      <pubDate>Tue, 30 May 2023 05:00:00 -0000</pubDate>
      <itunes:title>catfish (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>150</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>The practice of crafting a fake online persona for malicious purposes.
CyberWire Glossary link: https://thecyberwire.com/glossary/catfish
Audio reference link: netbunny, 2013. Catfish - The Movie - Ending Scene [Movie Scene]. YouTube. URL https://www.youtube.com/watch?v=qR_NIN6zy0U</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The practice of crafting a fake online persona for malicious purposes.</p><p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/catfish">https://thecyberwire.com/glossary/catfish</a></p><p>Audio reference link: netbunny, 2013. Catfish - The Movie - Ending Scene [Movie Scene]. YouTube. URL <a href="https://www.youtube.com/watch?v=qR_NIN6zy0U">https://www.youtube.com/watch?v=qR_NIN6zy0U</a></p>]]>
      </content:encoded>
      <itunes:duration>423</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[d7747f5a-fbf8-11ed-928a-33f91abb39ac]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW4054174363.mp3?updated=1685127897" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Bringing in the human side of scamming.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/244/notes</link>
      <description>Nick Percoco from Kraken sits down to discuss the human factor of crypto scams, including going over common red flags and what to do when a third party is exerting pressure that taps into a human emotions. Listener Sean writes in with some follow up to discuss the increase in AI scams and if people would be more likely to talk about falling for these scams as AI becomes better and better. An anonymous listener also reached out with some follow up regarding there experience with corporate ID theft. Joe's story follows the report on "dark patterns," and what they are. Dave's story is on people who got hired as customer service reps, but instead helped lure in lonely and lovestruck through a network of dating and hookup sites. Our catch of the day comes from listener Gareth who shares his catch of a phishing scheme from the "NSA."
Links to stories:

Guide to Dark Patterns – Terms and examples from the CCPA and the CPA

Bringing Dark Patterns to Light

This Is Catfishing on an Industrial Scale


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 25 May 2023 05:00:00 -0000</pubDate>
      <itunes:title>Bringing in the human side of scamming.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>244</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Nick Percoco from Kraken sits down to discuss the human factor of crypto scams, including going over common red flags and what to do when a third party is exerting pressure that taps into a human emotions. Listener Sean writes in with some follow up to discuss the increase in AI scams and if people would be more likely to talk about falling for these scams as AI becomes better and better. An anonymous listener also reached out with some follow up regarding there experience with corporate ID theft. Joe's story follows the report on "dark patterns," and what they are. Dave's story is on people who got hired as customer service reps, but instead helped lure in lonely and lovestruck through a network of dating and hookup sites. Our catch of the day comes from listener Gareth who shares his catch of a phishing scheme from the "NSA."
Links to stories:

Guide to Dark Patterns – Terms and examples from the CCPA and the CPA

Bringing Dark Patterns to Light

This Is Catfishing on an Industrial Scale


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Nick Percoco from Kraken sits down to discuss the human factor of crypto scams, including going over common red flags and what to do when a third party is exerting pressure that taps into a human emotions. Listener Sean writes in with some follow up to discuss the increase in AI scams and if people would be more likely to talk about falling for these scams as AI becomes better and better. An anonymous listener also reached out with some follow up regarding there experience with corporate ID theft. Joe's story follows the report on "dark patterns," and what they are. Dave's story is on people who got hired as customer service reps, but instead helped lure in lonely and lovestruck through a network of dating and hookup sites. Our catch of the day comes from listener Gareth who shares his catch of a phishing scheme from the "NSA."</p><p>Links to stories:</p><ul>
<li><a href="https://www.merudata.com/single-post/guide-to-dark-patterns-terms-and-examples-from-the-ccpa-and-the-cpa">Guide to Dark Patterns – Terms and examples from the CCPA and the CPA</a></li>
<li><a href="https://www.ftc.gov/system/files/ftc_gov/pdf/P214800%20Dark%20Patterns%20Report%209.14.2022%20-%20FINAL.pdf">Bringing Dark Patterns to Light</a></li>
<li><a href="https://www.wired.com/story/catfishing-customer-support-love/">This Is Catfishing on an Industrial Scale</a></li>
</ul><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>3988</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[87d9a7a8-7ff3-11ed-8345-1f57f67ff63c]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW7093784363.mp3?updated=1684952294" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>QR code phishing (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/148/notes</link>
      <description>A type of phishing attack that uses QR codes as the lure.
CyberWire Glossary link: https://thecyberwire.com/glossary/qr-code-phishing
Audio reference link: KNR, 2018. Batman The Dark Knight Joker bomb blast by phone calls scene [Video]. YouTube. URL https://www.youtube.com/watch?v=qB_fXfzB4z0.</description>
      <pubDate>Tue, 23 May 2023 07:00:00 -0000</pubDate>
      <itunes:title>QR code phishing (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>148</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A type of phishing attack that uses QR codes as the lure.
CyberWire Glossary link: https://thecyberwire.com/glossary/qr-code-phishing
Audio reference link: KNR, 2018. Batman The Dark Knight Joker bomb blast by phone calls scene [Video]. YouTube. URL https://www.youtube.com/watch?v=qB_fXfzB4z0.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A type of phishing attack that uses QR codes as the lure.</p><p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/qr-code-phishing">https://thecyberwire.com/glossary/qr-code-phishing</a></p><p>Audio reference link: KNR, 2018. Batman The Dark Knight Joker bomb blast by phone calls scene [Video]. YouTube. URL <a href="https://www.youtube.com/watch?v=qB_fXfzB4z0">https://www.youtube.com/watch?v=qB_fXfzB4z0</a>.</p>]]>
      </content:encoded>
      <itunes:duration>479</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[11561dca-f675-11ed-a1b0-63cec5d5ae2b]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW3734298169.mp3?updated=1684165443" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Who says the perfect heist doesn't exist? [Hacking Humans Goes to the Movies]</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans-goes-to-the-movies/19/notes</link>
      <description>Thanks for joining us again for another episode of fun project brought to you by the team of Hacking Humans, the CyberWire's social engineering podcast. Hacking Humans co-host Dave Bittner is joined by Rick Howard in this series where they view clips from their favorite movies and television shows with examples of the social engineering scams and schemes you hear Dave and co-host Joe Carrigan talk about on Hacking Humans. In this episode, Dave and Rick watch each of the selected scenes, describe the on-screen action for you, and then they deconstruct what they saw. Grab your bowl of popcorn and join us for some fantastic scams and frauds.
Links to this episode's clips if you'd like to watch along:

Dave's clip from the movie Out of Sight


Rick's clip from the movie The Thomas Crown Affair</description>
      <pubDate>Sun, 21 May 2023 05:00:00 -0000</pubDate>
      <itunes:title>Who says the perfect heist doesn't exist? [Hacking Humans Goes to the Movies]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>19</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Thanks for joining us again for another episode of fun project brought to you by the team of Hacking Humans, the CyberWire's social engineering podcast. Hacking Humans co-host Dave Bittner is joined by Rick Howard in this series where they view clips from their favorite movies and television shows with examples of the social engineering scams and schemes you hear Dave and co-host Joe Carrigan talk about on Hacking Humans. In this episode, Dave and Rick watch each of the selected scenes, describe the on-screen action for you, and then they deconstruct what they saw. Grab your bowl of popcorn and join us for some fantastic scams and frauds.
Links to this episode's clips if you'd like to watch along:

Dave's clip from the movie Out of Sight


Rick's clip from the movie The Thomas Crown Affair</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Thanks for joining us again for another episode of fun project brought to you by the team of Hacking Humans, the CyberWire's social engineering podcast. Hacking Humans co-host Dave Bittner is joined by Rick Howard in this series where they view clips from their favorite movies and television shows with examples of the social engineering scams and schemes you hear Dave and co-host Joe Carrigan talk about on Hacking Humans. In this episode, Dave and Rick watch each of the selected scenes, describe the on-screen action for you, and then they deconstruct what they saw. Grab your bowl of popcorn and join us for some fantastic scams and frauds.</p><p>Links to this episode's clips if you'd like to watch along:</p><ul>
<li>Dave's clip from the movie <a href="youtube.com/watch?v=-RJ6USD2nEU">Out of Sight</a>
</li>
<li>Rick's clip from the movie <a href="https://www.youtube.com/watch?v=kJKWjeMtEDM">The Thomas Crown Affair</a>
</li>
</ul>]]>
      </content:encoded>
      <itunes:duration>1346</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[465dbe42-f675-11ed-a1b0-db1c2d0691d5]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW9219593313.mp3?updated=1684523994" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Data privacy in a consumers world.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/243/notes</link>
      <description>Our guest, Mark Kapczynski from OneRep, joins Dave to discuss what consumers should know about data privacy. Listener Jon writes in to the show with some follow-up with some thoughts on tap interface. Another anonymous listener wrote into the show discussing ethical hacking. Dave's story is on fake QR codes and how people are getting scammed out of money after receiving a fake QR code parking ticket survey. Joe's story follows an attempted attack at Dragos and what they didn't get. Our catch of the day comes from listener Richard who writes in with a fun scam he caught from the "Marine Corps."
Links to stories:

QR codes used in fake parking tickets, surveys to steal your money

Deconstructing a Cybersecurity Event


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 18 May 2023 05:00:00 -0000</pubDate>
      <itunes:title>Data privacy in a consumers world.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>243</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Our guest, Mark Kapczynski from OneRep, joins Dave to discuss what consumers should know about data privacy. Listener Jon writes in to the show with some follow-up with some thoughts on tap interface. Another anonymous listener wrote into the show discussing ethical hacking. Dave's story is on fake QR codes and how people are getting scammed out of money after receiving a fake QR code parking ticket survey. Joe's story follows an attempted attack at Dragos and what they didn't get. Our catch of the day comes from listener Richard who writes in with a fun scam he caught from the "Marine Corps."
Links to stories:

QR codes used in fake parking tickets, surveys to steal your money

Deconstructing a Cybersecurity Event


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Our guest, Mark Kapczynski from OneRep, joins Dave to discuss what consumers should know about data privacy. Listener Jon writes in to the show with some follow-up with some thoughts on tap interface. Another anonymous listener wrote into the show discussing ethical hacking. Dave's story is on fake QR codes and how people are getting scammed out of money after receiving a fake QR code parking ticket survey. Joe's story follows an attempted attack at Dragos and what they didn't get. Our catch of the day comes from listener Richard who writes in with a fun scam he caught from the "Marine Corps."</p><p>Links to stories:</p><ul>
<li><a href="https://www.bleepingcomputer.com/news/security/qr-codes-used-in-fake-parking-tickets-surveys-to-steal-your-money/">QR codes used in fake parking tickets, surveys to steal your money</a></li>
<li><a href="https://www.dragos.com/blog/deconstructing-a-cybersecurity-event/">Deconstructing a Cybersecurity Event</a></li>
</ul><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>3871</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[87bfe566-7ff3-11ed-8345-274dc4a01eb8]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW3486274134.mp3?updated=1684257459" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>attribution (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/147/notes</link>
      <description>Definition one: The recognition of a set of repeatable attack patterns across the intrusion kill chain.
Definition two: Determining the responsibility for offensive cyber operations.
CyberWire Glossary link: https://thecyberwire.com/glossary/attribution
Audio reference link: Nunnikhoven, M., 2018. Cybersecurity Basics #9 - Attack Attribution [Video]. YouTube. URL www.youtube.com/watch?v=rlyMz5jN_Vs</description>
      <pubDate>Tue, 16 May 2023 07:00:00 -0000</pubDate>
      <itunes:title>attribution (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>147</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Definition one: The recognition of a set of repeatable attack patterns across the intrusion kill chain.
Definition two: Determining the responsibility for offensive cyber operations.
CyberWire Glossary link: https://thecyberwire.com/glossary/attribution
Audio reference link: Nunnikhoven, M., 2018. Cybersecurity Basics #9 - Attack Attribution [Video]. YouTube. URL www.youtube.com/watch?v=rlyMz5jN_Vs</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Definition one: The recognition of a set of repeatable attack patterns across the intrusion kill chain.</p><p>Definition two: Determining the responsibility for offensive cyber operations.</p><p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/attribution">https://thecyberwire.com/glossary/attribution</a></p><p>Audio reference link: Nunnikhoven, M., 2018. Cybersecurity Basics #9 - Attack Attribution [Video]. YouTube. URL <a href="http://www.youtube.com/watch?v=rlyMz5jN_Vs">www.youtube.com/watch?v=rlyMz5jN_Vs</a></p>]]>
      </content:encoded>
      <itunes:duration>564</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[4f537256-eb64-11ed-9572-8fcb521d64a4]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW4720048684.mp3?updated=1683304115" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Remedies for infectious computers.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/242/notes</link>
      <description>Our guest, CW Walker, Director of Security Product Strategy at SpyCloud, joins to discuss post-infection remediation and ransomware defense. Joe compliments one of his least favorite big tech companies. Joe and Dave share quite a bit of follow-up; one from listener Clayton who writes in about “fast idiots” from a previous episode. The other is from listener Robert, who writes in about the wallet versus smart phone debate, and which is safer. Joe shares a few stories this week, all regarding ATM scams and lost or stolen credit cards including his own sons ATM nightmare. Dave's scary story is on the latest hot topic in the cyber industry: AI, and how families are being scammed by believable voice AI to sound like loved ones. Listener Michael shares this week's catch of the day on an IRS scam he came across in his email.
Links to stories:

Chase Bank didn't believe customers with accounts drained by ATM 'tap' feature scam

Lost or Stolen Credit, ATM, and Debit Cards

Family targeted by AI scam using loved one’s voice


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 11 May 2023 05:00:00 -0000</pubDate>
      <itunes:title>Remedies for infectious computers.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>242</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Our guest, CW Walker, Director of Security Product Strategy at SpyCloud, joins to discuss post-infection remediation and ransomware defense. Joe compliments one of his least favorite big tech companies. Joe and Dave share quite a bit of follow-up; one from listener Clayton who writes in about “fast idiots” from a previous episode. The other is from listener Robert, who writes in about the wallet versus smart phone debate, and which is safer. Joe shares a few stories this week, all regarding ATM scams and lost or stolen credit cards including his own sons ATM nightmare. Dave's scary story is on the latest hot topic in the cyber industry: AI, and how families are being scammed by believable voice AI to sound like loved ones. Listener Michael shares this week's catch of the day on an IRS scam he came across in his email.
Links to stories:

Chase Bank didn't believe customers with accounts drained by ATM 'tap' feature scam

Lost or Stolen Credit, ATM, and Debit Cards

Family targeted by AI scam using loved one’s voice


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Our guest, CW Walker, Director of Security Product Strategy at SpyCloud, joins to discuss post-infection remediation and ransomware defense. Joe compliments one of his least favorite big tech companies. Joe and Dave share quite a bit of follow-up; one from listener Clayton who writes in about “fast idiots” from a previous episode. The other is from listener Robert, who writes in about the wallet versus smart phone debate, and which is safer. Joe shares a few stories this week, all regarding ATM scams and lost or stolen credit cards including his own sons ATM nightmare. Dave's scary story is on the latest hot topic in the cyber industry: AI, and how families are being scammed by believable voice AI to sound like loved ones. Listener Michael shares this week's catch of the day on an IRS scam he came across in his email.</p><p>Links to stories:</p><ul>
<li><a href="https://abc7news.com/atm-rights-consumer-banking-bank-scam/13209137/">Chase Bank didn't believe customers with accounts drained by ATM 'tap' feature scam</a></li>
<li><a href="https://consumer.ftc.gov/articles/lost-or-stolen-credit-atm-debit-cards">Lost or Stolen Credit, ATM, and Debit Cards</a></li>
<li><a href="https://www.actionnews5.com/2023/04/28/family-targeted-by-ai-scam-using-loved-ones-voice/">Family targeted by AI scam using loved one’s voice</a></li>
</ul><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>3439</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[87a37ec6-7ff3-11ed-8345-43d38b0e3024]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW8285997515.mp3?updated=1683666578" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>spear phishing (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/146/notes</link>
      <description>A type of cyber attack where an attacker sends a targeted and personalized email or other form of communication to a specific individual or a small group of individuals with the intention of tricking them into divulging sensitive information, such as a password, or convincing them to click a malicious link that will enable the attacker to take control of the victim's machine.
CyberWire Glossary link: https://thecyberwire.com/glossary/spearphishing
Audio reference link: Richardson, T., 2014. What is the difference between phishing and spear-phishing? [Video]. YouTube. URL www.youtube.com/watch?v=Wpx5IMduWX4.</description>
      <pubDate>Tue, 09 May 2023 07:00:00 -0000</pubDate>
      <itunes:title>spear phishing (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>146</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A type of cyber attack where an attacker sends a targeted and personalized email or other form of communication to a specific individual or a small group of individuals with the intention of tricking them into divulging sensitive information, such as a password, or convincing them to click a malicious link that will enable the attacker to take control of the victim's machine.
CyberWire Glossary link: https://thecyberwire.com/glossary/spearphishing
Audio reference link: Richardson, T., 2014. What is the difference between phishing and spear-phishing? [Video]. YouTube. URL www.youtube.com/watch?v=Wpx5IMduWX4.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A type of cyber attack where an attacker sends a targeted and personalized email or other form of communication to a specific individual or a small group of individuals with the intention of tricking them into divulging sensitive information, such as a password, or convincing them to click a malicious link that will enable the attacker to take control of the victim's machine.</p><p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/spearphishing">https://thecyberwire.com/glossary/spearphishing</a></p><p>Audio reference link: Richardson, T., 2014. What is the difference between phishing and spear-phishing? [Video]. YouTube. URL <a href="https://www.youtube.com/watch?v=Wpx5IMduWX4">www.youtube.com/watch?v=Wpx5IMduWX4</a>.</p>]]>
      </content:encoded>
      <itunes:duration>430</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[0f859a64-e844-11ed-85c0-73863a8987e4]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW3449939570.mp3?updated=1682962371" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Encore: Human errors and why they're made. </title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/203/notes</link>
      <description>Josh Yavor, CISO at Tessian, joins Dave to discuss a new report they released on cyber mistakes and why employees make them. Joe and Dave share a listener follow-up from Jon, who writes in about mental illness, a serious epidemic taking over the nation. Jon shares interesting tidbits on social media linking to mental illness and the impact it's creating. Dave's story is on hackers trying an old trick with new mechanics: impersonating well known companies. This time, hackers are posing as Quickbooks. Joe's story describes how LinkedIn users are being targeted yet again. These fraudsters are now creating significant threats to users, according to the FBI. Finally, our catch of the day comes from listener Jennifer, who writes in and shares her story of a scammer using SMS to tell her that her Venmo account was hacked, even though she does not have one.
Links to stories:

Sending Phishing Emails from QuickBooks

FBI says fraud on LinkedIn a ‘significant threat’ to platform and consumers


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter</description>
      <pubDate>Thu, 04 May 2023 05:00:00 -0000</pubDate>
      <itunes:title>Encore: Human errors and why they're made. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>203</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Josh Yavor, CISO at Tessian, joins Dave to discuss a new report they released on cyber mistakes and why employees make them. Joe and Dave share a listener follow-up from Jon, who writes in about mental illness, a serious epidemic taking over the nation. Jon shares interesting tidbits on social media linking to mental illness and the impact it's creating. Dave's story is on hackers trying an old trick with new mechanics: impersonating well known companies. This time, hackers are posing as Quickbooks. Joe's story describes how LinkedIn users are being targeted yet again. These fraudsters are now creating significant threats to users, according to the FBI. Finally, our catch of the day comes from listener Jennifer, who writes in and shares her story of a scammer using SMS to tell her that her Venmo account was hacked, even though she does not have one.
Links to stories:

Sending Phishing Emails from QuickBooks

FBI says fraud on LinkedIn a ‘significant threat’ to platform and consumers


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Josh Yavor, CISO at Tessian, joins Dave to discuss a new report they released on cyber mistakes and why employees make them. Joe and Dave share a listener follow-up from Jon, who writes in about mental illness, a serious epidemic taking over the nation. Jon shares interesting tidbits on social media linking to mental illness and the impact it's creating. Dave's story is on hackers trying an old trick with new mechanics: impersonating well known companies. This time, hackers are posing as Quickbooks. Joe's story describes how LinkedIn users are being targeted yet again. These fraudsters are now creating significant threats to users, according to the FBI. Finally, our catch of the day comes from listener Jennifer, who writes in and shares her story of a scammer using SMS to tell her that her Venmo account was hacked, even though she does not have one.</p><p>Links to stories:</p><ul>
<li><a href="https://www.avanan.com/blog/sending-phishing-emails-from-quickbooks">Sending Phishing Emails from QuickBooks</a></li>
<li><a href="https://www.cnbc.com/2022/06/17/fbi-says-fraud-on-linkedin-a-significant-threat-to-platform-and-consumers.html">FBI says fraud on LinkedIn a ‘significant threat’ to platform and consumers</a></li>
</ul><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a></p>]]>
      </content:encoded>
      <itunes:duration>3015</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[878a3d3a-7ff3-11ed-8345-f74c32b2a1f1]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW8567162054.mp3?updated=1682958675" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>resiliency (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/145/notes</link>
      <description>The ability to continuously deliver the intended outcome despite adverse cyber events.
CyberWire Glossary link: https://thecyberwire.com/glossary/resiliency
Audio reference link: Cameron, J., 1984. The Terminator [Movie]. IMDb. URL www.imdb.com/title/tt0088247/.
Clip Nation, 2012. The Arnold Schwarzenegger “I’ll Be Back” Supercut [Video]. YouTube. URL www.youtube.com/watch?v=-YEG9DgRHhA.
Coops, C., 2013. Terminator 2 Theme [Video]. YouTube. URL www.youtube.com/watch?v=pVZ2NShfCE8.</description>
      <pubDate>Tue, 02 May 2023 07:00:00 -0000</pubDate>
      <itunes:title>resiliency (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>145</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>The ability to continuously deliver the intended outcome despite adverse cyber events.
CyberWire Glossary link: https://thecyberwire.com/glossary/resiliency
Audio reference link: Cameron, J., 1984. The Terminator [Movie]. IMDb. URL www.imdb.com/title/tt0088247/.
Clip Nation, 2012. The Arnold Schwarzenegger “I’ll Be Back” Supercut [Video]. YouTube. URL www.youtube.com/watch?v=-YEG9DgRHhA.
Coops, C., 2013. Terminator 2 Theme [Video]. YouTube. URL www.youtube.com/watch?v=pVZ2NShfCE8.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The ability to continuously deliver the intended outcome despite adverse cyber events.</p><p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/resiliency">https://thecyberwire.com/glossary/resiliency</a></p><p>Audio reference link: Cameron, J., 1984. The Terminator [Movie]. IMDb. URL <a href="http://www.imdb.com/title/tt0088247/">www.imdb.com/title/tt0088247/</a>.</p><p>Clip Nation, 2012. The Arnold Schwarzenegger “I’ll Be Back” Supercut [Video]. YouTube. URL <a href="http://www.youtube.com/watch?v=-YEG9DgRHhA">www.youtube.com/watch?v=-YEG9DgRHhA</a>.</p><p>Coops, C., 2013. Terminator 2 Theme [Video]. YouTube. URL <a href="www.youtube.com/watch?v=pVZ2NShfCE8">www.youtube.com/watch?v=pVZ2NShfCE8</a>.</p>]]>
      </content:encoded>
      <itunes:duration>426</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[f70ab910-e843-11ed-b560-43ac8ea10a17]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW1378742998.mp3?updated=1682105889" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Is the industry ready for AI?</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/241/notes</link>
      <description>This week, Carole Theriault, CW UK correspondent, sits down with Cisco Talos' Vanja Svacjer discussing if the security industry is ready for AI. Joe and Dave share some follow up regarding a new term, "yahoo boy" after reading it in an article. Joe's follows a story about a scam where five mastermind business men were able to scam ordinary investors out of a billion dollars. Dave's story is on a basic iPhone feature that is helping criminals steal your entire digital life. Our catch of the day comes from William who writes in about an email he received from "Bob William" who shares that he works at a law firm and one of his clients has an insurance policy where his client did not write a will. Bob wants to share the amount of $12,820,000 with charity and then split the rest of the funds.
Links to stories:

On the hunt for the businessmen behind a billion-dollar scam

A Basic iPhone Feature Helps Criminals Steal Your Entire Digital Life


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 27 Apr 2023 05:00:00 -0000</pubDate>
      <itunes:title>Is the industry ready for AI?</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>241</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>This week, Carole Theriault, CW UK correspondent, sits down with Cisco Talos' Vanja Svacjer discussing if the security industry is ready for AI. Joe and Dave share some follow up regarding a new term, "yahoo boy" after reading it in an article. Joe's follows a story about a scam where five mastermind business men were able to scam ordinary investors out of a billion dollars. Dave's story is on a basic iPhone feature that is helping criminals steal your entire digital life. Our catch of the day comes from William who writes in about an email he received from "Bob William" who shares that he works at a law firm and one of his clients has an insurance policy where his client did not write a will. Bob wants to share the amount of $12,820,000 with charity and then split the rest of the funds.
Links to stories:

On the hunt for the businessmen behind a billion-dollar scam

A Basic iPhone Feature Helps Criminals Steal Your Entire Digital Life


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This week, Carole Theriault, CW UK correspondent, sits down with Cisco Talos' Vanja Svacjer discussing if the security industry is ready for AI. Joe and Dave share some follow up regarding a new term, "yahoo boy" after reading it in an article. Joe's follows a story about a scam where five mastermind business men were able to scam ordinary investors out of a billion dollars. Dave's story is on a basic iPhone feature that is helping criminals steal your entire digital life. Our catch of the day comes from William who writes in about an email he received from "Bob William" who shares that he works at a law firm and one of his clients has an insurance policy where his client did not write a will. Bob wants to share the amount of $12,820,000 with charity and then split the rest of the funds.</p><p>Links to stories:</p><ul>
<li><a href="https://www.bbc.com/news/world-65038949">On the hunt for the businessmen behind a billion-dollar scam</a></li>
<li><a href="https://www.wsj.com/articles/apple-iphone-security-theft-passcode-data-privacya-basic-iphone-feature-helps-criminals-steal-your-digital-life-cbf14b1a">A Basic iPhone Feature Helps Criminals Steal Your Entire Digital Life</a></li>
</ul><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>2541</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[6634a54c-b9da-11ec-8b6e-fbf1a4ed2801]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW1638579841.mp3?updated=1683126788" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Security Operations Center (SOC) (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/144/notes</link>
      <description>A centralized facility or team responsible for monitoring, detecting, analyzing, and responding to cybersecurity incidents within an organization.
CyberWire Glossary link: https://thecyberwire.com/glossary/security-operations-center
Audio reference link: AT&amp;T Tech Channel, 2012. A tour of AT&amp;T’s Network Operations Center (1979) [Video]. YouTube. URL www.youtube.com/watch?v=cigc3hvMyWw.﻿</description>
      <pubDate>Tue, 25 Apr 2023 07:00:00 -0000</pubDate>
      <itunes:title>Security Operations Center (SOC) (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>144</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A centralized facility or team responsible for monitoring, detecting, analyzing, and responding to cybersecurity incidents within an organization.
CyberWire Glossary link: https://thecyberwire.com/glossary/security-operations-center
Audio reference link: AT&amp;T Tech Channel, 2012. A tour of AT&amp;T’s Network Operations Center (1979) [Video]. YouTube. URL www.youtube.com/watch?v=cigc3hvMyWw.﻿</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A centralized facility or team responsible for monitoring, detecting, analyzing, and responding to cybersecurity incidents within an organization.</p><p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/security-operations-center">https://thecyberwire.com/glossary/security-operations-center</a></p><p>Audio reference link: AT&amp;T Tech Channel, 2012. A tour of AT&amp;T’s Network Operations Center (1979) [Video]. YouTube. URL <a href="https://www.youtube.com/watch?v=cigc3hvMyWw">www.youtube.com/watch?v=cigc3hvMyWw.﻿</a></p>]]>
      </content:encoded>
      <itunes:duration>477</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[fbb93858-dd47-11ed-9540-078b98664bed]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW4974498214.mp3?updated=1681753722" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Lazarus Group: Breaking down the evolution. </title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/240/notes</link>
      <description>This week, our guests are Jean Lee and Geoff White from BBC and the Lazarus Heist talking about what is coming up in Season 2 of their show and how the Lazarus Group is evolving. Joe briefly discusses Generative AI before going into his stories for this week. Joe's first story comes from Lauren Jackson from WBRC who writes in with a disturbing tire scam causing businesses to lose thousands. Joe's second story is from David Sentendrey from KDFW, who shares a story about a woman who fell victim to a romance scam loosing $75,000. Daves story follows a casino scam in Colorado, which was the largest heist in the states history. Our catch of the day comes from listener Morten who received a confusing message regarding an inheritance payment fund.
Links to stories:

Cullman Police warn of returning scam that has local businesses out thousands of dollars

Woman who lost $75K in worldwide online romance scam warning others of the danger

Black Hawk casino heist is largest in Colorado history


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 20 Apr 2023 05:00:00 -0000</pubDate>
      <itunes:title>Lazarus Group: Breaking down the evolution. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>240</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>This week, our guests are Jean Lee and Geoff White from BBC and the Lazarus Heist talking about what is coming up in Season 2 of their show and how the Lazarus Group is evolving. Joe briefly discusses Generative AI before going into his stories for this week. Joe's first story comes from Lauren Jackson from WBRC who writes in with a disturbing tire scam causing businesses to lose thousands. Joe's second story is from David Sentendrey from KDFW, who shares a story about a woman who fell victim to a romance scam loosing $75,000. Daves story follows a casino scam in Colorado, which was the largest heist in the states history. Our catch of the day comes from listener Morten who received a confusing message regarding an inheritance payment fund.
Links to stories:

Cullman Police warn of returning scam that has local businesses out thousands of dollars

Woman who lost $75K in worldwide online romance scam warning others of the danger

Black Hawk casino heist is largest in Colorado history


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This week, our guests are Jean Lee and Geoff White from BBC and the Lazarus Heist talking about what is coming up in Season 2 of their show and how the Lazarus Group is evolving. Joe briefly discusses Generative AI before going into his stories for this week. Joe's first story comes from Lauren Jackson from WBRC who writes in with a disturbing tire scam causing businesses to lose thousands. Joe's second story is from David Sentendrey from KDFW, who shares a story about a woman who fell victim to a romance scam loosing $75,000. Daves story follows a casino scam in Colorado, which was the largest heist in the states history. Our catch of the day comes from listener Morten who received a confusing message regarding an inheritance payment fund.</p><p>Links to stories:</p><ul>
<li><a href="https://www.wbrc.com/2023/04/11/cullman-police-warn-returning-scam-that-has-local-businesses-out-thousands-dollars/">Cullman Police warn of returning scam that has local businesses out thousands of dollars</a></li>
<li><a href="https://www.fox4news.com/news/online-romance-scam-yahoo-boys">Woman who lost $75K in worldwide online romance scam warning others of the danger</a></li>
<li><a href="https://www.9news.com/article/news/crime/500k-casino-heist-black-hawk/73-a16dbfc6-7755-45b2-8a95-ade063731263">Black Hawk casino heist is largest in Colorado history</a></li>
</ul><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>2945</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[66251cee-b9da-11ec-8b6e-774b3cadc482]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW5811310358.mp3?updated=1682013139" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Hunt forward operations (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/143/notes</link>
      <description>Defensive cyber operations carried out by U.S. Cyber Command's Cyber National Mission Force, CNMF at the request of allied nations.
CyberWire Glossary link: https://thecyberwire.com/glossary/hunt-forward-operation
Audio reference link: Paul Nakasone, G., 2022. Vanderbilt Summit Keynote [Video]. YouTube. URL www.youtube.com/watch?v=Axg4s9l9wi0.</description>
      <pubDate>Tue, 18 Apr 2023 07:00:00 -0000</pubDate>
      <itunes:title>Hunt forward operations (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>143</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Defensive cyber operations carried out by U.S. Cyber Command's Cyber National Mission Force, CNMF at the request of allied nations.
CyberWire Glossary link: https://thecyberwire.com/glossary/hunt-forward-operation
Audio reference link: Paul Nakasone, G., 2022. Vanderbilt Summit Keynote [Video]. YouTube. URL www.youtube.com/watch?v=Axg4s9l9wi0.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Defensive cyber operations carried out by U.S. Cyber Command's Cyber National Mission Force, CNMF at the request of allied nations.</p><p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/hunt-forward-operation">https://thecyberwire.com/glossary/hunt-forward-operation</a></p><p>Audio reference link: Paul Nakasone, G., 2022. Vanderbilt Summit Keynote [Video]. YouTube. URL <a href="http://www.youtube.com/watch?v=Axg4s9l9wi0">www.youtube.com/watch?v=Axg4s9l9wi0</a>.</p>]]>
      </content:encoded>
      <itunes:duration>361</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[040d002c-d7ce-11ed-949a-8f862d684ddc]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW2023142778.mp3?updated=1681152060" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Inside the history of a child hacker. </title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/239/notes</link>
      <description>Paul Dant, Illumio's Senior Director for Cybersecurity Strategy and Research, is sharing how his history as a child hacker informed his thinking today. Joe and Dave share some listener follow up from Anthony, who writes in about a scam from the app Nextdoor, regarding scammers trying to upgrade Xfinity customers using their computers rather than the usual method, which throws up red flags. Dave's story this week follows a principal from a Florida science and technology charter school who mistakenly wrote a check for $100,000 to an Elon Musk impersonator. Joe's story is on email compromise, and the increase we have seen in the last several months, including an "increase in ‘novel social engineering attacks’ across thousands of active Darktrace/Email customers from January to February 2023." Our catch of the day comes from listener JP, who writes in regarding a suspicious looking email they received from "Norton" saying they will increase the price of their service being used.
Links to stories:

School principal resigns after writing $100,000 check to Elon Musk impersonator

Tackling the Soft Underbelly of Cyber Security – Email Compromise


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 13 Apr 2023 05:00:00 -0000</pubDate>
      <itunes:title>Inside the history of a child hacker. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>239</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Paul Dant, Illumio's Senior Director for Cybersecurity Strategy and Research, is sharing how his history as a child hacker informed his thinking today. Joe and Dave share some listener follow up from Anthony, who writes in about a scam from the app Nextdoor, regarding scammers trying to upgrade Xfinity customers using their computers rather than the usual method, which throws up red flags. Dave's story this week follows a principal from a Florida science and technology charter school who mistakenly wrote a check for $100,000 to an Elon Musk impersonator. Joe's story is on email compromise, and the increase we have seen in the last several months, including an "increase in ‘novel social engineering attacks’ across thousands of active Darktrace/Email customers from January to February 2023." Our catch of the day comes from listener JP, who writes in regarding a suspicious looking email they received from "Norton" saying they will increase the price of their service being used.
Links to stories:

School principal resigns after writing $100,000 check to Elon Musk impersonator

Tackling the Soft Underbelly of Cyber Security – Email Compromise


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Paul Dant, Illumio's Senior Director for Cybersecurity Strategy and Research, is sharing how his history as a child hacker informed his thinking today. Joe and Dave share some listener follow up from Anthony, who writes in about a scam from the app Nextdoor, regarding scammers trying to upgrade Xfinity customers using their computers rather than the usual method, which throws up red flags. Dave's story this week follows a principal from a Florida science and technology charter school who mistakenly wrote a check for $100,000 to an Elon Musk impersonator. Joe's story is on email compromise, and the increase we have seen in the last several months, including an "increase in ‘novel social engineering attacks’ across thousands of active Darktrace/Email customers from January to February 2023." Our catch of the day comes from listener JP, who writes in regarding a suspicious looking email they received from "Norton" saying they will increase the price of their service being used.</p><p>Links to stories:</p><ul>
<li><a href="https://www.theregister.com/2023/04/03/infosec_in_brief/">School principal resigns after writing $100,000 check to Elon Musk impersonator</a></li>
<li><a href="https://darktrace.com/blog/tackling-the-soft-underbelly-of-cyber-security-email-compromise">Tackling the Soft Underbelly of Cyber Security – Email Compromise</a></li>
</ul><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>2785</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[66148096-b9da-11ec-8b6e-c36bfdb491f8]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW9703190484.mp3?updated=1681244483" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Cyber gravity (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/142/notes</link>
      <description>The invisible force that governs the movement of data across networks.
Audio reference link: “Things to Come 1936 - HG Wells.” YouTube, YouTube, 28 Sept. 2011, https://www.youtube.com/watch?v=atwfWEKz00U. </description>
      <pubDate>Tue, 11 Apr 2023 07:00:00 -0000</pubDate>
      <itunes:title>Cyber gravity (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>142</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>The invisible force that governs the movement of data across networks.
Audio reference link: “Things to Come 1936 - HG Wells.” YouTube, YouTube, 28 Sept. 2011, https://www.youtube.com/watch?v=atwfWEKz00U. </itunes:summary>
      <content:encoded>
        <![CDATA[<p>The invisible force that governs the movement of data across networks.</p><p>Audio reference link: “Things to Come 1936 - HG Wells.” <em>YouTube</em>, YouTube, 28 Sept. 2011, <a href="https://www.youtube.com/watch?v=atwfWEKz00U">https://www.youtube.com/watch?v=atwfWEKz00U</a>. </p>]]>
      </content:encoded>
      <itunes:duration>494</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[52006ae0-d250-11ed-9dd3-ffde75b819e3]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW9775188652.mp3?updated=1680546848" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>As a scammer, sometimes you need to fake it till you make it. [Hacking Humans Goes to the Movies]</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans-goes-to-the-movies/18/notes</link>
      <description>Thanks for joining us again for another episode of fun project brought to you by the team of Hacking Humans, the CyberWire's social engineering podcast. Hacking Humans co-host Dave Bittner is joined by Rick Howard in this series where they view clips from their favorite movies and television shows with examples of the social engineering scams and schemes you hear Dave and co-host Joe Carrigan talk about on Hacking Humans. In this episode, Dave and Rick watch each of the selected scenes, describe the on-screen action for you, and then they deconstruct what they saw. Grab your bowl of popcorn and join us for some fantastic scams and frauds.
Links to this episode's clips if you'd like to watch along:

Dave's clip from the movie The Princess Bride


Rick's clip from the movie Now You See Me 2</description>
      <pubDate>Sun, 09 Apr 2023 07:00:00 -0000</pubDate>
      <itunes:title>As a scammer, sometimes you need to fake it till you make it. [Hacking Humans Goes to the Movies]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>18</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Thanks for joining us again for another episode of fun project brought to you by the team of Hacking Humans, the CyberWire's social engineering podcast. Hacking Humans co-host Dave Bittner is joined by Rick Howard in this series where they view clips from their favorite movies and television shows with examples of the social engineering scams and schemes you hear Dave and co-host Joe Carrigan talk about on Hacking Humans. In this episode, Dave and Rick watch each of the selected scenes, describe the on-screen action for you, and then they deconstruct what they saw. Grab your bowl of popcorn and join us for some fantastic scams and frauds.
Links to this episode's clips if you'd like to watch along:

Dave's clip from the movie The Princess Bride


Rick's clip from the movie Now You See Me 2</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Thanks for joining us again for another episode of fun project brought to you by the team of Hacking Humans, the CyberWire's social engineering podcast. Hacking Humans co-host Dave Bittner is joined by Rick Howard in this series where they view clips from their favorite movies and television shows with examples of the social engineering scams and schemes you hear Dave and co-host Joe Carrigan talk about on Hacking Humans. In this episode, Dave and Rick watch each of the selected scenes, describe the on-screen action for you, and then they deconstruct what they saw. Grab your bowl of popcorn and join us for some fantastic scams and frauds.</p><p>Links to this episode's clips if you'd like to watch along:</p><ul>
<li>Dave's clip from the movie <a href="https://www.youtube.com/watch?v=IoSHmVkjmuA">The Princess Bride</a>
</li>
<li>Rick's clip from the movie <a href="https://www.youtube.com/watch?v=Blt2UuiJDkM">Now You See Me 2</a>
</li>
</ul>]]>
      </content:encoded>
      <itunes:duration>1795</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[3d12b0e8-d61a-11ed-8000-1b0c70c0c52e]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW6543310725.mp3?updated=1684519465" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Protecting against financial cybercrimes. </title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/238/notes</link>
      <description>Keith Houston, Chief prosecutor in financial cybercrimes at Harris County District Attorney's Office in Houston, TX, shares some scams that have come through his office and advice on how to protect yourself. Dave and Joe share some follow up from listener Nevile, who writes in about a news story he came across regarding pendrive bombs, wondering what do you do if you're a reporter and someone sends you a scoop in a pendrive? Joe has two stories regarding AI, and how scammers were able to use AI software to clone voices the victims would recognize and then con them out of thousands of dollars. Dave's story is on a new report stating that the most common combosquatting keyword is support. Our catch of the day comes from listener Shawn who writes in sharing an email they received from their companies HR team warning them of a suspicious package that has been circulating around the office.
Links to stories:

N.L. family warns of possible AI voice clone scam that cost them $10K

How scammers likely used artificial intelligence to con Newfoundland seniors out of $200K

The Most Common Combosquatting Keyword Is “Support”


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter</description>
      <pubDate>Thu, 06 Apr 2023 05:00:00 -0000</pubDate>
      <itunes:title>Protecting against financial cybercrimes. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>238</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Keith Houston, Chief prosecutor in financial cybercrimes at Harris County District Attorney's Office in Houston, TX, shares some scams that have come through his office and advice on how to protect yourself. Dave and Joe share some follow up from listener Nevile, who writes in about a news story he came across regarding pendrive bombs, wondering what do you do if you're a reporter and someone sends you a scoop in a pendrive? Joe has two stories regarding AI, and how scammers were able to use AI software to clone voices the victims would recognize and then con them out of thousands of dollars. Dave's story is on a new report stating that the most common combosquatting keyword is support. Our catch of the day comes from listener Shawn who writes in sharing an email they received from their companies HR team warning them of a suspicious package that has been circulating around the office.
Links to stories:

N.L. family warns of possible AI voice clone scam that cost them $10K

How scammers likely used artificial intelligence to con Newfoundland seniors out of $200K

The Most Common Combosquatting Keyword Is “Support”


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Keith Houston, Chief prosecutor in financial cybercrimes at Harris County District Attorney's Office in Houston, TX, shares some scams that have come through his office and advice on how to protect yourself. Dave and Joe share some follow up from listener Nevile, who writes in about a news story he came across regarding pendrive bombs, wondering what do you do if you're a reporter and someone sends you a scoop in a pendrive? Joe has two stories regarding AI, and how scammers were able to use AI software to clone voices the victims would recognize and then con them out of thousands of dollars. Dave's story is on a new report stating that the most common combosquatting keyword is support. Our catch of the day comes from listener Shawn who writes in sharing an email they received from their companies HR team warning them of a suspicious package that has been circulating around the office.</p><p>Links to stories:</p><ul>
<li><a href="https://www.youtube.com/watch?v=Lwylb4cE1b8">N.L. family warns of possible AI voice clone scam that cost them $10K</a></li>
<li><a href="https://www.cbc.ca/news/canada/newfoundland-labrador/ai-vocal-cloning-grandparent-scam-1.6777106">How scammers likely used artificial intelligence to con Newfoundland seniors out of $200K</a></li>
<li><a href="https://www.akamai.com/blog/security-research/combosquatting-keyword-analysis-support">The Most Common Combosquatting Keyword Is “Support”</a></li>
</ul><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a></p>]]>
      </content:encoded>
      <itunes:duration>2753</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[6604ac8e-b9da-11ec-8b6e-aba4995d1cc3]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW7558308287.mp3?updated=1680631567" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Artificial Intelligence (AI) (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/141/notes</link>
      <description>The ability of computers to execute tasks typically associated with human intelligence, including natural language processing, problem solving, and pattern recognition.
CyberWire Glossary link: https://thecyberwire.com/glossary/ai
Audio reference link: Staff, 2016. Alan Turing - The Imitation Game - Can Machines Think? [YouTube Video]. Learn Understand Create. URL www.youtube.com/watch?v=Vs7Lo5MKIws.</description>
      <pubDate>Tue, 04 Apr 2023 07:00:00 -0000</pubDate>
      <itunes:title>Artificial Intelligence (AI) (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>141</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>The ability of computers to execute tasks typically associated with human intelligence, including natural language processing, problem solving, and pattern recognition.
CyberWire Glossary link: https://thecyberwire.com/glossary/ai
Audio reference link: Staff, 2016. Alan Turing - The Imitation Game - Can Machines Think? [YouTube Video]. Learn Understand Create. URL www.youtube.com/watch?v=Vs7Lo5MKIws.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The ability of computers to execute tasks typically associated with human intelligence, including natural language processing, problem solving, and pattern recognition.</p><p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/ai">https://thecyberwire.com/glossary/ai</a></p><p>Audio reference link: Staff, 2016. Alan Turing - The Imitation Game - Can Machines Think? [YouTube Video]. Learn Understand Create. URL <a href="www.youtube.com/watch?v=Vs7Lo5MKIws.">www.youtube.com/watch?v=Vs7Lo5MKIws.</a></p>]]>
      </content:encoded>
      <itunes:duration>486</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[5bf89d6c-ccdb-11ed-ac5e-3b60586cde20]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW5601313963.mp3?updated=1679948068" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Seeking employment fraud? </title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/237/notes</link>
      <description>Kathleen Smith, CMO from ClearedJobs.Net sits down with Dave to talk about how job seekers are susceptible to employment fraud. Joe and Dave share some listener follow up from Steve, who writes in to share a scary and frustrating story as hackers were able to scam their way into his and his wife’s Verizon Wireless account. Dave's story follows giveaway scams, which are scams that impersonate celebrities and brands, most notably Elon Musk and the companies he is associate with, to try and get victims to believe they have won a large sum of cryptocurrency. Joe's story is on a scary development in the AI world, regarding family emergency scams. Scammers are now using AI to enhance the believability. Our catch of the day comes from a listener named Jim who writes in about a scam he came across in his spam folder from a "Sgt. Nolla E. Donald" who wants to give him millions of dollars to keep safe while she fights over in Iraq.
Links to stories:

Chatbots, Celebrities, and Victim Retargeting: Why Crypto Giveaway Scams Are Still So Successful

Scammers use AI to enhance their family emergency schemes


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter</description>
      <pubDate>Thu, 30 Mar 2023 05:00:00 -0000</pubDate>
      <itunes:title>Seeking employment fraud? </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>237</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Kathleen Smith, CMO from ClearedJobs.Net sits down with Dave to talk about how job seekers are susceptible to employment fraud. Joe and Dave share some listener follow up from Steve, who writes in to share a scary and frustrating story as hackers were able to scam their way into his and his wife’s Verizon Wireless account. Dave's story follows giveaway scams, which are scams that impersonate celebrities and brands, most notably Elon Musk and the companies he is associate with, to try and get victims to believe they have won a large sum of cryptocurrency. Joe's story is on a scary development in the AI world, regarding family emergency scams. Scammers are now using AI to enhance the believability. Our catch of the day comes from a listener named Jim who writes in about a scam he came across in his spam folder from a "Sgt. Nolla E. Donald" who wants to give him millions of dollars to keep safe while she fights over in Iraq.
Links to stories:

Chatbots, Celebrities, and Victim Retargeting: Why Crypto Giveaway Scams Are Still So Successful

Scammers use AI to enhance their family emergency schemes


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Kathleen Smith, CMO from ClearedJobs.Net sits down with Dave to talk about how job seekers are susceptible to employment fraud. Joe and Dave share some listener follow up from Steve, who writes in to share a scary and frustrating story as hackers were able to scam their way into his and his wife’s Verizon Wireless account. Dave's story follows giveaway scams, which are scams that impersonate celebrities and brands, most notably Elon Musk and the companies he is associate with, to try and get victims to believe they have won a large sum of cryptocurrency. Joe's story is on a scary development in the AI world, regarding family emergency scams. Scammers are now using AI to enhance the believability. Our catch of the day comes from a listener named Jim who writes in about a scam he came across in his spam folder from a "Sgt. Nolla E. Donald" who wants to give him millions of dollars to keep safe while she fights over in Iraq.</p><p>Links to stories:</p><ul>
<li><a href="https://www.akamai.com/blog/security-research/crypto-giveaway-scams-are-still-successful">Chatbots, Celebrities, and Victim Retargeting: Why Crypto Giveaway Scams Are Still So Successful</a></li>
<li><a href="https://consumer.ftc.gov/consumer-alerts/2023/03/scammers-use-ai-enhance-their-family-emergency-schemes">Scammers use AI to enhance their family emergency schemes</a></li>
</ul><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a></p>]]>
      </content:encoded>
      <itunes:duration>3551</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[65f4cb7a-b9da-11ec-8b6e-e3f26d021e0e]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW9613024616.mp3?updated=1680028335" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Certification (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/140/notes</link>
      <description>A credential demonstrating an individual's knowledge in the field of cybersecurity, usually obtained by passing an exam or series of exams. 
CyberWire Glossary link: https://thecyberwire.com/glossary/certification
Audio reference link: Bombal, D., 2022. Are certifications important in Cybersecurity? [Video]. YouTube. URL www.youtube.com/watch?v=Zdgf_Wr82rs.</description>
      <pubDate>Tue, 28 Mar 2023 07:00:00 -0000</pubDate>
      <itunes:title>Certification (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>140</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A credential demonstrating an individual's knowledge in the field of cybersecurity, usually obtained by passing an exam or series of exams. 
CyberWire Glossary link: https://thecyberwire.com/glossary/certification
Audio reference link: Bombal, D., 2022. Are certifications important in Cybersecurity? [Video]. YouTube. URL www.youtube.com/watch?v=Zdgf_Wr82rs.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A credential demonstrating an individual's knowledge in the field of cybersecurity, usually obtained by passing an exam or series of exams. </p><p>CyberWire Glossary link: https://thecyberwire.com/glossary/certification</p><p>Audio reference link: Bombal, D., 2022. Are certifications important in Cybersecurity? [Video]. YouTube. URL <a href="https://www.youtube.com/watch?v=Zdgf_Wr82rs">www.youtube.com/watch?v=Zdgf_Wr82rs</a>.</p>]]>
      </content:encoded>
      <itunes:duration>397</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[8fc0efae-c8c7-11ed-b224-1bc2590b4660]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW7675927784.mp3?updated=1679340285" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Fingerprinting fights off fraud? [Hacking Humans Goes to the Movies}</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans-goes-to-the-movies/17/notes</link>
      <description>Thanks for joining us again for another episode of fun project brought to you by the team of Hacking Humans, the CyberWire's social engineering podcast. Hacking Humans co-host Dave Bittner is joined by Rick Howard in this series where they view clips from their favorite movies and television shows with examples of the social engineering scams and schemes you hear Dave and co-host Joe Carrigan talk about on Hacking Humans. In this episode, Dave and Rick watch each of the selected scenes, describe the on-screen action for you, and then they deconstruct what they saw. Grab your bowl of popcorn and join us for some fantastic scams and frauds.
Links to this episode's clips if you'd like to watch along:

Dave's clip from the movie I dream of Jeannie


Rick's clip from the movie Ant Man</description>
      <pubDate>Sun, 26 Mar 2023 07:00:00 -0000</pubDate>
      <itunes:title>Fingerprinting fights off fraud? [Hacking Humans Goes to the Movies}</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>17</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Thanks for joining us again for another episode of fun project brought to you by the team of Hacking Humans, the CyberWire's social engineering podcast. Hacking Humans co-host Dave Bittner is joined by Rick Howard in this series where they view clips from their favorite movies and television shows with examples of the social engineering scams and schemes you hear Dave and co-host Joe Carrigan talk about on Hacking Humans. In this episode, Dave and Rick watch each of the selected scenes, describe the on-screen action for you, and then they deconstruct what they saw. Grab your bowl of popcorn and join us for some fantastic scams and frauds.
Links to this episode's clips if you'd like to watch along:

Dave's clip from the movie I dream of Jeannie


Rick's clip from the movie Ant Man</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Thanks for joining us again for another episode of fun project brought to you by the team of Hacking Humans, the CyberWire's social engineering podcast. Hacking Humans co-host Dave Bittner is joined by Rick Howard in this series where they view clips from their favorite movies and television shows with examples of the social engineering scams and schemes you hear Dave and co-host Joe Carrigan talk about on Hacking Humans. In this episode, Dave and Rick watch each of the selected scenes, describe the on-screen action for you, and then they deconstruct what they saw. Grab your bowl of popcorn and join us for some fantastic scams and frauds.</p><p>Links to this episode's clips if you'd like to watch along:</p><ul>
<li>Dave's clip from the movie <a href="https://www.youtube.com/watch?v=ApX9AxPsjT8">I dream of Jeannie</a>
</li>
<li>Rick's clip from the movie <a href="https://www.youtube.com/watch?v=vTOstXbt-JY">Ant Man</a>
</li>
</ul>]]>
      </content:encoded>
      <itunes:duration>1434</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[a3f48120-cb10-11ed-a738-1f74a730299b]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW6134175871.mp3?updated=1679680207" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Do you have curtains on your house?</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/236/notes</link>
      <description>On this episode, the CyberWire's UK Correspondent Carole Theriault talks with Iain Thomson from the Register about why he has no IoT in his house and what advice he offers for those who do. Joe's story features ten social engineering techniques. Dave has a story starts with an order by the FTC against Epic Games for tricking users to make in-game purchases in Fortnite using dark patterns. Our Catch of the Day comes from listener Lauren sharing a phishing attempt at her company where the scammers obviously did their homework on who to contact in the organization.
Links to stories:

Ten Social Engineering Techniques Used By Hackers

FTC Finalizes Order Requiring Fortnite maker Epic Games to Pay $245 Million for Tricking Users into Making Unwanted Charges

What are deceptive patterns?


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter</description>
      <pubDate>Thu, 23 Mar 2023 05:00:00 -0000</pubDate>
      <itunes:title>Do you have curtains on your house?</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>236</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>On this episode, the CyberWire's UK Correspondent Carole Theriault talks with Iain Thomson from the Register about why he has no IoT in his house and what advice he offers for those who do. Joe's story features ten social engineering techniques. Dave has a story starts with an order by the FTC against Epic Games for tricking users to make in-game purchases in Fortnite using dark patterns. Our Catch of the Day comes from listener Lauren sharing a phishing attempt at her company where the scammers obviously did their homework on who to contact in the organization.
Links to stories:

Ten Social Engineering Techniques Used By Hackers

FTC Finalizes Order Requiring Fortnite maker Epic Games to Pay $245 Million for Tricking Users into Making Unwanted Charges

What are deceptive patterns?


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter</itunes:summary>
      <content:encoded>
        <![CDATA[<p>On this episode, the CyberWire's UK Correspondent Carole Theriault talks with Iain Thomson from the Register about why he has no IoT in his house and what advice he offers for those who do. Joe's story features ten social engineering techniques. Dave has a story starts with an order by the FTC against Epic Games for tricking users to make in-game purchases in Fortnite using dark patterns. Our Catch of the Day comes from listener Lauren sharing a phishing attempt at her company where the scammers obviously did their homework on who to contact in the organization.</p><p>Links to stories:</p><ul>
<li><a href="https://businessplus.ie/tech/social-engineering-techniques-used-by-hackers/">Ten Social Engineering Techniques Used By Hackers</a></li>
<li><a href="https://www.ftc.gov/news-events/news/press-releases/2023/03/ftc-finalizes-order-requiring-fortnite-maker-epic-games-pay-245-million-tricking-users-making">FTC Finalizes Order Requiring Fortnite maker Epic Games to Pay $245 Million for Tricking Users into Making Unwanted Charges</a></li>
<li><a href="https://www.deceptive.design/">What are deceptive patterns?</a></li>
</ul><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a></p>]]>
      </content:encoded>
      <itunes:duration>2980</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[65e5382c-b9da-11ec-8b6e-6b537ec640b3]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW5032793279.mp3?updated=1679433963" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Network slicing (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/139/notes</link>
      <description>A technique used to create virtual networks within a shared physical network infrastructure.
CyberWire Glossary link: https://thecyberwire.com/glossary/network-slicing
Audio reference link: Whitehead, D.N., 2021. 5G Smart Networks Part 1: Network Slicing [Video]. YouTube. URL www.youtube.com/watch?v=dCt3rYODZ7g.</description>
      <pubDate>Tue, 21 Mar 2023 07:00:00 -0000</pubDate>
      <itunes:title>Network slicing (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>139</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A technique used to create virtual networks within a shared physical network infrastructure.
CyberWire Glossary link: https://thecyberwire.com/glossary/network-slicing
Audio reference link: Whitehead, D.N., 2021. 5G Smart Networks Part 1: Network Slicing [Video]. YouTube. URL www.youtube.com/watch?v=dCt3rYODZ7g.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A technique used to create virtual networks within a shared physical network infrastructure.</p><p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/network-slicing">https://thecyberwire.com/glossary/network-slicing</a></p><p>Audio reference link: Whitehead, D.N., 2021. 5G Smart Networks Part 1: Network Slicing [Video]. YouTube. URL <a href="https://www.youtube.com/watch?v=dCt3rYODZ7g">www.youtube.com/watch?v=dCt3rYODZ7g</a>.</p>]]>
      </content:encoded>
      <itunes:duration>380</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[4979210a-c1de-11ed-bd65-ef74e829626c]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW7579936511.mp3?updated=1678730722" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Changing the face of identity.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/235/notes</link>
      <description>Eric Olden, Chief Executive at Strata, sits down with Dave to discuss the changing face of identity; where we’ve been, where are going, and the bumps along the way. Dave and Joe share some listener follow-up from Michael, who writes in about advertisements on YouTube and other social networks claiming magical results. Dave's story follows a new tool released by the National Center for Missing and Exploited Children (NCMEC) to help with slow and stop the spread of sextortion of minors. Joe's story is on a LinkedIn post by Gary Warner regarding why we have so much fraud. Our catch of the day is from listener Shon, who writes in about an email they received about “Meta Resources Recruiter” informing them of an open “CISO Lead role.”
Links to stories:

Teens can proactively block their nude images from Instagram, OnlyFans

Why do we have so much fraud?


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter</description>
      <pubDate>Thu, 16 Mar 2023 05:00:00 -0000</pubDate>
      <itunes:title>Changing the face of identity.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>235</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Eric Olden, Chief Executive at Strata, sits down with Dave to discuss the changing face of identity; where we’ve been, where are going, and the bumps along the way. Dave and Joe share some listener follow-up from Michael, who writes in about advertisements on YouTube and other social networks claiming magical results. Dave's story follows a new tool released by the National Center for Missing and Exploited Children (NCMEC) to help with slow and stop the spread of sextortion of minors. Joe's story is on a LinkedIn post by Gary Warner regarding why we have so much fraud. Our catch of the day is from listener Shon, who writes in about an email they received about “Meta Resources Recruiter” informing them of an open “CISO Lead role.”
Links to stories:

Teens can proactively block their nude images from Instagram, OnlyFans

Why do we have so much fraud?


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Eric Olden, Chief Executive at Strata, sits down with Dave to discuss the changing face of identity; where we’ve been, where are going, and the bumps along the way. Dave and Joe share some listener follow-up from Michael, who writes in about advertisements on YouTube and other social networks claiming magical results. Dave's story follows a new tool released by the National Center for Missing and Exploited Children (NCMEC) to help with slow and stop the spread of sextortion of minors. Joe's story is on a LinkedIn post by Gary Warner regarding why we have so much fraud. Our catch of the day is from listener Shon, who writes in about an email they received about “Meta Resources Recruiter” informing them of an open “CISO Lead role.”</p><p>Links to stories:</p><ul>
<li><a href="https://arstechnica.com/tech-policy/2023/02/meta-pornhub-let-teens-block-uploads-of-nude-images-to-prevent-sextortion/?utm_brand=ars">Teens can proactively block their nude images from Instagram, OnlyFans</a></li>
<li><a href="https://www.linkedin.com/posts/garwarner_why-are-fraudsters-getting-away-with-it-activity-7036317250785607680-oeaJ/">Why do we have so much fraud?</a></li>
</ul><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a></p>]]>
      </content:encoded>
      <itunes:duration>3236</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[65d5682a-b9da-11ec-8b6e-13d54b5739d4]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW8151082089.mp3?updated=1679433331" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Device trust (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/138/notes</link>
      <description>The process of verifying that a device is known, secure, and uncompromised before allowing it to connect to a network or access resources.
CyberWire Glossary link: https://thecyberwire.com/glossary/device-trust
Audio reference link: “Favorite Scene of Alan Rickman from Die Hard.” YouTube, YouTube, 14 Jan. 2016, https://www.youtube.com/watch?v=mklnXM3LIXo. </description>
      <pubDate>Tue, 14 Mar 2023 07:00:00 -0000</pubDate>
      <itunes:title>Device trust (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>138</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>The process of verifying that a device is known, secure, and uncompromised before allowing it to connect to a network or access resources.
CyberWire Glossary link: https://thecyberwire.com/glossary/device-trust
Audio reference link: “Favorite Scene of Alan Rickman from Die Hard.” YouTube, YouTube, 14 Jan. 2016, https://www.youtube.com/watch?v=mklnXM3LIXo. </itunes:summary>
      <content:encoded>
        <![CDATA[<p>The process of verifying that a device is known, secure, and uncompromised before allowing it to connect to a network or access resources.</p><p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/device-trust">https://thecyberwire.com/glossary/device-trust</a></p><p>Audio reference link: “Favorite Scene of Alan Rickman from Die Hard.” <em>YouTube</em>, YouTube, 14 Jan. 2016, <a href="https://www.youtube.com/watch?v=mklnXM3LIXo">https://www.youtube.com/watch?v=mklnXM3LIXo.</a> </p>]]>
      </content:encoded>
      <itunes:duration>404</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[2d29ceaa-c1de-11ed-b2f2-b341fac80572]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW5902677082.mp3?updated=1678128678" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Encore: Scams in the media. </title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/209/notes</link>
      <description>Mallory Sofastaii from Baltimore's WMAR 2 News sits down with Joe to talk about some recent stories on scams she's covered on Matter for Mallory. Dave and Joe share some listener follow up from Robert who writes in about the technical means to protect phones from robocalls. He shares some insight on how carriers up in the north are able to protect phones. Dave shares a twitter thread from Brian Jay Jones, who is an author of biographies of Jim Henson, George Lucas and Dr. Seuss, who shares how he would have almost had his Twitter account hijacked if it weren't for 2-step verification. Joe's story is on a gentleman pleading guilty in PAC scams, raising almost 3.5 million by making false and misleading representations in the 2016 election. This week we have a string of catch of the days from different listeners sharing different SMS scams.
Links to stories:

Associate of scam PAC operator pleads guilty

Twitter thread of Brian Jay Jones


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter</description>
      <pubDate>Thu, 09 Mar 2023 06:00:00 -0000</pubDate>
      <itunes:title>Encore: Scams in the media. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>209</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Mallory Sofastaii from Baltimore's WMAR 2 News sits down with Joe to talk about some recent stories on scams she's covered on Matter for Mallory. Dave and Joe share some listener follow up from Robert who writes in about the technical means to protect phones from robocalls. He shares some insight on how carriers up in the north are able to protect phones. Dave shares a twitter thread from Brian Jay Jones, who is an author of biographies of Jim Henson, George Lucas and Dr. Seuss, who shares how he would have almost had his Twitter account hijacked if it weren't for 2-step verification. Joe's story is on a gentleman pleading guilty in PAC scams, raising almost 3.5 million by making false and misleading representations in the 2016 election. This week we have a string of catch of the days from different listeners sharing different SMS scams.
Links to stories:

Associate of scam PAC operator pleads guilty

Twitter thread of Brian Jay Jones


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Mallory Sofastaii from Baltimore's WMAR 2 News sits down with Joe to talk about some recent stories on scams she's covered on Matter for Mallory. Dave and Joe share some listener follow up from Robert who writes in about the technical means to protect phones from robocalls. He shares some insight on how carriers up in the north are able to protect phones. Dave shares a twitter thread from Brian Jay Jones, who is an author of biographies of Jim Henson, George Lucas and Dr. Seuss, who shares how he would have almost had his Twitter account hijacked if it weren't for 2-step verification. Joe's story is on a gentleman pleading guilty in PAC scams, raising almost 3.5 million by making false and misleading representations in the 2016 election. This week we have a string of catch of the days from different listeners sharing different SMS scams.</p><p>Links to stories:</p><ul>
<li><a href="https://www.politico.com/newsletters/politico-influence/2022/08/09/associate-of-scam-pac-operator-pleads-guilty-00050697">Associate of scam PAC operator pleads guilty</a></li>
<li><a href="https://twitter.com/brianjayjones/status/1557745807469776896">Twitter thread of Brian Jay Jones</a></li>
</ul><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a></p>]]>
      </content:encoded>
      <itunes:duration>3134</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[65c64f0c-b9da-11ec-8b6e-23ad67fb4110]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW7977079478.mp3?updated=1678314677" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>ZTNA (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/137/notes</link>
      <description>A technology set design to support the cybersecurity first principle strategy of zero trust, that limits device people and software component access to only designated authorized resources and nothing more.
CyberWire Glossary link: https://thecyberwire.com/glossary/zero-trust-network-access
Audio reference link: “Zero Trust Explained by John Kindervag.” YouTube, YouTube, 2 Oct. 2022, https://www.youtube.com/watch?v=-LZe4Vn-eEo. </description>
      <pubDate>Tue, 07 Mar 2023 08:00:00 -0000</pubDate>
      <itunes:title>ZTNA (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>137</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A technology set design to support the cybersecurity first principle strategy of zero trust, that limits device people and software component access to only designated authorized resources and nothing more.
CyberWire Glossary link: https://thecyberwire.com/glossary/zero-trust-network-access
Audio reference link: “Zero Trust Explained by John Kindervag.” YouTube, YouTube, 2 Oct. 2022, https://www.youtube.com/watch?v=-LZe4Vn-eEo. </itunes:summary>
      <content:encoded>
        <![CDATA[<p>A technology set design to support the cybersecurity first principle strategy of zero trust, that limits device people and software component access to only designated authorized resources and nothing more.</p><p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/zero-trust-network-access">https://thecyberwire.com/glossary/zero-trust-network-access</a></p><p>Audio reference link: “Zero Trust Explained by John Kindervag.” <em>YouTube</em>, YouTube, 2 Oct. 2022, <a href="https://www.youtube.com/watch?v=-LZe4Vn-eEo">https://www.youtube.com/watch?v=-LZe4Vn-eEo</a>. </p>]]>
      </content:encoded>
      <itunes:duration>437</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[aca29a34-b6dc-11ed-b8d5-cf3f0168b150]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW5628371590.mp3?updated=1677524747" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Saving the world from cybercrime.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/234/notes</link>
      <description>Dan Golden and Renee Dudley, reporters at ProPublica and authors of "The Ransomware Hunting Team: A Band of Misfits' Improbable Crusade to Save the World from Cybercrime," discuss their book. Dave and Joe share some follow up form listener Ignacio who writes in to share thoughts on Joe's preference to using open source options for password managers. Joe's story this week follows Coinbase, who recently had a cybersecurity breach but their cyber controls prevented the attacker from gaining direct system access and prevented any loss of funds or compromise of customer information. Dave's story is on people trying to gain cryptocurrency back after it was hacked and stolen from them, only to wait and receive nothing in the long run. Our catch of the day comes from listener Josh, who writes in about an email he received that stated that his wallet would be suspended if he did not download a verification link.
Links to stories:

Who You Gonna Call? The Ransomware Hunting Team.

Social Engineering - A Coinbase Case Study

These Companies Say They Can Recover Stolen Crypto. That Rarely Happens.


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 02 Mar 2023 06:00:00 -0000</pubDate>
      <itunes:title>Saving the world from cybercrime.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>234</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Dan Golden and Renee Dudley, reporters at ProPublica and authors of "The Ransomware Hunting Team: A Band of Misfits' Improbable Crusade to Save the World from Cybercrime," discuss their book. Dave and Joe share some follow up form listener Ignacio who writes in to share thoughts on Joe's preference to using open source options for password managers. Joe's story this week follows Coinbase, who recently had a cybersecurity breach but their cyber controls prevented the attacker from gaining direct system access and prevented any loss of funds or compromise of customer information. Dave's story is on people trying to gain cryptocurrency back after it was hacked and stolen from them, only to wait and receive nothing in the long run. Our catch of the day comes from listener Josh, who writes in about an email he received that stated that his wallet would be suspended if he did not download a verification link.
Links to stories:

Who You Gonna Call? The Ransomware Hunting Team.

Social Engineering - A Coinbase Case Study

These Companies Say They Can Recover Stolen Crypto. That Rarely Happens.


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Dan Golden and Renee Dudley, reporters at ProPublica and authors of "The Ransomware Hunting Team: A Band of Misfits' Improbable Crusade to Save the World from Cybercrime," discuss their book. Dave and Joe share some follow up form listener Ignacio who writes in to share thoughts on Joe's preference to using open source options for password managers. Joe's story this week follows Coinbase, who recently had a cybersecurity breach but their cyber controls prevented the attacker from gaining direct system access and prevented any loss of funds or compromise of customer information. Dave's story is on people trying to gain cryptocurrency back after it was hacked and stolen from them, only to wait and receive nothing in the long run. Our catch of the day comes from listener Josh, who writes in about an email he received that stated that his wallet would be suspended if he did not download a verification link.</p><p>Links to stories:</p><ul>
<li><a href="https://www.nytimes.com/2022/10/24/books/review/the-ransomware-hunting-team-renee-dudley-daniel-golden.html">Who You Gonna Call? The Ransomware Hunting Team.</a></li>
<li><a href="https://www.coinbase.com/blog/social-engineering-a-coinbase-case-study">Social Engineering - A Coinbase Case Study</a></li>
<li><a href="https://www.forbes.com/sites/cyrusfarivar/2023/02/23/these-companies-say-they-can-recover-stolen-crypto-that-rarely-happens/?sh=5ea8318919de">These Companies Say They Can Recover Stolen Crypto. That Rarely Happens.</a></li>
</ul><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>3360</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[65b7511e-b9da-11ec-8b6e-ff0ef258bb4d]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW8565997448.mp3?updated=1677608922" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>GDPR (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/136/notes</link>
      <description>A data privacy legal framework that applies to all countries in the European Union, regulating the transmission, storage, and use of personal data associated with residents of the EU. 
CyberWire Glossary link: https://thecyberwire.com/glossary/general-data-protection-regulation
Audio reference link: “Mr. Robot Predicts JPM Coin!” YouTube, YouTube, 14 Feb. 2019, https://www.youtube.com/watch?v=1ee-cHbCI0s. </description>
      <pubDate>Tue, 28 Feb 2023 08:00:00 -0000</pubDate>
      <itunes:title>GDPR (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>136</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A data privacy legal framework that applies to all countries in the European Union, regulating the transmission, storage, and use of personal data associated with residents of the EU. 
CyberWire Glossary link: https://thecyberwire.com/glossary/general-data-protection-regulation
Audio reference link: “Mr. Robot Predicts JPM Coin!” YouTube, YouTube, 14 Feb. 2019, https://www.youtube.com/watch?v=1ee-cHbCI0s. </itunes:summary>
      <content:encoded>
        <![CDATA[<p>A data privacy legal framework that applies to all countries in the European Union, regulating the transmission, storage, and use of personal data associated with residents of the EU. </p><p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/general-data-protection-regulation">https://thecyberwire.com/glossary/general-data-protection-regulation</a></p><p>Audio reference link: “Mr. Robot Predicts JPM Coin!” <em>YouTube</em>, YouTube, 14 Feb. 2019, <a href="https://www.youtube.com/watch?v=1ee-cHbCI0s.%C2%A0">https://www.youtube.com/watch?v=1ee-cHbCI0s. </a></p>]]>
      </content:encoded>
      <itunes:duration>417</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[4de1043a-b219-11ed-a44a-0b8bb9aa06a0]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW9825636415.mp3?updated=1676918290" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Password managers and their benefits.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/233/notes</link>
      <description>Corie Colliton Wagner from Security.org joins to discuss the company’s research of password manager tools and their benefits, identity theft, and the market outlook for PW managers. Dave and Joe share quite a bit of follow up from listeners Mitch, Neville, and Richard. Mitch writes in to share about gift card scams, and Neville and Richard both share their thoughts on the pros and cons of having a cloud-based password manager. Dave's story is about employees around the globe and their internet habits inside the workplace. Joe's story follows a new release of data from the FTC on romance scams, including the top lies being told by scammers. Our catch of the day comes from listener Gordy, who writes in about an email he received regarding a new position scammers are trying to fill in an open job.
Links to stories:

Are Your Employees Thinking Critically About Their Online Behaviors?

New FTC Data Reveals Top Lies Told by Romance Scammers


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 23 Feb 2023 06:00:00 -0000</pubDate>
      <itunes:title>Password managers and their benefits.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>233</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Corie Colliton Wagner from Security.org joins to discuss the company’s research of password manager tools and their benefits, identity theft, and the market outlook for PW managers. Dave and Joe share quite a bit of follow up from listeners Mitch, Neville, and Richard. Mitch writes in to share about gift card scams, and Neville and Richard both share their thoughts on the pros and cons of having a cloud-based password manager. Dave's story is about employees around the globe and their internet habits inside the workplace. Joe's story follows a new release of data from the FTC on romance scams, including the top lies being told by scammers. Our catch of the day comes from listener Gordy, who writes in about an email he received regarding a new position scammers are trying to fill in an open job.
Links to stories:

Are Your Employees Thinking Critically About Their Online Behaviors?

New FTC Data Reveals Top Lies Told by Romance Scammers


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Corie Colliton Wagner from <a href="https://www.security.org/">Security.org</a> joins to discuss the company’s research of password manager tools and their benefits, identity theft, and the market outlook for PW managers. Dave and Joe share quite a bit of follow up from listeners Mitch, Neville, and Richard. Mitch writes in to share about gift card scams, and Neville and Richard both share their thoughts on the pros and cons of having a cloud-based password manager. Dave's story is about employees around the globe and their internet habits inside the workplace. Joe's story follows a new release of data from the FTC on romance scams, including the top lies being told by scammers. Our catch of the day comes from listener Gordy, who writes in about an email he received regarding a new position scammers are trying to fill in an open job.</p><p>Links to stories:</p><ul>
<li><a href="https://www.darkreading.com/operations/are-your-employees-thinking-critically-about-their-online-behaviors">Are Your Employees Thinking Critically About Their Online Behaviors?</a></li>
<li><a href="https://www.ftc.gov/news-events/news/press-releases/2023/02/new-ftc-data-reveals-top-lies-told-romance-scammers">New FTC Data Reveals Top Lies Told by Romance Scammers</a></li>
</ul><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>3003</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[65a505fe-b9da-11ec-8b6e-039a6f9622ec]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW9438813381.mp3?updated=1677192551" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>ChatGPT (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/135/notes</link>
      <description>A conversational language model developed by the company OpenAI. 
CyberWire Glossary link: https://thecyberwire.com/glossary/chatgpt
Audio reference link: jeongphill. “Movie - Her, First Meet OS1 (Operation System One, Os One, OS1).” YouTube, YouTube, 29 June 2014, https://www.youtube.com/watch?v=GV01B5kVsC0. </description>
      <pubDate>Tue, 21 Feb 2023 08:00:00 -0000</pubDate>
      <itunes:title>ChatGPT (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>135</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A conversational language model developed by the company OpenAI. 
CyberWire Glossary link: https://thecyberwire.com/glossary/chatgpt
Audio reference link: jeongphill. “Movie - Her, First Meet OS1 (Operation System One, Os One, OS1).” YouTube, YouTube, 29 June 2014, https://www.youtube.com/watch?v=GV01B5kVsC0. </itunes:summary>
      <content:encoded>
        <![CDATA[<p>A conversational language model developed by the company OpenAI. </p><p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/chatgpt">https://thecyberwire.com/glossary/chatgpt</a></p><p>Audio reference link: jeongphill. “Movie - Her, First Meet OS1 (Operation System One, Os One, OS1).” <em>YouTube</em>, YouTube, 29 June 2014, <a href="https://www.youtube.com/watch?v=GV01B5kVsC0">https://www.youtube.com/watch?v=GV01B5kVsC0</a>. </p>]]>
      </content:encoded>
      <itunes:duration>517</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[3a1ab1fe-abc9-11ed-a056-bb8b69783cbc]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW2010322249.mp3?updated=1676311466" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Scamming through generations.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/232/notes</link>
      <description>Mathieu Gorge from VigiTrust sits down to discuss the different ways that online attackers target younger and older generations, and what the cybersecurity industry can and should do to protect them. Dave and Joe share some listener follow up from Greg who writes in regarding porch pirates possibly finding a new way to steal packages. In Joe's story this week, we learn that while ransomware was down last year, more and more people are clicking on phishing emails. Dave's story follows Ahad Shams, the co-founder of Web3 metaverse gaming engine startup Webaverse, who ended up getting $4 million of his cryptocurrency stolen. Our catch of the day comes from listener Rodney who writes in about an email he received. The scammers were trying to collect information from him after saying he was already scammed out of money, when in fact he was not.
Links to stories:

New cybersecurity data reveals persistent social engineering vulnerabilities

Scammers steal $4 million in crypto during face-to-face meeting


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 16 Feb 2023 06:00:00 -0000</pubDate>
      <itunes:title>Scamming through generations.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>232</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Mathieu Gorge from VigiTrust sits down to discuss the different ways that online attackers target younger and older generations, and what the cybersecurity industry can and should do to protect them. Dave and Joe share some listener follow up from Greg who writes in regarding porch pirates possibly finding a new way to steal packages. In Joe's story this week, we learn that while ransomware was down last year, more and more people are clicking on phishing emails. Dave's story follows Ahad Shams, the co-founder of Web3 metaverse gaming engine startup Webaverse, who ended up getting $4 million of his cryptocurrency stolen. Our catch of the day comes from listener Rodney who writes in about an email he received. The scammers were trying to collect information from him after saying he was already scammed out of money, when in fact he was not.
Links to stories:

New cybersecurity data reveals persistent social engineering vulnerabilities

Scammers steal $4 million in crypto during face-to-face meeting


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Mathieu Gorge from VigiTrust sits down to discuss the different ways that online attackers target younger and older generations, and what the cybersecurity industry can and should do to protect them. Dave and Joe share some listener follow up from Greg who writes in regarding porch pirates possibly finding a new way to steal packages. In Joe's story this week, we learn that while ransomware was down last year, more and more people are clicking on phishing emails. Dave's story follows Ahad Shams, the co-founder of Web3 metaverse gaming engine startup Webaverse, who ended up getting $4 million of his cryptocurrency stolen. Our catch of the day comes from listener Rodney who writes in about an email he received. The scammers were trying to collect information from him after saying he was already scammed out of money, when in fact he was not.</p><p>Links to stories:</p><ul>
<li><a href="https://www.techrepublic.com/article/persistent-social-engineering-vulnerabilities/">New cybersecurity data reveals persistent social engineering vulnerabilities</a></li>
<li><a href="https://www.theregister.com/2023/02/08/webaverse_crypto_stolen/">Scammers steal $4 million in crypto during face-to-face meeting</a></li>
</ul><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>3013</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[6595e042-b9da-11ec-8b6e-43030120306b]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW5417809991.mp3?updated=1676411751" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Man-in-the-Middle (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/134/notes</link>
      <description>A cyber attack technique where adversaries intercept communications between two parties in order to collect useful information or to sabotage or corrupt the communication in some manner.
CyberWire Glossary link: https://thecyberwire.com/glossary/man-in-the-middle-attack</description>
      <pubDate>Tue, 14 Feb 2023 08:00:00 -0000</pubDate>
      <itunes:title>Man-in-the-Middle (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>134</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A cyber attack technique where adversaries intercept communications between two parties in order to collect useful information or to sabotage or corrupt the communication in some manner.
CyberWire Glossary link: https://thecyberwire.com/glossary/man-in-the-middle-attack</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A cyber attack technique where adversaries intercept communications between two parties in order to collect useful information or to sabotage or corrupt the communication in some manner.</p><p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/man-in-the-middle-attack">https://thecyberwire.com/glossary/man-in-the-middle-attack</a></p>]]>
      </content:encoded>
      <itunes:duration>351</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[3719b416-a703-11ed-88e4-974639eeff6b]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW2088788701.mp3?updated=1675712479" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Appearances count in the scam business. [Hacking Humans Goes to the Movies]</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans-goes-to-the-movies/16/notes</link>
      <description>Welcome to Season 3 of Hacking Humans Goes to the Movies. Thanks for joining us again for another episode of fun project brought to you by the team of Hacking Humans, the CyberWire's social engineering podcast. Hacking Humans co-host Dave Bittner is joined by Rick Howard in this series where they view clips from their favorite movies and television shows with examples of the social engineering scams and schemes you hear Dave and co-host Joe Carrigan talk about on Hacking Humans. In this episode, Dave and Rick watch each of the selected scenes, describe the on-screen action for you, and then they deconstruct what they saw. Grab your bowl of popcorn and join us for some fantastic scams and frauds.
Links to this episode's clips if you'd like to watch along:

Dave's clip from the movie Paper Moon


Rick's clip from the movie Catch Me If You Can</description>
      <pubDate>Sun, 12 Feb 2023 08:00:00 -0000</pubDate>
      <itunes:title>Appearances count in the scam business. [Hacking Humans Goes to the Movies]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>16</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Welcome to Season 3 of Hacking Humans Goes to the Movies. Thanks for joining us again for another episode of fun project brought to you by the team of Hacking Humans, the CyberWire's social engineering podcast. Hacking Humans co-host Dave Bittner is joined by Rick Howard in this series where they view clips from their favorite movies and television shows with examples of the social engineering scams and schemes you hear Dave and co-host Joe Carrigan talk about on Hacking Humans. In this episode, Dave and Rick watch each of the selected scenes, describe the on-screen action for you, and then they deconstruct what they saw. Grab your bowl of popcorn and join us for some fantastic scams and frauds.
Links to this episode's clips if you'd like to watch along:

Dave's clip from the movie Paper Moon


Rick's clip from the movie Catch Me If You Can</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Welcome to Season 3 of Hacking Humans Goes to the Movies. Thanks for joining us again for another episode of fun project brought to you by the team of Hacking Humans, the CyberWire's social engineering podcast. Hacking Humans co-host Dave Bittner is joined by Rick Howard in this series where they view clips from their favorite movies and television shows with examples of the social engineering scams and schemes you hear Dave and co-host Joe Carrigan talk about on Hacking Humans. In this episode, Dave and Rick watch each of the selected scenes, describe the on-screen action for you, and then they deconstruct what they saw. Grab your bowl of popcorn and join us for some fantastic scams and frauds.</p><p>Links to this episode's clips if you'd like to watch along:</p><ul>
<li>Dave's clip from the movie <a href="https://www.youtube.com/watch?v=CKJJbZe4TWM">Paper Moon</a>
</li>
<li>Rick's clip from the movie <a href="https://www.youtube.com/watch?v=67xt8jcZfm8">Catch Me If You Can</a>
</li>
</ul>]]>
      </content:encoded>
      <itunes:duration>1333</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[7fbd7e2e-a991-11ed-b97a-476eb72c0211]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW3556085765.mp3?updated=1675378012" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>A boom of infostealers and stolen credentials.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/231/notes</link>
      <description>Keith Jarvis, Senior Security Researcher from Secureworks Counter Threat Unit (CTU), shares his thoughts on the alarming rise of infostealers and stolen credentials. Dave and Joe share some listener follow-up from Ron who writes in about a book, entitled "Firewalls Don't Stop Dragons" by Carey Parker, which he finds as a helpful resource when it comes to cybersecurity. Dave's story follows password management companies and how they might not be as safe as what we presume them to be, most notably the LastPass breach in the last month. Joe has two stories this week, his first on a 19 year old TikToker who was arrested for running a GoFundMe scam while portraying on the popular social media app that she was diagnosed with 3 different types of cancer. Joe's second story is on Marines outsmarting artificially intelligent security cameras by hiding in a clever way that the AI could not recognize. Our catch of the day comes from listener Tim, who writes in about an old scam with a new twist, and how he was able to figure it out.
Links to stories:

Password Managers: A Work in Progress Despite Popularity

19-YEAR-OLD TIKTOKER ARRESTED FOR RUNNING GOFUNDME SCAM... Over Fake Cancer Diagnosis

U.S. Marines Outsmart AI Security Cameras by Hiding in a Cardboard Box


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 09 Feb 2023 06:00:00 -0000</pubDate>
      <itunes:title>A boom of infostealers and stolen credentials.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>231</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Keith Jarvis, Senior Security Researcher from Secureworks Counter Threat Unit (CTU), shares his thoughts on the alarming rise of infostealers and stolen credentials. Dave and Joe share some listener follow-up from Ron who writes in about a book, entitled "Firewalls Don't Stop Dragons" by Carey Parker, which he finds as a helpful resource when it comes to cybersecurity. Dave's story follows password management companies and how they might not be as safe as what we presume them to be, most notably the LastPass breach in the last month. Joe has two stories this week, his first on a 19 year old TikToker who was arrested for running a GoFundMe scam while portraying on the popular social media app that she was diagnosed with 3 different types of cancer. Joe's second story is on Marines outsmarting artificially intelligent security cameras by hiding in a clever way that the AI could not recognize. Our catch of the day comes from listener Tim, who writes in about an old scam with a new twist, and how he was able to figure it out.
Links to stories:

Password Managers: A Work in Progress Despite Popularity

19-YEAR-OLD TIKTOKER ARRESTED FOR RUNNING GOFUNDME SCAM... Over Fake Cancer Diagnosis

U.S. Marines Outsmart AI Security Cameras by Hiding in a Cardboard Box


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Keith Jarvis, Senior Security Researcher from Secureworks Counter Threat Unit (CTU), shares his thoughts on the alarming rise of infostealers and stolen credentials. Dave and Joe share some listener follow-up from Ron who writes in about a book, entitled "Firewalls Don't Stop Dragons" by Carey Parker, which he finds as a helpful resource when it comes to cybersecurity. Dave's story follows password management companies and how they might not be as safe as what we presume them to be, most notably the LastPass breach in the last month. Joe has two stories this week, his first on a 19 year old TikToker who was arrested for running a GoFundMe scam while portraying on the popular social media app that she was diagnosed with 3 different types of cancer. Joe's second story is on Marines outsmarting artificially intelligent security cameras by hiding in a clever way that the AI could not recognize. Our catch of the day comes from listener Tim, who writes in about an old scam with a new twist, and how he was able to figure it out.</p><p>Links to stories:</p><ul>
<li><a href="https://www.isms.online/information-security/password-managers-a-work-in-progress-despite-popularity/">Password Managers: A Work in Progress Despite Popularity</a></li>
<li><a href="https://www.tmz.com/2023/02/01/19-year-old-arrested-fake-cancer-diagnosis-gofundme-scam/">19-YEAR-OLD TIKTOKER ARRESTED FOR RUNNING GOFUNDME SCAM... Over Fake Cancer Diagnosis</a></li>
<li><a href="https://petapixel.com/2023/01/30/u-s-marines-outsmart-ai-security-cameras-by-hiding-in-a-cardboard-box/">U.S. Marines Outsmart AI Security Cameras by Hiding in a Cardboard Box</a></li>
</ul><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>2907</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[6586cf26-b9da-11ec-8b6e-3b6931bbf650]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW6588533837.mp3?updated=1675804594" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>NIST (Noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/133/notes</link>
      <description>A branch of the US Department of Commerce whose stated mission is to “promote U.S. innovation and industrial competitiveness by advancing measurement science, standards, and technology in ways that enhance economic security and improve our quality of life.”
CyberWire Glossary link: https://thecyberwire.com/glossary/national-institute-of-standards-and-technology
Audio reference link: Center, M.I., 2022. 2022 Meridian Summit: Cultivating Trust in Technology with NIST Director Laurie Locascio [WWW Document]. YouTube. URL https://www.youtube.com/watch?v=o43Y9Tk8ZVA (accessed 1.26.23).</description>
      <pubDate>Tue, 07 Feb 2023 08:00:00 -0000</pubDate>
      <itunes:title>NIST (Noun) [Word Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>133</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A branch of the US Department of Commerce whose stated mission is to “promote U.S. innovation and industrial competitiveness by advancing measurement science, standards, and technology in ways that enhance economic security and improve our quality of life.”
CyberWire Glossary link: https://thecyberwire.com/glossary/national-institute-of-standards-and-technology
Audio reference link: Center, M.I., 2022. 2022 Meridian Summit: Cultivating Trust in Technology with NIST Director Laurie Locascio [WWW Document]. YouTube. URL https://www.youtube.com/watch?v=o43Y9Tk8ZVA (accessed 1.26.23).</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A branch of the US Department of Commerce whose stated mission is to “promote U.S. innovation and industrial competitiveness by advancing measurement science, standards, and technology in ways that enhance economic security and improve our quality of life.”</p><p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/national-institute-of-standards-and-technology">https://thecyberwire.com/glossary/national-institute-of-standards-and-technology</a></p><p>Audio reference link: Center, M.I., 2022. 2022 Meridian Summit: Cultivating Trust in Technology with NIST Director Laurie Locascio [WWW Document]. YouTube. URL <a href="https://www.youtube.com/watch?v=o43Y9Tk8ZVA">https://www.youtube.com/watch?v=o43Y9Tk8ZVA</a> (accessed 1.26.23).</p>]]>
      </content:encoded>
      <itunes:duration>366</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[140f6750-a185-11ed-989d-67eaa52e05b1]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW1008739657.mp3?updated=1675110851" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>A war on commerce.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/230/notes</link>
      <description>J. Bennett from Signifyd discusses the fraud ring that has launched a war on commerce against US merchants over the past few months. Joe and Dave share some listener follow up from Jon who writes in about an email he almost fell victim to. Joe shares two stories this week, the first on how scammers were seen posing as tech support at two US agencies in an attempt to hack their employees. Joe's second story is on a woman trying to steal 2.8 million for an elderly Holocaust survivor. Dave's story follows how an ad scam was able to break through over 11 million phones. Our catch of the day comes from husband and wife, Chad and Jen, who write in sharing a scam that Jen almost fell for. An email from "iTunes" confirming a payment of over $100 hit the music lover's inbox that she didn't authorize. The scammers went on to explain the rules behind the payment, making sure to include that if she did not make this purchase to notify them immediately.
Links to stories:

Scammers posed as tech support to hack employees at two US agencies last year, officials say

36-Year-Old Woman Accused of Using Romance Scam to Swindle $2.8M from Elderly Holocaust Survivor

A Sneaky Ad Scam Tore Through 11 Million Phones


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 02 Feb 2023 06:00:00 -0000</pubDate>
      <itunes:title>A war on commerce.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>230</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>J. Bennett from Signifyd discusses the fraud ring that has launched a war on commerce against US merchants over the past few months. Joe and Dave share some listener follow up from Jon who writes in about an email he almost fell victim to. Joe shares two stories this week, the first on how scammers were seen posing as tech support at two US agencies in an attempt to hack their employees. Joe's second story is on a woman trying to steal 2.8 million for an elderly Holocaust survivor. Dave's story follows how an ad scam was able to break through over 11 million phones. Our catch of the day comes from husband and wife, Chad and Jen, who write in sharing a scam that Jen almost fell for. An email from "iTunes" confirming a payment of over $100 hit the music lover's inbox that she didn't authorize. The scammers went on to explain the rules behind the payment, making sure to include that if she did not make this purchase to notify them immediately.
Links to stories:

Scammers posed as tech support to hack employees at two US agencies last year, officials say

36-Year-Old Woman Accused of Using Romance Scam to Swindle $2.8M from Elderly Holocaust Survivor

A Sneaky Ad Scam Tore Through 11 Million Phones


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>J. Bennett from Signifyd discusses the fraud ring that has launched a war on commerce against US merchants over the past few months. Joe and Dave share some listener follow up from Jon who writes in about an email he almost fell victim to. Joe shares two stories this week, the first on how scammers were seen posing as tech support at two US agencies in an attempt to hack their employees. Joe's second story is on a woman trying to steal 2.8 million for an elderly Holocaust survivor. Dave's story follows how an ad scam was able to break through over 11 million phones. Our catch of the day comes from husband and wife, Chad and Jen, who write in sharing a scam that Jen almost fell for. An email from "iTunes" confirming a payment of over $100 hit the music lover's inbox that she didn't authorize. The scammers went on to explain the rules behind the payment, making sure to include that if she did not make this purchase to notify them immediately.</p><p>Links to stories:</p><ul>
<li><a href="https://www.cnn.com/2023/01/25/politics/hackers-fraud-us-agencies-bank-accounts/index.html">Scammers posed as tech support to hack employees at two US agencies last year, officials say</a></li>
<li><a href="https://people.com/crime/36-year-old-woman-accused-of-using-romance-scam-to-swindle-2-8m-from-elderly-holocaust-survivor/">36-Year-Old Woman Accused of Using Romance Scam to Swindle $2.8M from Elderly Holocaust Survivor</a></li>
<li><a href="https://www.wired.com/story/vastflux-ad-fraud/">A Sneaky Ad Scam Tore Through 11 Million Phones</a></li>
</ul><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>3058</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[65779a42-b9da-11ec-8b6e-7b8c8ada090a]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW7569895523.mp3?updated=1675187018" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>CIRT (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/132/notes</link>
      <description>A team responsible for responding to and managing cybersecurity incidents involving computer systems and networks in order to minimize the damage and to restore normal operations as quickly as possible.
CyberWire Glossary link: https://thecyberwire.com/glossary/cirt
Audio reference link: Avery, B., 2017. 24 TV May 05 Season4 [WWW Document]. YouTube. URL https://www.youtube.com/watch?v=Gq_2xPuqI-E&amp;#38;list=PLGHedLavrFoGsea1ZCHBm9-nK5FdM3_Kd&amp;#38;index=10.</description>
      <pubDate>Tue, 31 Jan 2023 08:00:00 -0000</pubDate>
      <itunes:title>CIRT (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>132</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A team responsible for responding to and managing cybersecurity incidents involving computer systems and networks in order to minimize the damage and to restore normal operations as quickly as possible.
CyberWire Glossary link: https://thecyberwire.com/glossary/cirt
Audio reference link: Avery, B., 2017. 24 TV May 05 Season4 [WWW Document]. YouTube. URL https://www.youtube.com/watch?v=Gq_2xPuqI-E&amp;#38;list=PLGHedLavrFoGsea1ZCHBm9-nK5FdM3_Kd&amp;#38;index=10.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A team responsible for responding to and managing cybersecurity incidents involving computer systems and networks in order to minimize the damage and to restore normal operations as quickly as possible.</p><p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/cirt">https://thecyberwire.com/glossary/cirt</a></p><p>Audio reference link: Avery, B., 2017. 24 TV May 05 Season4 [WWW Document]. YouTube. URL <a href="https://www.youtube.com/watch?v=Gq_2xPuqI-E">https://www.youtube.com/watch?v=Gq_2xPuqI-E&amp;#38;list=PLGHedLavrFoGsea1ZCHBm9-nK5FdM3_Kd&amp;#38;index=10.</a></p>]]>
      </content:encoded>
      <itunes:duration>396</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[0e0b03d2-9b4f-11ed-b5c2-132b7c79e21c]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW6451601634.mp3?updated=1674498576" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Interview with the AI, part one. [Special Editions]</title>
      <link>https://thecyberwire.com/podcasts/special-edition/48/notes</link>
      <description>Cybersecurity interview with ChatGPT.
In part one of CyberWire’s Interview with the AI, Brandon Karpf interviews ChatGPT about topics related to cybersecurity. Rick Howard joins Brandon to analyze the conversation and discuss potential use cases for the cybersecurity community.
ChatGPT is a chatbot launched by OpenAI and built on top of OpenAI’s GPT-3 family of large language models.
Cyber questions answered by ChatGPT in part one of the interview.

What were the most significant cybersecurity incidents up through 2021?

What leads you to characterize these specific events as significant?

What were the specific technical vulnerabilities associated with these incidents?

Who were the cyber actors involved in each of these attacks?

Do you think it's valuable to attribute cyber attacks to specific actors?</description>
      <pubDate>Sun, 29 Jan 2023 06:00:00 -0000</pubDate>
      <itunes:title>Interview with the AI, part one. [Special Editions]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>48</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Cybersecurity interview with ChatGPT.
In part one of CyberWire’s Interview with the AI, Brandon Karpf interviews ChatGPT about topics related to cybersecurity. Rick Howard joins Brandon to analyze the conversation and discuss potential use cases for the cybersecurity community.
ChatGPT is a chatbot launched by OpenAI and built on top of OpenAI’s GPT-3 family of large language models.
Cyber questions answered by ChatGPT in part one of the interview.

What were the most significant cybersecurity incidents up through 2021?

What leads you to characterize these specific events as significant?

What were the specific technical vulnerabilities associated with these incidents?

Who were the cyber actors involved in each of these attacks?

Do you think it's valuable to attribute cyber attacks to specific actors?</itunes:summary>
      <content:encoded>
        <![CDATA[<h3>Cybersecurity interview with ChatGPT.</h3><p>In part one of CyberWire’s Interview with the AI, Brandon Karpf interviews ChatGPT about topics related to cybersecurity. Rick Howard joins Brandon to analyze the conversation and discuss potential use cases for the cybersecurity community.</p><p>ChatGPT is a chatbot launched by OpenAI and built on top of OpenAI’s GPT-3 family of large language models.</p><h3>Cyber questions answered by ChatGPT in part one of the interview.</h3><ol>
<li>What were the most significant cybersecurity incidents up through 2021?</li>
<li>What leads you to characterize these specific events as significant?</li>
<li>What were the specific technical vulnerabilities associated with these incidents?</li>
<li>Who were the cyber actors involved in each of these attacks?</li>
<li>Do you think it's valuable to attribute cyber attacks to specific actors?</li>
</ol>]]>
      </content:encoded>
      <itunes:duration>1647</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[49f96dda-9e91-11ed-8bad-0f0d5400972f]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW6549503133.mp3?updated=1674850117" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Outsmarting the scammers.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/229/notes</link>
      <description>Nadine Michaelides from Anima People sits down with Dave to discuss preventing insider threat using behavioral science and psych metrics. Joe and Dave share some follow up regarding a Facebook scammer who is targeting Joe, as well as a letter from listener Richard who write in about business emails and the compromised warning signs they send about dangerous emails coming from outside the company. Dave shares a story about hackers who are setting up fake websites to promote malicious downloads through advertisements in Google search results. Joe's has two stories this week, one is about the latest scam in the parking ticket realm, and the second story follows West Virginia police warning residents of a Walmart scam where the scammer send you a "free 50 dollar Walmart gift card." The catch of the day comes from Penny who writes in about a scam that almost sucked her in through an email from "McAfee."
Links to stories:

Hackers push malware via Google search ads for VLC, 7-Zip, CCleaner

That Surprisingly Real Looking Parking Ticket May Be Fake! Don’t Fall for Latest Scam

McMechen Police issue warning about Walmart scam in area


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 26 Jan 2023 06:00:00 -0000</pubDate>
      <itunes:title>Outsmarting the scammers.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>229</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Nadine Michaelides from Anima People sits down with Dave to discuss preventing insider threat using behavioral science and psych metrics. Joe and Dave share some follow up regarding a Facebook scammer who is targeting Joe, as well as a letter from listener Richard who write in about business emails and the compromised warning signs they send about dangerous emails coming from outside the company. Dave shares a story about hackers who are setting up fake websites to promote malicious downloads through advertisements in Google search results. Joe's has two stories this week, one is about the latest scam in the parking ticket realm, and the second story follows West Virginia police warning residents of a Walmart scam where the scammer send you a "free 50 dollar Walmart gift card." The catch of the day comes from Penny who writes in about a scam that almost sucked her in through an email from "McAfee."
Links to stories:

Hackers push malware via Google search ads for VLC, 7-Zip, CCleaner

That Surprisingly Real Looking Parking Ticket May Be Fake! Don’t Fall for Latest Scam

McMechen Police issue warning about Walmart scam in area


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Nadine Michaelides from Anima People sits down with Dave to discuss preventing insider threat using behavioral science and psych metrics. Joe and Dave share some follow up regarding a Facebook scammer who is targeting Joe, as well as a letter from listener Richard who write in about business emails and the compromised warning signs they send about dangerous emails coming from outside the company. Dave shares a story about hackers who are setting up fake websites to promote malicious downloads through advertisements in Google search results. Joe's has two stories this week, one is about the latest scam in the parking ticket realm, and the second story follows West Virginia police warning residents of a Walmart scam where the scammer send you a "free 50 dollar Walmart gift card." The catch of the day comes from Penny who writes in about a scam that almost sucked her in through an email from "McAfee."</p><p>Links to stories:</p><ul>
<li><a href="https://www.bleepingcomputer.com/news/security/hackers-push-malware-via-google-search-ads-for-vlc-7-zip-ccleaner/">Hackers push malware via Google search ads for VLC, 7-Zip, CCleaner</a></li>
<li><a href="https://wibx950.com/ixp/39/p/fake-parking-ticket/">That Surprisingly Real Looking Parking Ticket May Be Fake! Don’t Fall for Latest Scam</a></li>
<li><a href="https://wtov9.com/news/local/mcmechen-police-issue-warning-about-walmart-scam-in-area">McMechen Police issue warning about Walmart scam in area</a></li>
</ul><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>3349</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[6567c95a-b9da-11ec-8b6e-7f6d7d1fcf91]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW1427545131.mp3?updated=1674665535" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>PUP (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/131/notes</link>
      <description>A software program installed unintentionally by a user that typically performs tasks not asked for by the installer. 
CyberWire Glossary link: https://thecyberwire.com/glossary/potentially-unwanted-program
Audio reference link: Butler, S., 2022. Potentially Unwanted Programs (PUPS) EXPLAINED [Video]. YouTube. URL https://www.youtube.com/watch?v=5L429Iahbww (accessed 1.6.23).</description>
      <pubDate>Tue, 24 Jan 2023 08:00:00 -0000</pubDate>
      <itunes:title>PUP (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>131</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A software program installed unintentionally by a user that typically performs tasks not asked for by the installer. 
CyberWire Glossary link: https://thecyberwire.com/glossary/potentially-unwanted-program
Audio reference link: Butler, S., 2022. Potentially Unwanted Programs (PUPS) EXPLAINED [Video]. YouTube. URL https://www.youtube.com/watch?v=5L429Iahbww (accessed 1.6.23).</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A software program installed unintentionally by a user that typically performs tasks not asked for by the installer. </p><p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/potentially-unwanted-program">https://thecyberwire.com/glossary/potentially-unwanted-program</a></p><p>Audio reference link: Butler, S., 2022. Potentially Unwanted Programs (PUPS) EXPLAINED [Video]. YouTube. URL <a href="https://www.youtube.com/watch?v=5L429Iahbww">https://www.youtube.com/watch?v=5L429Iahbww</a> (accessed 1.6.23).</p>]]>
      </content:encoded>
      <itunes:duration>325</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[27068ccc-9059-11ed-bccb-4fe5a7e96565]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW6824299345.mp3?updated=1673295060" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The front lines of ransomware attacks.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/228/notes</link>
      <description>Rohit Dhamankar from Fortra’s Alert Logic joins Dave to discuss the decline in ransomware attacks and lessons learned from the front lines. Dave and Joe share some listener follow up from Keith regarding Dave's story from last episode and how he recognizes the scams being mentioned and offers his opinions on the matter. Joe shares two stories this week, one about his ironclad gift he gave to his wife, with his second story following the buzz surrounding OpenAI, creators of ChatGPT, their new interface for their Large Language Model (LLM) and how it works. Dave's story also follows ChatGPT in a different direction. His story is on the latest popular app and its rise to fame in the app store, now charging users almost 8 dollars to use the AI technology. Our catch of the day comes from listener and friend of the show Joel who writes in about how he was contacted at his place of business by a "DEA agent" who claims Joel was committing malpractice, and if he wanted these charges to go away he would need to pay $2500.
Links to stories:

OPWNAI: AI THAT CAN SAVE THE DAY OR HACK IT AWAY

Sketchy ChatGPT App Soars Up App Store Charts, Charges $7.99 Weekly Subscription [Update: Removed]


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 19 Jan 2023 06:00:00 -0000</pubDate>
      <itunes:title>The front lines of ransomware attacks.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>228</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Rohit Dhamankar from Fortra’s Alert Logic joins Dave to discuss the decline in ransomware attacks and lessons learned from the front lines. Dave and Joe share some listener follow up from Keith regarding Dave's story from last episode and how he recognizes the scams being mentioned and offers his opinions on the matter. Joe shares two stories this week, one about his ironclad gift he gave to his wife, with his second story following the buzz surrounding OpenAI, creators of ChatGPT, their new interface for their Large Language Model (LLM) and how it works. Dave's story also follows ChatGPT in a different direction. His story is on the latest popular app and its rise to fame in the app store, now charging users almost 8 dollars to use the AI technology. Our catch of the day comes from listener and friend of the show Joel who writes in about how he was contacted at his place of business by a "DEA agent" who claims Joel was committing malpractice, and if he wanted these charges to go away he would need to pay $2500.
Links to stories:

OPWNAI: AI THAT CAN SAVE THE DAY OR HACK IT AWAY

Sketchy ChatGPT App Soars Up App Store Charts, Charges $7.99 Weekly Subscription [Update: Removed]


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Rohit Dhamankar from Fortra’s Alert Logic joins Dave to discuss the decline in ransomware attacks and lessons learned from the front lines. Dave and Joe share some listener follow up from Keith regarding Dave's story from last episode and how he recognizes the scams being mentioned and offers his opinions on the matter. Joe shares two stories this week, one about his ironclad gift he gave to his wife, with his second story following the buzz surrounding OpenAI, creators of ChatGPT, their new interface for their Large Language Model (LLM) and how it works. Dave's story also follows ChatGPT in a different direction. His story is on the latest popular app and its rise to fame in the app store, now charging users almost 8 dollars to use the AI technology. Our catch of the day comes from listener and friend of the show Joel who writes in about how he was contacted at his place of business by a "DEA agent" who claims Joel was committing malpractice, and if he wanted these charges to go away he would need to pay $2500.</p><p>Links to stories:</p><ul>
<li><a href="https://research.checkpoint.com/2022/opwnai-ai-that-can-save-the-day-or-hack-it-away/">OPWNAI: AI THAT CAN SAVE THE DAY OR HACK IT AWAY</a></li>
<li><a href="https://www.macrumors.com/2023/01/09/chatgpt-app-store-apps/">Sketchy ChatGPT App Soars Up App Store Charts, Charges $7.99 Weekly Subscription [Update: Removed]</a></li>
</ul><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>3022</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[6557dd06-b9da-11ec-8b6e-13eeaf018ee3]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW9889103114.mp3?updated=1674063199" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Ransomware (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/130/notes</link>
      <description>Malware that disables a system in exchange for a ransom, usually by encrypting the system's data until the user pays for the decryption key.
CyberWire Glossary link: https://thecyberwire.com/glossary/ransomware
Audio reference link: https://watch.amazon.com/detail?gti=amzn1.dv.gti.d6a9f744-47b0-ac70-aa56-b31fd0f58482&amp;territory=US&amp;ref_=share_ios_season&amp;r=web</description>
      <pubDate>Tue, 17 Jan 2023 08:00:00 -0000</pubDate>
      <itunes:title>Ransomware (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>130</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Malware that disables a system in exchange for a ransom, usually by encrypting the system's data until the user pays for the decryption key.
CyberWire Glossary link: https://thecyberwire.com/glossary/ransomware
Audio reference link: https://watch.amazon.com/detail?gti=amzn1.dv.gti.d6a9f744-47b0-ac70-aa56-b31fd0f58482&amp;territory=US&amp;ref_=share_ios_season&amp;r=web</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Malware that disables a system in exchange for a ransom, usually by encrypting the system's data until the user pays for the decryption key.</p><p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/ransomware">https://thecyberwire.com/glossary/ransomware</a></p><p>Audio reference link: <a href="https://watch.amazon.com/detail?gti=amzn1.dv.gti.d6a9f744-47b0-ac70-aa56-b31fd0f58482&amp;territory=US&amp;ref_=share_ios_season&amp;r=web">https://watch.amazon.com/detail?gti=amzn1.dv.gti.d6a9f744-47b0-ac70-aa56-b31fd0f58482&amp;territory=US&amp;ref_=share_ios_season&amp;r=web</a></p>]]>
      </content:encoded>
      <itunes:duration>466</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b2243f48-7fe7-11ed-a306-f3393c358341]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW7197401279.mp3?updated=1671488826" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The age old battle between social engineering and banking.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/227/notes</link>
      <description>Chip Gibbons, CISO at Thrive, sits down with Dave to talk about how to defend against social engineering attacks in banking. Dave starts us off this week with a story about Amazon opening up its selling market to Pakistani residents, and what consequences that led to for the organization’s business. Joe's story follows a scam targeting soldiers in the Army. The Army warns against unknown individuals purporting to be noncommissioned officers that are calling said soldiers and asking them for money to fix a "pay problem" and, if questioned, threatening them with a punishment. Our catch of the day comes from listener Manie who writes in about a scam found when trying to download a HDRI (High Dynamic Range Image). The scam involves a fake ad asking for people’s cell phone numbers as soon as they click on a button that reads "download here". Manie shares how after she clicked the ad, she realized the mistake and immediately researched more before proceeding further.
Links to stories:

Amazon finally authorized Pakistani sellers. A wave of scammers followed

Army Warns of Scam Targeting New Soldiers


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 12 Jan 2023 06:00:00 -0000</pubDate>
      <itunes:title>The age old battle between social engineering and banking.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>227</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Chip Gibbons, CISO at Thrive, sits down with Dave to talk about how to defend against social engineering attacks in banking. Dave starts us off this week with a story about Amazon opening up its selling market to Pakistani residents, and what consequences that led to for the organization’s business. Joe's story follows a scam targeting soldiers in the Army. The Army warns against unknown individuals purporting to be noncommissioned officers that are calling said soldiers and asking them for money to fix a "pay problem" and, if questioned, threatening them with a punishment. Our catch of the day comes from listener Manie who writes in about a scam found when trying to download a HDRI (High Dynamic Range Image). The scam involves a fake ad asking for people’s cell phone numbers as soon as they click on a button that reads "download here". Manie shares how after she clicked the ad, she realized the mistake and immediately researched more before proceeding further.
Links to stories:

Amazon finally authorized Pakistani sellers. A wave of scammers followed

Army Warns of Scam Targeting New Soldiers


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Chip Gibbons, CISO at Thrive, sits down with Dave to talk about how to defend against social engineering attacks in banking. Dave starts us off this week with a story about Amazon opening up its selling market to Pakistani residents, and what consequences that led to for the organization’s business. Joe's story follows a scam targeting soldiers in the Army. The Army warns against unknown individuals purporting to be noncommissioned officers that are calling said soldiers and asking them for money to fix a "pay problem" and, if questioned, threatening them with a punishment. Our catch of the day comes from listener Manie who writes in about a scam found when trying to download a HDRI (High Dynamic Range Image). The scam involves a fake ad asking for people’s cell phone numbers as soon as they click on a button that reads "download here". Manie shares how after she clicked the ad, she realized the mistake and immediately researched more before proceeding further.</p><p>Links to stories:</p><ul>
<li><a href="https://restofworld.org/2023/amazon-pakistani-sellers-scammers/">Amazon finally authorized Pakistani sellers. A wave of scammers followed</a></li>
<li><a href="https://www.military.com/daily-news/2023/01/04/army-warns-of-scam-targeting-new-soldiers.html">Army Warns of Scam Targeting New Soldiers</a></li>
</ul><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>3214</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[65486b78-b9da-11ec-8b6e-a7150b1a5c9a]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW2563283813.mp3?updated=1673375520" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Service Set Identifier (SSID) (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/129/notes</link>
      <description>The name of a wireless access point.
CyberWire Glossary link.
Audio reference link: SSID Management - CompTIA Security+ SY0-401: 1.5, Professor Messer, uploaded August 3rd, 2014.</description>
      <pubDate>Tue, 10 Jan 2023 08:00:00 -0000</pubDate>
      <itunes:title>Service Set Identifier (SSID) (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>129</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>The name of a wireless access point.
CyberWire Glossary link.
Audio reference link: SSID Management - CompTIA Security+ SY0-401: 1.5, Professor Messer, uploaded August 3rd, 2014.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The name of a wireless access point.</p><p>CyberWire Glossary <a href="https://thecyberwire.com/glossary/service-set-identifier-ssid">link</a>.</p><p>Audio reference link: <a href="https://www.youtube.com/watch?v=wlg4VaEXbrg">SSID Management - CompTIA Security+ SY0-401: 1.5</a>, Professor Messer, uploaded August 3rd, 2014.</p>]]>
      </content:encoded>
      <itunes:duration>342</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[7c4d644e-773b-11ed-a289-4bf5b7e064fa]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW7385763601.mp3?updated=1670945081" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Leveraging credentials online and off isn't going away. </title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/226/notes</link>
      <description>Guest Eric Levine, Co-founder and CEO at Berbix, joins Dave to discuss identity fraud. Dave and Joe share comments from listener Chris on a series of SMS messages he got from "Wells Fargo." Joe's story previews what is coming for social engineering attacks in 2023 and how to prepare to improve your safety online, while Dave's story is about sextortion scammers in rural India and how they are blackmailing victims. Our catch of the day comes from listener George who's been receiving a lot of scam messages via WhatsApp and how he played along with one of them.
Links to stories:

Social Engineering Attacks: Preparing for What’s Coming in 2023

The sextortion scammers of rural India


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 05 Jan 2023 06:00:00 -0000</pubDate>
      <itunes:title>Leveraging credentials online and off isn't going away. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>226</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Guest Eric Levine, Co-founder and CEO at Berbix, joins Dave to discuss identity fraud. Dave and Joe share comments from listener Chris on a series of SMS messages he got from "Wells Fargo." Joe's story previews what is coming for social engineering attacks in 2023 and how to prepare to improve your safety online, while Dave's story is about sextortion scammers in rural India and how they are blackmailing victims. Our catch of the day comes from listener George who's been receiving a lot of scam messages via WhatsApp and how he played along with one of them.
Links to stories:

Social Engineering Attacks: Preparing for What’s Coming in 2023

The sextortion scammers of rural India


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Guest Eric Levine, Co-founder and CEO at Berbix, joins Dave to discuss identity fraud. Dave and Joe share comments from listener Chris on a series of SMS messages he got from "Wells Fargo." Joe's story previews what is coming for social engineering attacks in 2023 and how to prepare to improve your safety online, while Dave's story is about sextortion scammers in rural India and how they are blackmailing victims. Our catch of the day comes from listener George who's been receiving a lot of scam messages via WhatsApp and how he played along with one of them.</p><p>Links to stories:</p><ul>
<li><a href="https://tdwi.org/articles/2022/12/21/dwt-all-social-engineering-attacks-preparing-for-2023.aspx">Social Engineering Attacks: Preparing for What’s Coming in 2023</a></li>
<li><a href="https://restofworld.org/2022/sex-scam-village-india/">The sextortion scammers of rural India</a></li>
</ul><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>3202</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[6537abda-b9da-11ec-8b6e-d3b764134f40]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW6696103748.mp3?updated=1672692737" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Advanced Encryption Standard (AES) (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/128/notes</link>
      <description>A U.S. Government specification for data encryption using an asymmetric key algorithm.
CyberWire Glossary link: https://thecyberwire.com/glossary/advanced-encryption-standard
Audio reference link: papadoc73. “Claude Debussy: Clair De Lune.” YouTube, YouTube, 6 Oct. 2008. </description>
      <pubDate>Tue, 03 Jan 2023 08:00:00 -0000</pubDate>
      <itunes:title>Advanced Encryption Standard (AES) (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>128</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A U.S. Government specification for data encryption using an asymmetric key algorithm.
CyberWire Glossary link: https://thecyberwire.com/glossary/advanced-encryption-standard
Audio reference link: papadoc73. “Claude Debussy: Clair De Lune.” YouTube, YouTube, 6 Oct. 2008. </itunes:summary>
      <content:encoded>
        <![CDATA[<p>A U.S. Government specification for data encryption using an asymmetric key algorithm.</p><p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/advanced-encryption-standard">https://thecyberwire.com/glossary/advanced-encryption-standard</a></p><p>Audio reference link: papadoc73. <a href="https://www.youtube.com/watch?v=CvFH_6DNRCY">“Claude Debussy: Clair De Lune.”</a> <em>YouTube</em>, YouTube, 6 Oct. 2008. </p>]]>
      </content:encoded>
      <itunes:duration>517</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[01ccffc8-725d-11ed-847c-1b884c0b9bc4]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW2409379398.mp3?updated=1669935395" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Sisters, grifters, and shifters. [Hacking Humans Goes to the Movies]</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans-goes-to-the-movies/15/notes</link>
      <description>Thanks for joining us again for another episode of fun project brought to you by the team of Hacking Humans, the CyberWire's social engineering podcast. Hacking Humans co-host Dave Bittner is joined by Rick Howard in this series where they view clips from their favorite movies and television shows with examples of the social engineering scams and schemes you hear Dave and co-host Joe Carrigan talk about on Hacking Humans. In this episode, Dave and Rick watch each of the selected scenes, describe the on-screen action for you, and then they deconstruct what they saw. Grab your bowl of popcorn and join us for some fantastic scams and frauds.
On this episode, Dave and Rick are joined by guest contributor Amanda Fennell. You can find Amanda on Twitter at @Chi_from_afar.
Links to this episode's clips if you'd like to watch along:

Dave's clip from the movie Zombieland


Rick's clip from the movie Traveller


Amanda's clip from the movie The Girl with the Dragon Tattoo</description>
      <pubDate>Thu, 29 Dec 2022 08:00:00 -0000</pubDate>
      <itunes:title>Sisters, grifters, and shifters. [Hacking Humans Goes to the Movies]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>15</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Thanks for joining us again for another episode of fun project brought to you by the team of Hacking Humans, the CyberWire's social engineering podcast. Hacking Humans co-host Dave Bittner is joined by Rick Howard in this series where they view clips from their favorite movies and television shows with examples of the social engineering scams and schemes you hear Dave and co-host Joe Carrigan talk about on Hacking Humans. In this episode, Dave and Rick watch each of the selected scenes, describe the on-screen action for you, and then they deconstruct what they saw. Grab your bowl of popcorn and join us for some fantastic scams and frauds.
On this episode, Dave and Rick are joined by guest contributor Amanda Fennell. You can find Amanda on Twitter at @Chi_from_afar.
Links to this episode's clips if you'd like to watch along:

Dave's clip from the movie Zombieland


Rick's clip from the movie Traveller


Amanda's clip from the movie The Girl with the Dragon Tattoo</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Thanks for joining us again for another episode of fun project brought to you by the team of Hacking Humans, the CyberWire's social engineering podcast. Hacking Humans co-host Dave Bittner is joined by Rick Howard in this series where they view clips from their favorite movies and television shows with examples of the social engineering scams and schemes you hear Dave and co-host Joe Carrigan talk about on Hacking Humans. In this episode, Dave and Rick watch each of the selected scenes, describe the on-screen action for you, and then they deconstruct what they saw. Grab your bowl of popcorn and join us for some fantastic scams and frauds.</p><p>On this episode, Dave and Rick are joined by guest contributor Amanda Fennell. You can find Amanda on Twitter at <a href="https://twitter.com/Chi_from_afar">@Chi_from_afar</a>.</p><p>Links to this episode's clips if you'd like to watch along:</p><ul>
<li>Dave's clip from the movie <a href="https://www.youtube.com/watch?v=TAZGIJev8nU">Zombieland</a>
</li>
<li>Rick's clip from the movie <a href="https://www.youtube.com/watch?v=9dOZyrzR7R0">Traveller</a>
</li>
<li>Amanda's clip from the movie <a href="https://www.youtube.com/watch?v=IOpipTU6EkU">The Girl with the Dragon Tattoo</a>
</li>
</ul>]]>
      </content:encoded>
      <itunes:duration>2068</itunes:duration>
      <guid isPermaLink="false"><![CDATA[7a03a948-815c-11ed-84e7-db456ceea2ba]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW4098101815.mp3?updated=1675377515" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The CyberWire: The 12 Days of Malware.[Special Editions]</title>
      <link>https://thecyberwire.com/stories/f765b7d394aa4c16840fd96d405c2ee7/the-cyberwire-the-12-days-of-malware</link>
      <description>Merry Christmas and Happy Holidays from the CyberWire and our friends! Enjoy our rendition of the 12 Days of Malware created by Dave Bittner and performed by Dave and friends: Rachel Tobac, Jayson Street, Ron Eddings &amp; Chris Cochran, Ray [Redacted], Dinah Davis, Camille Stewart, Rick Howard, Michelle Dennedy, Jack Rhysider, Johannes Ullrich, and Charity Wright. Ba dum bum bum. Sing along if you are game! Check out our video for the full effect!

The 12 Days of Malware lyrics
On the first day of Christmas, my malware gave to me:
A keylogger logging my keys.

On the second day of Christmas, my malware gave to me:
2 Trojan Apps...
And a keylogger logging my keys.

On the third day of Christmas, my malware gave to me:
3 Web shells...
2 Trojan Apps...
And a keylogger logging my keys.

On the fourth day of Christmas, my malware gave to me:
4 Crypto scams...
3 Web shells...
2 Trojan Apps...
And a keylogger logging my keys.

On the fifth day of Christmas, my malware gave to me:
5 Zero Days!
4 Crypto scams...
3 Web shells...
2 Trojan Apps...
And a keylogger logging my keys.

On the sixth day of Christmas, my malware gave to me:
6 Passwords spraying...
5 Zero Days!
4 Crypto scams...
3 Web shells...
2 Trojan Apps...
And a keylogger logging my keys.

On the seventh day of Christmas, my malware gave to me:
7 Scripts a scraping...
6 Passwords spraying...
5 Zero Days!
4 Crypto scams...
3 Web shells...
2 Trojan Apps...
And a keylogger logging my keys.

On the eighth day of Christmas, my malware gave to me:
8 Worms a wiping...
7 Scripts a scraping...
6 Passwords spraying...
5 Zero Days!
4 Crypto scams...
3 Web shells...
2 Trojan Apps...
And a keylogger logging my keys.

On the ninth day of Christmas, my malware gave to me:
9 Rootkits rooting...
8 Worms a wiping...
7 Scripts a scraping...
6 Passwords spraying...
5 Zero Days!
4 Crypto scams...
3 Web shells...
2 Trojan Apps...
And a keylogger logging my keys.

On the tenth day of Christmas, my malware gave to me:
10 Darknet markets...
9 Rootkits rooting...
8 Worms a wiping...
7 Scripts a scraping...
6 Passwords spraying...
5 Zero Days! (Bah-dum-dum-dum!)
4 Crypto scams...
3 Web shells...
2 Trojan Apps...
And a keylogger logging my keys.

On the eleventh day of Christmas, my malware gave to me:
11 Phishers phishing...
10 Darknet markets...
9 Rootkits rooting...
8 Worms a wiping...
7 Scripts a scraping...
6 Passwords spraying...
5 Zero Days! (Bah-dum-dum-dum!)
4 Crypto scams...
3 Web shells...
2 Trojan Apps...
And a keylogger logging my keys.

On the twelfth day of Christmas, my malware gave to me:
12 Hackers hacking...
11 Phishers phishing...
10 Darknet markets...
9 Rootkits rooting...
8 Worms a wiping...
7 Scripts a scraping...
6 Passwords spraying...
5 Zero Days!
4 Crypto scams...
3 Web shells...
2 Trojan Apps...
And a keylogger logging my keys.</description>
      <pubDate>Sun, 25 Dec 2022 06:00:00 -0000</pubDate>
      <itunes:title>The CyberWire: The 12 Days of Malware.[Special Editions]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Merry Christmas and Happy Holidays from the CyberWire and our friends! Enjoy our rendition of the 12 Days of Malware created by Dave Bittner and performed by Dave and friends: Rachel Tobac, Jayson Street, Ron Eddings &amp; Chris Cochran, Ray [Redacted], Dinah Davis, Camille Stewart, Rick Howard, Michelle Dennedy, Jack Rhysider, Johannes Ullrich, and Charity Wright. Ba dum bum bum. Sing along if you are game! Check out our video for the full effect!

The 12 Days of Malware lyrics
On the first day of Christmas, my malware gave to me:
A keylogger logging my keys.

On the second day of Christmas, my malware gave to me:
2 Trojan Apps...
And a keylogger logging my keys.

On the third day of Christmas, my malware gave to me:
3 Web shells...
2 Trojan Apps...
And a keylogger logging my keys.

On the fourth day of Christmas, my malware gave to me:
4 Crypto scams...
3 Web shells...
2 Trojan Apps...
And a keylogger logging my keys.

On the fifth day of Christmas, my malware gave to me:
5 Zero Days!
4 Crypto scams...
3 Web shells...
2 Trojan Apps...
And a keylogger logging my keys.

On the sixth day of Christmas, my malware gave to me:
6 Passwords spraying...
5 Zero Days!
4 Crypto scams...
3 Web shells...
2 Trojan Apps...
And a keylogger logging my keys.

On the seventh day of Christmas, my malware gave to me:
7 Scripts a scraping...
6 Passwords spraying...
5 Zero Days!
4 Crypto scams...
3 Web shells...
2 Trojan Apps...
And a keylogger logging my keys.

On the eighth day of Christmas, my malware gave to me:
8 Worms a wiping...
7 Scripts a scraping...
6 Passwords spraying...
5 Zero Days!
4 Crypto scams...
3 Web shells...
2 Trojan Apps...
And a keylogger logging my keys.

On the ninth day of Christmas, my malware gave to me:
9 Rootkits rooting...
8 Worms a wiping...
7 Scripts a scraping...
6 Passwords spraying...
5 Zero Days!
4 Crypto scams...
3 Web shells...
2 Trojan Apps...
And a keylogger logging my keys.

On the tenth day of Christmas, my malware gave to me:
10 Darknet markets...
9 Rootkits rooting...
8 Worms a wiping...
7 Scripts a scraping...
6 Passwords spraying...
5 Zero Days! (Bah-dum-dum-dum!)
4 Crypto scams...
3 Web shells...
2 Trojan Apps...
And a keylogger logging my keys.

On the eleventh day of Christmas, my malware gave to me:
11 Phishers phishing...
10 Darknet markets...
9 Rootkits rooting...
8 Worms a wiping...
7 Scripts a scraping...
6 Passwords spraying...
5 Zero Days! (Bah-dum-dum-dum!)
4 Crypto scams...
3 Web shells...
2 Trojan Apps...
And a keylogger logging my keys.

On the twelfth day of Christmas, my malware gave to me:
12 Hackers hacking...
11 Phishers phishing...
10 Darknet markets...
9 Rootkits rooting...
8 Worms a wiping...
7 Scripts a scraping...
6 Passwords spraying...
5 Zero Days!
4 Crypto scams...
3 Web shells...
2 Trojan Apps...
And a keylogger logging my keys.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Merry Christmas and Happy Holidays from the CyberWire and our friends! Enjoy our rendition of the 12 Days of Malware created by Dave Bittner and performed by Dave and friends: Rachel Tobac, Jayson Street, Ron Eddings &amp; Chris Cochran, Ray [Redacted], Dinah Davis, Camille Stewart, Rick Howard, Michelle Dennedy, Jack Rhysider, Johannes Ullrich, and Charity Wright. Ba dum bum bum. Sing along if you are game! Check out <a href="thecyberwire.com/stories/f765b7d394aa4c16840fd96d405c2ee7/the-cyberwire-the-12-days-of-malware">our video</a> for the full effect!</p><p><br></p><p><strong>The 12 Days of Malware lyrics</strong></p><p><em>On the first day of Christmas, my malware gave to me:</em></p><p><em>A keylogger logging my keys.</em></p><p><br></p><p><em>On the second day of Christmas, my malware gave to me:</em></p><p><em>2 Trojan Apps...</em></p><p><em>And a keylogger logging my keys.</em></p><p><br></p><p><em>On the third day of Christmas, my malware gave to me:</em></p><p><em>3 Web shells...</em></p><p><em>2 Trojan Apps...</em></p><p><em>And a keylogger logging my keys.</em></p><p><br></p><p><em>On the fourth day of Christmas, my malware gave to me:</em></p><p><em>4 Crypto scams...</em></p><p><em>3 Web shells...</em></p><p><em>2 Trojan Apps...</em></p><p><em>And a keylogger logging my keys.</em></p><p><br></p><p><em>On the fifth day of Christmas, my malware gave to me:</em></p><p><em>5 Zero Days!</em></p><p><em>4 Crypto scams...</em></p><p><em>3 Web shells...</em></p><p><em>2 Trojan Apps...</em></p><p><em>And a keylogger logging my keys.</em></p><p><br></p><p><em>On the sixth day of Christmas, my malware gave to me:</em></p><p><em>6 Passwords spraying...</em></p><p><em>5 Zero Days!</em></p><p><em>4 Crypto scams...</em></p><p><em>3 Web shells...</em></p><p><em>2 Trojan Apps...</em></p><p><em>And a keylogger logging my keys.</em></p><p><br></p><p><em>On the seventh day of Christmas, my malware gave to me:</em></p><p><em>7 Scripts a scraping...</em></p><p><em>6 Passwords spraying...</em></p><p><em>5 Zero Days!</em></p><p><em>4 Crypto scams...</em></p><p><em>3 Web shells...</em></p><p><em>2 Trojan Apps...</em></p><p><em>And a keylogger logging my keys.</em></p><p><br></p><p><em>On the eighth day of Christmas, my malware gave to me:</em></p><p><em>8 Worms a wiping...</em></p><p><em>7 Scripts a scraping...</em></p><p><em>6 Passwords spraying...</em></p><p><em>5 Zero Days!</em></p><p><em>4 Crypto scams...</em></p><p><em>3 Web shells...</em></p><p><em>2 Trojan Apps...</em></p><p><em>And a keylogger logging my keys.</em></p><p><br></p><p><em>On the ninth day of Christmas, my malware gave to me:</em></p><p><em>9 Rootkits rooting...</em></p><p><em>8 Worms a wiping...</em></p><p><em>7 Scripts a scraping...</em></p><p><em>6 Passwords spraying...</em></p><p><em>5 Zero Days!</em></p><p><em>4 Crypto scams...</em></p><p><em>3 Web shells...</em></p><p><em>2 Trojan Apps...</em></p><p><em>And a keylogger logging my keys.</em></p><p><br></p><p><em>On the tenth day of Christmas, my malware gave to me:</em></p><p><em>10 Darknet markets...</em></p><p><em>9 Rootkits rooting...</em></p><p><em>8 Worms a wiping...</em></p><p><em>7 Scripts a scraping...</em></p><p><em>6 Passwords spraying...</em></p><p><em>5 Zero Days! (Bah-dum-dum-dum!)</em></p><p><em>4 Crypto scams...</em></p><p><em>3 Web shells...</em></p><p><em>2 Trojan Apps...</em></p><p><em>And a keylogger logging my keys.</em></p><p><br></p><p><em>On the eleventh day of Christmas, my malware gave to me:</em></p><p><em>11 Phishers phishing...</em></p><p><em>10 Darknet markets...</em></p><p><em>9 Rootkits rooting...</em></p><p><em>8 Worms a wiping...</em></p><p><em>7 Scripts a scraping...</em></p><p><em>6 Passwords spraying...</em></p><p><em>5 Zero Days! (Bah-dum-dum-dum!)</em></p><p><em>4 Crypto scams...</em></p><p><em>3 Web shells...</em></p><p><em>2 Trojan Apps...</em></p><p><em>And a keylogger logging my keys.</em></p><p><br></p><p><em>On the twelfth day of Christmas, my malware gave to me:</em></p><p><em>12 Hackers hacking...</em></p><p><em>11 Phishers phishing...</em></p><p><em>10 Darknet markets...</em></p><p><em>9 Rootkits rooting...</em></p><p><em>8 Worms a wiping...</em></p><p><em>7 Scripts a scraping...</em></p><p><em>6 Passwords spraying...</em></p><p><em>5 Zero Days!</em></p><p><em>4 Crypto scams...</em></p><p><em>3 Web shells...</em></p><p><em>2 Trojan Apps...</em></p><p><em>And a keylogger logging my keys.</em></p>]]>
      </content:encoded>
      <itunes:duration>448</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[faf4e646-7803-11ed-b857-533e79a4a499]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW7920143782.mp3?updated=1640203827" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>How to avoid Instagram scams.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/225/notes</link>
      <description>This week, Carole Theriault sits down to interview Dr. Jessica Barker from Cygenta to discuss the latest Instagram scams and how to avoid them. Dave and Joe share some follow-up on Apple, why they are being sued, and how you can protect yourself, as well as a new USPS scam affecting Connecticut. Dave's story follows a message board on smartphones being stolen and what happens after the thieves obtain the stolen phone. Joe's story is on a complex scam where the scammers choose ambitious individuals to turn into the scammers. Our catch of the day comes from listener Jay, who writes in, sharing a LinkedIn post from Dave Harland about him messing with a scammer trying to bamboozle him.
Links to stories:

USPS text scam hits Connecticut residents

What happens to your smartphone when it gets stolen?

Dreamers say father and son lured them to scam artist

LinkedIn scammer thread


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 22 Dec 2022 06:00:00 -0000</pubDate>
      <itunes:title>How to avoid Instagram scams.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>225</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>This week, Carole Theriault sits down to interview Dr. Jessica Barker from Cygenta to discuss the latest Instagram scams and how to avoid them. Dave and Joe share some follow-up on Apple, why they are being sued, and how you can protect yourself, as well as a new USPS scam affecting Connecticut. Dave's story follows a message board on smartphones being stolen and what happens after the thieves obtain the stolen phone. Joe's story is on a complex scam where the scammers choose ambitious individuals to turn into the scammers. Our catch of the day comes from listener Jay, who writes in, sharing a LinkedIn post from Dave Harland about him messing with a scammer trying to bamboozle him.
Links to stories:

USPS text scam hits Connecticut residents

What happens to your smartphone when it gets stolen?

Dreamers say father and son lured them to scam artist

LinkedIn scammer thread


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This week, Carole Theriault sits down to interview Dr. Jessica Barker from Cygenta to discuss the latest Instagram scams and how to avoid them. Dave and Joe share some follow-up on Apple, why they are being sued, and how you can protect yourself, as well as a new USPS scam affecting Connecticut. Dave's story follows a message board on smartphones being stolen and what happens after the thieves obtain the stolen phone. Joe's story is on a complex scam where the scammers choose ambitious individuals to turn into the scammers. Our catch of the day comes from listener Jay, who writes in, sharing a LinkedIn post from Dave Harland about him messing with a scammer trying to bamboozle him.</p><p>Links to stories:</p><ul>
<li><a href="https://www.wtnh.com/news/usps-text-scam-hits-connecticut-residents/">USPS text scam hits Connecticut residents</a></li>
<li><a href="https://hachyderm.io/@em0/109494729273725207">What happens to your smartphone when it gets stolen?</a></li>
<li><a href="https://www.fox2detroit.com/news/dreamers-say-father-and-son-lured-them-to-scam-artist">Dreamers say father and son lured them to scam artist</a></li>
<li><a href="https://www.linkedin.com/posts/daveharland_confuse-the-scammers-keith-the-gopher-ugcPost-7006221170576367616-JN57/">LinkedIn scammer thread</a></li>
</ul><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>3140</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[39b085d6-b9da-11ec-b50d-97c141f307f2]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW2631226588.mp3?updated=1671571909" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Data Loss Protection (DLP) (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/127/notes</link>
      <description>A set of tools designed to safeguard data while in use in motion and at rest. 
CyberWire Glossary link: https://thecyberwire.com/glossary/data-loss-prevention
Audio reference link: HistoryHeard. “Data Loss Prevention - CompTIA Security+ SY0-501 - 2.1,” Professor Messer, uploaded 20 November 2017</description>
      <pubDate>Tue, 20 Dec 2022 08:00:00 -0000</pubDate>
      <itunes:title>Data Loss Protection (DLP) (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>127</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A set of tools designed to safeguard data while in use in motion and at rest. 
CyberWire Glossary link: https://thecyberwire.com/glossary/data-loss-prevention
Audio reference link: HistoryHeard. “Data Loss Prevention - CompTIA Security+ SY0-501 - 2.1,” Professor Messer, uploaded 20 November 2017</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A set of tools designed to safeguard data while in use in motion and at rest. </p><p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/data-loss-prevention">https://thecyberwire.com/glossary/data-loss-prevention</a></p><p>Audio reference link: HistoryHeard. “<a href="https://www.youtube.com/watch?v=jf-GSmiQZgw">Data Loss Prevention - CompTIA Security+ SY0-501 - 2.1</a>,” Professor Messer, uploaded 20 November 2017</p>]]>
      </content:encoded>
      <itunes:duration>426</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[381b52b4-6f5b-11ed-a80c-3fc90668c06a]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW3472889126.mp3?updated=1669660824" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Sometimes it's scripted and others, it's a target of opportunity. [Hacking Humans Goes to the Movies]</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans-goes-to-the-movies/14/notes</link>
      <description>Thanks for joining us again for another episode of fun project brought to you by the team of Hacking Humans, the CyberWire's social engineering podcast. Hacking Humans co-host Dave Bittner is joined by Rick Howard in this series where they view clips from their favorite movies and television shows with examples of the social engineering scams and schemes you hear Dave and co-host Joe Carrigan talk about on Hacking Humans. In this episode, Dave and Rick watch each of the selected scenes, describe the on-screen action for you, and then they deconstruct what they saw. Grab your bowl of popcorn and join us for some fantastic scams and frauds.
On this episode, Dave and Rick are joined once again by Tracy Maleeff, security researcher at the Krebs Stamos Group. You may also know Tracy on Twitter as infosecsherpa.
Links to this episode's clips if you'd like to watch along:

Rick's clip from the movie Criminal


Tracy's clip from the movie The Talented Mr. Ripley</description>
      <pubDate>Sun, 18 Dec 2022 08:00:00 -0000</pubDate>
      <itunes:title>Sometimes it's scripted and others, it's a target of opportunity. [Hacking Humans Goes to the Movies]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>14</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Thanks for joining us again for another episode of fun project brought to you by the team of Hacking Humans, the CyberWire's social engineering podcast. Hacking Humans co-host Dave Bittner is joined by Rick Howard in this series where they view clips from their favorite movies and television shows with examples of the social engineering scams and schemes you hear Dave and co-host Joe Carrigan talk about on Hacking Humans. In this episode, Dave and Rick watch each of the selected scenes, describe the on-screen action for you, and then they deconstruct what they saw. Grab your bowl of popcorn and join us for some fantastic scams and frauds.
On this episode, Dave and Rick are joined once again by Tracy Maleeff, security researcher at the Krebs Stamos Group. You may also know Tracy on Twitter as infosecsherpa.
Links to this episode's clips if you'd like to watch along:

Rick's clip from the movie Criminal


Tracy's clip from the movie The Talented Mr. Ripley</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Thanks for joining us again for another episode of fun project brought to you by the team of Hacking Humans, the CyberWire's social engineering podcast. Hacking Humans co-host Dave Bittner is joined by Rick Howard in this series where they view clips from their favorite movies and television shows with examples of the social engineering scams and schemes you hear Dave and co-host Joe Carrigan talk about on Hacking Humans. In this episode, Dave and Rick watch each of the selected scenes, describe the on-screen action for you, and then they deconstruct what they saw. Grab your bowl of popcorn and join us for some fantastic scams and frauds.</p><p>On this episode, Dave and Rick are joined once again by Tracy Maleeff, security researcher at the Krebs Stamos Group. You may also know Tracy on Twitter as <a href="https://twitter.com/InfoSecSherpa">infosecsherpa</a>.</p><p>Links to this episode's clips if you'd like to watch along:</p><ul>
<li>Rick's clip from the movie <a href="https://www.youtube.com/watch?v=--ny4HSCs5U">Criminal</a>
</li>
<li>Tracy's clip from the movie <a href="https://youtu.be/pnJJ9wvA8WY?t=132">The Talented Mr. Ripley</a>
</li>
</ul>]]>
      </content:encoded>
      <itunes:duration>1706</itunes:duration>
      <guid isPermaLink="false"><![CDATA[7e03282e-7d7f-11ed-85fe-83c1e187fae8]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW4577113637.mp3?updated=1671650185" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Disinformation and verification. </title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/224/notes</link>
      <description>Kaspars Ruklis, the Program Manager for Media Literacy from IREX sits down with Dave to talk about the very verified media literacy program. Dave and Joe share some listener followup on some of the business' common language, this week, listener Vicki asks about the term "EULA" and what it stands for. Joe's story follows a scam that is particularly alarming around the holiday's, about fake barcodes on gift cards. A former police officer found this scam as she was trying to check out with a gift card and the cashier pulled off a fake barcode. Dave's story is all about scammers who are getting scammed. The story follows cybercriminals who are using hacking forums to buy software exploits and stolen login details and how they keep falling for cons and are getting ripped off thousands of dollars. Our catch of the day comes from listener Connor who shares an email that is so suspicious, Gmail put a warning on it. It's a very interesting email explaining that the receiver has been hacked and the scammer requires $1200 in bitcoin to not take advantage of the receivers accounts.
Links to stories:

HOW TO AVOID GIFT CARD SCAMS THIS HOLIDAY SEASON

Scammers Are Scamming Other Scammers Out of Millions of Dollars

Very Verified program


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 15 Dec 2022 06:00:00 -0000</pubDate>
      <itunes:title>Disinformation and verification. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>224</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Kaspars Ruklis, the Program Manager for Media Literacy from IREX sits down with Dave to talk about the very verified media literacy program. Dave and Joe share some listener followup on some of the business' common language, this week, listener Vicki asks about the term "EULA" and what it stands for. Joe's story follows a scam that is particularly alarming around the holiday's, about fake barcodes on gift cards. A former police officer found this scam as she was trying to check out with a gift card and the cashier pulled off a fake barcode. Dave's story is all about scammers who are getting scammed. The story follows cybercriminals who are using hacking forums to buy software exploits and stolen login details and how they keep falling for cons and are getting ripped off thousands of dollars. Our catch of the day comes from listener Connor who shares an email that is so suspicious, Gmail put a warning on it. It's a very interesting email explaining that the receiver has been hacked and the scammer requires $1200 in bitcoin to not take advantage of the receivers accounts.
Links to stories:

HOW TO AVOID GIFT CARD SCAMS THIS HOLIDAY SEASON

Scammers Are Scamming Other Scammers Out of Millions of Dollars

Very Verified program


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Kaspars Ruklis, the Program Manager for Media Literacy from IREX sits down with Dave to talk about the very verified media literacy program. Dave and Joe share some listener followup on some of the business' common language, this week, listener Vicki asks about the term "EULA" and what it stands for. Joe's story follows a scam that is particularly alarming around the holiday's, about fake barcodes on gift cards. A former police officer found this scam as she was trying to check out with a gift card and the cashier pulled off a fake barcode. Dave's story is all about scammers who are getting scammed. The story follows cybercriminals who are using hacking forums to buy software exploits and stolen login details and how they keep falling for cons and are getting ripped off thousands of dollars. Our catch of the day comes from listener Connor who shares an email that is so suspicious, Gmail put a warning on it. It's a very interesting email explaining that the receiver has been hacked and the scammer requires $1200 in bitcoin to not take advantage of the receivers accounts.</p><p>Links to stories:</p><ul>
<li><a href="https://www.cbsnews.com/video/gift-card-scams-holiday-season-moneywatch/#x">HOW TO AVOID GIFT CARD SCAMS THIS HOLIDAY SEASON</a></li>
<li><a href="https://www.wired.co.uk/article/cybercrime-hackers-scams-forums">Scammers Are Scamming Other Scammers Out of Millions of Dollars</a></li>
<li><a href="https://veryverified.eu/">Very Verified program</a></li>
</ul><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>3165</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[39a2ac68-b9da-11ec-b50d-5b61647ed9b6]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW8097930935.mp3?updated=1671119067" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Domain Naming System (DNS) (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/126/notes</link>
      <description>A system that translates text-based URLs to their underlying numerical IP addresses.
CyberWire Glossary link: https://thecyberwire.com/glossary/domain-name-system-dns
Audio reference link: HistoryHeard. “History Heard: Paul Mockapetris.” YouTube, YouTube, 5 Apr. 2009.</description>
      <pubDate>Tue, 13 Dec 2022 08:00:00 -0000</pubDate>
      <itunes:title>Domain Naming System (DNS) (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>126</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A system that translates text-based URLs to their underlying numerical IP addresses.
CyberWire Glossary link: https://thecyberwire.com/glossary/domain-name-system-dns
Audio reference link: HistoryHeard. “History Heard: Paul Mockapetris.” YouTube, YouTube, 5 Apr. 2009.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A system that translates text-based URLs to their underlying numerical IP addresses.</p><p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/domain-name-system-dns">https://thecyberwire.com/glossary/domain-name-system-dns</a></p><p>Audio reference link: HistoryHeard. “<a href="https://www.youtube.com/watch?v=VLahF1zwAog">History Heard: Paul Mockapetris.</a>” <em>YouTube</em>, YouTube, 5 Apr. 2009.</p>]]>
      </content:encoded>
      <itunes:duration>571</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b82ffde4-69cd-11ed-a994-a705e9b3ed7b]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW7347173674.mp3?updated=1669056172" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Keeping the scams in the family. [Hacking Humans Goes to the Movies]</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans-goes-to-the-movies/13/notes</link>
      <description>Thanks for joining us again for another episode of fun project brought to you by the team of Hacking Humans, the CyberWire's social engineering podcast. Hacking Humans co-host Dave Bittner is joined by Rick Howard in this series where they view clips from their favorite movies and television shows with examples of the social engineering scams and schemes you hear Dave and co-host Joe Carrigan talk about on Hacking Humans. In this episode, Dave and Rick watch each of the selected scenes, describe the on-screen action for you, and then they deconstruct what they saw. Grab your bowl of popcorn and join us for some fantastic scams and frauds.
Links to this episode's clips if you'd like to watch along:

Dave's clip from the television show Better Call Saul.

Rick's clip from the movie The Lady Eve.</description>
      <pubDate>Sun, 11 Dec 2022 08:00:00 -0000</pubDate>
      <itunes:title>Keeping the scams in the family. [Hacking Humans Goes to the Movies]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>13</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Thanks for joining us again for another episode of fun project brought to you by the team of Hacking Humans, the CyberWire's social engineering podcast. Hacking Humans co-host Dave Bittner is joined by Rick Howard in this series where they view clips from their favorite movies and television shows with examples of the social engineering scams and schemes you hear Dave and co-host Joe Carrigan talk about on Hacking Humans. In this episode, Dave and Rick watch each of the selected scenes, describe the on-screen action for you, and then they deconstruct what they saw. Grab your bowl of popcorn and join us for some fantastic scams and frauds.
Links to this episode's clips if you'd like to watch along:

Dave's clip from the television show Better Call Saul.

Rick's clip from the movie The Lady Eve.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Thanks for joining us again for another episode of fun project brought to you by the team of Hacking Humans, the CyberWire's social engineering podcast. Hacking Humans co-host Dave Bittner is joined by Rick Howard in this series where they view clips from their favorite movies and television shows with examples of the social engineering scams and schemes you hear Dave and co-host Joe Carrigan talk about on Hacking Humans. In this episode, Dave and Rick watch each of the selected scenes, describe the on-screen action for you, and then they deconstruct what they saw. Grab your bowl of popcorn and join us for some fantastic scams and frauds.</p><p>Links to this episode's clips if you'd like to watch along:</p><ul>
<li>Dave's clip from the television show <a href="https://youtu.be/ixW6UUzsCFA">Better Call Saul</a>.</li>
<li>Rick's clip from the movie <a href="https://www.youtube.com/watch?v=9VEScwL3KGQ">The Lady Eve</a>.</li>
</ul>]]>
      </content:encoded>
      <itunes:duration>1176</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[4f35ae18-74f1-11ed-bc29-c721fabe905b]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW7578931707.mp3?updated=1670281675" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Do not get your news on social media. </title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/223/notes</link>
      <description>Guest Giulia Porter, Vice President of RoboKiller, discusses their mid-year report on phone scams. Following that phone scam line, Dave has a story about the international takedown of online crimeware that spoofed caller ID with a service called iSpoof. Dave notes there are some helpful tips for scams related to caller ID included in the article. Joe talks about news on social media (note: Joe's stance is: DO NOT get your news on social media). He talks about several pieces he found on leadstories.com while doing research for an article about news on social media. Joe shares some examples from the website. Our Catch of the Day listener Povilas with a funny phish about a green product.

Links to stories:

Voice-scamming site “iSpoof” seized, 100s arrested in massive crackdown

Leadstories.com

Blue Feed

Fact Check: White House Did NOT Pick 'Satan Worshipper' to 'Oversee American Health'

Fact Check: COVID-19 Nasal Test Swabs Do NOT Contain DARPA Hydrogel That Causes Recipients To Be Remotely Controlled

Red Feed

Fact Check: Donald Trump Does NOT Get A Tax Break For His Golf Course Because Ivana Trump Is Buried There

Fact Check: Ben Shapiro The Commentator Did NOT Receive PPP Loan -- That Was A Different Guy


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 08 Dec 2022 06:00:00 -0000</pubDate>
      <itunes:title>Do not get your news on social media. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>223</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Guest Giulia Porter, Vice President of RoboKiller, discusses their mid-year report on phone scams. Following that phone scam line, Dave has a story about the international takedown of online crimeware that spoofed caller ID with a service called iSpoof. Dave notes there are some helpful tips for scams related to caller ID included in the article. Joe talks about news on social media (note: Joe's stance is: DO NOT get your news on social media). He talks about several pieces he found on leadstories.com while doing research for an article about news on social media. Joe shares some examples from the website. Our Catch of the Day listener Povilas with a funny phish about a green product.

Links to stories:

Voice-scamming site “iSpoof” seized, 100s arrested in massive crackdown

Leadstories.com

Blue Feed

Fact Check: White House Did NOT Pick 'Satan Worshipper' to 'Oversee American Health'

Fact Check: COVID-19 Nasal Test Swabs Do NOT Contain DARPA Hydrogel That Causes Recipients To Be Remotely Controlled

Red Feed

Fact Check: Donald Trump Does NOT Get A Tax Break For His Golf Course Because Ivana Trump Is Buried There

Fact Check: Ben Shapiro The Commentator Did NOT Receive PPP Loan -- That Was A Different Guy


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Guest Giulia Porter, Vice President of RoboKiller, discusses their mid-year report on phone scams. Following that phone scam line, Dave has a story about the international takedown of online crimeware that spoofed caller ID with a service called iSpoof. Dave notes there are some helpful tips for scams related to caller ID included in the article. Joe talks about news on social media (note: Joe's stance is: DO NOT get your news on social media). He talks about several pieces he found on leadstories.com while doing research for an article about news on social media. Joe shares some examples from the website. Our Catch of the Day listener Povilas with a funny phish about a green product.</p><p><br></p><p>Links to stories:</p><ul>
<li><a href="https://nakedsecurity.sophos.com/2022/11/25/voice-scamming-site-ispoof-seized-100s-arrested-in-massive-crackdown/">Voice-scamming site “iSpoof” seized, 100s arrested in massive crackdown</a></li>
<li><a href="https://leadstories.com/">Leadstories.com</a></li>
<li><a href="https://leadstories.com/blue-feed/">Blue Feed</a></li>
<li><a href="https://leadstories.com/hoax-alert/2022/11/fact-check-white-house-did-not-pick-satanist-to-oversee-american-health.html">Fact Check: White House Did NOT Pick 'Satan Worshipper' to 'Oversee American Health'</a></li>
<li><a href="https://leadstories.com/hoax-alert/2022/11/fact-check-covid-19-nasal-test-swabs-do-not-contain-darpa-hydrogel-that-causes-recipients-to-be-remotely-controlled.html">Fact Check: COVID-19 Nasal Test Swabs Do NOT Contain DARPA Hydrogel That Causes Recipients To Be Remotely Controlled</a></li>
<li><a href="https://leadstories.com/red-feed/">Red Feed</a></li>
<li><a href="https://leadstories.com/hoax-alert/2022/10/fact-check-donald-trump-does-not-get-tax-break-for-his-golf-course-because-ivana-trump-is-buried-there.html">Fact Check: Donald Trump Does NOT Get A Tax Break For His Golf Course Because Ivana Trump Is Buried There</a></li>
<li><a href="https://leadstories.com/hoax-alert/2022/08/fact-check-commentator-ben-shapiro-did-not-receive-ppp-loan-that-was-a-different-guy.html">Fact Check: Ben Shapiro The Commentator Did NOT Receive PPP Loan -- That Was A Different Guy</a></li>
</ul><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>2888</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[3994a636-b9da-11ec-b50d-a37ccd027c85]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW6138978211.mp3?updated=1670279001" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Pretexting (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/125/notes</link>
      <description>A social engineering technique in which a threat actor poses as a trusted person or entity in order to trick the victim into disclosing information or performing an action that benefits the attacker.
CyberWire Glossary link: https://thecyberwire.com/glossary/pretexting
Audio reference link: “Batch Pin Hurt Charlize Theron Skin | the Italian Job (2003) Movie Scene.” YouTube, YouTube, 22 Nov. 2016. </description>
      <pubDate>Tue, 06 Dec 2022 08:00:00 -0000</pubDate>
      <itunes:title>Pretexting (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>125</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A social engineering technique in which a threat actor poses as a trusted person or entity in order to trick the victim into disclosing information or performing an action that benefits the attacker.
CyberWire Glossary link: https://thecyberwire.com/glossary/pretexting
Audio reference link: “Batch Pin Hurt Charlize Theron Skin | the Italian Job (2003) Movie Scene.” YouTube, YouTube, 22 Nov. 2016. </itunes:summary>
      <content:encoded>
        <![CDATA[<p>A social engineering technique in which a threat actor poses as a trusted person or entity in order to trick the victim into disclosing information or performing an action that benefits the attacker.</p><p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/pretexting">https://thecyberwire.com/glossary/pretexting</a></p><p>Audio reference link: “<a href="https://www.youtube.com/watch?v=Wz6UEWQ9vdI">Batch Pin Hurt Charlize Theron Skin | the Italian Job (2003) Movie Scene.</a>” <em>YouTube</em>, YouTube, 22 Nov. 2016. </p>]]>
      </content:encoded>
      <itunes:duration>367</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[90c61d12-646c-11ed-8e2d-83406cbe95e8]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW4231990519.mp3?updated=1668459346" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>A vishing competition and a Black Badge holder. </title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/222/notes</link>
      <description>This week, Carole Theriault is interviewing DEFCON Black Badge holder Chris Kirsch from RunZero on the recent DEFCON 30 vishing competition. Dave and Joe share some listener follow up from 3 different listeners, who share stories on disposable email addresses, as well as a little insight on a Best Buy scam mentioned in a previous episode. Joe's story is on gaming companies and whether or not they have to stoop down to stemming growth in cheats, hacks, and other types of fraud to keep customers coming back. Dave's story comes from his father, he has two stories, one involving a gift card scam and an email compromise of a family member’s account. The other involves a fake invoice for tech support services. Our catch of the day comes from listener Felipe, who writes in asking Joe and Dave to make sense of the email he received saying that his refund was recalled from someone claiming to be the "Secretary for International Finance of United States Treasury Department."
Links to stories:

For Gaming Companies, Cybersecurity Has Become a Major Value Proposition

Scam call center video

Jim Browning scammers video


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 01 Dec 2022 06:00:00 -0000</pubDate>
      <itunes:title>A vishing competition and a Black Badge holder. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>222</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>This week, Carole Theriault is interviewing DEFCON Black Badge holder Chris Kirsch from RunZero on the recent DEFCON 30 vishing competition. Dave and Joe share some listener follow up from 3 different listeners, who share stories on disposable email addresses, as well as a little insight on a Best Buy scam mentioned in a previous episode. Joe's story is on gaming companies and whether or not they have to stoop down to stemming growth in cheats, hacks, and other types of fraud to keep customers coming back. Dave's story comes from his father, he has two stories, one involving a gift card scam and an email compromise of a family member’s account. The other involves a fake invoice for tech support services. Our catch of the day comes from listener Felipe, who writes in asking Joe and Dave to make sense of the email he received saying that his refund was recalled from someone claiming to be the "Secretary for International Finance of United States Treasury Department."
Links to stories:

For Gaming Companies, Cybersecurity Has Become a Major Value Proposition

Scam call center video

Jim Browning scammers video


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This week, Carole Theriault is interviewing DEFCON Black Badge holder Chris Kirsch from RunZero on the recent DEFCON 30 vishing competition. Dave and Joe share some listener follow up from 3 different listeners, who share stories on disposable email addresses, as well as a little insight on a Best Buy scam mentioned in a previous episode. Joe's story is on gaming companies and whether or not they have to stoop down to stemming growth in cheats, hacks, and other types of fraud to keep customers coming back. Dave's story comes from his father, he has two stories, one involving a gift card scam and an email compromise of a family member’s account. The other involves a fake invoice for tech support services. Our catch of the day comes from listener Felipe, who writes in asking Joe and Dave to make sense of the email he received saying that his refund was recalled from someone claiming to be the "Secretary for International Finance of United States Treasury Department."</p><p>Links to stories:</p><ul>
<li><a href="https://www.darkreading.com/threat-intelligence/cybersecurity-major-game-company-value-proposition">For Gaming Companies, Cybersecurity Has Become a Major Value Proposition</a></li>
<li><a href="https://youtu.be/_u_JTddAYes">Scam call center video</a></li>
<li><a href="https://youtube.com/c/JimBrowning">Jim Browning scammers video</a></li>
</ul><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>3319</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[39867868-b9da-11ec-b50d-f71a2b2af403]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW8564821517.mp3?updated=1670278929" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Web Application Firewall (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/124/notes</link>
      <description>A layer seven firewall designed to block threats at the application layer of the open system interconnection model, the OSI model. 
CyberWire Glossary link: https://thecyberwire.com/glossary/web-application-firewall
Audio reference link: “VCF East 9.1 - Ches' Computer Security Adventures - Bill Cheswick.” YouTube, 29 Dec. 2015, https://youtu.be/trR1cuBtcPs. </description>
      <pubDate>Tue, 29 Nov 2022 08:00:00 -0000</pubDate>
      <itunes:title>Web Application Firewall (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>124</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A layer seven firewall designed to block threats at the application layer of the open system interconnection model, the OSI model. 
CyberWire Glossary link: https://thecyberwire.com/glossary/web-application-firewall
Audio reference link: “VCF East 9.1 - Ches' Computer Security Adventures - Bill Cheswick.” YouTube, 29 Dec. 2015, https://youtu.be/trR1cuBtcPs. </itunes:summary>
      <content:encoded>
        <![CDATA[<p>A layer seven firewall designed to block threats at the application layer of the open system interconnection model, the OSI model. </p><p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/web-application-firewall">https://thecyberwire.com/glossary/web-application-firewall</a></p><p>Audio reference link: “VCF East 9.1 - Ches' Computer Security Adventures - Bill Cheswick.” <em>YouTube</em>, 29 Dec. 2015, <a href="https://www.youtube.com/watch?v=trR1cuBtcPs">https://youtu.be/trR1cuBtcPs</a>. </p>]]>
      </content:encoded>
      <itunes:duration>539</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c12cf41e-5eca-11ed-abf1-cfd485bfc47e]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW4111560821.mp3?updated=1667845585" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Counterfeit coupons and paybacks. [Hacking Humans Goes to the Movies]</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans-goes-to-the-movies/12/notes</link>
      <description>Thanks for joining us again for another episode of fun project brought to you by the team of Hacking Humans, the CyberWire's social engineering podcast. Hacking Humans co-host Dave Bittner is joined by Rick Howard in this series where they view clips from their favorite movies and television shows with examples of the social engineering scams and schemes you hear Dave and co-host Joe Carrigan talk about on Hacking Humans. In this episode, Dave and Rick watch each of the selected scenes, describe the on-screen action for you, and then they deconstruct what they saw. Grab your bowl of popcorn and join us for some fantastic scams and frauds.
Links to this episode's clips if you'd like to watch along:

Dave's clip from the movie Queenpins.

Rick's clip from the movie Confidence.</description>
      <pubDate>Thu, 24 Nov 2022 08:00:00 -0000</pubDate>
      <itunes:title>Counterfeit coupons and paybacks. [Hacking Humans Goes to the Movies]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>12</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Thanks for joining us again for another episode of fun project brought to you by the team of Hacking Humans, the CyberWire's social engineering podcast. Hacking Humans co-host Dave Bittner is joined by Rick Howard in this series where they view clips from their favorite movies and television shows with examples of the social engineering scams and schemes you hear Dave and co-host Joe Carrigan talk about on Hacking Humans. In this episode, Dave and Rick watch each of the selected scenes, describe the on-screen action for you, and then they deconstruct what they saw. Grab your bowl of popcorn and join us for some fantastic scams and frauds.
Links to this episode's clips if you'd like to watch along:

Dave's clip from the movie Queenpins.

Rick's clip from the movie Confidence.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Thanks for joining us again for another episode of fun project brought to you by the team of Hacking Humans, the CyberWire's social engineering podcast. Hacking Humans co-host Dave Bittner is joined by Rick Howard in this series where they view clips from their favorite movies and television shows with examples of the social engineering scams and schemes you hear Dave and co-host Joe Carrigan talk about on Hacking Humans. In this episode, Dave and Rick watch each of the selected scenes, describe the on-screen action for you, and then they deconstruct what they saw. Grab your bowl of popcorn and join us for some fantastic scams and frauds.</p><p>Links to this episode's clips if you'd like to watch along:</p><ul>
<li>Dave's clip from the movie <a href="https://www.youtube.com/watch?v=H5fH6D4wPmM">Queenpins</a>.</li>
<li>Rick's clip from the movie <a href="https://www.dailymotion.com/video/xqs0ou">Confidence</a>.</li>
</ul>]]>
      </content:encoded>
      <itunes:duration>1409</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[fcddc514-69ed-11ed-ad9d-1f3b65cbea1c]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW6422962499.mp3?updated=1669070874" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>COBIT (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/123/notes</link>
      <description>An IT governance framework developed by ISACA. 
CyberWire Glossary link: https://thecyberwire.com/glossary/cobit
Audio reference link: isacappc. “How Do You Explain Cobit to Your Dad – or Your CEO?” YouTube, YouTube, 24 Aug. 2016, https://www.youtube.com/watch?v=EYATVkddIyw. </description>
      <pubDate>Tue, 22 Nov 2022 06:00:00 -0000</pubDate>
      <itunes:title>COBIT (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>123</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>An IT governance framework developed by ISACA. 
CyberWire Glossary link: https://thecyberwire.com/glossary/cobit
Audio reference link: isacappc. “How Do You Explain Cobit to Your Dad – or Your CEO?” YouTube, YouTube, 24 Aug. 2016, https://www.youtube.com/watch?v=EYATVkddIyw. </itunes:summary>
      <content:encoded>
        <![CDATA[<p>An IT governance framework developed by ISACA. </p><p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/cobit">https://thecyberwire.com/glossary/cobit</a></p><p>Audio reference link: isacappc. “How Do You Explain Cobit to Your Dad – or Your CEO?” <em>YouTube</em>, YouTube, 24 Aug. 2016, <a href="https://www.youtube.com/watch?v=EYATVkddIyw">https://www.youtube.com/watch?v=EYATVkddIyw</a>. </p>]]>
      </content:encoded>
      <itunes:duration>426</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b4f30b80-5947-11ed-b79a-eb9b120b5d07]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW6016243707.mp3?updated=1667235700" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Ways to make fraud less lucrative.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/221/notes</link>
      <description>Brett Johnson, Chief Criminal Officer at Arkose Labs, sits down with Dave to discuss his history &amp; ways to make fraud efforts less lucrative for bad actors. Dave and Joe share some listener follow up from Graham about one way that helps him stay safe against fake URLs. Dave's story is about bomb email attacks, in which someones email is spammed with hundreds to thousands of emails in hopes of hiding important information contained in one of the thousands of emails, perhaps from a financial institute. Joe's story is on how the FBI is warning the public to beware of tech support scammers and how they are targeting financial accounts using remote desktop software. Our catch of the day comes from listener Norman, who shares a story about how his Steam account got hijacked and how a hacker impersonating a Steam employee was trying to help him.
Links to stories:

New Registration Bomb Email Attack Distracts Victims of Financial Fraud

FBI Warns Public to Beware of Tech Support Scammers Targeting Financial Accounts Using Remote Desktop Software


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 17 Nov 2022 06:00:00 -0000</pubDate>
      <itunes:title>Ways to make fraud less lucrative.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>221</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Brett Johnson, Chief Criminal Officer at Arkose Labs, sits down with Dave to discuss his history &amp; ways to make fraud efforts less lucrative for bad actors. Dave and Joe share some listener follow up from Graham about one way that helps him stay safe against fake URLs. Dave's story is about bomb email attacks, in which someones email is spammed with hundreds to thousands of emails in hopes of hiding important information contained in one of the thousands of emails, perhaps from a financial institute. Joe's story is on how the FBI is warning the public to beware of tech support scammers and how they are targeting financial accounts using remote desktop software. Our catch of the day comes from listener Norman, who shares a story about how his Steam account got hijacked and how a hacker impersonating a Steam employee was trying to help him.
Links to stories:

New Registration Bomb Email Attack Distracts Victims of Financial Fraud

FBI Warns Public to Beware of Tech Support Scammers Targeting Financial Accounts Using Remote Desktop Software


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Brett Johnson, Chief Criminal Officer at Arkose Labs, sits down with Dave to discuss his history &amp; ways to make fraud efforts less lucrative for bad actors. Dave and Joe share some listener follow up from Graham about one way that helps him stay safe against fake URLs. Dave's story is about bomb email attacks, in which someones email is spammed with hundreds to thousands of emails in hopes of hiding important information contained in one of the thousands of emails, perhaps from a financial institute. Joe's story is on how the FBI is warning the public to beware of tech support scammers and how they are targeting financial accounts using remote desktop software. Our catch of the day comes from listener Norman, who shares a story about how his Steam account got hijacked and how a hacker impersonating a Steam employee was trying to help him.</p><p>Links to stories:</p><ul>
<li><a href="https://blackcloak.io/new-registration-bomb-email-attack-distracts-victims-of-financial-fraud/">New Registration Bomb Email Attack Distracts Victims of Financial Fraud</a></li>
<li><a href="https://www.fbi.gov/contact-us/field-offices/boston/news/press-releases/fbi-warns-public-to-beware-of-tech-support-scammers-targeting-financial-accounts-using-remote-desktop-software">FBI Warns Public to Beware of Tech Support Scammers Targeting Financial Accounts Using Remote Desktop Software</a></li>
</ul><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>3102</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[39783794-b9da-11ec-b50d-d70ed667dba3]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW9969772059.mp3?updated=1669842340" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Security Service Edge (SSE) (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/122/notes</link>
      <description>A security architecture that incorporates the cloud shared responsibility model, a vendor provided security stack, and network peering with one or more of the big content providers and their associated fiber networks. 
CyberWire Glossary link: https://thecyberwire.com/glossary/security-service-edge
Audio reference link: Netskope (2022). What is Security Service Edge (SSE). YouTube. Available at: https://www.youtube.com/watch?v=Z9H84nvgBqw [Accessed 21 Oct. 2022].</description>
      <pubDate>Tue, 15 Nov 2022 08:00:00 -0000</pubDate>
      <itunes:title>Security Service Edge (SSE) (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>122</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A security architecture that incorporates the cloud shared responsibility model, a vendor provided security stack, and network peering with one or more of the big content providers and their associated fiber networks. 
CyberWire Glossary link: https://thecyberwire.com/glossary/security-service-edge
Audio reference link: Netskope (2022). What is Security Service Edge (SSE). YouTube. Available at: https://www.youtube.com/watch?v=Z9H84nvgBqw [Accessed 21 Oct. 2022].</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A security architecture that incorporates the cloud shared responsibility model, a vendor provided security stack, and network peering with one or more of the big content providers and their associated fiber networks. </p><p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/security-service-edge">https://thecyberwire.com/glossary/security-service-edge</a></p><p>Audio reference link: Netskope (2022). What is Security Service Edge (SSE). YouTube. Available at: <a href="https://www.youtube.com/watch?v=Z9H84nvgBqw">https://www.youtube.com/watch?v=Z9H84nvgBqw</a> [Accessed 21 Oct. 2022].</p>]]>
      </content:encoded>
      <itunes:duration>497</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[3606109e-53f5-11ed-94ce-47d53af7113c]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW9860728267.mp3?updated=1666655210" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>New laws and the effect on small businesses.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/220/notes</link>
      <description>Kurtis Minder, CEO of GroupSense joins Dave to discuss how ransomware new laws leave small business behind. Dave and Joe share some follow up on Elon Musk after his big purchase and the changes that now follow. Joe's story follows Kalamazoo County residents and a new scam that is popping up, where they are being targeted by scammers through Facebook messenger video calls. Dave shares a story that hits home for him about an email that his father received from Best Buy claiming that he will be charged $500 for Geek Squad services. Our catch of the day comes from an anonymous listener who writes in to share an email they received from a Mrs. Phong Dung, who wants to send 1 million to the person who received the email. The receiver knows this email is a fake and writes into the show to ask Joe and Dave if these emails ever actually work on anyone.
Links to stories:
Kalamazoo County residents targeted in Facebook messenger video call scam

Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 10 Nov 2022 06:00:00 -0000</pubDate>
      <itunes:title>New laws and the effect on small businesses.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>220</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Kurtis Minder, CEO of GroupSense joins Dave to discuss how ransomware new laws leave small business behind. Dave and Joe share some follow up on Elon Musk after his big purchase and the changes that now follow. Joe's story follows Kalamazoo County residents and a new scam that is popping up, where they are being targeted by scammers through Facebook messenger video calls. Dave shares a story that hits home for him about an email that his father received from Best Buy claiming that he will be charged $500 for Geek Squad services. Our catch of the day comes from an anonymous listener who writes in to share an email they received from a Mrs. Phong Dung, who wants to send 1 million to the person who received the email. The receiver knows this email is a fake and writes into the show to ask Joe and Dave if these emails ever actually work on anyone.
Links to stories:
Kalamazoo County residents targeted in Facebook messenger video call scam

Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Kurtis Minder, CEO of GroupSense joins Dave to discuss how ransomware new laws leave small business behind. Dave and Joe share some follow up on Elon Musk after his big purchase and the changes that now follow. Joe's story follows Kalamazoo County residents and a new scam that is popping up, where they are being targeted by scammers through Facebook messenger video calls. Dave shares a story that hits home for him about an email that his father received from Best Buy claiming that he will be charged $500 for Geek Squad services. Our catch of the day comes from an anonymous listener who writes in to share an email they received from a Mrs. Phong Dung, who wants to send 1 million to the person who received the email. The receiver knows this email is a fake and writes into the show to ask Joe and Dave if these emails ever actually work on anyone.</p><p>Links to stories:</p><ul><li><a href="https://wwmt.com/news/local/technology-facebook-scam-kalamazoo-alert-meta-messenger-video-county-app-cash-account-call-privacy">Kalamazoo County residents targeted in Facebook messenger video call scam</a></li></ul><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>3015</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[396a3266-b9da-11ec-b50d-8f38d306010e]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW9691891420.mp3?updated=1667927571" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Domain spoofing (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/121/notes</link>
      <description>A social engineering tactic in which hackers build a malicious domain to mimic a legitimate one.
CyberWire Glossary link: https://thecyberwire.com/glossary/domain-spoofing
Audio reference link: “Mission Impossible Fallout - Hospital Scene.” YouTube, YouTube, 8 Oct. 2018,</description>
      <pubDate>Tue, 08 Nov 2022 08:00:00 -0000</pubDate>
      <itunes:title>Domain spoofing (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>121</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A social engineering tactic in which hackers build a malicious domain to mimic a legitimate one.
CyberWire Glossary link: https://thecyberwire.com/glossary/domain-spoofing
Audio reference link: “Mission Impossible Fallout - Hospital Scene.” YouTube, YouTube, 8 Oct. 2018,</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A social engineering tactic in which hackers build a malicious domain to mimic a legitimate one.</p><p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/domain-spoofing">https://thecyberwire.com/glossary/domain-spoofing</a></p><p>Audio reference link: <a href="https://www.youtube.com/watch?v=SOlmyv1WTBY">“Mission Impossible Fallout - Hospital Scene.”</a> <em>YouTube</em>, YouTube, 8 Oct. 2018,</p>]]>
      </content:encoded>
      <itunes:duration>475</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[3903cc42-4be8-11ed-83b2-dba02e1b6877]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW7569334459.mp3?updated=1665769711" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>What's Your Problem trailer.</title>
      <description>We’re sharing a preview of a podcast we enjoy called “What’s Your Problem?” 
Every week on What’s Your Problem, entrepreneurs talk about the future they’re trying to build and the problems they have to solve to get there. How do you build cars that can actually drive themselves? How do you use technology to bring down the cost of airfares? And how do you teach a computer to understand sports? 
Hosted by former Planet Money host Jacob Goldstein, What’s Your Problem? helps listeners understand the problems really smart people are trying to solve right now. 
Listen to What’s Your Problem? at https://podcasts.pushkin.fm/wyphumans</description>
      <pubDate>Thu, 03 Nov 2022 05:00:00 -0000</pubDate>
      <itunes:title>What's Your Problem trailer.</itunes:title>
      <itunes:episodeType>trailer</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>1</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle>What's Your Problem trailer.</itunes:subtitle>
      <itunes:summary>We’re sharing a preview of a podcast we enjoy called “What’s Your Problem?” 
Every week on What’s Your Problem, entrepreneurs talk about the future they’re trying to build and the problems they have to solve to get there. How do you build cars that can actually drive themselves? How do you use technology to bring down the cost of airfares? And how do you teach a computer to understand sports? 
Hosted by former Planet Money host Jacob Goldstein, What’s Your Problem? helps listeners understand the problems really smart people are trying to solve right now. 
Listen to What’s Your Problem? at https://podcasts.pushkin.fm/wyphumans</itunes:summary>
      <content:encoded>
        <![CDATA[<p>We’re sharing a preview of a podcast we enjoy called “What’s Your Problem?” </p><p>Every week on What’s Your Problem, entrepreneurs talk about the future they’re trying to build and the problems they have to solve to get there. How do you build cars that can actually drive themselves? How do you use technology to bring down the cost of airfares? And how do you teach a computer to understand sports? </p><p>Hosted by former Planet Money host Jacob Goldstein, What’s Your Problem? helps listeners understand the problems really smart people are trying to solve right now. </p><p>Listen to What’s Your Problem? at <a href="https://podcasts.pushkin.fm/wyphumans">https://podcasts.pushkin.fm/wyphumans</a></p>]]>
      </content:encoded>
      <itunes:duration>124</itunes:duration>
      <guid isPermaLink="false"><![CDATA[f4170c7e-59fd-11ed-a5aa-ef5351c31414]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW5224205933.mp3?updated=1667441927" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Protecting your identity.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/219/notes</link>
      <description>Jameeka Green Aaron, CISO, Customer Identity at Okta, sits down with Dave to speak about their State of Secure Identity report. Dave and Joe share some listener follow up from Richard, who writes in to share his thoughts on the discussion of the phishing kit targeting WordPress sites in a previous episode, and also writes in about last episode’s discussion on how companies were turning on employees who are overworked with two remote jobs and shares how Equifax was one of these companies. Dave's story follows typosquatting, which is when a scammer registers a website that is very similar to the real one, but will have a typo in it (ex: amozon, homdepot, gougle) and how a large typosquatting campaign is delivering tech support scams. Joe's story follows a South Bay man who had the misfortune of accepting hundreds of open house offers, but the houses weren't for sale. Our catch of the day comes from listener Chris who writes in that he's never gotten a phishing email on his work email or personal email, but that he received his first phish from PayPal, which seemed to me a notification at first glance rather than a message telling him there is fraudulent activity happening in his account.
Links to stories:

Large typosquatting campaign delivers tech support scams

A South Bay man accepted hundreds of offers from open houses. But the homes weren’t for sale


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 03 Nov 2022 05:00:00 -0000</pubDate>
      <itunes:title>Protecting your identity.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>219</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Jameeka Green Aaron, CISO, Customer Identity at Okta, sits down with Dave to speak about their State of Secure Identity report. Dave and Joe share some listener follow up from Richard, who writes in to share his thoughts on the discussion of the phishing kit targeting WordPress sites in a previous episode, and also writes in about last episode’s discussion on how companies were turning on employees who are overworked with two remote jobs and shares how Equifax was one of these companies. Dave's story follows typosquatting, which is when a scammer registers a website that is very similar to the real one, but will have a typo in it (ex: amozon, homdepot, gougle) and how a large typosquatting campaign is delivering tech support scams. Joe's story follows a South Bay man who had the misfortune of accepting hundreds of open house offers, but the houses weren't for sale. Our catch of the day comes from listener Chris who writes in that he's never gotten a phishing email on his work email or personal email, but that he received his first phish from PayPal, which seemed to me a notification at first glance rather than a message telling him there is fraudulent activity happening in his account.
Links to stories:

Large typosquatting campaign delivers tech support scams

A South Bay man accepted hundreds of offers from open houses. But the homes weren’t for sale


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Jameeka Green Aaron, CISO, Customer Identity at Okta, sits down with Dave to speak about their State of Secure Identity report. Dave and Joe share some listener follow up from Richard, who writes in to share his thoughts on the discussion of the phishing kit targeting WordPress sites in a previous episode, and also writes in about last episode’s discussion on how companies were turning on employees who are overworked with two remote jobs and shares how Equifax was one of these companies. Dave's story follows typosquatting, which is when a scammer registers a website that is very similar to the real one, but will have a typo in it (ex: amozon, homdepot, gougle) and how a large typosquatting campaign is delivering tech support scams. Joe's story follows a South Bay man who had the misfortune of accepting hundreds of open house offers, but the houses weren't for sale. Our catch of the day comes from listener Chris who writes in that he's never gotten a phishing email on his work email or personal email, but that he received his first phish from PayPal, which seemed to me a notification at first glance rather than a message telling him there is fraudulent activity happening in his account.</p><p>Links to stories:</p><ul>
<li><a href="https://www.malwarebytes.com/blog/threat-intelligence/large-typosquatting-campaign-delivers-tech-support-scams">Large typosquatting campaign delivers tech support scams</a></li>
<li><a href="https://www.latimes.com/california/story/2022-10-26/prison-sentence-multimillion-dollar-scam-fake-open-houses">A South Bay man accepted hundreds of offers from open houses. But the homes weren’t for sale</a></li>
</ul><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>3094</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[395c36f2-b9da-11ec-b50d-833ec9f6b52b]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW1005841703.mp3?updated=1667600067" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Secure Web Gateway (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/120/notes</link>
      <description>A layer seven firewall that sits in line at the boundary between the internet and an organization's network perimeter that allows security policy enforcement and can perform certain prevention and detection tasks.
CyberWire Glossary link: https://thecyberwire.com/glossary/secure-web-gateway
Audio reference link: ‌Vintage Computer Federation (2015). VCF East 9.1 - Ches’ Computer Security Adventures - Bill Cheswick. YouTube. Available at: https://www.youtube.com/watch?v=trR1cuBtcPs.</description>
      <pubDate>Tue, 01 Nov 2022 07:00:00 -0000</pubDate>
      <itunes:title>Secure Web Gateway (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>120</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A layer seven firewall that sits in line at the boundary between the internet and an organization's network perimeter that allows security policy enforcement and can perform certain prevention and detection tasks.
CyberWire Glossary link: https://thecyberwire.com/glossary/secure-web-gateway
Audio reference link: ‌Vintage Computer Federation (2015). VCF East 9.1 - Ches’ Computer Security Adventures - Bill Cheswick. YouTube. Available at: https://www.youtube.com/watch?v=trR1cuBtcPs.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A layer seven firewall that sits in line at the boundary between the internet and an organization's network perimeter that allows security policy enforcement and can perform certain prevention and detection tasks.</p><p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/secure-web-gateway">https://thecyberwire.com/glossary/secure-web-gateway</a></p><p>Audio reference link: ‌Vintage Computer Federation (2015). VCF East 9.1 - Ches’ Computer Security Adventures - Bill Cheswick. YouTube. Available at: <a href="https://www.youtube.com/watch?v=trR1cuBtcPs.">https://www.youtube.com/watch?v=trR1cuBtcPs.</a></p>]]>
      </content:encoded>
      <itunes:duration>562</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[d21bfeba-466e-11ed-b6bc-ebeb5dcfda2c]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW6322620623.mp3?updated=1665165723" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The Malware Mash! [Bonus]</title>
      <link>https://thecyberwire.com/stories/123bc0f691444be6af3145a6dab6cee4/malware-mash</link>
      <description>Enjoy this CyberWire classic.
They did the Mash...the did the Malware Mash...</description>
      <pubDate>Fri, 28 Oct 2022 07:00:00 -0000</pubDate>
      <itunes:title>The Malware Mash! [Bonus]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Enjoy this CyberWire classic.
They did the Mash...the did the Malware Mash...</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Enjoy this CyberWire classic.</p><p>They did the Mash...the did the Malware Mash...</p>]]>
      </content:encoded>
      <itunes:duration>185</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[6b079d7e-55fa-11ed-bee2-036a9162f123]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW3014440102.mp3?updated=1666877087" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Setting tech limits with a new tool.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/218/notes</link>
      <description>Kim Allman from NortonLifeLock, and Carrie Neill from the National PTA, sit down with Dave to discuss the Smart Talk 2.0 tool. Joe and Dave share some follow up on an exciting new position Joe has accepted as the Director of Cyber Science at a company called Harbor Labs. This week, Joe's story comes from listener Beau, who writes in about an ATM scam he fell victim to, sharing how the scammers were spamming his phone with texts, emails, and calls before he figured out what was going on. Dave's story follows the growing new trend of overworking, or having two remote jobs at once and working at both. One company's CEO calls it a form of theft and deception. Our catch of the day comes from listener Rodney who writes in, sharing about his son's girlfriend who is looking for work and received an email pointing her in the direction of a new prospect. Sadly, Rodney had to share the news that the email seemed to be a scam.
Links to stories:
Tech CEO calls overemployment trend a 'new form of theft and deception' after firing 2 engineers secretly working multiple full-time jobs at once

Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 27 Oct 2022 05:00:00 -0000</pubDate>
      <itunes:title>Setting tech limits with a new tool.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>218</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Kim Allman from NortonLifeLock, and Carrie Neill from the National PTA, sit down with Dave to discuss the Smart Talk 2.0 tool. Joe and Dave share some follow up on an exciting new position Joe has accepted as the Director of Cyber Science at a company called Harbor Labs. This week, Joe's story comes from listener Beau, who writes in about an ATM scam he fell victim to, sharing how the scammers were spamming his phone with texts, emails, and calls before he figured out what was going on. Dave's story follows the growing new trend of overworking, or having two remote jobs at once and working at both. One company's CEO calls it a form of theft and deception. Our catch of the day comes from listener Rodney who writes in, sharing about his son's girlfriend who is looking for work and received an email pointing her in the direction of a new prospect. Sadly, Rodney had to share the news that the email seemed to be a scam.
Links to stories:
Tech CEO calls overemployment trend a 'new form of theft and deception' after firing 2 engineers secretly working multiple full-time jobs at once

Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Kim Allman from NortonLifeLock, and Carrie Neill from the National PTA, sit down with Dave to discuss the Smart Talk 2.0 tool. Joe and Dave share some follow up on an exciting new position Joe has accepted as the Director of Cyber Science at a company called Harbor Labs. This week, Joe's story comes from listener Beau, who writes in about an ATM scam he fell victim to, sharing how the scammers were spamming his phone with texts, emails, and calls before he figured out what was going on. Dave's story follows the growing new trend of overworking, or having two remote jobs at once and working at both. One company's CEO calls it a form of theft and deception. Our catch of the day comes from listener Rodney who writes in, sharing about his son's girlfriend who is looking for work and received an email pointing her in the direction of a new prospect. Sadly, Rodney had to share the news that the email seemed to be a scam.</p><p>Links to stories:</p><ul><li><a href="https://www.businessinsider.com/ceo-viral-linkedin-post-engineers-working-two-jobs-overemployment-theft-2022-10">Tech CEO calls overemployment trend a 'new form of theft and deception' after firing 2 engineers secretly working multiple full-time jobs at once</a></li></ul><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>2597</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[394e3a0c-b9da-11ec-b50d-1b8b51868773]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW9315290934.mp3?updated=1666886159" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Indicators of Compromise (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/119/notes</link>
      <description>Digital evidence that a system or network has been breached.
CyberWire Glossary link: https://thecyberwire.com/glossary/indicator-of-compromise
Audio reference link: ‌”Suicide or Murder? | The Blind Banker | Sherlock,” uploaded by Sherlock, 18 October 2015</description>
      <pubDate>Tue, 25 Oct 2022 07:00:00 -0000</pubDate>
      <itunes:title>Indicators of Compromise (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>119</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Digital evidence that a system or network has been breached.
CyberWire Glossary link: https://thecyberwire.com/glossary/indicator-of-compromise
Audio reference link: ‌”Suicide or Murder? | The Blind Banker | Sherlock,” uploaded by Sherlock, 18 October 2015</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Digital evidence that a system or network has been breached.</p><p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/indicator-of-compromise">https://thecyberwire.com/glossary/indicator-of-compromise</a></p><p>Audio reference link: ‌”<a href="https://www.youtube.com/watch?v=4PKr_BVo4hg">Suicide or Murder? | The Blind Banker | Sherlock</a>,” uploaded by Sherlock, 18 October 2015</p>]]>
      </content:encoded>
      <itunes:duration>419</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[3dd17406-40d8-11ed-bcfb-4f120773542d]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW5731984796.mp3?updated=1664552752" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The difference between shallow fakes vs. deep fakes.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/217/notes</link>
      <description>Martin Rehak CEO &amp; Founder from Resistant AI sits down with Dave to discuss how organizations should be worried about shallow fakes vs. deep fakes. Listener Joe writes in with some follow up on Joe's statement about not using legacy OSes, and how it is unfortunately not an option for many. Both Joe and Dave share two stories this week. Dave's first story follows how the Maryland Attorney General, Brian Frosh, is warning residents about purchasing flood-damaged cars. Dave's second story is about how a Japanese woman was fooled by an astronaut imposter who wooed her into buying a "return ticket to earth." Joe's first story is about a potential scam brewing in Springfield, as people are collecting money on the side of the street for a teenagers funeral, police are warning residents stating they have heard of this scam in neighboring cities. Joe's second story follows a new horrifying scam after a woman fell victim to a phone scam where the scammer claimed to have the victims daughter and they would kill her if she did not do what they asked. Our catch of the day comes from listener Richard who writes in sharing his experience with an email that may or may not be a phish.
Links to stories:

Consumer Alert: Attorney General Frosh Warns Consumers about Purchasing Flood-Damaged Cars

An Imposter Claiming to Be an Astronaut Wooed a Japanese Woman Into Paying for a 'Return Ticket to Earth'

Springfield police warns drivers of “potential” funeral scam

Greenfield Police warns about "terrifying" kidnapping scam


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 20 Oct 2022 05:00:00 -0000</pubDate>
      <itunes:title>The difference between shallow fakes vs. deep fakes.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>217</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Martin Rehak CEO &amp; Founder from Resistant AI sits down with Dave to discuss how organizations should be worried about shallow fakes vs. deep fakes. Listener Joe writes in with some follow up on Joe's statement about not using legacy OSes, and how it is unfortunately not an option for many. Both Joe and Dave share two stories this week. Dave's first story follows how the Maryland Attorney General, Brian Frosh, is warning residents about purchasing flood-damaged cars. Dave's second story is about how a Japanese woman was fooled by an astronaut imposter who wooed her into buying a "return ticket to earth." Joe's first story is about a potential scam brewing in Springfield, as people are collecting money on the side of the street for a teenagers funeral, police are warning residents stating they have heard of this scam in neighboring cities. Joe's second story follows a new horrifying scam after a woman fell victim to a phone scam where the scammer claimed to have the victims daughter and they would kill her if she did not do what they asked. Our catch of the day comes from listener Richard who writes in sharing his experience with an email that may or may not be a phish.
Links to stories:

Consumer Alert: Attorney General Frosh Warns Consumers about Purchasing Flood-Damaged Cars

An Imposter Claiming to Be an Astronaut Wooed a Japanese Woman Into Paying for a 'Return Ticket to Earth'

Springfield police warns drivers of “potential” funeral scam

Greenfield Police warns about "terrifying" kidnapping scam


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Martin Rehak CEO &amp; Founder from Resistant AI sits down with Dave to discuss how organizations should be worried about shallow fakes vs. deep fakes. Listener Joe writes in with some follow up on Joe's statement about not using legacy OSes, and how it is unfortunately not an option for many. Both Joe and Dave share two stories this week. Dave's first story follows how the Maryland Attorney General, Brian Frosh, is warning residents about purchasing flood-damaged cars. Dave's second story is about how a Japanese woman was fooled by an astronaut imposter who wooed her into buying a "return ticket to earth." Joe's first story is about a potential scam brewing in Springfield, as people are collecting money on the side of the street for a teenagers funeral, police are warning residents stating they have heard of this scam in neighboring cities. Joe's second story follows a new horrifying scam after a woman fell victim to a phone scam where the scammer claimed to have the victims daughter and they would kill her if she did not do what they asked. Our catch of the day comes from listener Richard who writes in sharing his experience with an email that may or may not be a phish.</p><p>Links to stories:</p><ul>
<li><a href="https://www.marylandattorneygeneral.gov/press/2022/101222CA.pdf">Consumer Alert: Attorney General Frosh Warns Consumers about Purchasing Flood-Damaged Cars</a></li>
<li><a href="https://gizmodo.com/astronaut-iss-instagram-1849638814">An Imposter Claiming to Be an Astronaut Wooed a Japanese Woman Into Paying for a 'Return Ticket to Earth'</a></li>
<li><a href="https://www.ky3.com/2022/10/12/springfield-police-warns-drivers-potential-funeral-scam/">Springfield police warns drivers of “potential” funeral scam</a></li>
<li><a href="https://www.wisn.com/article/greenfield-police-warns-about-terrifying-kidnapping-scam/41616766#">Greenfield Police warns about "terrifying" kidnapping scam</a></li>
</ul><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>2550</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[39402a02-b9da-11ec-b50d-8b9632c6475d]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW8167341945.mp3?updated=1666117673" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Intrusion Detection System (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/118/notes</link>
      <description>A system that monitors for malicious or unwanted activity, and either raises alerts when such activity is detected or blocks the traffic from passing to the target.
CyberWire Glossary link: https://thecyberwire.com/glossary/intrusion-detection-system
Audio reference link: “Network Intrusion Detection and Prevention - CompTIA Security+ SY0-501 - 2.1,” Professor Messer, uploaded 16 November, 2017</description>
      <pubDate>Tue, 18 Oct 2022 07:00:00 -0000</pubDate>
      <itunes:title>Intrusion Detection System (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>118</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A system that monitors for malicious or unwanted activity, and either raises alerts when such activity is detected or blocks the traffic from passing to the target.
CyberWire Glossary link: https://thecyberwire.com/glossary/intrusion-detection-system
Audio reference link: “Network Intrusion Detection and Prevention - CompTIA Security+ SY0-501 - 2.1,” Professor Messer, uploaded 16 November, 2017</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A system that monitors for malicious or unwanted activity, and either raises alerts when such activity is detected or blocks the traffic from passing to the target.</p><p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/intrusion-detection-system">https://thecyberwire.com/glossary/intrusion-detection-system</a></p><p>Audio reference link: “<a href="https://youtu.be/hEgWPWIuq_s">Network Intrusion Detection and Prevention - CompTIA Security+ SY0-501 - 2.1</a>,” Professor Messer, uploaded 16 November, 2017</p>]]>
      </content:encoded>
      <itunes:duration>467</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[09926f7a-3b82-11ed-973f-2f55178860ee]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW5120278623.mp3?updated=1663966663" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The long con and the flim flam. [Hacking Humans Goes to the Movies]</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans-goes-to-the-movies/11/notes</link>
      <description>Thanks for joining us again for another episode of fun project brought to you by the team of Hacking Humans, the CyberWire's social engineering podcast. Hacking Humans co-host Dave Bittner is joined by Rick Howard in this series where they view clips from their favorite movies and television shows with examples of the social engineering scams and schemes you hear Dave and co-host Joe Carrigan talk about on Hacking Humans. In this episode, Dave and Rick watch each of the selected scenes, describe the on-screen action for you, and then they deconstruct what they saw. Grab your bowl of popcorn and join us for some fantastic scams and frauds.
Links to this episode's clips if you'd like to watch along:

Rick's clip from Hustle: S1 Ep1 The Con is On


Dave's clip from Cheers: S6 Harry the Hat</description>
      <pubDate>Sun, 16 Oct 2022 07:00:00 -0000</pubDate>
      <itunes:title>The long con and the flim flam. [Hacking Humans Goes to the Movies]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>11</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Thanks for joining us again for another episode of fun project brought to you by the team of Hacking Humans, the CyberWire's social engineering podcast. Hacking Humans co-host Dave Bittner is joined by Rick Howard in this series where they view clips from their favorite movies and television shows with examples of the social engineering scams and schemes you hear Dave and co-host Joe Carrigan talk about on Hacking Humans. In this episode, Dave and Rick watch each of the selected scenes, describe the on-screen action for you, and then they deconstruct what they saw. Grab your bowl of popcorn and join us for some fantastic scams and frauds.
Links to this episode's clips if you'd like to watch along:

Rick's clip from Hustle: S1 Ep1 The Con is On


Dave's clip from Cheers: S6 Harry the Hat</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Thanks for joining us again for another episode of fun project brought to you by the team of Hacking Humans, the CyberWire's social engineering podcast. Hacking Humans co-host Dave Bittner is joined by Rick Howard in this series where they view clips from their favorite movies and television shows with examples of the social engineering scams and schemes you hear Dave and co-host Joe Carrigan talk about on Hacking Humans. In this episode, Dave and Rick watch each of the selected scenes, describe the on-screen action for you, and then they deconstruct what they saw. Grab your bowl of popcorn and join us for some fantastic scams and frauds.</p><p>Links to this episode's clips if you'd like to watch along:</p><ul>
<li>Rick's clip from Hustle: S1 Ep1 <a href="https://www.youtube.com/watch?v=h7ery-cvAYE&amp;t=49s">The Con is On</a>
</li>
<li>Dave's clip from Cheers: S6 <a href="https://www.youtube.com/watch?v=X7ea3KtXlk8">Harry the Hat</a>
</li>
</ul>]]>
      </content:encoded>
      <itunes:duration>1214</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[1ff27998-4c00-11ed-a073-f37fa33abec0]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW2913399591.mp3?updated=1672788839" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Falling for a phishing kit scam.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/216/notes</link>
      <description>Larry Cashdollar from Akamai sits down with Dave to discuss their research, "The Kit That Wants It All: Scam Mimics PayPal’s Known Security Measures." Joe shares an incredible story regarding impersonation and man sharing his first hand experience with impostors impersonating him to get a job, luckily a good samaritan shared this information before the damage could be done. Dave's story follows raids happening in Cambodia with connection to alleged cyberscam compounds. We have two catches of the day this week, one is from listener Eric who sends in a romance scam email asking for love from one desperate scammer. The next one comes from Uberfacts on Twitter and is an instagram DM from someone pretending to be Queen Elizabeth II.
Links to stories:

Someone is pretending to be me.

Authorities Raid Alleged Cyberscam Compounds in Cambodia


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 13 Oct 2022 05:00:00 -0000</pubDate>
      <itunes:title>Falling for a phishing kit scam.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>216</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Larry Cashdollar from Akamai sits down with Dave to discuss their research, "The Kit That Wants It All: Scam Mimics PayPal’s Known Security Measures." Joe shares an incredible story regarding impersonation and man sharing his first hand experience with impostors impersonating him to get a job, luckily a good samaritan shared this information before the damage could be done. Dave's story follows raids happening in Cambodia with connection to alleged cyberscam compounds. We have two catches of the day this week, one is from listener Eric who sends in a romance scam email asking for love from one desperate scammer. The next one comes from Uberfacts on Twitter and is an instagram DM from someone pretending to be Queen Elizabeth II.
Links to stories:

Someone is pretending to be me.

Authorities Raid Alleged Cyberscam Compounds in Cambodia


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Larry Cashdollar from Akamai sits down with Dave to discuss their research, "The Kit That Wants It All: Scam Mimics PayPal’s Known Security Measures." Joe shares an incredible story regarding impersonation and man sharing his first hand experience with impostors impersonating him to get a job, luckily a good samaritan shared this information before the damage could be done. Dave's story follows raids happening in Cambodia with connection to alleged cyberscam compounds. We have two catches of the day this week, one is from listener Eric who sends in a romance scam email asking for love from one desperate scammer. The next one comes from Uberfacts on Twitter and is an instagram DM from someone pretending to be Queen Elizabeth II.</p><p>Links to stories:</p><ul>
<li><a href="https://connortumbleson.com/2022/09/19/someone-is-pretending-to-be-me/">Someone is pretending to be me.</a></li>
<li><a href="https://www.propublica.org/article/pig-butchering-scams-raided-cambodia-apple-trafficking?utm_source=twitter&amp;utm_medium=social&amp;utm_campaign=socialflow">Authorities Raid Alleged Cyberscam Compounds in Cambodia</a></li>
</ul><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>2575</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[39320ee0-b9da-11ec-b50d-fbc1201b62c9]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW8032572818.mp3?updated=1665512971" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>MFA prompt bombing (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/117/notes</link>
      <description>Hackers bypass, multifactor authentication schemes by sending a blizzard of spamming login attempts until the accounts owner accepts the MFA prompt out of desperation to make the spamming stop. 
CyberWire Glossary link: https://thecyberwire.com/glossary/mfa-prompt-bombing
Audio reference link: movieclips. “Sneakers (2/9) Movie Clip - Defeating the Keypad (1992) HD.” YouTube, YouTube, 29 May 2011, https://www.youtube.com/watch?v=oG5vsPJ5Tos. </description>
      <pubDate>Tue, 11 Oct 2022 07:00:00 -0000</pubDate>
      <itunes:title>MFA prompt bombing (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>117</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Hackers bypass, multifactor authentication schemes by sending a blizzard of spamming login attempts until the accounts owner accepts the MFA prompt out of desperation to make the spamming stop. 
CyberWire Glossary link: https://thecyberwire.com/glossary/mfa-prompt-bombing
Audio reference link: movieclips. “Sneakers (2/9) Movie Clip - Defeating the Keypad (1992) HD.” YouTube, YouTube, 29 May 2011, https://www.youtube.com/watch?v=oG5vsPJ5Tos. </itunes:summary>
      <content:encoded>
        <![CDATA[<p>Hackers bypass, multifactor authentication schemes by sending a blizzard of spamming login attempts until the accounts owner accepts the MFA prompt out of desperation to make the spamming stop. </p><p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/mfa-prompt-bombing">https://thecyberwire.com/glossary/mfa-prompt-bombing</a></p><p>Audio reference link: movieclips. “<a href="https://www.youtube.com/watch?v=oG5vsPJ5Tos">Sneakers (2/9) Movie Clip - Defeating the Keypad (1992) HD.</a>” <em>YouTube</em>, YouTube, 29 May 2011, https://www.youtube.com/watch?v=oG5vsPJ5Tos. </p>]]>
      </content:encoded>
      <itunes:duration>407</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c8086bba-382d-11ed-a3df-dfd99dfa283e]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW2602514639.mp3?updated=1663598979" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>What is cyber quantum computing?</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/215/notes</link>
      <description>Pete Ford from QuSecure sits down with Dave to discuss what exactly cyber quantum computing is, what it means for the country, and how other countries are using quantum. Dave and Joe share follow up on 2 stories, one Bleeping Computer reports, discussing the teen that hacked Uber and Rockstar Games has been arrested. Second, we share some listener follow up from last episode about medical documents being shared and how easy it would be to falsify your identity to obtain children's documents. Dustin, a Registered Health Information Management Technician, shares his thoughts on the matter. Dave's story follows the FCC’s new plan to require phone companies to block spam texts from bogus numbers. Joe has the story on how two Abbotsford residents lose approximately forty six thousand dollars in a bank scam. Our catch of the day comes from listener Joseph who shares a strange email he received from a scammer claiming to be PayPal, which could have seemed real if it weren't for a few mistakes Joseph found to be peculiar.
Links to stories:

FCC advances plan to require blocking of spam texts from bogus numbers

Two Abbotsford residents lose $46K in bank scam

UK Police arrests teen believed to be behind Uber, Rockstar hacks


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 06 Oct 2022 05:00:00 -0000</pubDate>
      <itunes:title>What is cyber quantum computing?</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>215</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Pete Ford from QuSecure sits down with Dave to discuss what exactly cyber quantum computing is, what it means for the country, and how other countries are using quantum. Dave and Joe share follow up on 2 stories, one Bleeping Computer reports, discussing the teen that hacked Uber and Rockstar Games has been arrested. Second, we share some listener follow up from last episode about medical documents being shared and how easy it would be to falsify your identity to obtain children's documents. Dustin, a Registered Health Information Management Technician, shares his thoughts on the matter. Dave's story follows the FCC’s new plan to require phone companies to block spam texts from bogus numbers. Joe has the story on how two Abbotsford residents lose approximately forty six thousand dollars in a bank scam. Our catch of the day comes from listener Joseph who shares a strange email he received from a scammer claiming to be PayPal, which could have seemed real if it weren't for a few mistakes Joseph found to be peculiar.
Links to stories:

FCC advances plan to require blocking of spam texts from bogus numbers

Two Abbotsford residents lose $46K in bank scam

UK Police arrests teen believed to be behind Uber, Rockstar hacks


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Pete Ford from QuSecure sits down with Dave to discuss what exactly cyber quantum computing is, what it means for the country, and how other countries are using quantum. Dave and Joe share follow up on 2 stories, one Bleeping Computer reports, discussing the teen that hacked Uber and Rockstar Games has been arrested. Second, we share some listener follow up from last episode about medical documents being shared and how easy it would be to falsify your identity to obtain children's documents. Dustin, a Registered Health Information Management Technician, shares his thoughts on the matter. Dave's story follows the FCC’s new plan to require phone companies to block spam texts from bogus numbers. Joe has the story on how two Abbotsford residents lose approximately forty six thousand dollars in a bank scam. Our catch of the day comes from listener Joseph who shares a strange email he received from a scammer claiming to be PayPal, which could have seemed real if it weren't for a few mistakes Joseph found to be peculiar.</p><p>Links to stories:</p><ul>
<li><a href="https://arstechnica.com/tech-policy/2022/09/fcc-advances-plan-to-require-blocking-of-spam-texts-from-bogus-numbers/?utm_brand=ars&amp;utm_source=twitter&amp;utm_social-type=owned&amp;utm_medium=social">FCC advances plan to require blocking of spam texts from bogus numbers</a></li>
<li><a href="https://www.abbynews.com/news/two-abbotsford-residents-lose-46k-in-bank-scam/">Two Abbotsford residents lose $46K in bank scam</a></li>
<li><a href="https://www.bleepingcomputer.com/news/security/uk-police-arrests-teen-believed-to-be-behind-uber-rockstar-hacks/">UK Police arrests teen believed to be behind Uber, Rockstar hacks</a></li>
</ul><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>2656</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[3923ed60-b9da-11ec-b50d-9b6ace9c8177]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW3088549754.mp3?updated=1665085278" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Apple Lockdown Mode (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/116/notes</link>
      <description>An optional security mode for macOS and iOS that reduces the attack surface of the operating system by disabling certain commonly attacked features. 
Audio reference link: “How NSO Group’s Pegasus Spyware Was Found on Jamal Khashoggi’s Fiancée’s Phone,” FRONTLINE, YouTube, 18 July 2021.</description>
      <pubDate>Tue, 04 Oct 2022 07:00:00 -0000</pubDate>
      <itunes:title>Apple Lockdown Mode (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>116</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>An optional security mode for macOS and iOS that reduces the attack surface of the operating system by disabling certain commonly attacked features. 
Audio reference link: “How NSO Group’s Pegasus Spyware Was Found on Jamal Khashoggi’s Fiancée’s Phone,” FRONTLINE, YouTube, 18 July 2021.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>An optional security mode for macOS and iOS that reduces the attack surface of the operating system by disabling certain commonly attacked features. </p><p>Audio reference link: “<a href="https://www.youtube.com/watch?v=a2BIYWHdfTE">How NSO Group’s Pegasus Spyware Was Found on Jamal Khashoggi’s Fiancée’s Phone</a>,” FRONTLINE, YouTube, 18 July 2021.</p>]]>
      </content:encoded>
      <itunes:duration>389</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[14decfea-306a-11ed-91b8-b7f5581fa38a]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW4302251998.mp3?updated=1662996000" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>A cryptoqueen on the run and the cons she got away with.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/214/notes</link>
      <description>This week Carole Theriault sits down to interview author Jamie Bartlett on his book, "The Missing Cryptoqueen - The Billion Dollar Cryptocurrency Con and the Woman Who Got Away with It." Dave and Joe share some follow up from listener Dustin who shares an interesting experience he had involving his child's medical documents and how easy it was to obtain them, making scams even easier. Joe's story follows a young teen hacker and how they allegedly were able to hack Uber and Rockstar Games. Dave has got the story on Queen Elizabeth II and how giving condolences could lead you right into a scam. Our catch of the day comes from us here at the CyberWire. We received an email from one Vladomir Petrova, a citizen of Ukraine, which gets more suspicious the longer the email reads.
Links to stories:

Social Engineering: How A Teen Hacker Allegedly Managed To Breach Both Uber And Rockstar Games

PHISHING ALERT: GIVING YOUR CONDOLENCES FOR QUEEN ELIZABETH II CAN LEAVE YOUR DATA IN THE HANDS OF CYBERCRIMINALS


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 29 Sep 2022 05:00:00 -0000</pubDate>
      <itunes:title>A cryptoqueen on the run and the cons she got away with.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>214</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>This week Carole Theriault sits down to interview author Jamie Bartlett on his book, "The Missing Cryptoqueen - The Billion Dollar Cryptocurrency Con and the Woman Who Got Away with It." Dave and Joe share some follow up from listener Dustin who shares an interesting experience he had involving his child's medical documents and how easy it was to obtain them, making scams even easier. Joe's story follows a young teen hacker and how they allegedly were able to hack Uber and Rockstar Games. Dave has got the story on Queen Elizabeth II and how giving condolences could lead you right into a scam. Our catch of the day comes from us here at the CyberWire. We received an email from one Vladomir Petrova, a citizen of Ukraine, which gets more suspicious the longer the email reads.
Links to stories:

Social Engineering: How A Teen Hacker Allegedly Managed To Breach Both Uber And Rockstar Games

PHISHING ALERT: GIVING YOUR CONDOLENCES FOR QUEEN ELIZABETH II CAN LEAVE YOUR DATA IN THE HANDS OF CYBERCRIMINALS


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This week Carole Theriault sits down to interview author Jamie Bartlett on his book, "The Missing Cryptoqueen - The Billion Dollar Cryptocurrency Con and the Woman Who Got Away with It." Dave and Joe share some follow up from listener Dustin who shares an interesting experience he had involving his child's medical documents and how easy it was to obtain them, making scams even easier. Joe's story follows a young teen hacker and how they allegedly were able to hack Uber and Rockstar Games. Dave has got the story on Queen Elizabeth II and how giving condolences could lead you right into a scam. Our catch of the day comes from us here at the CyberWire. We received an email from one Vladomir Petrova, a citizen of Ukraine, which gets more suspicious the longer the email reads.</p><p>Links to stories:</p><ul>
<li><a href="https://www.forbes.com/sites/siladityaray/2022/09/20/social-engineering-how-a-teen-hacker-allegedly-managed-to-breach-both-uber-and-rockstar-games/?sh=2f84f81f451c">Social Engineering: How A Teen Hacker Allegedly Managed To Breach Both Uber And Rockstar Games</a></li>
<li><a href="https://www.securitynewspaper.com/2022/09/15/phishing-alert-giving-your-condolences-for-queen-elizabeth-ii-can-leave-your-data-in-the-hands-of-cybercriminals/">PHISHING ALERT: GIVING YOUR CONDOLENCES FOR QUEEN ELIZABETH II CAN LEAVE YOUR DATA IN THE HANDS OF CYBERCRIMINALS</a></li>
</ul><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>2319</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[3915c794-b9da-11ec-b50d-373cbf9b2446]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW7208703306.mp3?updated=1664216048" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Simulated Phishing (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/115/notes</link>
      <description>A security awareness training technique in which authorized, but fake phishing emails are sent to employees in order to measure and improve their resistance to real phishing attacks. 
CyberWire Glossary link: https://thecyberwire.com/glossary/simulated-phishing
Audio reference link: “Blackhat (2014) - Hacking the NSA Scene (4/10) | Movieclips.” YouTube, YouTube, 19 Apr. 2017.</description>
      <pubDate>Tue, 27 Sep 2022 07:00:00 -0000</pubDate>
      <itunes:title>Simulated Phishing (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>115</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A security awareness training technique in which authorized, but fake phishing emails are sent to employees in order to measure and improve their resistance to real phishing attacks. 
CyberWire Glossary link: https://thecyberwire.com/glossary/simulated-phishing
Audio reference link: “Blackhat (2014) - Hacking the NSA Scene (4/10) | Movieclips.” YouTube, YouTube, 19 Apr. 2017.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A security awareness training technique in which authorized, but fake phishing emails are sent to employees in order to measure and improve their resistance to real phishing attacks. </p><p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/simulated-phishing">https://thecyberwire.com/glossary/simulated-phishing</a></p><p>Audio reference link: <a href="https://www.youtube.com/watch?v=7HWfwLBqSQ4">“Blackhat (2014) - Hacking the NSA Scene (4/10) | Movieclips.”</a> <em>YouTube</em>, YouTube, 19 Apr. 2017.</p>]]>
      </content:encoded>
      <itunes:duration>485</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[667a678a-2df2-11ed-abbb-a73f5dd3fed4]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW1239700517.mp3?updated=1662175394" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The rise in fraudulent online content.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/213/notes</link>
      <description>Guest Jane Lee, Trust and Safety Architect from Sift joins Dave to discuss the rise of fraudulent online content and fake crypto platforms. Dave and Joe share some listener follow up regarding the debate over "mum" versus "mom" and who speaks which pronunciation more. Dave has two stories this week, one story follows a Twitter thread about a man who shared his story about selling a desk on Facebook and the dangers that come with that. His second story is about how hackers are using a clever new phishing technique to create email threads with multiple responses to trick potential victims into thinking bogus messages are legitimate. Joe shares the story of hackers new way to get information positioning themselves in the middle of your browser between the server and your computer. Our catch of the day has a little bit of everything from Peter who writes in about an email he received pulling out all the stops to get him to give over his information.
Links to stories:

Twitter thread

https://www.cyberscoop.com/phishing-scheme-targeting-mideast-researchers/

Serious Security: Browser-in-the-browser attacks – watch out for windows that aren’t!


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 22 Sep 2022 05:00:00 -0000</pubDate>
      <itunes:title>The rise in fraudulent online content.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>213</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Guest Jane Lee, Trust and Safety Architect from Sift joins Dave to discuss the rise of fraudulent online content and fake crypto platforms. Dave and Joe share some listener follow up regarding the debate over "mum" versus "mom" and who speaks which pronunciation more. Dave has two stories this week, one story follows a Twitter thread about a man who shared his story about selling a desk on Facebook and the dangers that come with that. His second story is about how hackers are using a clever new phishing technique to create email threads with multiple responses to trick potential victims into thinking bogus messages are legitimate. Joe shares the story of hackers new way to get information positioning themselves in the middle of your browser between the server and your computer. Our catch of the day has a little bit of everything from Peter who writes in about an email he received pulling out all the stops to get him to give over his information.
Links to stories:

Twitter thread

https://www.cyberscoop.com/phishing-scheme-targeting-mideast-researchers/

Serious Security: Browser-in-the-browser attacks – watch out for windows that aren’t!


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Guest Jane Lee, Trust and Safety Architect from Sift joins Dave to discuss the rise of fraudulent online content and fake crypto platforms. Dave and Joe share some listener follow up regarding the debate over "mum" versus "mom" and who speaks which pronunciation more. Dave has two stories this week, one story follows a Twitter thread about a man who shared his story about selling a desk on Facebook and the dangers that come with that. His second story is about how hackers are using a clever new phishing technique to create email threads with multiple responses to trick potential victims into thinking bogus messages are legitimate. Joe shares the story of hackers new way to get information positioning themselves in the middle of your browser between the server and your computer. Our catch of the day has a little bit of everything from Peter who writes in about an email he received pulling out all the stops to get him to give over his information.</p><p>Links to stories:</p><ul>
<li><a href="https://twitter.com/_larry0/status/1568991780988719104?s=51&amp;t=Curz6kinRQbKk5LE-s442g">Twitter thread</a></li>
<li><a href="https://www.cyberscoop.com/phishing-scheme-targeting-mideast-researchers/">https://www.cyberscoop.com/phishing-scheme-targeting-mideast-researchers/</a></li>
<li><a href="https://nakedsecurity.sophos.com/2022/09/13/serious-security-browser-in-the-browser-attacks-watch-out-for-windows-that-arent/">Serious Security: Browser-in-the-browser attacks – watch out for windows that aren’t!</a></li>
</ul><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>3032</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[39077ef0-b9da-11ec-b50d-fb246c29c249]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW4931638009.mp3?updated=1689095847" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Sideloading (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/114/notes</link>
      <description>The process of installing applications on a device without the use of official software distribution channels.
CyberWire Glossary link: https://thecyberwire.com/glossary/sideloading</description>
      <pubDate>Tue, 20 Sep 2022 07:00:00 -0000</pubDate>
      <itunes:title>Sideloading (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>114</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>The process of installing applications on a device without the use of official software distribution channels.
CyberWire Glossary link: https://thecyberwire.com/glossary/sideloading</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The process of installing applications on a device without the use of official software distribution channels.</p><p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/sideloading">https://thecyberwire.com/glossary/sideloading</a></p>]]>
      </content:encoded>
      <itunes:duration>419</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[5bf3ab5a-2898-11ed-a2ca-a3ecd31a3d3e]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW1890984697.mp3?updated=1661885920" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>It pays to do your research. [Hacking Humans Goes to the Movies}</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans-goes-to-the-movies/10/notes</link>
      <description>Thanks for joining us again for another episode of fun project brought to you by the team of Hacking Humans, the CyberWire's social engineering podcast. Co-hosts Dave Bittner and Joe Carrigan are joined by Rick Howard in this series where they view clips from their favorite movies with examples of the social engineering scams and schemes you hear about on Hacking Humans. In this episode, Dave and Joe are joined on this episode by guest Tracy Maleeff from Krebs Stamos Group – you may know her on Twitter as @Infosecsherpa. Dave,Joe and Tracy watch and discuss Tracy;s and Joe's clips on this episode. They watch each of the selected scenes, describe the on-screen action for you, and then the team deconstructs what they saw. Grab your bowl of popcorn and join us for some Hollywood scams and frauds.
Links to this episode's clips if you'd like to watch along:

Tracy's clips from "Working Girl"


Elevator scene

Tess and Jack gatecrash a wedding scene

Joe's clip from "Oceans 8"</description>
      <pubDate>Sun, 18 Sep 2022 05:00:00 -0000</pubDate>
      <itunes:title>It pays to do your research. [Hacking Humans Goes to the Movies}</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>10</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Thanks for joining us again for another episode of fun project brought to you by the team of Hacking Humans, the CyberWire's social engineering podcast. Co-hosts Dave Bittner and Joe Carrigan are joined by Rick Howard in this series where they view clips from their favorite movies with examples of the social engineering scams and schemes you hear about on Hacking Humans. In this episode, Dave and Joe are joined on this episode by guest Tracy Maleeff from Krebs Stamos Group – you may know her on Twitter as @Infosecsherpa. Dave,Joe and Tracy watch and discuss Tracy;s and Joe's clips on this episode. They watch each of the selected scenes, describe the on-screen action for you, and then the team deconstructs what they saw. Grab your bowl of popcorn and join us for some Hollywood scams and frauds.
Links to this episode's clips if you'd like to watch along:

Tracy's clips from "Working Girl"


Elevator scene

Tess and Jack gatecrash a wedding scene

Joe's clip from "Oceans 8"</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Thanks for joining us again for another episode of fun project brought to you by the team of Hacking Humans, the CyberWire's social engineering podcast. Co-hosts Dave Bittner and Joe Carrigan are joined by Rick Howard in this series where they view clips from their favorite movies with examples of the social engineering scams and schemes you hear about on Hacking Humans. In this episode, Dave and Joe are joined on this episode by guest Tracy Maleeff from Krebs Stamos Group – you may know her on Twitter as @Infosecsherpa. Dave,Joe and Tracy watch and discuss Tracy;s and Joe's clips on this episode. They watch each of the selected scenes, describe the on-screen action for you, and then the team deconstructs what they saw. Grab your bowl of popcorn and join us for some Hollywood scams and frauds.</p><p>Links to this episode's clips if you'd like to watch along:</p><ul>
<li>Tracy's clips from "Working Girl"</li>
<li>
<a href="https://www.youtube.com/watch?v=h7D11Jr7nxQ">Elevator</a> scene</li>
<li>Tess and Jack <a href="https://www.youtube.com/watch?v=NzL5aAUz_uc">gatecrash a wedding</a> scene</li>
<li>Joe's clip from "<a href="https://youtu.be/OkBaZLq7gnU">Oceans 8</a>"</li>
</ul>]]>
      </content:encoded>
      <itunes:duration>1888</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c3628b54-35f8-11ed-8d64-b3433e139482]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW3196811496.mp3?updated=1672786334" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Is inflation affecting the Dark Web?</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/212/notes</link>
      <description>Dov Lerner, a Security Research Lead from Cybersixgill, sits down with Dave to discuss how inflation hasn't affected the Dark Web, including how the cratering of cryptocurrency may have affected things. Joe and Dave share some follow up from listener Pelle, who writes in about their grandmother who was scammed over the phone for her PIN, among other information, allowing the scammers to get away with much more than money. This week, Joe's story comes from a listener named Kyle, who shared an article about protecting against AiTM (adversary-in-the-middle) phishing techniques that bypass multi-factor authentication. Dave's story is about a new video being released that shares the most common WhatsApp scams and how to avoid them. Our catch of the day comes from listener Vlad, who shares his story regarding an email he received stating he is owed 1 million dollars, and how he's not falling for the scammer’s latest attempt.
Links to stories:

Protect against AiTM/ MFA phishing attacks using Microsoft technology

How to avoid the most common WhatsApp Scams 2022

WhatsApp Scams in 2022: What to Look out for


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 15 Sep 2022 05:00:00 -0000</pubDate>
      <itunes:title>Is inflation affecting the Dark Web?</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>212</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Dov Lerner, a Security Research Lead from Cybersixgill, sits down with Dave to discuss how inflation hasn't affected the Dark Web, including how the cratering of cryptocurrency may have affected things. Joe and Dave share some follow up from listener Pelle, who writes in about their grandmother who was scammed over the phone for her PIN, among other information, allowing the scammers to get away with much more than money. This week, Joe's story comes from a listener named Kyle, who shared an article about protecting against AiTM (adversary-in-the-middle) phishing techniques that bypass multi-factor authentication. Dave's story is about a new video being released that shares the most common WhatsApp scams and how to avoid them. Our catch of the day comes from listener Vlad, who shares his story regarding an email he received stating he is owed 1 million dollars, and how he's not falling for the scammer’s latest attempt.
Links to stories:

Protect against AiTM/ MFA phishing attacks using Microsoft technology

How to avoid the most common WhatsApp Scams 2022

WhatsApp Scams in 2022: What to Look out for


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Dov Lerner, a Security Research Lead from Cybersixgill, sits down with Dave to discuss how inflation hasn't affected the Dark Web, including how the cratering of cryptocurrency may have affected things. Joe and Dave share some follow up from listener Pelle, who writes in about their grandmother who was scammed over the phone for her PIN, among other information, allowing the scammers to get away with much more than money. This week, Joe's story comes from a listener named Kyle, who shared an article about protecting against AiTM (adversary-in-the-middle) phishing techniques that bypass multi-factor authentication. Dave's story is about a new video being released that shares the most common WhatsApp scams and how to avoid them. Our catch of the day comes from listener Vlad, who shares his story regarding an email he received stating he is owed 1 million dollars, and how he's not falling for the scammer’s latest attempt.</p><p>Links to stories:</p><ul>
<li><a href="https://jeffreyappel.nl/protect-against-aitm-mfa-phishing-attacks-using-microsoft-technology/">Protect against AiTM/ MFA phishing attacks using Microsoft technology</a></li>
<li><a href="https://www.youtube.com/watch?v=6xejzya19yE&amp;t=404s">How to avoid the most common WhatsApp Scams 2022</a></li>
<li><a href="https://www.tripwire.com/state-of-security/security-data-protection/cyber-security/whatsapp-scams-what-to-look-out-for/">WhatsApp Scams in 2022: What to Look out for</a></li>
</ul><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>3126</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[38f92f9e-b9da-11ec-b50d-374a0d6d4900]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW5399657629.mp3?updated=1663090653" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Microsegmentation (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/113/notes</link>
      <description>A zero trust security technique that isolates application workloads from each other, allowing each one to be protected individually.
CyberWire Glossary link: https://thecyberwire.com/glossary/microsegmentation
Audio reference link: “Micro-Segmentation Masterpieces,” PJ Kirner, Illumio CTO and Co-Founder, Tech Field Day, YouTube, 13 December 2020.</description>
      <pubDate>Tue, 13 Sep 2022 07:00:00 -0000</pubDate>
      <itunes:title>Microsegmentation (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>113</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A zero trust security technique that isolates application workloads from each other, allowing each one to be protected individually.
CyberWire Glossary link: https://thecyberwire.com/glossary/microsegmentation
Audio reference link: “Micro-Segmentation Masterpieces,” PJ Kirner, Illumio CTO and Co-Founder, Tech Field Day, YouTube, 13 December 2020.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A zero trust security technique that isolates application workloads from each other, allowing each one to be protected individually.</p><p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/microsegmentation">https://thecyberwire.com/glossary/microsegmentation</a></p><p>Audio reference link: “<a href="https://www.youtube.com/watch?v=tJaWZmW_gD4">Micro-Segmentation Masterpieces</a>,” PJ Kirner, Illumio CTO and Co-Founder, Tech Field Day, YouTube, 13 December 2020.</p>]]>
      </content:encoded>
      <itunes:duration>379</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[79abacae-2241-11ed-ad4a-abe4b3fbac0e]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW4645249150.mp3?updated=1661188601" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>A travel surge and a host of different scams.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/211/notes</link>
      <description>Greg Otto from Intel 471 joins Dave to discuss the findings of their work on "Cybercriminals preying on a travel surge with a host of different scams." Dave and Joe share some interesting listener follow up from Kevin, who writes in about the deepfakes episode and shares his comments on how scary the topic can be, especially with politicians. Dave shares a story about Charles Egunjobi, an auditor with the D.C. government, and how he fell victim to an online love scam costing elderly U.S. citizens $1.9 million. Joe touches on two stories, one being how a woman down in Texas is able to scam men out of some expensive items with a romance scam, and the other being a story that is warning Pennsylvania residents on a quick moving scam artist moving from state to state. Our catch of the day comes from Jon in California who writes in about about an email scam concerning a local job sent to him and how he needs to apply right away.
Links to stories:

D.C. government auditor involved in romance scheme, prosecutors say

Texas woman cons men out of Rolex watches and fancy cars through ‘romance scam’

Pennsylvania State Troopers warn of ‘quick moving’ city-to-city scam artists


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 08 Sep 2022 05:00:00 -0000</pubDate>
      <itunes:title>A travel surge and a host of different scams.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>211</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Greg Otto from Intel 471 joins Dave to discuss the findings of their work on "Cybercriminals preying on a travel surge with a host of different scams." Dave and Joe share some interesting listener follow up from Kevin, who writes in about the deepfakes episode and shares his comments on how scary the topic can be, especially with politicians. Dave shares a story about Charles Egunjobi, an auditor with the D.C. government, and how he fell victim to an online love scam costing elderly U.S. citizens $1.9 million. Joe touches on two stories, one being how a woman down in Texas is able to scam men out of some expensive items with a romance scam, and the other being a story that is warning Pennsylvania residents on a quick moving scam artist moving from state to state. Our catch of the day comes from Jon in California who writes in about about an email scam concerning a local job sent to him and how he needs to apply right away.
Links to stories:

D.C. government auditor involved in romance scheme, prosecutors say

Texas woman cons men out of Rolex watches and fancy cars through ‘romance scam’

Pennsylvania State Troopers warn of ‘quick moving’ city-to-city scam artists


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Greg Otto from Intel 471 joins Dave to discuss the findings of their work on "Cybercriminals preying on a travel surge with a host of different scams." Dave and Joe share some interesting listener follow up from Kevin, who writes in about the deepfakes episode and shares his comments on how scary the topic can be, especially with politicians. Dave shares a story about Charles Egunjobi, an auditor with the D.C. government, and how he fell victim to an online love scam costing elderly U.S. citizens $1.9 million. Joe touches on two stories, one being how a woman down in Texas is able to scam men out of some expensive items with a romance scam, and the other being a story that is warning Pennsylvania residents on a quick moving scam artist moving from state to state. Our catch of the day comes from Jon in California who writes in about about an email scam concerning a local job sent to him and how he needs to apply right away.</p><p>Links to stories:</p><ul>
<li><a href="https://www.washingtonpost.com/dc-md-va/2022/08/31/dc-auditor-scam-romance-charges/">D.C. government auditor involved in romance scheme, prosecutors say</a></li>
<li><a href="https://nypost.com/2022/09/01/texas-woman-dominique-golden-tricks-her-way-to-rolex-watches-through-romance-scam/">Texas woman cons men out of Rolex watches and fancy cars through ‘romance scam’</a></li>
<li><a href="https://www.abc27.com/pennsylvania/pennsylvania-state-troopers-warn-of-quick-moving-city-to-city-scam-artists/">Pennsylvania State Troopers warn of ‘quick moving’ city-to-city scam artists</a></li>
</ul><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>2456</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[38eaff50-b9da-11ec-b50d-1b3ceef400d9]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW4837542800.mp3?updated=1662491696" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Homograph phishing (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/112/notes</link>
      <description>The use of similar-looking characters in a phishing URL to spoof a legitimate site.
CyberWire Glossary link:
Audio reference link: “Mission Impossible III 2006 Masking 01,” uploaded by DISGUISE MASK, 28 July 2018.</description>
      <pubDate>Tue, 06 Sep 2022 07:00:00 -0000</pubDate>
      <itunes:title>Homograph phishing (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>112</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>The use of similar-looking characters in a phishing URL to spoof a legitimate site.
CyberWire Glossary link:
Audio reference link: “Mission Impossible III 2006 Masking 01,” uploaded by DISGUISE MASK, 28 July 2018.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The use of similar-looking characters in a phishing URL to spoof a legitimate site.</p><p>CyberWire Glossary link:</p><p>Audio reference link: “<a href="https://youtu.be/8VgscNBhD6g">Mission Impossible III 2006 Masking 01</a>,” uploaded by DISGUISE MASK, 28 July 2018.</p>]]>
      </content:encoded>
      <itunes:duration>368</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[8583b3e0-1cd4-11ed-aad4-2b35b2343f62]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW6713612953.mp3?updated=1660657803" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Is there a growing number of public and private partnerships forming?</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/210/notes</link>
      <description>This week Carole Theriault interviews Chuck Everette from Deep Instinct on public and private partnerships. Dave and Joe share some listener follow up from Rodney who writes in about flexible spending cards and chips inside them as well as sharing technology that helps keep the scammers away. Joe's story follows the trend of fake invoicing, specifically through PayPal and the newest string of scammers getting people to call in about a pending charge. Dave shares a story where people are getting sent fake Microsoft products in hopes to steal information after they plug these products into their computers. Our catch of the day comes from listener William who writes in about getting an increasing amount of emails from fake accounts saying they have charged his card and there is a pending transaction. William shares how the scammers are trying to get him to call in to dispute the charges.
Links to stories:

PayPal Phishing Scam Uses Invoices Sent Via PayPal

Criminals posting counterfeit Microsoft products to get access to victims' computers


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 01 Sep 2022 05:00:00 -0000</pubDate>
      <itunes:title>Is there a growing number of public and private partnerships forming?</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>210</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>This week Carole Theriault interviews Chuck Everette from Deep Instinct on public and private partnerships. Dave and Joe share some listener follow up from Rodney who writes in about flexible spending cards and chips inside them as well as sharing technology that helps keep the scammers away. Joe's story follows the trend of fake invoicing, specifically through PayPal and the newest string of scammers getting people to call in about a pending charge. Dave shares a story where people are getting sent fake Microsoft products in hopes to steal information after they plug these products into their computers. Our catch of the day comes from listener William who writes in about getting an increasing amount of emails from fake accounts saying they have charged his card and there is a pending transaction. William shares how the scammers are trying to get him to call in to dispute the charges.
Links to stories:

PayPal Phishing Scam Uses Invoices Sent Via PayPal

Criminals posting counterfeit Microsoft products to get access to victims' computers


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This week Carole Theriault interviews Chuck Everette from Deep Instinct on public and private partnerships. Dave and Joe share some listener follow up from Rodney who writes in about flexible spending cards and chips inside them as well as sharing technology that helps keep the scammers away. Joe's story follows the trend of fake invoicing, specifically through PayPal and the newest string of scammers getting people to call in about a pending charge. Dave shares a story where people are getting sent fake Microsoft products in hopes to steal information after they plug these products into their computers. Our catch of the day comes from listener William who writes in about getting an increasing amount of emails from fake accounts saying they have charged his card and there is a pending transaction. William shares how the scammers are trying to get him to call in to dispute the charges.</p><p>Links to stories:</p><ul>
<li><a href="https://krebsonsecurity.com/2022/08/paypal-phishing-scam-uses-invoices-sent-via-paypal/">PayPal Phishing Scam Uses Invoices Sent Via PayPal</a></li>
<li><a href="https://news.sky.com/story/criminals-posting-counterfeit-microsoft-products-to-get-access-to-victims-computers-12675123">Criminals posting counterfeit Microsoft products to get access to victims' computers</a></li>
</ul><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>2311</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[38db8908-b9da-11ec-b50d-5f9551b7bcfb]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW8966722134.mp3?updated=1661882783" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Policy Orchestration (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/105/notes</link>
      <description>The deployment of rules to the security stack across all data islands, cloud, SaaS applications, data centers, and mobile devices designed to manifest an organization's cybersecurity first principle strategies of zero trust, intrusion kill chain prevention, resilience, and risk forecasting. 
CyberWire Glossary link: https://thecyberwire.com/glossary/policy-orchestration
Audio reference link: “The Value of Using Security Policy Orchestration and Automation,” by David Monahan, uploaded by EMAResearch, 3 April, 2018</description>
      <pubDate>Tue, 30 Aug 2022 07:00:00 -0000</pubDate>
      <itunes:title>Policy Orchestration (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>105</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>The deployment of rules to the security stack across all data islands, cloud, SaaS applications, data centers, and mobile devices designed to manifest an organization's cybersecurity first principle strategies of zero trust, intrusion kill chain prevention, resilience, and risk forecasting. 
CyberWire Glossary link: https://thecyberwire.com/glossary/policy-orchestration
Audio reference link: “The Value of Using Security Policy Orchestration and Automation,” by David Monahan, uploaded by EMAResearch, 3 April, 2018</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The deployment of rules to the security stack across all data islands, cloud, SaaS applications, data centers, and mobile devices designed to manifest an organization's cybersecurity first principle strategies of zero trust, intrusion kill chain prevention, resilience, and risk forecasting. </p><p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/policy-orchestration">https://thecyberwire.com/glossary/policy-orchestration</a></p><p>Audio reference link: “<a href="https://www.youtube.com/watch?v=mXJggqI0-uY">The Value of Using Security Policy Orchestration and Automation</a>,” by David Monahan, uploaded by EMAResearch, 3 April, 2018</p>]]>
      </content:encoded>
      <itunes:duration>383</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b7ffff0e-2544-11ed-b577-83ed8da65d12]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW9664554693.mp3?updated=1661521503" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Encore: Sometimes, deepfake victims don't want to be convinced it is fake. </title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/165/notes</link>
      <description>Guest Etay Maor of Cato Networks joins Dave Bittner to discuss the impact that deepfakes will have on our society, we share some fun feedback on the Lightning Rod story edit, Dave's story talks about how some of the most successful and lucrative online scams employ a “low-and-slow” approach, Joe's story is about 2 Arkansas farmer that scammed investors out of money for wind turbines, but used it for houses, cars and Disney World, and our Catch of the Day is from an unnamed listener with a supposed iPhone invoice.
Links to stories:

Gift Card Gang Extracts Cash From 100k Inboxes Daily

Arkansas wind farmers claimed their technology was more efficient than turbines — then spent investors’ money on houses, cars and at Disney World


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 25 Aug 2022 05:00:00 -0000</pubDate>
      <itunes:title>Encore: Sometimes, deepfake victims don't want to be convinced it is fake. </itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>165</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Guest Etay Maor of Cato Networks joins Dave Bittner to discuss the impact that deepfakes will have on our society, we share some fun feedback on the Lightning Rod story edit, Dave's story talks about how some of the most successful and lucrative online scams employ a “low-and-slow” approach, Joe's story is about 2 Arkansas farmer that scammed investors out of money for wind turbines, but used it for houses, cars and Disney World, and our Catch of the Day is from an unnamed listener with a supposed iPhone invoice.
Links to stories:

Gift Card Gang Extracts Cash From 100k Inboxes Daily

Arkansas wind farmers claimed their technology was more efficient than turbines — then spent investors’ money on houses, cars and at Disney World


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Guest Etay Maor of Cato Networks joins Dave Bittner to discuss the impact that deepfakes will have on our society, we share some fun feedback on the Lightning Rod story edit, Dave's story talks about how some of the most successful and lucrative online scams employ a “low-and-slow” approach, Joe's story is about 2 Arkansas farmer that scammed investors out of money for wind turbines, but used it for houses, cars and Disney World, and our Catch of the Day is from an unnamed listener with a supposed iPhone invoice.</p><p>Links to stories:</p><ul>
<li><a href="https://krebsonsecurity.com/2021/09/gift-card-gang-extracts-cash-from-100k-inboxes-daily/">Gift Card Gang Extracts Cash From 100k Inboxes Daily</a></li>
<li><a href="https://www.marketwatch.com/story/arkansas-wind-farmers-claimed-their-technology-was-more-efficient-than-turbines-but-they-spent-investors-money-on-houses-cars-and-at-disney-world-11631050243">Arkansas wind farmers claimed their technology was more efficient than turbines — then spent investors’ money on houses, cars and at Disney World</a></li>
</ul><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>2648</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[38cb3e36-b9da-11ec-b50d-bbfc31c96fb7]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW1732786807.mp3?updated=1661200092" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Anti-cheat software (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/111/notes</link>
      <description>Software designed to prevent cheating in video games. 
CyberWire Glossary link: https://thecyberwire.com/glossary/anti-cheat-software
Audio reference link: “The BIG Problem with Anti-Cheat,” by Techquickie, YouTube, 5 June 2020</description>
      <pubDate>Tue, 23 Aug 2022 07:00:00 -0000</pubDate>
      <itunes:title>Anti-cheat software (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>111</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Software designed to prevent cheating in video games. 
CyberWire Glossary link: https://thecyberwire.com/glossary/anti-cheat-software
Audio reference link: “The BIG Problem with Anti-Cheat,” by Techquickie, YouTube, 5 June 2020</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Software designed to prevent cheating in video games. </p><p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/anti-cheat-software">https://thecyberwire.com/glossary/anti-cheat-software</a></p><p>Audio reference link: “<a href="https://www.youtube.com/watch?v=aaL7owZmbEA">The BIG Problem with Anti-Cheat</a>,” by Techquickie, YouTube, 5 June 2020</p>]]>
      </content:encoded>
      <itunes:duration>490</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[22a6b164-173e-11ed-85fc-a750be022bd5]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW7177333097.mp3?updated=1659979482" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Scams in the media. </title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/209/notes</link>
      <description>Mallory Sofastaii from Baltimore's WMAR 2 News sits down with Joe to talk about some recent stories on scams she's covered on Matter for Mallory. Dave and Joe share some listener follow up from Robert who writes in about the technical means to protect phones from robocalls. He shares some insight on how carriers up in the north are able to protect phones. Dave shares a twitter thread from Brian Jay Jones, who is an author of biographies of Jim Henson, George Lucas and Dr. Seuss, who shares how he would have almost had his Twitter account hijacked if it weren't for 2-step verification. Joe's story is on a gentleman pleading guilty in PAC scams, raising almost 3.5 million by making false and misleading representations in the 2016 election. This week we have a string of catch of the days from different listeners sharing different SMS scams.
Links to stories:

Associate of scam PAC operator pleads guilty

Twitter thread of Brian Jay Jones


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter</description>
      <pubDate>Thu, 18 Aug 2022 05:00:00 -0000</pubDate>
      <itunes:title>Scams in the media. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>209</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Mallory Sofastaii from Baltimore's WMAR 2 News sits down with Joe to talk about some recent stories on scams she's covered on Matter for Mallory. Dave and Joe share some listener follow up from Robert who writes in about the technical means to protect phones from robocalls. He shares some insight on how carriers up in the north are able to protect phones. Dave shares a twitter thread from Brian Jay Jones, who is an author of biographies of Jim Henson, George Lucas and Dr. Seuss, who shares how he would have almost had his Twitter account hijacked if it weren't for 2-step verification. Joe's story is on a gentleman pleading guilty in PAC scams, raising almost 3.5 million by making false and misleading representations in the 2016 election. This week we have a string of catch of the days from different listeners sharing different SMS scams.
Links to stories:

Associate of scam PAC operator pleads guilty

Twitter thread of Brian Jay Jones


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Mallory Sofastaii from Baltimore's WMAR 2 News sits down with Joe to talk about some recent stories on scams she's covered on Matter for Mallory. Dave and Joe share some listener follow up from Robert who writes in about the technical means to protect phones from robocalls. He shares some insight on how carriers up in the north are able to protect phones. Dave shares a twitter thread from Brian Jay Jones, who is an author of biographies of Jim Henson, George Lucas and Dr. Seuss, who shares how he would have almost had his Twitter account hijacked if it weren't for 2-step verification. Joe's story is on a gentleman pleading guilty in PAC scams, raising almost 3.5 million by making false and misleading representations in the 2016 election. This week we have a string of catch of the days from different listeners sharing different SMS scams.</p><p>Links to stories:</p><ul>
<li><a href="https://www.politico.com/newsletters/politico-influence/2022/08/09/associate-of-scam-pac-operator-pleads-guilty-00050697">Associate of scam PAC operator pleads guilty</a></li>
<li><a href="https://twitter.com/brianjayjones/status/1557745807469776896">Twitter thread of Brian Jay Jones</a></li>
</ul><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a></p>]]>
      </content:encoded>
      <itunes:duration>3091</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[38bc9fde-b9da-11ec-b50d-734ba1d02b9a]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW8121549533.mp3?updated=1660748328" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Pseudoransomware (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/110/notes</link>
      <description>Malware, in the guise of ransomware, that destroys data rather than encrypts.
CyberWire Glossary link: https://thecyberwire.com/glossary/pseudoransomware
Audio reference link: “Some Men Just Want to Watch the World Burn | the Dark Knight,” by YouTube, 2 November 2019.</description>
      <pubDate>Tue, 16 Aug 2022 07:00:00 -0000</pubDate>
      <itunes:title>Pseudoransomware (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>110</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Malware, in the guise of ransomware, that destroys data rather than encrypts.
CyberWire Glossary link: https://thecyberwire.com/glossary/pseudoransomware
Audio reference link: “Some Men Just Want to Watch the World Burn | the Dark Knight,” by YouTube, 2 November 2019.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Malware, in the guise of ransomware, that destroys data rather than encrypts.</p><p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/pseudoransomware">https://thecyberwire.com/glossary/pseudoransomware</a></p><p>Audio reference link: “<a href="https://www.youtube.com/watch?v=oCIsI7EUYL8">Some Men Just Want to Watch the World Burn | the Dark Knight</a>,” by YouTube, 2 November 2019.</p>]]>
      </content:encoded>
      <itunes:duration>447</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[d3d30a42-11b1-11ed-93d7-ef7f8947fe6a]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW6349742421.mp3?updated=1659368960" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Staying away from Medicare scams.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/208/notes</link>
      <description>Ari Parker, Lead Advisor from Chapter, discussing "Tips for Avoiding Medicare Scams." Joe and Dave share some follow up from several listeners, who write in about various scams they have encountered. Joe's story is on Facebook messenger and how more and more victims are being claimed to scams and cons through the popular social media app. Dave's story shares disturbing information regarding LinkedIn scams, explaining how North Koreans are stealing resumes off the job site in a new crypto job search scam. Our catch of the day comes from listener Jon who writes in about him receiving $10,500,000.00 and how he needs to claim this offer before the end of 2021. Sadly he missed the deadline and wanted to share.
Links to stories:

Understand and Avoid Medicare Scams

Facebook Messenger scam snags 10 million victims, more conned every day

North Koreans Steal LinkedIn Resumes in Crypto Job Search Scam


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter</description>
      <pubDate>Thu, 11 Aug 2022 05:00:00 -0000</pubDate>
      <itunes:title>Staying away from Medicare scams.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>208</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Ari Parker, Lead Advisor from Chapter, discussing "Tips for Avoiding Medicare Scams." Joe and Dave share some follow up from several listeners, who write in about various scams they have encountered. Joe's story is on Facebook messenger and how more and more victims are being claimed to scams and cons through the popular social media app. Dave's story shares disturbing information regarding LinkedIn scams, explaining how North Koreans are stealing resumes off the job site in a new crypto job search scam. Our catch of the day comes from listener Jon who writes in about him receiving $10,500,000.00 and how he needs to claim this offer before the end of 2021. Sadly he missed the deadline and wanted to share.
Links to stories:

Understand and Avoid Medicare Scams

Facebook Messenger scam snags 10 million victims, more conned every day

North Koreans Steal LinkedIn Resumes in Crypto Job Search Scam


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Ari Parker, Lead Advisor from Chapter, discussing "Tips for Avoiding Medicare Scams." Joe and Dave share some follow up from several listeners, who write in about various scams they have encountered. Joe's story is on Facebook messenger and how more and more victims are being claimed to scams and cons through the popular social media app. Dave's story shares disturbing information regarding LinkedIn scams, explaining how North Koreans are stealing resumes off the job site in a new crypto job search scam. Our catch of the day comes from listener Jon who writes in about him receiving $10,500,000.00 and how he needs to claim this offer before the end of 2021. Sadly he missed the deadline and wanted to share.</p><p>Links to stories:</p><ul>
<li><a href="https://askchapter.org/magazine/senior-health-wellness/medicare-resources/elder-abuse-awareness-day-understand-and-avoid-medicare-scams">Understand and Avoid Medicare Scams</a></li>
<li><a href="https://www.wcpo.com/money/consumer/dont-waste-your-money/facebook-messenger-scam-snags-10-million-victims-more-conned-every-day">Facebook Messenger scam snags 10 million victims, more conned every day</a></li>
<li><a href="https://www.bloomberg.com/news/articles/2022-08-01/north-koreans-suspected-of-using-fake-resumes-to-steal-crypto?srnd=premium">North Koreans Steal LinkedIn Resumes in Crypto Job Search Scam</a></li>
</ul><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a></p>]]>
      </content:encoded>
      <itunes:duration>2556</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[38ae717a-b9da-11ec-b50d-77950eeafc4d]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW5642474588.mp3?updated=1660230151" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Trusted Platform Module (TPM) (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/109/notes</link>
      <description>A browser configuration control that prevents accessing resources within a private network.
CyberWire Glossary link:
Audio reference link: “TPM (Trusted Platform Module) - Computerphile,” Computerphile, 23 July 2021</description>
      <pubDate>Tue, 09 Aug 2022 05:00:00 -0000</pubDate>
      <itunes:title>Trusted Platform Module (TPM) (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>109</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A browser configuration control that prevents accessing resources within a private network.
CyberWire Glossary link:
Audio reference link: “TPM (Trusted Platform Module) - Computerphile,” Computerphile, 23 July 2021</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A browser configuration control that prevents accessing resources within a private network.</p><p>CyberWire Glossary link:</p><p>Audio reference link: “<a href="https://youtu.be/RW2zHvVO09g">TPM (Trusted Platform Module) - Computerphile</a>,” Computerphile, 23 July 2021</p>]]>
      </content:encoded>
      <itunes:duration>398</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[7903918c-09ea-11ed-ae14-1ffc24a6ff2b]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW4061621817.mp3?updated=1658762683" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Making the world a safer online place. </title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/207/notes</link>
      <description>Raj Sarkar, CMO from 1Password and Julien Benichou, Senior Director of Partnership, Strategy, and Execution from Gen.G, join Dave to discuss making the online world a safer place and talk about helping reduce the risk of gamers being the target of hackers. Joe and Dave share some followup from listener Ryan who writes in about the catch of the day from last week's episode, and what struck him most with the scam. Dave's story is on how the government was able to seize millions in stolen cryptocurrency. Joe's story is on a scam involving diamonds and how one scammer was caught, now sentenced to 12 years in prison. Our catch of the day comes from listener Jeremy who writes in about a suspicious email he received from one of his mothers friends. She wrote him asking if he could buy her gift cards and she would pay him back. He shares how he dealt with the scammer and informed his mom, one of her friends emails may have been compromised.
Links to stories:

How governments seize millions in stolen cryptocurrency

Jeweler who sold Trump-Maples ring sentenced to 12 years in multimillion-dollar ‘Yellow Rose’ diamond scam


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter</description>
      <pubDate>Thu, 04 Aug 2022 05:00:00 -0000</pubDate>
      <itunes:title>Making the world a safer online place. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>207</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Raj Sarkar, CMO from 1Password and Julien Benichou, Senior Director of Partnership, Strategy, and Execution from Gen.G, join Dave to discuss making the online world a safer place and talk about helping reduce the risk of gamers being the target of hackers. Joe and Dave share some followup from listener Ryan who writes in about the catch of the day from last week's episode, and what struck him most with the scam. Dave's story is on how the government was able to seize millions in stolen cryptocurrency. Joe's story is on a scam involving diamonds and how one scammer was caught, now sentenced to 12 years in prison. Our catch of the day comes from listener Jeremy who writes in about a suspicious email he received from one of his mothers friends. She wrote him asking if he could buy her gift cards and she would pay him back. He shares how he dealt with the scammer and informed his mom, one of her friends emails may have been compromised.
Links to stories:

How governments seize millions in stolen cryptocurrency

Jeweler who sold Trump-Maples ring sentenced to 12 years in multimillion-dollar ‘Yellow Rose’ diamond scam


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Raj Sarkar, CMO from 1Password and Julien Benichou, Senior Director of Partnership, Strategy, and Execution from Gen.G, join Dave to discuss making the online world a safer place and talk about helping reduce the risk of gamers being the target of hackers. Joe and Dave share some followup from listener Ryan who writes in about the catch of the day from last week's episode, and what struck him most with the scam. Dave's story is on how the government was able to seize millions in stolen cryptocurrency. Joe's story is on a scam involving diamonds and how one scammer was caught, now sentenced to 12 years in prison. Our catch of the day comes from listener Jeremy who writes in about a suspicious email he received from one of his mothers friends. She wrote him asking if he could buy her gift cards and she would pay him back. He shares how he dealt with the scammer and informed his mom, one of her friends emails may have been compromised.</p><p>Links to stories:</p><ul>
<li><a href="https://www.technologyreview.com/2022/07/26/1056447/how-governments-seize-millions-in-cryptocurrency/">How governments seize millions in stolen cryptocurrency</a></li>
<li><a href="https://www.marketwatch.com/story/jeweler-who-sold-trump-maples-ring-sentenced-to-12-years-in-multi-million-yellow-rose-diamond-scam-11659068024">Jeweler who sold Trump-Maples ring sentenced to 12 years in multimillion-dollar ‘Yellow Rose’ diamond scam</a></li>
</ul><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a></p>]]>
      </content:encoded>
      <itunes:duration>2955</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[38a010f8-b9da-11ec-b50d-cf22dd595972]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW1937805399.mp3?updated=1659460339" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Private Network Access (PNA) (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/108/notes</link>
      <description>A browser configuration control that prevents accessing resources within a private network.
CyberWire Glossary link:
Audio reference link: “Chrome Limits Access to Private Networks,” by Daniel Lowrie, ITProTV, YouTube, 19 January 2022.</description>
      <pubDate>Tue, 02 Aug 2022 07:00:00 -0000</pubDate>
      <itunes:title>Private Network Access (PNA) (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>108</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A browser configuration control that prevents accessing resources within a private network.
CyberWire Glossary link:
Audio reference link: “Chrome Limits Access to Private Networks,” by Daniel Lowrie, ITProTV, YouTube, 19 January 2022.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A browser configuration control that prevents accessing resources within a private network.</p><p>CyberWire Glossary link:</p><p>Audio reference link: “<a href="https://www.youtube.com/watch?v=GACsiZWyMbs">Chrome Limits Access to Private Networks</a>,” by Daniel Lowrie, ITProTV, YouTube, 19 January 2022.</p>]]>
      </content:encoded>
      <itunes:duration>336</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[d697810e-0455-11ed-83ec-17c3c1733769]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW2548051298.mp3?updated=1658239304" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>A return to office means a return to email scams.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/206/notes</link>
      <description>Romain Basset, Director of Customer Service, at Vade joins Dave to discuss the threat of initial contact spearphishing emails now that many employees are returning to the office. Dave and Joe share some listener follow up from listener Will who writes in about a troubling debate over if it should be "Joe and Dave" or "Dave and Joe." Will shares a website about ablaut reduplication, sharing his thoughts on the matter. Joe shares some good news following a story of a homeless man being robbed of $400,000 after a GoFundMe scam. Joe's story is on a woman who loses almost $150,000 over the phone with someone claiming to be a DEA agent. Dave's story is on a woman who gets scam calls up to 20 times a day. She was diagnosed with cancer in 2021, and can't afford to miss any calls from potential doctors or possible nurses trying to schedule appointments. Our catch of the day comes from listener Alex who writes in sharing how his Apple ID was hacked and locked, although the scammers got one crucial detail wrong, his email.
Links to stories:

Lincoln woman loses $149,000 in DEA phone scam

GoFundMe scam: Kate McClure sentenced to 1 year in federal prison

The nonstop scam economy is costing us more than just money


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter</description>
      <pubDate>Thu, 28 Jul 2022 05:00:00 -0000</pubDate>
      <itunes:title>A return to office means a return to email scams.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>206</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Romain Basset, Director of Customer Service, at Vade joins Dave to discuss the threat of initial contact spearphishing emails now that many employees are returning to the office. Dave and Joe share some listener follow up from listener Will who writes in about a troubling debate over if it should be "Joe and Dave" or "Dave and Joe." Will shares a website about ablaut reduplication, sharing his thoughts on the matter. Joe shares some good news following a story of a homeless man being robbed of $400,000 after a GoFundMe scam. Joe's story is on a woman who loses almost $150,000 over the phone with someone claiming to be a DEA agent. Dave's story is on a woman who gets scam calls up to 20 times a day. She was diagnosed with cancer in 2021, and can't afford to miss any calls from potential doctors or possible nurses trying to schedule appointments. Our catch of the day comes from listener Alex who writes in sharing how his Apple ID was hacked and locked, although the scammers got one crucial detail wrong, his email.
Links to stories:

Lincoln woman loses $149,000 in DEA phone scam

GoFundMe scam: Kate McClure sentenced to 1 year in federal prison

The nonstop scam economy is costing us more than just money


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Romain Basset, Director of Customer Service, at Vade joins Dave to discuss the threat of initial contact spearphishing emails now that many employees are returning to the office. Dave and Joe share some listener follow up from listener Will who writes in about a troubling debate over if it should be "Joe and Dave" or "Dave and Joe." Will shares a website about ablaut reduplication, sharing his thoughts on the matter. Joe shares some good news following a story of a homeless man being robbed of $400,000 after a GoFundMe scam. Joe's story is on a woman who loses almost $150,000 over the phone with someone claiming to be a DEA agent. Dave's story is on a woman who gets scam calls up to 20 times a day. She was diagnosed with cancer in 2021, and can't afford to miss any calls from potential doctors or possible nurses trying to schedule appointments. Our catch of the day comes from listener Alex who writes in sharing how his Apple ID was hacked and locked, although the scammers got one crucial detail wrong, his email.</p><p>Links to stories:</p><ul>
<li><a href="https://www.1011now.com/2022/07/21/lincoln-woman-loses-149000-dea-phone-scam/">Lincoln woman loses $149,000 in DEA phone scam</a></li>
<li><a href="https://6abc.com/gofundme-scam-kate-mcclure-in-court-sentenced-mark-damico/12065807/">GoFundMe scam: Kate McClure sentenced to 1 year in federal prison</a></li>
<li><a href="https://www.washingtonpost.com/technology/2022/07/13/scam-fraud-fatigue/">The nonstop scam economy is costing us more than just money</a></li>
</ul><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a></p>]]>
      </content:encoded>
      <itunes:duration>2872</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[3891b526-b9da-11ec-b50d-ab6628bdbf46]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW9273643443.mp3?updated=1658859155" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Extortion scams and the LGBTQ+ community.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/205/notes</link>
      <description>This week, Carole Theriault sits down to talk with Paul Ducklin from Sophos on extortion scams targeting LGBTQ+ communities. Joe and Dave share multiple pieces of listener follow up, the first from Matt and Kevin, who write in to share a Wikipedia link regarding N.B. (Nota Bene, or note well) and an ad from 1801. The second one is a write in from someone who is referred to as "P," who shares more information on the Facebook link shortener discussion. Finally, Joe and Dave get a great piece of listener feedback from listener and friend of the show Jonathan, who writes in about resist fingerprinting and how Firefox doesn't block fingerprinting. Dave's story is on trafficking victims being forced to scam people. Joe's story is on a credit union being targeted for phone scams. Our catch of the day comes from listener Ian, who shares how his son was trying to get college housing accommodations and went through Facebook, only to find out that not everyone is as trustworthy as they seem.
Links to stories:

From Industrial-Scale Scam Centers, Trafficking Victims Are Being Forced to Steal Billions

Don’t fall for a scam targeting Ent Credit Union customers


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter</description>
      <pubDate>Thu, 21 Jul 2022 05:00:00 -0000</pubDate>
      <itunes:title>Extortion scams and the LGBTQ+ community.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>205</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>This week, Carole Theriault sits down to talk with Paul Ducklin from Sophos on extortion scams targeting LGBTQ+ communities. Joe and Dave share multiple pieces of listener follow up, the first from Matt and Kevin, who write in to share a Wikipedia link regarding N.B. (Nota Bene, or note well) and an ad from 1801. The second one is a write in from someone who is referred to as "P," who shares more information on the Facebook link shortener discussion. Finally, Joe and Dave get a great piece of listener feedback from listener and friend of the show Jonathan, who writes in about resist fingerprinting and how Firefox doesn't block fingerprinting. Dave's story is on trafficking victims being forced to scam people. Joe's story is on a credit union being targeted for phone scams. Our catch of the day comes from listener Ian, who shares how his son was trying to get college housing accommodations and went through Facebook, only to find out that not everyone is as trustworthy as they seem.
Links to stories:

From Industrial-Scale Scam Centers, Trafficking Victims Are Being Forced to Steal Billions

Don’t fall for a scam targeting Ent Credit Union customers


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This week, Carole Theriault sits down to talk with Paul Ducklin from Sophos on extortion scams targeting LGBTQ+ communities. Joe and Dave share multiple pieces of listener follow up, the first from Matt and Kevin, who write in to share a Wikipedia link regarding N.B. (Nota Bene, or note well) and an ad from 1801. The second one is a write in from someone who is referred to as "P," who shares more information on the Facebook link shortener discussion. Finally, Joe and Dave get a great piece of listener feedback from listener and friend of the show Jonathan, who writes in about resist fingerprinting and how Firefox doesn't block fingerprinting. Dave's story is on trafficking victims being forced to scam people. Joe's story is on a credit union being targeted for phone scams. Our catch of the day comes from listener Ian, who shares how his son was trying to get college housing accommodations and went through Facebook, only to find out that not everyone is as trustworthy as they seem.</p><p>Links to stories:</p><ul>
<li><a href="https://www.vice.com/en/article/n7zb5d/pig-butchering-scam-cambodia-trafficking">From Industrial-Scale Scam Centers, Trafficking Victims Are Being Forced to Steal Billions</a></li>
<li><a href="https://www.kktv.com/2022/07/15/dont-fall-scam-targeting-ent-credit-union-customers/">Don’t fall for a scam targeting Ent Credit Union customers</a></li>
</ul><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a></p>]]>
      </content:encoded>
      <itunes:duration>2896</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[388329fc-b9da-11ec-b50d-aff8a342fefb]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW6684206495.mp3?updated=1658243785" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Web 3.0 (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/107/notes</link>
      <description>The potential next evolution of the worldwide web that decentralizes interaction between users and content away from the big silicon valley social media platforms like Twitter, Facebook, and YouTube, and towards peer-to-peer interaction using blockchain as the underlying technology. 
CyberWire Glossary link: https://thecyberwire.com/glossary/web-30
Audio reference link: “What Elon Musk Just Said about Metaverse, Web3 and Neuralink,” By Clayton Morris, Crypto News Daily, YouTube. 2 December 2021.</description>
      <pubDate>Tue, 19 Jul 2022 07:00:00 -0000</pubDate>
      <itunes:title>Web 3.0 (noun)</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>107</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>The potential next evolution of the worldwide web that decentralizes interaction between users and content away from the big silicon valley social media platforms like Twitter, Facebook, and YouTube, and towards peer-to-peer interaction using blockchain as the underlying technology. 
CyberWire Glossary link: https://thecyberwire.com/glossary/web-30
Audio reference link: “What Elon Musk Just Said about Metaverse, Web3 and Neuralink,” By Clayton Morris, Crypto News Daily, YouTube. 2 December 2021.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The potential next evolution of the worldwide web that decentralizes interaction between users and content away from the big silicon valley social media platforms like Twitter, Facebook, and YouTube, and towards peer-to-peer interaction using blockchain as the underlying technology. </p><p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/web-30">https://thecyberwire.com/glossary/web-30</a></p><p>Audio reference link: “<a href="https://www.youtube.com/watch?v=ESjUgb_ZakA">What Elon Musk Just Said about Metaverse, Web3 and Neuralink</a>,” By Clayton Morris, Crypto News Daily, YouTube. 2 December 2021.</p>]]>
      </content:encoded>
      <itunes:duration>420</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[60a0ea6c-015d-11ed-b66e-3be002ffa68a]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW1703777904.mp3?updated=1657563939" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Behavioral science in the world of InfoSec.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/204/notes</link>
      <description>Kelly Shortridge, a Senior Principal from Fastly, joins Dave to discuss her talk at RSAC on why behavioral science and behavioral economics matters for InfoSec. Joe's story shares an old scam with a new twist, it's about packages being delivered to you that you never ordered. Dave's story is on how a large scale phishing campaign compromised one million Facebook credentials. Our catch of the day comes from listener Will who was reached out to by someone claiming to be the "Head IMF/EUROPEAN UNION coordinator," who claimed to want to give Will one million dollars in compensation.
Links to stories:

Package scam delivers unordered items, victims billed hundreds of dollars

One Million Facebook Credentials Compromised in Four Months by Ongoing Phishing Campaign


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter</description>
      <pubDate>Thu, 14 Jul 2022 05:00:00 -0000</pubDate>
      <itunes:title>Behavioral science in the world of InfoSec.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>204</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Kelly Shortridge, a Senior Principal from Fastly, joins Dave to discuss her talk at RSAC on why behavioral science and behavioral economics matters for InfoSec. Joe's story shares an old scam with a new twist, it's about packages being delivered to you that you never ordered. Dave's story is on how a large scale phishing campaign compromised one million Facebook credentials. Our catch of the day comes from listener Will who was reached out to by someone claiming to be the "Head IMF/EUROPEAN UNION coordinator," who claimed to want to give Will one million dollars in compensation.
Links to stories:

Package scam delivers unordered items, victims billed hundreds of dollars

One Million Facebook Credentials Compromised in Four Months by Ongoing Phishing Campaign


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Kelly Shortridge, a Senior Principal from Fastly, joins Dave to discuss her talk at RSAC on why behavioral science and behavioral economics matters for InfoSec. Joe's story shares an old scam with a new twist, it's about packages being delivered to you that you never ordered. Dave's story is on how a large scale phishing campaign compromised one million Facebook credentials. Our catch of the day comes from listener Will who was reached out to by someone claiming to be the "Head IMF/EUROPEAN UNION coordinator," who claimed to want to give Will one million dollars in compensation.</p><p>Links to stories:</p><ul>
<li><a href="https://wsbt.com/news/local/package-scam-delivers-unordered-items-victims-billed-hundreds-of-dollars">Package scam delivers unordered items, victims billed hundreds of dollars</a></li>
<li><a href="https://www.cpomagazine.com/cyber-security/one-million-facebook-credentials-compromised-in-four-months-by-ongoing-phishing-campaign/">One Million Facebook Credentials Compromised in Four Months by Ongoing Phishing Campaign</a></li>
</ul><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a></p>]]>
      </content:encoded>
      <itunes:duration>2887</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[3874f080-b9da-11ec-b50d-73146d2dc355]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW4197723060.mp3?updated=1657648533" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Identity access management (IAM) (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/106/notes</link>
      <description>A set of solutions for ensuring that the right users can only access the appropriate resources.
CyberWire Glossary link: https://thecyberwire.com/glossary/identity-and-access-management
Audio reference link: “The Wrath of Khan (1982) ‘Kirk’s Response,’” by Russell, YouTube, 16 May 2017.</description>
      <pubDate>Tue, 12 Jul 2022 07:00:00 -0000</pubDate>
      <itunes:title>Identity access management (IAM) (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>106</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A set of solutions for ensuring that the right users can only access the appropriate resources.
CyberWire Glossary link: https://thecyberwire.com/glossary/identity-and-access-management
Audio reference link: “The Wrath of Khan (1982) ‘Kirk’s Response,’” by Russell, YouTube, 16 May 2017.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A set of solutions for ensuring that the right users can only access the appropriate resources.</p><p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/identity-and-access-management">https://thecyberwire.com/glossary/identity-and-access-management</a></p><p>Audio reference link: “<a href="https://www.youtube.com/watch?v=gl_y5wTeJtk">The Wrath of Khan (1982) ‘Kirk’s Response</a>,’” by Russell, YouTube, 16 May 2017.</p>]]>
      </content:encoded>
      <itunes:duration>715</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[81cb49b6-f632-11ec-a573-c3787a985b0c]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW7595770188.mp3?updated=1656342413" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Human errors and why they're made. </title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/203/notes</link>
      <description>Josh Yavor, CISO at Tessian, joins Dave to discuss a new report they released on cyber mistakes and why employees make them. Joe and Dave share a listener follow-up from Jon, who writes in about mental illness, a serious epidemic taking over the nation. Jon shares interesting tidbits on social media linking to mental illness and the impact it's creating. Dave's story is on hackers trying an old trick with new mechanics: impersonating well known companies. This time, hackers are posing as Quickbooks. Joe's story describes how LinkedIn users are being targeted yet again. These fraudsters are now creating significant threats to users, according to the FBI. Finally, our catch of the day comes from listener Jennifer, who writes in and shares her story of a scammer using SMS to tell her that her Venmo account was hacked, even though she does not have one.
Links to stories:

Sending Phishing Emails from QuickBooks

FBI says fraud on LinkedIn a ‘significant threat’ to platform and consumers


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter</description>
      <pubDate>Thu, 07 Jul 2022 05:00:00 -0000</pubDate>
      <itunes:title>Human errors and why they're made. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>203</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Josh Yavor, CISO at Tessian, joins Dave to discuss a new report they released on cyber mistakes and why employees make them. Joe and Dave share a listener follow-up from Jon, who writes in about mental illness, a serious epidemic taking over the nation. Jon shares interesting tidbits on social media linking to mental illness and the impact it's creating. Dave's story is on hackers trying an old trick with new mechanics: impersonating well known companies. This time, hackers are posing as Quickbooks. Joe's story describes how LinkedIn users are being targeted yet again. These fraudsters are now creating significant threats to users, according to the FBI. Finally, our catch of the day comes from listener Jennifer, who writes in and shares her story of a scammer using SMS to tell her that her Venmo account was hacked, even though she does not have one.
Links to stories:

Sending Phishing Emails from QuickBooks

FBI says fraud on LinkedIn a ‘significant threat’ to platform and consumers


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Josh Yavor, CISO at Tessian, joins Dave to discuss a new report they released on cyber mistakes and why employees make them. Joe and Dave share a listener follow-up from Jon, who writes in about mental illness, a serious epidemic taking over the nation. Jon shares interesting tidbits on social media linking to mental illness and the impact it's creating. Dave's story is on hackers trying an old trick with new mechanics: impersonating well known companies. This time, hackers are posing as Quickbooks. Joe's story describes how LinkedIn users are being targeted yet again. These fraudsters are now creating significant threats to users, according to the FBI. Finally, our catch of the day comes from listener Jennifer, who writes in and shares her story of a scammer using SMS to tell her that her Venmo account was hacked, even though she does not have one.</p><p>Links to stories:</p><ul>
<li><a href="https://www.avanan.com/blog/sending-phishing-emails-from-quickbooks">Sending Phishing Emails from QuickBooks</a></li>
<li><a href="https://www.cnbc.com/2022/06/17/fbi-says-fraud-on-linkedin-a-significant-threat-to-platform-and-consumers.html">FBI says fraud on LinkedIn a ‘significant threat’ to platform and consumers</a></li>
</ul><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a></p>]]>
      </content:encoded>
      <itunes:duration>3015</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[3866b2e0-b9da-11ec-b50d-87d96dc5a948]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW9922161094.mp3?updated=1657047853" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Abstraction layer (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/104/notes</link>
      <description>A process of hiding the complexity of a system by providing an interface that eases its manipulation.
CyberWire Glossary link: https://thecyberwire.com/glossary/abstraction-layer
Audio reference link: “What Is Abstraction in Computer Science,” by CodeExpanse, YouTube, 29 October 2018.</description>
      <pubDate>Tue, 05 Jul 2022 07:00:00 -0000</pubDate>
      <itunes:title>Abstraction layer (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>104</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A process of hiding the complexity of a system by providing an interface that eases its manipulation.
CyberWire Glossary link: https://thecyberwire.com/glossary/abstraction-layer
Audio reference link: “What Is Abstraction in Computer Science,” by CodeExpanse, YouTube, 29 October 2018.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A process of hiding the complexity of a system by providing an interface that eases its manipulation.</p><p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/abstraction-layer">https://thecyberwire.com/glossary/abstraction-layer</a></p><p>Audio reference link: “<a href="https://www.youtube.com/watch?v=_y-5nZAbgt4">What Is Abstraction in Computer Science,</a>” by CodeExpanse, YouTube, 29 October 2018.</p>]]>
      </content:encoded>
      <itunes:duration>336</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[ce4bcd20-eb23-11ec-97f9-dbbbc3f9f583]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW5955595770.mp3?updated=1655131736" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The top 10 brand names most likely used in a phishing scheme.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/202/notes</link>
      <description>Omer Dembinsky, a Data Research Manager from Check Point Research, joins Dave to discuss their Brand Phishing Report for Q1 2022 and how DHL, Maersk, and AliExpress were all in the top 10 list. Joe and Dave have some listener follow up from the 200th episode discussing how many redirects are too many. Joe has two stories this week, the first on how Instagram (Meta Platforms) was hit with multiple lawsuits from the Beasley Allen Law Firm over exploiting young people for money. The second story is about social media addiction, and how companies are making the platforms deliberately addictive. Dave's story is on your internet fingerprint that you leave behind, and how easy it is for websites to know everything about you and your computer settings. Our catch of the day comes from listener Pablo, who shares about a scammer contacting him through text trying to receive money for coronavirus insurance.
Links to stories:

Meta, Instagram hit with 8 lawsuits for ‘exploiting young people for profit’

Social media apps are 'deliberately' addictive to users

The Fingerprint You Leave


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter</description>
      <pubDate>Thu, 30 Jun 2022 05:00:00 -0000</pubDate>
      <itunes:title>The top 10 brand names most likely used in a phishing scheme.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>202</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Omer Dembinsky, a Data Research Manager from Check Point Research, joins Dave to discuss their Brand Phishing Report for Q1 2022 and how DHL, Maersk, and AliExpress were all in the top 10 list. Joe and Dave have some listener follow up from the 200th episode discussing how many redirects are too many. Joe has two stories this week, the first on how Instagram (Meta Platforms) was hit with multiple lawsuits from the Beasley Allen Law Firm over exploiting young people for money. The second story is about social media addiction, and how companies are making the platforms deliberately addictive. Dave's story is on your internet fingerprint that you leave behind, and how easy it is for websites to know everything about you and your computer settings. Our catch of the day comes from listener Pablo, who shares about a scammer contacting him through text trying to receive money for coronavirus insurance.
Links to stories:

Meta, Instagram hit with 8 lawsuits for ‘exploiting young people for profit’

Social media apps are 'deliberately' addictive to users

The Fingerprint You Leave


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Omer Dembinsky, a Data Research Manager from Check Point Research, joins Dave to discuss their Brand Phishing Report for Q1 2022 and how DHL, Maersk, and AliExpress were all in the top 10 list. Joe and Dave have some listener follow up from the 200th episode discussing how many redirects are too many. Joe has two stories this week, the first on how Instagram (Meta Platforms) was hit with multiple lawsuits from the Beasley Allen Law Firm over exploiting young people for money. The second story is about social media addiction, and how companies are making the platforms deliberately addictive. Dave's story is on your internet fingerprint that you leave behind, and how easy it is for websites to know everything about you and your computer settings. Our catch of the day comes from listener Pablo, who shares about a scammer contacting him through text trying to receive money for coronavirus insurance.</p><p>Links to stories:</p><ul>
<li><a href="https://nypost.com/2022/06/12/meta-instagram-hit-with-8-lawsuits-for-exploiting-young-people-for-profit/">Meta, Instagram hit with 8 lawsuits for ‘exploiting young people for profit’</a></li>
<li><a href="bbc.com/news/technology-44640959">Social media apps are 'deliberately' addictive to users</a></li>
<li><a href="https://eomail3.com/web-version?p=090954bc-f096-11ec-9258-0241b9615763&amp;pt=campaign&amp;t=1655729020&amp;s=44e7b2a2981874f244b63bf4cb45ee69cfd083a9fd2f38606725ea091d6fa68d">The Fingerprint You Leave</a></li>
</ul><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a></p>]]>
      </content:encoded>
      <itunes:duration>2649</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[38587a36-b9da-11ec-b50d-5fb2edb0ea9a]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW1935298182.mp3?updated=1656441033" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Identity Fabric (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/103/notes</link>
      <description>A set of services for managing identity and access management, or IAM across all of an organization's data islands.
CyberWire Glossary link: https://thecyberwire.com/glossary/identity-fabric
Audio reference link: “Leadership Compass Identity Fabrics - Analyst Chat 126,” by KuppingerCole, YouTube, 30 May 2022.</description>
      <pubDate>Tue, 28 Jun 2022 07:00:00 -0000</pubDate>
      <itunes:title>Identity Fabric (noun)  [Word Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>103</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A set of services for managing identity and access management, or IAM across all of an organization's data islands.
CyberWire Glossary link: https://thecyberwire.com/glossary/identity-fabric
Audio reference link: “Leadership Compass Identity Fabrics - Analyst Chat 126,” by KuppingerCole, YouTube, 30 May 2022.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A set of services for managing identity and access management, or IAM across all of an organization's data islands.</p><p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/identity-fabric">https://thecyberwire.com/glossary/identity-fabric</a></p><p>Audio reference link: “<a href="https://www.youtube.com/watch?v=z5t3-HHMp-w">Leadership Compass Identity Fabrics - Analyst Chat 126</a>,” by KuppingerCole, YouTube, 30 May 2022.</p>]]>
      </content:encoded>
      <itunes:duration>405</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[46856a5e-e385-11ec-b357-033c4d1e2f0f]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW1304623968.mp3?updated=1654292307" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>North Korea and a global cyber war.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/201/notes</link>
      <description>Carole Theriault interviews author and journalist Geoff White on his upcoming book, "The Lazarus Heist: From Hollywood to High Finance: Inside North Korea's Global Cyber War." Joe and Dave share some listener follow up from listener John, regarding a T-mobile breach and how he was notified through a third-party monitoring service and not T-Mobile. Joe's story shares how hackers are also keeping an eye on the upcoming holidays and describes how a Father's Day beer contest from Heineken was a scam. Dave's story is on police warning against a rise in voice phishing as they have made 2000 arrests since the crackdown on social engineering and business email scams started. Our catch of the day comes all the way from the Netherlands, listener Joram shares a scam he discovered in his spam folder. The sender notified him that she is frail and will be dying soon, to which her millions of dollars will be lost since she has no next of kin. The sender goes on to tell him that he is receiving this money just out of the goodness of her heart.
Links to stories:

Heineken says Father's Day beer contest is a scam

2,000 arrests in crackdown on social engineering and business email scams


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter</description>
      <pubDate>Thu, 23 Jun 2022 05:00:00 -0000</pubDate>
      <itunes:title>North Korea and a global cyber war.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>201</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Carole Theriault interviews author and journalist Geoff White on his upcoming book, "The Lazarus Heist: From Hollywood to High Finance: Inside North Korea's Global Cyber War." Joe and Dave share some listener follow up from listener John, regarding a T-mobile breach and how he was notified through a third-party monitoring service and not T-Mobile. Joe's story shares how hackers are also keeping an eye on the upcoming holidays and describes how a Father's Day beer contest from Heineken was a scam. Dave's story is on police warning against a rise in voice phishing as they have made 2000 arrests since the crackdown on social engineering and business email scams started. Our catch of the day comes all the way from the Netherlands, listener Joram shares a scam he discovered in his spam folder. The sender notified him that she is frail and will be dying soon, to which her millions of dollars will be lost since she has no next of kin. The sender goes on to tell him that he is receiving this money just out of the goodness of her heart.
Links to stories:

Heineken says Father's Day beer contest is a scam

2,000 arrests in crackdown on social engineering and business email scams


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Carole Theriault interviews author and journalist Geoff White on his upcoming book, "The Lazarus Heist: From Hollywood to High Finance: Inside North Korea's Global Cyber War." Joe and Dave share some listener follow up from listener John, regarding a T-mobile breach and how he was notified through a third-party monitoring service and not T-Mobile. Joe's story shares how hackers are also keeping an eye on the upcoming holidays and describes how a Father's Day beer contest from Heineken was a scam. Dave's story is on police warning against a rise in voice phishing as they have made 2000 arrests since the crackdown on social engineering and business email scams started. Our catch of the day comes all the way from the Netherlands, listener Joram shares a scam he discovered in his spam folder. The sender notified him that she is frail and will be dying soon, to which her millions of dollars will be lost since she has no next of kin. The sender goes on to tell him that he is receiving this money just out of the goodness of her heart.</p><p>Links to stories:</p><ul>
<li><a href="https://www.bbc.com/news/business-61811259">Heineken says Father's Day beer contest is a scam</a></li>
<li><a href="https://www.zdnet.com/article/2000-arrests-in-crackdown-on-social-engineering-and-business-email-scams/">2,000 arrests in crackdown on social engineering and business email scams</a></li>
</ul><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a></p>]]>
      </content:encoded>
      <itunes:duration>2293</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[384a4358-b9da-11ec-b50d-cb2bd37b6aad]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW2616430263.mp3?updated=1655839586" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Intrusion Kill Chain (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/102/notes</link>
      <description>A cybersecurity first principle strategy focused on disrupting known adversary activity at one of several phases of an attack sequence.
CyberWire Glossary link: https://thecyberwire.com/glossary/intrusion-kill-chain
Audio reference link: "Cybersecurity Days: A Network Defender's Future," by Rick Howard, Integrated Cyber Conference, Integrated Adaptive Cyber Defense (IACD), YouTube, 26 October 2018.</description>
      <pubDate>Tue, 21 Jun 2022 07:00:00 -0000</pubDate>
      <itunes:title>Intrusion Kill Chain (noun)  [Word Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>102</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A cybersecurity first principle strategy focused on disrupting known adversary activity at one of several phases of an attack sequence.
CyberWire Glossary link: https://thecyberwire.com/glossary/intrusion-kill-chain
Audio reference link: "Cybersecurity Days: A Network Defender's Future," by Rick Howard, Integrated Cyber Conference, Integrated Adaptive Cyber Defense (IACD), YouTube, 26 October 2018.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A cybersecurity first principle strategy focused on disrupting known adversary activity at one of several phases of an attack sequence.</p><p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/intrusion-kill-chain">https://thecyberwire.com/glossary/intrusion-kill-chain</a></p><p>Audio reference link: "<a href="https://www.youtube.com/watch?v=K9WD1-ftTWo">Cybersecurity Days: A Network Defender's Future</a>," by Rick Howard, Integrated Cyber Conference, Integrated Adaptive Cyber Defense (IACD), YouTube, 26 October 2018.</p>]]>
      </content:encoded>
      <itunes:duration>466</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[cf2000b8-ddd6-11ec-84dd-1b9887ccec94]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW6382878126.mp3?updated=1653669721" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The great resignation and data exposure challenges.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/200/notes</link>
      <description>Abhik Mitra, Head of Portfolio Strategy at Code42, shares the findings on Code 42's 2022 Data Exposure Report (DER). Joe breaks down a story that follows a couple in Westlake, where the woman was called about a supposed warrant out for her arrest, and how she was told that she needs to provide thousands of dollars in order for the police to not come and arrest her. The story describes how her fast-thinking husband was able to figure out the scam and get in touch with real authorities. Dave's story delves into Facebook and a phishing scam that ended in a threat actor stealing 1M credentials in 4 months. Our catch of the day comes from listener William who received an email about a new laptop that he supposedly bought through PayPal. He shares why he knew it was a scheme right away, and hopes to make this information known so others know what to look out for.
Links to stories:

Westlake doctor and lawyer avoid telephone scam; police warn residents to be alert

Phishing tactics: how a threat actor stole 1M credentials in 4 months


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitte</description>
      <pubDate>Thu, 16 Jun 2022 05:00:00 -0000</pubDate>
      <itunes:title>The great resignation and data exposure challenges.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>200</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Abhik Mitra, Head of Portfolio Strategy at Code42, shares the findings on Code 42's 2022 Data Exposure Report (DER). Joe breaks down a story that follows a couple in Westlake, where the woman was called about a supposed warrant out for her arrest, and how she was told that she needs to provide thousands of dollars in order for the police to not come and arrest her. The story describes how her fast-thinking husband was able to figure out the scam and get in touch with real authorities. Dave's story delves into Facebook and a phishing scam that ended in a threat actor stealing 1M credentials in 4 months. Our catch of the day comes from listener William who received an email about a new laptop that he supposedly bought through PayPal. He shares why he knew it was a scheme right away, and hopes to make this information known so others know what to look out for.
Links to stories:

Westlake doctor and lawyer avoid telephone scam; police warn residents to be alert

Phishing tactics: how a threat actor stole 1M credentials in 4 months


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitte</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Abhik Mitra, Head of Portfolio Strategy at Code42, shares the findings on Code 42's 2022 Data Exposure Report (DER). Joe breaks down a story that follows a couple in Westlake, where the woman was called about a supposed warrant out for her arrest, and how she was told that she needs to provide thousands of dollars in order for the police to not come and arrest her. The story describes how her fast-thinking husband was able to figure out the scam and get in touch with real authorities. Dave's story delves into Facebook and a phishing scam that ended in a threat actor stealing 1M credentials in 4 months. Our catch of the day comes from listener William who received an email about a new laptop that he supposedly bought through PayPal. He shares why he knew it was a scheme right away, and hopes to make this information known so others know what to look out for.</p><p>Links to stories:</p><ul>
<li><a href="https://www.cleveland.com/community/2022/06/westlake-doctor-and-lawyer-avoid-telephone-scam.html">Westlake doctor and lawyer avoid telephone scam; police warn residents to be alert</a></li>
<li><a href="https://pixmsecurity.com/blog/blog/phishing-tactics-how-a-threat-actor-stole-1m-credentials-in-4-months/">Phishing tactics: how a threat actor stole 1M credentials in 4 months</a></li>
</ul><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitte</a></p>]]>
      </content:encoded>
      <itunes:duration>3113</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[383c15d0-b9da-11ec-b50d-a7201859fa40]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW1979583978.mp3?updated=1655390483" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Identity Orchestration (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/101/notes</link>
      <description>A subset of security orchestration, the management of identities across an organization's set of digital islands. 
CyberWire Glossary link: https://thecyberwire.com/glossary/identity-orchestration</description>
      <pubDate>Tue, 14 Jun 2022 07:00:00 -0000</pubDate>
      <itunes:title>Identity Orchestration (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>101</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A subset of security orchestration, the management of identities across an organization's set of digital islands. 
CyberWire Glossary link: https://thecyberwire.com/glossary/identity-orchestration</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A subset of security orchestration, the management of identities across an organization's set of digital islands. </p><p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/identity-orchestration">https://thecyberwire.com/glossary/identity-orchestration</a></p>]]>
      </content:encoded>
      <itunes:duration>376</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[793c290a-d86e-11ec-a893-8b443d37295c]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW6638770772.mp3?updated=1653063127" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>What to look out for with scan-and-exploit cyber attacks. </title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/199/notes</link>
      <description>Andrew Morris, founder and CEO of GreyNoise Intelligence, joins Dave to discuss the explosive increase in opportunistic scan-and-exploit cyber attacks, and what security analysts can do to combat it. Joe and Dave share some follow up from listener Mark, whose son got scammed out of 150 million dollars in a game he plays. Dave's story is on ChromeLoader, which is a pervasive and persistent browser hijacker that modifies your settings and redirects you to more advertisement websites. Joe has two stories: one on a family of con artists found to be scamming gas station patrons that attacked an individual after being confronted, and the second is on fake Facebook ads and how shoppers are being scammed. Our catch of the day comes from listener Jon, who was contacted via email being requested to pay customs fees of $750 for packages in his name.
Links to stories:

ChromeLoader: a pushy malvertiser

Michigan State Police Looking For Con Artists in Emmet County Gas Station Scam

Shoppers scammed by fake ads on Facebook Marketplace


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 09 Jun 2022 05:00:00 -0000</pubDate>
      <itunes:title>What to look out for with scan-and-exploit cyber attacks. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>199</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Andrew Morris, founder and CEO of GreyNoise Intelligence, joins Dave to discuss the explosive increase in opportunistic scan-and-exploit cyber attacks, and what security analysts can do to combat it. Joe and Dave share some follow up from listener Mark, whose son got scammed out of 150 million dollars in a game he plays. Dave's story is on ChromeLoader, which is a pervasive and persistent browser hijacker that modifies your settings and redirects you to more advertisement websites. Joe has two stories: one on a family of con artists found to be scamming gas station patrons that attacked an individual after being confronted, and the second is on fake Facebook ads and how shoppers are being scammed. Our catch of the day comes from listener Jon, who was contacted via email being requested to pay customs fees of $750 for packages in his name.
Links to stories:

ChromeLoader: a pushy malvertiser

Michigan State Police Looking For Con Artists in Emmet County Gas Station Scam

Shoppers scammed by fake ads on Facebook Marketplace


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Andrew Morris, founder and CEO of GreyNoise Intelligence, joins Dave to discuss the explosive increase in opportunistic scan-and-exploit cyber attacks, and what security analysts can do to combat it. Joe and Dave share some follow up from listener Mark, whose son got scammed out of 150 million dollars in a game he plays. Dave's story is on ChromeLoader, which is a pervasive and persistent browser hijacker that modifies your settings and redirects you to more advertisement websites. Joe has two stories: one on a family of con artists found to be scamming gas station patrons that attacked an individual after being confronted, and the second is on fake Facebook ads and how shoppers are being scammed. Our catch of the day comes from listener Jon, who was contacted via email being requested to pay customs fees of $750 for packages in his name.</p><p>Links to stories:</p><ul>
<li><a href="https://redcanary.com/blog/chromeloader/">ChromeLoader: a pushy malvertiser</a></li>
<li><a href="https://www.thedenverchannel.com/money/consumer/dont-waste-your-money/shoppers-scammed-by-fake-ads-on-facebook-marketplace">Michigan State Police Looking For Con Artists in Emmet County Gas Station Scam</a></li>
<li><a href="https://www.thedenverchannel.com/money/consumer/dont-waste-your-money/shoppers-scammed-by-fake-ads-on-facebook-marketplace">Shoppers scammed by fake ads on Facebook Marketplace</a></li>
</ul><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>2841</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[382d926c-b9da-11ec-b50d-e30daa5743ab]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW6304930253.mp3?updated=1654629358" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Diamond Model (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/100/notes</link>
      <description>A cyber threat intelligence analysis model that defines relationship pairs between four core components in the shape of a diamond of adversary playbook activity across the intrusion kill chain: the adversary, their capability, the infrastructure used or attacked, and the victim.
CyberWire Glossary link: https://thecyberwire.com/glossary/diamond-model 
Audio reference link: “Diamond Presentation v2 0: Diamond Model for Intrusion Analysis – Applied to Star Wars’ Battles,” Andy Pendergrast and Wade Baker, ThreatConnect, YouTube, 4 February 2020.</description>
      <pubDate>Tue, 07 Jun 2022 07:00:00 -0000</pubDate>
      <itunes:title>Diamond Model (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>100</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A cyber threat intelligence analysis model that defines relationship pairs between four core components in the shape of a diamond of adversary playbook activity across the intrusion kill chain: the adversary, their capability, the infrastructure used or attacked, and the victim.
CyberWire Glossary link: https://thecyberwire.com/glossary/diamond-model 
Audio reference link: “Diamond Presentation v2 0: Diamond Model for Intrusion Analysis – Applied to Star Wars’ Battles,” Andy Pendergrast and Wade Baker, ThreatConnect, YouTube, 4 February 2020.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A cyber threat intelligence analysis model that defines relationship pairs between four core components in the shape of a diamond of adversary playbook activity across the intrusion kill chain: the adversary, their capability, the infrastructure used or attacked, and the victim.</p><p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/diamond-model">https://thecyberwire.com/glossary/diamond-model </a></p><p>Audio reference link: “<a href="https://www.youtube.com/watch?v=0QHUS8SNTNc">Diamond Presentation v2 0: Diamond Model for Intrusion Analysis – Applied to Star Wars’ Battles</a>,” Andy Pendergrast and Wade Baker, ThreatConnect, YouTube, 4 February 2020.</p>]]>
      </content:encoded>
      <itunes:duration>467</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[ec56d10c-d520-11ec-a962-afe367bc2cd7]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW2230129534.mp3?updated=1652396062" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Is ransomware getting too fast?</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/198/notes</link>
      <description>Ryan Kovar, distinguished security strategist at Splunk and leader of SURGe, discusses the speed of ransomware, as well as the first-of-its-kind research the SURGe team is releasing on how quickly the top ransomware families can encrypt 100,000 files. Joe and Dave share some listener follow up from listener Josh. Joe's story follows the baby food shortage and warns about the dangers of sellers scamming people through online purchases of formula. Dave's story is on how IT members can identify the three most dangerous types of internal users and what businesses need to look out for. Our catch of the day comes from listener Josh, who shares about a friend of his who possibly got hacked and the check the scammers claimed was real.
Links to stories:

Kansas City-area experts warn of online baby formula scams

The three most dangerous types of internal users to be aware of


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 02 Jun 2022 05:00:00 -0000</pubDate>
      <itunes:title>Is ransomware getting too fast?</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>198</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Ryan Kovar, distinguished security strategist at Splunk and leader of SURGe, discusses the speed of ransomware, as well as the first-of-its-kind research the SURGe team is releasing on how quickly the top ransomware families can encrypt 100,000 files. Joe and Dave share some listener follow up from listener Josh. Joe's story follows the baby food shortage and warns about the dangers of sellers scamming people through online purchases of formula. Dave's story is on how IT members can identify the three most dangerous types of internal users and what businesses need to look out for. Our catch of the day comes from listener Josh, who shares about a friend of his who possibly got hacked and the check the scammers claimed was real.
Links to stories:

Kansas City-area experts warn of online baby formula scams

The three most dangerous types of internal users to be aware of


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Ryan Kovar, distinguished security strategist at Splunk and leader of SURGe, discusses the speed of ransomware, as well as the first-of-its-kind research the SURGe team is releasing on how quickly the top ransomware families can encrypt 100,000 files. Joe and Dave share some listener follow up from listener Josh. Joe's story follows the baby food shortage and warns about the dangers of sellers scamming people through online purchases of formula. Dave's story is on how IT members can identify the three most dangerous types of internal users and what businesses need to look out for. Our catch of the day comes from listener Josh, who shares about a friend of his who possibly got hacked and the check the scammers claimed was real.</p><p>Links to stories:</p><ul>
<li><a href="https://www.kshb.com/news/local-news/kansas-city-area-experts-warn-of-online-baby-formula-scams">Kansas City-area experts warn of online baby formula scams</a></li>
<li><a href="https://www.information-age.com/three-most-dangerous-internal-users-to-be-aware-of-123499357/">The three most dangerous types of internal users to be aware of</a></li>
</ul><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>2930</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[381f89ec-b9da-11ec-b50d-efb47cc4d90a]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW2055849294.mp3?updated=1654278349" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>MITRE ATT&amp;CK (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/99/notes</link>
      <description>A knowledge base of adversary tactics, techniques, and procedures established and maintained by the MITRE Corporation. 
CyberWire Glossary link: https://thecyberwire.com/glossary/mitre-attck
Audio reference link: “Attack Frameworks - SY0-601 CompTIA Security+ : 4.2,” Professor Messer, YouTube, 29 April 2021.</description>
      <pubDate>Tue, 31 May 2022 07:00:00 -0000</pubDate>
      <itunes:title>MITRE ATT&amp;CK (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>99</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A knowledge base of adversary tactics, techniques, and procedures established and maintained by the MITRE Corporation. 
CyberWire Glossary link: https://thecyberwire.com/glossary/mitre-attck
Audio reference link: “Attack Frameworks - SY0-601 CompTIA Security+ : 4.2,” Professor Messer, YouTube, 29 April 2021.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A knowledge base of adversary tactics, techniques, and procedures established and maintained by the MITRE Corporation. </p><p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/mitre-attck">https://thecyberwire.com/glossary/mitre-attck</a></p><p>Audio reference link: “<a href="https://www.youtube.com/watch?v=-eFIVE5j834">Attack Frameworks - SY0-601 CompTIA Security+ : 4.2</a>,” Professor Messer, YouTube, 29 April 2021.</p>]]>
      </content:encoded>
      <itunes:duration>463</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c81d6e54-d520-11ec-b340-0bd3763d18c7]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW8956572177.mp3?updated=1651852197" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Combating social engineering.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/197/notes</link>
      <description>Ann Johnson, Security Executive at Microsoft and host of the afternoon cyber tea podcast, joins Dave to discuss social engineering and ways to help prevent it, as well as the different types of social engineering she's seen from her experience, Dave and Joe share some listener follow up about macros in Office documents, Joe has two stories this week, one is on how Seth Green lost over 300K in NFTs, and the other is on a new scam with Chatbots on phishing emails, Dave's story is on how a California man was arrested for siphoning money, our catch of the day comes from listener Sadik who shares a suspicious looking email telling him, that his Norton service is about to expire.
Links to stories:

Amazing mind reader reveals his 'gift'

Seth Green Loses $200K Bored Ape Yacht Club NFT in Phishing Scam

Phishing Scam Nets $23.5 Million From DoD, California Man Arrested Siphoning Money From Contractor

Phishing websites now use chatbots to steal your credentials


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 26 May 2022 05:00:00 -0000</pubDate>
      <itunes:title>Combating social engineering.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>197</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Ann Johnson, Security Executive at Microsoft and host of the afternoon cyber tea podcast, joins Dave to discuss social engineering and ways to help prevent it, as well as the different types of social engineering she's seen from her experience, Dave and Joe share some listener follow up about macros in Office documents, Joe has two stories this week, one is on how Seth Green lost over 300K in NFTs, and the other is on a new scam with Chatbots on phishing emails, Dave's story is on how a California man was arrested for siphoning money, our catch of the day comes from listener Sadik who shares a suspicious looking email telling him, that his Norton service is about to expire.
Links to stories:

Amazing mind reader reveals his 'gift'

Seth Green Loses $200K Bored Ape Yacht Club NFT in Phishing Scam

Phishing Scam Nets $23.5 Million From DoD, California Man Arrested Siphoning Money From Contractor

Phishing websites now use chatbots to steal your credentials


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Ann Johnson, Security Executive at Microsoft and host of the afternoon cyber tea podcast, joins Dave to discuss social engineering and ways to help prevent it, as well as the different types of social engineering she's seen from her experience, Dave and Joe share some listener follow up about macros in Office documents, Joe has two stories this week, one is on how Seth Green lost over 300K in NFTs, and the other is on a new scam with Chatbots on phishing emails, Dave's story is on how a California man was arrested for siphoning money, our catch of the day comes from listener Sadik who shares a suspicious looking email telling him, that his Norton service is about to expire.</p><p>Links to stories:</p><ul>
<li><a href="https://www.youtube.com/embed/F7pYHN9iC9I?rel=0">Amazing mind reader reveals his 'gift'</a></li>
<li><a href="https://www.cnet.com/personal-finance/seth-green-loses-200k-bored-ape-yacht-club-nft-in-phishing-scam/">Seth Green Loses $200K Bored Ape Yacht Club NFT in Phishing Scam</a></li>
<li><a href="https://www.cpomagazine.com/cyber-security/phishing-scam-nets-23-5-million-from-dod-california-man-arrested-siphoning-money-from-contractors/">Phishing Scam Nets $23.5 Million From DoD, California Man Arrested Siphoning Money From Contractor</a></li>
<li><a href="https://www.bleepingcomputer.com/news/security/phishing-websites-now-use-chatbots-to-steal-your-credentials/">Phishing websites now use chatbots to steal your credentials</a></li>
</ul><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>2864</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[38119bac-b9da-11ec-b50d-f7be62adb6e8]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW8876892861.mp3?updated=1653685884" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>DevOps (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/98/notes</link>
      <description>The set of people, process, technology, and cultural norms that integrates software development and IT operations into a system-of-systems.
CyberWire Glossary link:
Audio reference link: "10+ Deploys Per Day: Dev and Ops Cooperation at Flickr," by John Allspaw and Paul Hammond, Velocity 09, 25 July 2009.</description>
      <pubDate>Tue, 24 May 2022 07:00:00 -0000</pubDate>
      <itunes:title>DevOps (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>98</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>The set of people, process, technology, and cultural norms that integrates software development and IT operations into a system-of-systems.
CyberWire Glossary link:
Audio reference link: "10+ Deploys Per Day: Dev and Ops Cooperation at Flickr," by John Allspaw and Paul Hammond, Velocity 09, 25 July 2009.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The set of people, process, technology, and cultural norms that integrates software development and IT operations into a system-of-systems.</p><p>CyberWire Glossary link:</p><p>Audio reference link: "<a href="https://www.youtube.com/watch?v=LdOe18KhtT4">10+ Deploys Per Day: Dev and Ops Cooperation at Flickr</a>," by John Allspaw and Paul Hammond, Velocity 09, 25 July 2009.</p>]]>
      </content:encoded>
      <itunes:duration>450</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[cb99b2ea-c742-11ec-a8bb-0b92152f1f9c]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW7878363899.mp3?updated=1655143427" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Voice authentication taking hold. </title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/196/notes</link>
      <description>Mark Horne, Chief Marketing Officer at Pindrop, joins Dave to discuss voice authentication, Dave and Joe have some follow up about business phishing (BECs) from listeners Nick and Michael, Joe's story has a romance scam where criminals pretend to be celebrities, and Dave's story is about the increase in phishing downloads due to cyber criminals using SEO to leverage their lures, and we've got 2 catches of the day for you from listener Peter on free Dyson vacuums and one from Joe with a plea from Vladimir Putin asking for money.
Links to stories:

‘Keanu Reeves … I know it’s not you’: Fraudsters pretend to be celebrities in scam attempts

Malware Mayhem: Netskope Research Finds Sharp Increase in Phishing Downloads, as Cybercriminals Leverage SEO to Lure Victims


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 19 May 2022 05:00:00 -0000</pubDate>
      <itunes:title>Voice authentication taking hold. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>196</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Mark Horne, Chief Marketing Officer at Pindrop, joins Dave to discuss voice authentication, Dave and Joe have some follow up about business phishing (BECs) from listeners Nick and Michael, Joe's story has a romance scam where criminals pretend to be celebrities, and Dave's story is about the increase in phishing downloads due to cyber criminals using SEO to leverage their lures, and we've got 2 catches of the day for you from listener Peter on free Dyson vacuums and one from Joe with a plea from Vladimir Putin asking for money.
Links to stories:

‘Keanu Reeves … I know it’s not you’: Fraudsters pretend to be celebrities in scam attempts

Malware Mayhem: Netskope Research Finds Sharp Increase in Phishing Downloads, as Cybercriminals Leverage SEO to Lure Victims


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Mark Horne, Chief Marketing Officer at Pindrop, joins Dave to discuss voice authentication, Dave and Joe have some follow up about business phishing (BECs) from listeners Nick and Michael, Joe's story has a romance scam where criminals pretend to be celebrities, and Dave's story is about the increase in phishing downloads due to cyber criminals using SEO to leverage their lures, and we've got 2 catches of the day for you from listener Peter on free Dyson vacuums and one from Joe with a plea from Vladimir Putin asking for money.</p><p>Links to stories:</p><ul>
<li><a href="https://ktla.com/news/local-news/keanu-reeves-i-know-its-not-you-fraudsters-pretend-to-be-celebrities-in-scam-attempts/">‘Keanu Reeves … I know it’s not you’: Fraudsters pretend to be celebrities in scam attempts</a></li>
<li><a href="https://www.prnewswire.com/news-releases/malware-mayhem-netskope-research-finds-sharp-increase-in-phishing-downloads-as-cybercriminals-leverage-seo-to-lure-victims-301542802.html">Malware Mayhem: Netskope Research Finds Sharp Increase in Phishing Downloads, as Cybercriminals Leverage SEO to Lure Victims</a></li>
</ul><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>2882</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[3803b10e-b9da-11ec-b50d-8317d0c3bda5]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW7034219572.mp3?updated=1652735089" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>MITRE ATT&amp;CK (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/99/notes</link>
      <description>A knowledge base of adversary tactics, techniques, and procedures established and maintained by the MITRE Corporation. 
CyberWire Glossary link: https://thecyberwire.com/glossary/mitre-attck
Audio reference link: “Attack Frameworks - SY0-601 CompTIA Security+ : 4.2,” Professor Messer, YouTube, 29 April 2021.</description>
      <pubDate>Tue, 17 May 2022 07:00:00 -0000</pubDate>
      <itunes:title>MITRE ATT&amp;CK (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>99</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A knowledge base of adversary tactics, techniques, and procedures established and maintained by the MITRE Corporation. 
CyberWire Glossary link: https://thecyberwire.com/glossary/mitre-attck
Audio reference link: “Attack Frameworks - SY0-601 CompTIA Security+ : 4.2,” Professor Messer, YouTube, 29 April 2021.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A knowledge base of adversary tactics, techniques, and procedures established and maintained by the MITRE Corporation. </p><p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/mitre-attck">https://thecyberwire.com/glossary/mitre-attck</a></p><p>Audio reference link: “<a href="https://www.youtube.com/watch?v=-eFIVE5j834">Attack Frameworks - SY0-601 CompTIA Security+ : 4.2</a>,” Professor Messer, YouTube, 29 April 2021.</p>]]>
      </content:encoded>
      <itunes:duration>463</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[d2f39dc0-cfa9-11ec-a14c-2739613a95a2]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW8127367450.mp3?updated=1651852197" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Business phishing: Who's biting the bait?</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/195/notes</link>
      <description>Matthew Connor, Founder of Conscious Security, discusses a study he conducted while working with F-Secure, the study targeted 82,402 individuals with one of four phishing emails, he goes into the findings of the study and certain insight this study has brought, Joe's story is on the popular app Zelle and how users are loosing thousands of dollars due to scams, and Dave's story is on three big tech giants announcing plans to expand support for a common passwordless sign-in standard created by the FIDO Alliance, our catch of the day comes from listener Areus on text messages exchanged between two strangers and where the conversation leads.
Links to stories:

Criminals Are Scamming Zelle Users. Here's How to Keep Your Money Safe

Apple, Google and Microsoft Commit to Expanded Support for FIDO Standard to Accelerate Availability of Passwordless Sign-Ins


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 12 May 2022 05:00:00 -0000</pubDate>
      <itunes:title>Business phishing: Who's biting the bait?</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>195</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Matthew Connor, Founder of Conscious Security, discusses a study he conducted while working with F-Secure, the study targeted 82,402 individuals with one of four phishing emails, he goes into the findings of the study and certain insight this study has brought, Joe's story is on the popular app Zelle and how users are loosing thousands of dollars due to scams, and Dave's story is on three big tech giants announcing plans to expand support for a common passwordless sign-in standard created by the FIDO Alliance, our catch of the day comes from listener Areus on text messages exchanged between two strangers and where the conversation leads.
Links to stories:

Criminals Are Scamming Zelle Users. Here's How to Keep Your Money Safe

Apple, Google and Microsoft Commit to Expanded Support for FIDO Standard to Accelerate Availability of Passwordless Sign-Ins


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Matthew Connor, Founder of Conscious Security, discusses a study he conducted while working with F-Secure, the study targeted 82,402 individuals with one of four phishing emails, he goes into the findings of the study and certain insight this study has brought, Joe's story is on the popular app Zelle and how users are loosing thousands of dollars due to scams, and Dave's story is on three big tech giants announcing plans to expand support for a common passwordless sign-in standard created by the FIDO Alliance, our catch of the day comes from listener Areus on text messages exchanged between two strangers and where the conversation leads.</p><p>Links to stories:</p><ul>
<li><a href="https://www.cnet.com/personal-finance/banking/zelle-scams-how-they-work-and-how-to-keep-your-money-safe/">Criminals Are Scamming Zelle Users. Here's How to Keep Your Money Safe</a></li>
<li><a href="https://fidoalliance.org/apple-google-and-microsoft-commit-to-expanded-support-for-fido-standard-to-accelerate-availability-of-passwordless-sign-ins/">Apple, Google and Microsoft Commit to Expanded Support for FIDO Standard to Accelerate Availability of Passwordless Sign-Ins</a></li>
</ul><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>2864</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[37f581a6-b9da-11ec-b50d-df87d9e70c74]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW9047074178.mp3?updated=1652369697" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Waterfall Software Development Method (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/97/notes</link>
      <description>A software development model that relies on a series of sequential steps that flow into each other, like a series of waterfalls. 
CyberWire Glossary link: https://thecyberwire.com/glossary/waterfall-software-development
Audio reference link: “Creating Video Games - Agile Software Development,” by Sara Verrilli, MIT OpenCourseWare, YouTube, 10 December 2015</description>
      <pubDate>Tue, 10 May 2022 07:00:00 -0000</pubDate>
      <itunes:title>Waterfall Software Development Method (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>97</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A software development model that relies on a series of sequential steps that flow into each other, like a series of waterfalls. 
CyberWire Glossary link: https://thecyberwire.com/glossary/waterfall-software-development
Audio reference link: “Creating Video Games - Agile Software Development,” by Sara Verrilli, MIT OpenCourseWare, YouTube, 10 December 2015</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A software development model that relies on a series of sequential steps that flow into each other, like a series of waterfalls. </p><p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/waterfall-software-development">https://thecyberwire.com/glossary/waterfall-software-development</a></p><p>Audio reference link: “<a href="https://www.youtube.com/watch?v=UxMpn92vGXs">Creating Video Games - Agile Software Development,</a>” by Sara Verrilli, MIT OpenCourseWare, YouTube, 10 December 2015</p>]]>
      </content:encoded>
      <itunes:duration>385</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[33b112e2-c257-11ec-b0f9-23a81b8b7e67]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW6290059309.mp3?updated=1650644264" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Encore: The attackers keep coming every single day.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/160/notes</link>
      <description>Guest Andrew Rubin, CEO and co-founder of Illumio, joins Dave to discuss Zero Trust, Dave and Joe share some follow-up from several listeners including one with a variation on prison pen pals we discussed some time ago and some advice on Dave's Google Authenticator issue he mentioned last week, Dave's story is about non-delivery scams, Joe's got a story on Imperial Kitten doing some catphishing, and our Catch of the Day comes from listener Timothy about with a sextortion campaign.
Links to stories:

5 reasons non-delivery scams work

I Knew You Were Trouble: TA456 Targets Defense Contractor with Alluring Social Media Persona


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 05 May 2022 05:00:00 -0000</pubDate>
      <itunes:title>Encore: The attackers keep coming every single day.</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>160</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Guest Andrew Rubin, CEO and co-founder of Illumio, joins Dave to discuss Zero Trust, Dave and Joe share some follow-up from several listeners including one with a variation on prison pen pals we discussed some time ago and some advice on Dave's Google Authenticator issue he mentioned last week, Dave's story is about non-delivery scams, Joe's got a story on Imperial Kitten doing some catphishing, and our Catch of the Day comes from listener Timothy about with a sextortion campaign.
Links to stories:

5 reasons non-delivery scams work

I Knew You Were Trouble: TA456 Targets Defense Contractor with Alluring Social Media Persona


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Guest Andrew Rubin, CEO and co-founder of Illumio, joins Dave to discuss Zero Trust, Dave and Joe share some follow-up from several listeners including one with a variation on prison pen pals we discussed some time ago and some advice on Dave's Google Authenticator issue he mentioned last week, Dave's story is about non-delivery scams, Joe's got a story on Imperial Kitten doing some catphishing, and our Catch of the Day comes from listener Timothy about with a sextortion campaign.</p><p>Links to stories:</p><ul>
<li><a href="https://www.interpol.int/en/News-and-Events/News/2020/5-reasons-non-delivery-scams-work">5 reasons non-delivery scams work</a></li>
<li><a href="https://www.proofpoint.com/us/blog/threat-insight/i-knew-you-were-trouble-ta456-targets-defense-contractor-alluring-social-media">I Knew You Were Trouble: TA456 Targets Defense Contractor with Alluring Social Media Persona</a></li>
</ul><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>2709</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[37e70518-b9da-11ec-b50d-b70085de9607]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW5390596457.mp3?updated=1651597018" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Agile Software Development Method (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/96/notes</link>
      <description>A software development philosophy that emphasizes incremental delivery, team collaboration, continual planning, and continual learning 
Audio reference link: https://thecyberwire.com/glossary/agile-software-development
"Velocity 09: John Allspaw and Paul Hammond, "10+ Deploys Pe" John Allspaw and Paul Hammond, 2009 Velocity Conference,
YouTube, 25 June 2009. </description>
      <pubDate>Tue, 03 May 2022 07:00:00 -0000</pubDate>
      <itunes:title>Agile Software Development Method (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>96</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A software development philosophy that emphasizes incremental delivery, team collaboration, continual planning, and continual learning 
Audio reference link: https://thecyberwire.com/glossary/agile-software-development
"Velocity 09: John Allspaw and Paul Hammond, "10+ Deploys Pe" John Allspaw and Paul Hammond, 2009 Velocity Conference,
YouTube, 25 June 2009. </itunes:summary>
      <content:encoded>
        <![CDATA[<p>A software development philosophy that emphasizes incremental delivery, team collaboration, continual planning, and continual learning </p><p>Audio reference link: <a href="https://thecyberwire.com/glossary/agile-software-development">https://thecyberwire.com/glossary/agile-software-development</a></p><p>"<a href="https://www.youtube.com/watch?v=LdOe18KhtT4">Velocity 09: John Allspaw and Paul Hammond, "10+ Deploys Pe</a>" John Allspaw and Paul Hammond, 2009 Velocity Conference,</p><p>YouTube, 25 June 2009. </p>]]>
      </content:encoded>
      <itunes:duration>465</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[a5fb6506-bce8-11ec-ae0a-3b65e1c06510]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW6057883252.mp3?updated=1650050776" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The dark side of business email attacks.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/194/notes</link>
      <description>John Wilson, Senior Fellow Threat Research at Agari by HelpSystems, discusses business email compromise attacks, Joe shares three stories on different types of scams, the first being a mystery shopper scam, where the scammer tries to get you to buy gift cards at a grocery store, the second one is on, scammers posing as DTE Energy representatives, seeking bill payments, and the final one is about someone showing up to a victims door and demanding money to collect “Money owed” for a family member, Dave's story is on criminals who are using apple pay to scam their way into going on spending sprees, our catch of the day comes from listener Jon, who shares how two men claimed to be owed money after Jon's death, when in fact, John was very alive.
Links to stories:

Mystery shopper scam: How it works and how to avoid it

Phone scam alert: Metro Detroiters receiving phony DTE Energy calls

Police: Man scammed elderly person out of $10K

Criminals Abuse Apple Pay in Spending Sprees


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 28 Apr 2022 05:00:00 -0000</pubDate>
      <itunes:title>The dark side of business email attacks.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>194</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>John Wilson, Senior Fellow Threat Research at Agari by HelpSystems, discusses business email compromise attacks, Joe shares three stories on different types of scams, the first being a mystery shopper scam, where the scammer tries to get you to buy gift cards at a grocery store, the second one is on, scammers posing as DTE Energy representatives, seeking bill payments, and the final one is about someone showing up to a victims door and demanding money to collect “Money owed” for a family member, Dave's story is on criminals who are using apple pay to scam their way into going on spending sprees, our catch of the day comes from listener Jon, who shares how two men claimed to be owed money after Jon's death, when in fact, John was very alive.
Links to stories:

Mystery shopper scam: How it works and how to avoid it

Phone scam alert: Metro Detroiters receiving phony DTE Energy calls

Police: Man scammed elderly person out of $10K

Criminals Abuse Apple Pay in Spending Sprees


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>John Wilson, Senior Fellow Threat Research at Agari by HelpSystems, discusses business email compromise attacks, Joe shares three stories on different types of scams, the first being a mystery shopper scam, where the scammer tries to get you to buy gift cards at a grocery store, the second one is on, scammers posing as DTE Energy representatives, seeking bill payments, and the final one is about someone showing up to a victims door and demanding money to collect “Money owed” for a family member, Dave's story is on criminals who are using apple pay to scam their way into going on spending sprees, our catch of the day comes from listener Jon, who shares how two men claimed to be owed money after Jon's death, when in fact, John was very alive.</p><p>Links to stories:</p><ul>
<li><a href="https://www.vice.com/en/article/n7ngxm/apple-pay-fraud-spending-sprees-2fa-bots">Mystery shopper scam: How it works and how to avoid it</a></li>
<li><a href="https://www.clickondetroit.com/consumer/help-me-hank/2022/04/21/phone-scam-alert-metro-detroiters-receiving-phony-dte-energy-calls/">Phone scam alert: Metro Detroiters receiving phony DTE Energy calls</a></li>
<li><a href="https://www.wane.com/news/crime/police-man-scammed-elderly-person-out-of-10k/">Police: Man scammed elderly person out of $10K</a></li>
<li><a href="https://www.vice.com/en/article/n7ngxm/apple-pay-fraud-spending-sprees-2fa-bots">Criminals Abuse Apple Pay in Spending Sprees</a></li>
</ul><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>2728</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[775402c8-ad15-11eb-868a-978e166c9165]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW2667526699.mp3?updated=1651172860" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Pegasus (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/95/notes</link>
      <description>The flagship product of the controversial Israeli spyware vendor, the NSO Group, use for remotely hacking mobile devices, most notably iPhones, via zero-click exploits.
CyberWire Glossary link: https://thecyberwire.com/glossary/pegasus
Audio reference link:
“Cybersecurity beyond the Headlines: A Conversation with Journalist Nicole Perlroth,” Kristen Eichensehr, and Nicole Perlroth, University of Virginia School of Law,
YouTube, 14 February 2022</description>
      <pubDate>Tue, 26 Apr 2022 07:00:00 -0000</pubDate>
      <itunes:title>Pegasus (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>95</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>The flagship product of the controversial Israeli spyware vendor, the NSO Group, use for remotely hacking mobile devices, most notably iPhones, via zero-click exploits.
CyberWire Glossary link: https://thecyberwire.com/glossary/pegasus
Audio reference link:
“Cybersecurity beyond the Headlines: A Conversation with Journalist Nicole Perlroth,” Kristen Eichensehr, and Nicole Perlroth, University of Virginia School of Law,
YouTube, 14 February 2022</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The flagship product of the controversial Israeli spyware vendor, the NSO Group, use for remotely hacking mobile devices, most notably iPhones, via zero-click exploits.</p><p>CyberWire Glossary link: <a href="https://thecyberwire.com/glossary/pegasus">https://thecyberwire.com/glossary/pegasus</a></p><p>Audio reference link:</p><p><a href="https://www.youtube.com/watch?v=qeCTmEqnKnU">“Cybersecurity beyond the Headlines: A Conversation with Journalist Nicole Perlroth</a>,” Kristen Eichensehr, and Nicole Perlroth, University of Virginia School of Law,</p><p>YouTube, 14 February 2022</p>]]>
      </content:encoded>
      <itunes:duration>525</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[dfa4534a-b751-11ec-9f2f-7734355f5cee]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW3765852696.mp3?updated=1650048307" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Cons through and through. [Hacking Humans Goes to the Movies]</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans-goes-to-the-movies/9/notes</link>
      <description>Thanks for joining us for the latest episode of our fun project brought to you by the team of Hacking Humans, the CyberWire's social engineering podcast. Co-hosts Dave Bittner and Joe Carrigan are joined by Rick Howard in this series where they view clips from their favorite movies with examples of the social engineering scams and schemes you hear about on Hacking Humans. In this episode, Dave and Joe are joined on this episode by Perry Carpenter, host of 8th Layer Insights podcast and chief evangelist at KnowBe4. Dave,Joe and Perry watch and discuss Dave's and Perry's clips on this episode. They watch each of the selected scenes, describe the on-screen action for you, and then the team deconstructs what they saw. Grab your bowl of popcorn and join us for some Hollywood scams and frauds. A heads-up for our listeners: there is a bit of spicy language in today’s clips, so use your discretion if you are tuning in with your kids. 
Links to this episode's clips if you'd like to watch along:

Dave's scene from "Focus"

Perrys clip from "Ferris Bueller's Day Off"</description>
      <pubDate>Sun, 24 Apr 2022 05:00:00 -0000</pubDate>
      <itunes:title>Cons through and through. [Hacking Humans Goes to the Movies]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>9</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Thanks for joining us for the latest episode of our fun project brought to you by the team of Hacking Humans, the CyberWire's social engineering podcast. Co-hosts Dave Bittner and Joe Carrigan are joined by Rick Howard in this series where they view clips from their favorite movies with examples of the social engineering scams and schemes you hear about on Hacking Humans. In this episode, Dave and Joe are joined on this episode by Perry Carpenter, host of 8th Layer Insights podcast and chief evangelist at KnowBe4. Dave,Joe and Perry watch and discuss Dave's and Perry's clips on this episode. They watch each of the selected scenes, describe the on-screen action for you, and then the team deconstructs what they saw. Grab your bowl of popcorn and join us for some Hollywood scams and frauds. A heads-up for our listeners: there is a bit of spicy language in today’s clips, so use your discretion if you are tuning in with your kids. 
Links to this episode's clips if you'd like to watch along:

Dave's scene from "Focus"

Perrys clip from "Ferris Bueller's Day Off"</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Thanks for joining us for the latest episode of our fun project brought to you by the team of Hacking Humans, the CyberWire's social engineering podcast. Co-hosts Dave Bittner and Joe Carrigan are joined by Rick Howard in this series where they view clips from their favorite movies with examples of the social engineering scams and schemes you hear about on Hacking Humans. In this episode, Dave and Joe are joined on this episode by Perry Carpenter, host of <a href="https://thecyberwire.com/podcasts/8th-layer-insights">8th Layer Insights</a> podcast and chief evangelist at KnowBe4. Dave,Joe and Perry watch and discuss Dave's and Perry's clips on this episode. They watch each of the selected scenes, describe the on-screen action for you, and then the team deconstructs what they saw. Grab your bowl of popcorn and join us for some Hollywood scams and frauds. A heads-up for our listeners: there is a bit of spicy language in today’s clips, so use your discretion if you are tuning in with your kids. </p><p>Links to this episode's clips if you'd like to watch along:</p><ul>
<li>Dave's scene from "<a href="https://www.youtube.com/watch?v=YC6UniyPTKE">Focus</a>"</li>
<li>Perrys clip from "<a href="https://www.youtube.com/watch?v=595lVRKMiDs">Ferris Bueller's Day Off</a>"</li>
</ul>]]>
      </content:encoded>
      <itunes:duration>1249</itunes:duration>
      <guid isPermaLink="false"><![CDATA[cbefb9a4-c271-11ec-bcb6-b7a1d7151083]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW6743259203.mp3?updated=1668989465" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>On the front lines of fraud protection.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/193/notes</link>
      <description>Pete Barker, director of Fraud and Identity at SpyCloud offers critical insights on the alarming evolution of fraud and how consumers and enterprises can protect themselves, Joe and Dave share some listener follow up from listener Micah on a catch of the day from last week, Joe's story is on a woman who was scammed out of $15,000 and shares her experience on how the hackers were able to gather so much info and money from her, Dave's story is on an android malware scheme that allows cybercriminals to intercept customer calls to their banks, our catch of the day comes from listener John, who shares a scam from people claiming to be Amazon, saying that the users secret phrase has been incapacitated.
Links to stories:

76-year-old Fargo woman loses $15,000 in computer scam

Android banking malware intercepts calls to customer support


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 21 Apr 2022 05:00:00 -0000</pubDate>
      <itunes:title>On the front lines of fraud protection.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>193</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Pete Barker, director of Fraud and Identity at SpyCloud offers critical insights on the alarming evolution of fraud and how consumers and enterprises can protect themselves, Joe and Dave share some listener follow up from listener Micah on a catch of the day from last week, Joe's story is on a woman who was scammed out of $15,000 and shares her experience on how the hackers were able to gather so much info and money from her, Dave's story is on an android malware scheme that allows cybercriminals to intercept customer calls to their banks, our catch of the day comes from listener John, who shares a scam from people claiming to be Amazon, saying that the users secret phrase has been incapacitated.
Links to stories:

76-year-old Fargo woman loses $15,000 in computer scam

Android banking malware intercepts calls to customer support


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Pete Barker, director of Fraud and Identity at SpyCloud offers critical insights on the alarming evolution of fraud and how consumers and enterprises can protect themselves, Joe and Dave share some listener follow up from listener Micah on a catch of the day from last week, Joe's story is on a woman who was scammed out of $15,000 and shares her experience on how the hackers were able to gather so much info and money from her, Dave's story is on an android malware scheme that allows cybercriminals to intercept customer calls to their banks, our catch of the day comes from listener John, who shares a scam from people claiming to be Amazon, saying that the users secret phrase has been incapacitated.</p><p>Links to stories:</p><ul>
<li><a href="https://www.valleynewslive.com/2022/04/13/76-year-old-fargo-woman-loses-more-than-15000-computer-scam/">76-year-old Fargo woman loses $15,000 in computer scam</a></li>
<li><a href="https://www.bleepingcomputer.com/news/security/android-banking-malware-intercepts-calls-to-customer-support/">Android banking malware intercepts calls to customer support</a></li>
</ul><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>2624</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[7743c020-ad15-11eb-868a-3f2296b1442c]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW6911679732.mp3?updated=1650303096" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Domain-based Message Authentication Reporting Conformance (DMARC) (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/94/notes</link>
      <description>An open source email authentication protocol designed to prevent emails, spoofing in phishing, business email compromise or BEC, and other email-based attacks. </description>
      <pubDate>Tue, 19 Apr 2022 07:00:00 -0000</pubDate>
      <itunes:title>Domain-based Message Authentication Reporting Conformance (DMARC) (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>94</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>An open source email authentication protocol designed to prevent emails, spoofing in phishing, business email compromise or BEC, and other email-based attacks. </itunes:summary>
      <content:encoded>
        <![CDATA[<p>An open source email authentication protocol designed to prevent emails, spoofing in phishing, business email compromise or BEC, and other email-based attacks. </p>]]>
      </content:encoded>
      <itunes:duration>507</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[4715bc32-b1ce-11ec-ba4b-d34475a41c28]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW3160063568.mp3?updated=1655143501" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Magic, illusion, and scams, oh my.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/192/notes</link>
      <description>Brian Brushwood a former magician, joins Perry Carpenter, host of 8th Layer Insights, to talk about his new podcast, The Worlds Greatest Con, and how magic led him to discussing cons and scams on a podcast, Dave shares a personal story on login frustration, Joe's story is on a Cash App breach being confirmed after an employee was able to access a US customers data, and Dave's story is on inauthentic LinkedIn profiles and how fake accounts are requesting to connect when in fact the accounts are fake, our catch of the day comes from listener Richard who shares a scam he got sent through the mail to exploit his political views.
Links to stories:

Block confirms Cash App breach after former employee accessed US customer data

That smiling LinkedIn profile face might be a computer-generated fake


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 14 Apr 2022 05:00:00 -0000</pubDate>
      <itunes:title>Magic, illusion, and scams, oh my.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>192</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Brian Brushwood a former magician, joins Perry Carpenter, host of 8th Layer Insights, to talk about his new podcast, The Worlds Greatest Con, and how magic led him to discussing cons and scams on a podcast, Dave shares a personal story on login frustration, Joe's story is on a Cash App breach being confirmed after an employee was able to access a US customers data, and Dave's story is on inauthentic LinkedIn profiles and how fake accounts are requesting to connect when in fact the accounts are fake, our catch of the day comes from listener Richard who shares a scam he got sent through the mail to exploit his political views.
Links to stories:

Block confirms Cash App breach after former employee accessed US customer data

That smiling LinkedIn profile face might be a computer-generated fake


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Brian Brushwood a former magician, joins Perry Carpenter, host of 8th Layer Insights, to talk about his new podcast, The Worlds Greatest Con, and how magic led him to discussing cons and scams on a podcast, Dave shares a personal story on login frustration, Joe's story is on a Cash App breach being confirmed after an employee was able to access a US customers data, and Dave's story is on inauthentic LinkedIn profiles and how fake accounts are requesting to connect when in fact the accounts are fake, our catch of the day comes from listener Richard who shares a scam he got sent through the mail to exploit his political views.</p><p>Links to stories:</p><ul>
<li><a href="https://techcrunch.com/2022/04/05/block-cash-app-data-breach/">Block confirms Cash App breach after former employee accessed US customer data</a></li>
<li><a href="https://www.npr.org/2022/03/27/1088140809/fake-linkedin-profiles">That smiling LinkedIn profile face might be a computer-generated fake</a></li>
</ul><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>3061</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[7733105e-ad15-11eb-868a-e7748590eaec]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW1452803063.mp3?updated=1649697894" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Shields Up (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/93/notes</link>
      <description>A condition announced by the US Cybersecurity and Infrastructure Security Agency (CISA) to draw attention to a temporary period of high alert, associated with expectation of a connected wave of cyberattacks prompted by either a widespread vulnerability or an unusually active and capable threat actor.</description>
      <pubDate>Tue, 12 Apr 2022 07:00:00 -0000</pubDate>
      <itunes:title>Shields Up (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>93</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A condition announced by the US Cybersecurity and Infrastructure Security Agency (CISA) to draw attention to a temporary period of high alert, associated with expectation of a connected wave of cyberattacks prompted by either a widespread vulnerability or an unusually active and capable threat actor.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A condition announced by the US Cybersecurity and Infrastructure Security Agency (CISA) to draw attention to a temporary period of high alert, associated with expectation of a connected wave of cyberattacks prompted by either a widespread vulnerability or an unusually active and capable threat actor.</p>]]>
      </content:encoded>
      <itunes:duration>466</itunes:duration>
      <guid isPermaLink="false"><![CDATA[2ec041d2-aba4-11ec-80a1-3f28bc8b19ee]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW7101306527.mp3?updated=1655144614" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Online threats turned real world danger.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/191/notes</link>
      <description>Laura Hoffner from Concentric, joins Dave to discuss online dangers and how they can very easily turn into real world dangers, Laura explains about the popular social media platform TikTok and how users are being stalked and shares one story in particular, Joe and Dave share some listener follow up, Joe's story is centered around cryptocurrency scams and how they are on the rise, and Dave's story is on the malware BABYSHARK and the internal process of investigation as well as lessons learned, our catch of the day comes to us from listener Andre, who shares a scam from a Commanding officer of the U.S Central Command and how they need Andre to keep his money safe.
Links to stories:

Targeted APT Activity: BABYSHARK Is Out for Blood

BBB Study: Cryptocurrency is ripe for fraud and financial loss


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 07 Apr 2022 05:00:00 -0000</pubDate>
      <itunes:title>Online threats turned real world danger.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>191</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Laura Hoffner from Concentric, joins Dave to discuss online dangers and how they can very easily turn into real world dangers, Laura explains about the popular social media platform TikTok and how users are being stalked and shares one story in particular, Joe and Dave share some listener follow up, Joe's story is centered around cryptocurrency scams and how they are on the rise, and Dave's story is on the malware BABYSHARK and the internal process of investigation as well as lessons learned, our catch of the day comes to us from listener Andre, who shares a scam from a Commanding officer of the U.S Central Command and how they need Andre to keep his money safe.
Links to stories:

Targeted APT Activity: BABYSHARK Is Out for Blood

BBB Study: Cryptocurrency is ripe for fraud and financial loss


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Laura Hoffner from Concentric, joins Dave to discuss online dangers and how they can very easily turn into real world dangers, Laura explains about the popular social media platform TikTok and how users are being stalked and shares one story in particular, Joe and Dave share some listener follow up, Joe's story is centered around cryptocurrency scams and how they are on the rise, and Dave's story is on the malware BABYSHARK and the internal process of investigation as well as lessons learned, our catch of the day comes to us from listener Andre, who shares a scam from a Commanding officer of the U.S Central Command and how they need Andre to keep his money safe.</p><p>Links to stories:</p><ul>
<li><a href="https://www.huntress.com/blog/targeted-apt-activity-babyshark-is-out-for-blood">Targeted APT Activity: BABYSHARK Is Out for Blood</a></li>
<li><a href="https://www.bbb.org/article/investigations/26449-cryptocurrency-is-ripe-for-fraud-and-financial-loss">BBB Study: Cryptocurrency is ripe for fraud and financial loss</a></li>
</ul><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>2786</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[7718832e-ad15-11eb-868a-87f676561472]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW9129224223.mp3?updated=1649098771" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Software Assurance Maturity Model (SAMM) (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/92/notes</link>
      <description>A prescriptive open source software security maturity model designed to guide strategies tailored to an organization’s specific risks.</description>
      <pubDate>Tue, 05 Apr 2022 07:00:00 -0000</pubDate>
      <itunes:title>Software Assurance Maturity Model (SAMM) (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>92</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A prescriptive open source software security maturity model designed to guide strategies tailored to an organization’s specific risks.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A prescriptive open source software security maturity model designed to guide strategies tailored to an organization’s specific risks.</p>]]>
      </content:encoded>
      <itunes:duration>343</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[99b46360-a6cc-11ec-904b-cff41860ac07]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW9417021240.mp3?updated=1650294942" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Robocall scams and the psychology surrounding them.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/190/notes</link>
      <description>Alex Quilici, Robocall Scam Expert of YouMail, discusses how unwanted robocalls are becoming more targeted and the psychology behind some of the worst calls, Joe and Dave share some listener follow up, Joe's story comes from listener Derek who shares how his aunt avoided a scam which wasn't very obvious at first, and Dave's story is about how the FBI released its annual Internet Crime Complaint Center Internet Crime Report for 2021, our catch of the day comes from listener John who shares how he got a new interesting Instagram follower.
Links to stories:
FBI Releases the Internet Crime Complaint Center 2021 Internet Crime Report

Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 31 Mar 2022 05:00:00 -0000</pubDate>
      <itunes:title>Robocall scams and the psychology surrounding them.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>190</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Alex Quilici, Robocall Scam Expert of YouMail, discusses how unwanted robocalls are becoming more targeted and the psychology behind some of the worst calls, Joe and Dave share some listener follow up, Joe's story comes from listener Derek who shares how his aunt avoided a scam which wasn't very obvious at first, and Dave's story is about how the FBI released its annual Internet Crime Complaint Center Internet Crime Report for 2021, our catch of the day comes from listener John who shares how he got a new interesting Instagram follower.
Links to stories:
FBI Releases the Internet Crime Complaint Center 2021 Internet Crime Report

Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Alex Quilici, Robocall Scam Expert of YouMail, discusses how unwanted robocalls are becoming more targeted and the psychology behind some of the worst calls, Joe and Dave share some listener follow up, Joe's story comes from listener Derek who shares how his aunt avoided a scam which wasn't very obvious at first, and Dave's story is about how the FBI released its annual Internet Crime Complaint Center Internet Crime Report for 2021, our catch of the day comes from listener John who shares how he got a new interesting Instagram follower.</p><p>Links to stories:</p><ul><li><a href="https://www.fbi.gov/news/pressrel/press-releases/fbi-releases-the-internet-crime-complaint-center-2021-internet-crime-report/">FBI Releases the Internet Crime Complaint Center 2021 Internet Crime Report</a></li></ul><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>2555</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[854df1dc-3c25-11ec-b6e0-bfe096fb7589]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW8556277582.mp3?updated=1648488675" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Universal 2nd Factor (U2F) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/91/notes</link>
      <description>An open standard for hardware authentication tokens that use the universal serial bus, or USB, near-field communications, or NFCs, or Bluetooth to communicate one factor in a two-factor authentication exchange.</description>
      <pubDate>Tue, 29 Mar 2022 05:00:00 -0000</pubDate>
      <itunes:title>Universal 2nd Factor (U2F) [Word Notes]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>91</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>An open standard for hardware authentication tokens that use the universal serial bus, or USB, near-field communications, or NFCs, or Bluetooth to communicate one factor in a two-factor authentication exchange.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>An open standard for hardware authentication tokens that use the universal serial bus, or USB, near-field communications, or NFCs, or Bluetooth to communicate one factor in a two-factor authentication exchange.</p>]]>
      </content:encoded>
      <itunes:duration>437</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[aec9f428-a185-11ec-afbf-473598a20fc6]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW7442196274.mp3?updated=1650293803" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Cons: the short one and the first one. [Hacking Humans Goes to the Movies]</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans-goes-to-the-movies/8/notes</link>
      <description>Thanks for joining us for the latest episode of our fun project brought to you by the team of Hacking Humans, the CyberWire's social engineering podcast. Co-hosts Dave Bittner and Joe Carrigan are joined by Rick Howard in this series where they view clips from their favorite movies with examples of the social engineering scams and schemes you hear about on Hacking Humans. In this episode, Dave, Joe and Rick are watching Joe's and Rick's scene picks. They watch each of the selected scenes, describe the on-screen action for you, and then the team deconstructs what they saw. Grab a bowl of popcorn and join us for some Hollywood scams and frauds.
Links to this episode's clips if you'd like to watch along:

Joe's clip from "House of Games" (the Western Union scene)

Rick's clip from "The Brothers Bloom"</description>
      <pubDate>Sun, 27 Mar 2022 07:00:00 -0000</pubDate>
      <itunes:title>Cons: the short one and the first one. [Hacking Humans Goes to the Movies]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>8</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Thanks for joining us for the latest episode of our fun project brought to you by the team of Hacking Humans, the CyberWire's social engineering podcast. Co-hosts Dave Bittner and Joe Carrigan are joined by Rick Howard in this series where they view clips from their favorite movies with examples of the social engineering scams and schemes you hear about on Hacking Humans. In this episode, Dave, Joe and Rick are watching Joe's and Rick's scene picks. They watch each of the selected scenes, describe the on-screen action for you, and then the team deconstructs what they saw. Grab a bowl of popcorn and join us for some Hollywood scams and frauds.
Links to this episode's clips if you'd like to watch along:

Joe's clip from "House of Games" (the Western Union scene)

Rick's clip from "The Brothers Bloom"</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Thanks for joining us for the latest episode of our fun project brought to you by the team of Hacking Humans, the CyberWire's social engineering podcast. Co-hosts Dave Bittner and Joe Carrigan are joined by Rick Howard in this series where they view clips from their favorite movies with examples of the social engineering scams and schemes you hear about on Hacking Humans. In this episode, Dave, Joe and Rick are watching Joe's and Rick's scene picks. They watch each of the selected scenes, describe the on-screen action for you, and then the team deconstructs what they saw. Grab a bowl of popcorn and join us for some Hollywood scams and frauds.</p><p>Links to this episode's clips if you'd like to watch along:</p><ul>
<li>Joe's clip from "<a href="https://www.youtube.com/watch?v=Riy4God934c">House of Games</a>" (the Western Union scene)</li>
<li>Rick's clip from "<a href="https://www.youtube.com/watch?v=sUz0L4emNko">The Brothers Bloom</a>"</li>
</ul>]]>
      </content:encoded>
      <itunes:duration>1084</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b792c29c-ac8e-11ec-873e-2f27752b5e39]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW6747266812.mp3?updated=1668989455" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>What's behind Buy Now, Pay Later scams?</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/189/notes</link>
      <description>Jim Ducharme, COO of Outseer joins Dave to discuss buy now pay later scams, Joe and Dave share some listener follow up, Joe has an interesting story about an Unchained Capital partner and how they were hit with a social engineering attack, and Dave's story is on the FIDO alliance, our catch of the day comes from listener Matt, who shares how he won 20.5 million and why he wasn't falling for it.
Links to stories:

A Big Bet to Kill the Password for Good

Unchained Capital partner hit with social engineering attack


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 24 Mar 2022 05:00:00 -0000</pubDate>
      <itunes:title>What's behind Buy Now, Pay Later scams?</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>189</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Jim Ducharme, COO of Outseer joins Dave to discuss buy now pay later scams, Joe and Dave share some listener follow up, Joe has an interesting story about an Unchained Capital partner and how they were hit with a social engineering attack, and Dave's story is on the FIDO alliance, our catch of the day comes from listener Matt, who shares how he won 20.5 million and why he wasn't falling for it.
Links to stories:

A Big Bet to Kill the Password for Good

Unchained Capital partner hit with social engineering attack


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Jim Ducharme, COO of Outseer joins Dave to discuss buy now pay later scams, Joe and Dave share some listener follow up, Joe has an interesting story about an Unchained Capital partner and how they were hit with a social engineering attack, and Dave's story is on the FIDO alliance, our catch of the day comes from listener Matt, who shares how he won 20.5 million and why he wasn't falling for it.</p><p>Links to stories:</p><ul>
<li><a href="https://www.wired.com/story/fido-alliance-ios-android-password-replacement/">A Big Bet to Kill the Password for Good</a></li>
<li><a href="https://www.banklesstimes.com/news/2022/03/17/unchained-capital-partner-hit-with-social-engineering-attack/">Unchained Capital partner hit with social engineering attack</a></li>
</ul><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>3022</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c3cd97d4-a956-11ec-8324-435a91d7428d]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW3328925260.mp3?updated=1649171311" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>adversary group naming (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/90/notes</link>
      <description>A cyber threat intelligence best practice of assigning arbitrary labels to collections of hacker activity across the intrusion kill chain.</description>
      <pubDate>Tue, 22 Mar 2022 07:00:00 -0000</pubDate>
      <itunes:title>adversary group naming (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>90</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A cyber threat intelligence best practice of assigning arbitrary labels to collections of hacker activity across the intrusion kill chain.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A cyber threat intelligence best practice of assigning arbitrary labels to collections of hacker activity across the intrusion kill chain.</p>]]>
      </content:encoded>
      <itunes:duration>617</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[8317f708-9b2c-11ec-a49b-d7dfb880ba10]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW8743790720.mp3?updated=1646336992" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Data privacy: is it black and white when it comes to your kids? </title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/188/notes</link>
      <description>UK Correspondent Carole Theriault returns talking with guest David Ruiz from Malwarebytes about parents spying on their kids, Joe and Dave share some listener follow up, Joe's shares a story about the top 5 strangest social engineering tactics, Dave's got a story from one of our listeners, Ricky, about best gift card sales practices at retail chains, and our Catch of the Day comes from listener Michael with a well-crafted email full of red flags when you read into it.
Links to stories:
Rounding up the Past Year's Strangest Social Engineering Tactics

Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 17 Mar 2022 05:00:00 -0000</pubDate>
      <itunes:title>Data privacy: is it black and white when it comes to your kids? </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>188</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>UK Correspondent Carole Theriault returns talking with guest David Ruiz from Malwarebytes about parents spying on their kids, Joe and Dave share some listener follow up, Joe's shares a story about the top 5 strangest social engineering tactics, Dave's got a story from one of our listeners, Ricky, about best gift card sales practices at retail chains, and our Catch of the Day comes from listener Michael with a well-crafted email full of red flags when you read into it.
Links to stories:
Rounding up the Past Year's Strangest Social Engineering Tactics

Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>UK Correspondent Carole Theriault returns talking with guest David Ruiz from Malwarebytes about parents spying on their kids, Joe and Dave share some listener follow up, Joe's shares a story about the top 5 strangest social engineering tactics, Dave's got a story from one of our listeners, Ricky, about best gift card sales practices at retail chains, and our Catch of the Day comes from listener Michael with a well-crafted email full of red flags when you read into it.</p><p>Links to stories:</p><ul><li><a href="https://www.proofpoint.com/us/blog/email-and-cloud-threats/rounding-2021s-strangest-social-engineering-tactic">Rounding up the Past Year's Strangest Social Engineering Tactics</a></li></ul><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>2417</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[76ee9fdc-ad15-11eb-868a-e3177439ab9b]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW4638219156.mp3?updated=1647356421" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>BSIMM (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/89/notes</link>
      <description>A descriptive model that provides a baseline of observed software security initiatives and activities from a collection of volunteer software development shops. </description>
      <pubDate>Tue, 15 Mar 2022 07:00:00 -0000</pubDate>
      <itunes:title>BSIMM (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>89</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A descriptive model that provides a baseline of observed software security initiatives and activities from a collection of volunteer software development shops. </itunes:summary>
      <content:encoded>
        <![CDATA[<p>A descriptive model that provides a baseline of observed software security initiatives and activities from a collection of volunteer software development shops. </p>]]>
      </content:encoded>
      <itunes:duration>369</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[68495f9a-9689-11ec-8b7f-3f6cb382bef7]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW7708973649.mp3?updated=1655136527" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Technology's effects on students during the pandemic.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/187/notes</link>
      <description>Guest Justin Reilly, the CEO of Impero, stops by to talk with Dave Bittner about the mental health of kids in the digital age, Dave's got a story about large-scale phishing campaigns targeting the Indian Electric Vehicle consumers and businesses, Joe's story is from Vade sharing the top 20 most impersonated brands in phishing, and our Catch of the Day comes from Bob, a friend and former coworker of Joe's who received a smishing attempt via text from a "friend" and how he expertly turned the tables on the scammer.
Links to stories:

Unearthing the Million Dollar Scams Targeting the Indian Electric Vehicle Industry

Vade Releases 2021 Phishers’ Favorites Report


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 10 Mar 2022 06:00:00 -0000</pubDate>
      <itunes:title>Technology's effects on students during the pandemic.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>187</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Guest Justin Reilly, the CEO of Impero, stops by to talk with Dave Bittner about the mental health of kids in the digital age, Dave's got a story about large-scale phishing campaigns targeting the Indian Electric Vehicle consumers and businesses, Joe's story is from Vade sharing the top 20 most impersonated brands in phishing, and our Catch of the Day comes from Bob, a friend and former coworker of Joe's who received a smishing attempt via text from a "friend" and how he expertly turned the tables on the scammer.
Links to stories:

Unearthing the Million Dollar Scams Targeting the Indian Electric Vehicle Industry

Vade Releases 2021 Phishers’ Favorites Report


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Guest Justin Reilly, the CEO of Impero, stops by to talk with Dave Bittner about the mental health of kids in the digital age, Dave's got a story about large-scale phishing campaigns targeting the Indian Electric Vehicle consumers and businesses, Joe's story is from Vade sharing the top 20 most impersonated brands in phishing, and our Catch of the Day comes from Bob, a friend and former coworker of Joe's who received a smishing attempt via text from a "friend" and how he expertly turned the tables on the scammer.</p><p>Links to stories:</p><ul>
<li><a href="https://cloudsek.com/whitepapers_reports/unearthing-the-million-dollar-scams-targeting-the-indian-electric-vehicle-industry-scams/">Unearthing the Million Dollar Scams Targeting the Indian Electric Vehicle Industry</a></li>
<li><a href="https://www.vadesecure.com/en/company/news/vade-releases-2021-phishers-favorites-report">Vade Releases 2021 Phishers’ Favorites Report</a></li>
</ul><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>2417</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[76dcca3c-ad15-11eb-868a-53675ae4fa46]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW1779135498.mp3?updated=1649165922" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>OWASP vulnerable and outdated components (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/88/notes</link>
      <description>Software libraries, frameworks, packages, and other components, and their dependencies (third-party code that each component uses) that have inherent security weaknesses, either through newly discovered vulnerabilities or because newer versions have superseded the deployed version. </description>
      <pubDate>Tue, 08 Mar 2022 08:00:00 -0000</pubDate>
      <itunes:title>OWASP vulnerable and outdated components (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>88</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Software libraries, frameworks, packages, and other components, and their dependencies (third-party code that each component uses) that have inherent security weaknesses, either through newly discovered vulnerabilities or because newer versions have superseded the deployed version. </itunes:summary>
      <content:encoded>
        <![CDATA[<p>Software libraries, frameworks, packages, and other components, and their dependencies (third-party code that each component uses) that have inherent security weaknesses, either through newly discovered vulnerabilities or because newer versions have superseded the deployed version. </p>]]>
      </content:encoded>
      <itunes:duration>484</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b66314e8-89e9-11ec-bdfa-bfb003429f71]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW1860989740.mp3?updated=1650296362" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Phishing seems to be cyclical and thematic.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/186/notes</link>
      <description>Guest Jeff Nathan, the Director of Threat research at Norton Labs, joins Dave to discuss their most recent Consumer Cyber Safety Pulse Report, Joe and Dave share some follow up from listeners Daniel and Neville who helped the guys with a phrase from a recent Catch of the Day, Joe shares a story about getting around MFA using remote access software, Dave's story is about a jobfishing scam from a fake design firm, and our Catch of the Day is from listener Randy about an unsubscribe email he received.
Links to stories:

Devious phishing method bypasses MFA using remote access software

Jobfished: the con that tricked dozens into working for a fake design agency


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 03 Mar 2022 06:00:00 -0000</pubDate>
      <itunes:title>Phishing seems to be cyclical and thematic.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>186</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Guest Jeff Nathan, the Director of Threat research at Norton Labs, joins Dave to discuss their most recent Consumer Cyber Safety Pulse Report, Joe and Dave share some follow up from listeners Daniel and Neville who helped the guys with a phrase from a recent Catch of the Day, Joe shares a story about getting around MFA using remote access software, Dave's story is about a jobfishing scam from a fake design firm, and our Catch of the Day is from listener Randy about an unsubscribe email he received.
Links to stories:

Devious phishing method bypasses MFA using remote access software

Jobfished: the con that tricked dozens into working for a fake design agency


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Guest Jeff Nathan, the Director of Threat research at Norton Labs, joins Dave to discuss their most recent Consumer Cyber Safety Pulse Report, Joe and Dave share some follow up from listeners Daniel and Neville who helped the guys with a phrase from a recent Catch of the Day, Joe shares a story about getting around MFA using remote access software, Dave's story is about a jobfishing scam from a fake design firm, and our Catch of the Day is from listener Randy about an unsubscribe email he received.</p><p>Links to stories:</p><ul>
<li><a href="https://www.bleepingcomputer.com/news/security/devious-phishing-method-bypasses-mfa-using-remote-access-software/">Devious phishing method bypasses MFA using remote access software</a></li>
<li><a href="https://www.bbc.com/news/uk-60387324">Jobfished: the con that tricked dozens into working for a fake design agency</a></li>
</ul><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>2889</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[76cab5f4-ad15-11eb-868a-9f2bce29e143]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW5585501467.mp3?updated=1646163683" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>OWASP software and data integrity failures (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/87/notes</link>
      <description>Code and data repositories that don't protect against unauthorized changes.</description>
      <pubDate>Tue, 01 Mar 2022 08:00:00 -0000</pubDate>
      <itunes:title>OWASP software and data integrity failures (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>87</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Code and data repositories that don't protect against unauthorized changes.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Code and data repositories that don't protect against unauthorized changes.</p>]]>
      </content:encoded>
      <itunes:duration>507</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[91f4d940-846f-11ec-bb20-3728d7f66145]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW5774803784.mp3?updated=1643837458" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>A blurring of lines between nation states and criminals.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/185/notes</link>
      <description>Guest Joshua Neil, the Chief Data Scientist for SecurOnix, joins Dave to talk about evasive techniques and identifying nation-state kill chains, Joe shares an update on his identity theft experience, the guys share some follow up from listener Benji who shares experiences of scammers changing the name on gmail accounts at the synagogue where he works saying they are the rabbi and emailing congregants asking for gift cards, Dave's story is about Apple's AirTags and how they led to the discovery of a German intelligence agency, Joe's got a story about the City of Baltimore falling victim to a phishing scam, and our Catch of the Day is from listener G about a compressed file attachment he received, but did not open.
Links to stories:

Apple's AirTag uncovers a secret German intelligence agency

Inspector General: Baltimore victimized in 376,213 phishing scam last year


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 24 Feb 2022 06:00:00 -0000</pubDate>
      <itunes:title>A blurring of lines between nation states and criminals.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>185</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Guest Joshua Neil, the Chief Data Scientist for SecurOnix, joins Dave to talk about evasive techniques and identifying nation-state kill chains, Joe shares an update on his identity theft experience, the guys share some follow up from listener Benji who shares experiences of scammers changing the name on gmail accounts at the synagogue where he works saying they are the rabbi and emailing congregants asking for gift cards, Dave's story is about Apple's AirTags and how they led to the discovery of a German intelligence agency, Joe's got a story about the City of Baltimore falling victim to a phishing scam, and our Catch of the Day is from listener G about a compressed file attachment he received, but did not open.
Links to stories:

Apple's AirTag uncovers a secret German intelligence agency

Inspector General: Baltimore victimized in 376,213 phishing scam last year


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Guest Joshua Neil, the Chief Data Scientist for SecurOnix, joins Dave to talk about evasive techniques and identifying nation-state kill chains, Joe shares an update on his identity theft experience, the guys share some follow up from listener Benji who shares experiences of scammers changing the name on gmail accounts at the synagogue where he works saying they are the rabbi and emailing congregants asking for gift cards, Dave's story is about Apple's AirTags and how they led to the discovery of a German intelligence agency, Joe's got a story about the City of Baltimore falling victim to a phishing scam, and our Catch of the Day is from listener G about a compressed file attachment he received, but did not open.</p><p>Links to stories:</p><ul>
<li><a href="https://appleinsider.com/articles/22/01/25/apples-airtag-uncovers-a-secret-german-intelligence-agency">Apple's AirTag uncovers a secret German intelligence agency</a></li>
<li><a href="https://www.baltimoresun.com/politics/bs-md-pol-oig-report-phishing-scam-20220216-owt7sndmkfawrkoxgh3g57l574-story.htmleport-phishing-scam-20220216-owt7sndmkfawrkoxgh3g57l574-story.html">Inspector General: Baltimore victimized in 376,213 phishing scam last year</a></li>
</ul><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>2715</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[76b8ec70-ad15-11eb-868a-9bb79a31b3b7]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW5891522589.mp3?updated=1645221956" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>OWASP server-side request forgery (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/86/notes</link>
      <description>An attack technique that leverages an unprotected web server as a proxy for attackers to send commands through to other computers. </description>
      <pubDate>Tue, 22 Feb 2022 08:00:00 -0000</pubDate>
      <itunes:title>OWASP server-side request forgery (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>86</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>An attack technique that leverages an unprotected web server as a proxy for attackers to send commands through to other computers. </itunes:summary>
      <content:encoded>
        <![CDATA[<p>An attack technique that leverages an unprotected web server as a proxy for attackers to send commands through to other computers. </p>]]>
      </content:encoded>
      <itunes:duration>458</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[dfb8f71c-806c-11ec-a3d0-9359876e4673]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW6443917860.mp3?updated=1643394899" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Hustling the hustlers. [Hacking Humans Goes to the Movies]</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans-goes-to-the-movies/7/notes</link>
      <description>Thanks for joining us for the latest episode of our fun project brought to you by the team of Hacking Humans, the CyberWire's social engineering podcast. Co-hosts Dave Bittner and Joe Carrigan are joined by Rick Howard in this series where they view clips from their favorite movies with examples of the social engineering scams and schemes you hear about on Hacking Humans. In this episode, Dave, Joe and Rick are watching Joe's and Dave's scene picks. They watch each of the selected scenes, describe the on-screen action for you, and then the team deconstructs what they saw. Grab a bowl of popcorn and join us for some Hollywood scams and frauds.
Links to this episode's clips if you'd like to watch along:

Joe's scene from "The Hustle"

Dave's clip from "True Lies"</description>
      <pubDate>Sun, 20 Feb 2022 08:00:00 -0000</pubDate>
      <itunes:title>Hustling the hustlers. [Hacking Humans Goes to the Movies]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>7</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Thanks for joining us for the latest episode of our fun project brought to you by the team of Hacking Humans, the CyberWire's social engineering podcast. Co-hosts Dave Bittner and Joe Carrigan are joined by Rick Howard in this series where they view clips from their favorite movies with examples of the social engineering scams and schemes you hear about on Hacking Humans. In this episode, Dave, Joe and Rick are watching Joe's and Dave's scene picks. They watch each of the selected scenes, describe the on-screen action for you, and then the team deconstructs what they saw. Grab a bowl of popcorn and join us for some Hollywood scams and frauds.
Links to this episode's clips if you'd like to watch along:

Joe's scene from "The Hustle"

Dave's clip from "True Lies"</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Thanks for joining us for the latest episode of our fun project brought to you by the team of Hacking Humans, the CyberWire's social engineering podcast. Co-hosts Dave Bittner and Joe Carrigan are joined by Rick Howard in this series where they view clips from their favorite movies with examples of the social engineering scams and schemes you hear about on Hacking Humans. In this episode, Dave, Joe and Rick are watching Joe's and Dave's scene picks. They watch each of the selected scenes, describe the on-screen action for you, and then the team deconstructs what they saw. Grab a bowl of popcorn and join us for some Hollywood scams and frauds.</p><p>Links to this episode's clips if you'd like to watch along:</p><ul>
<li>Joe's scene from "<a href="https://www.youtube.com/watch?v=CEdcaYjWvQs">The Hustle</a>"</li>
<li>Dave's clip from "<a href="https://www.youtube.com/watch?v=FrOnyXzMmG8">True Lies</a>"</li>
</ul>]]>
      </content:encoded>
      <itunes:duration>1275</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[8cc707fe-90f9-11ec-b713-a7fa03c0ad36]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW6036009879.mp3?updated=1668989443" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Vulnerabilities will be found. </title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/184/notes</link>
      <description>Guest Deral Heiland from Rapid7 talks with our UK Correspondent Carole Theriault about the state of IOT, Joe shares a personal story about bank checks and a debit card received at his home that were in his name but not from his bank, Dave's got a story from an email he received from the PR department at TikTok about romance scams, and our Catch of the Day is from listener John about a friend who was harassed on Facebook to click a link and how John addressed it.
Links to stories:
#BeCyberSmart: Tips to protect your heart and wallet

Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 17 Feb 2022 06:00:00 -0000</pubDate>
      <itunes:title>Vulnerabilities will be found. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>184</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Guest Deral Heiland from Rapid7 talks with our UK Correspondent Carole Theriault about the state of IOT, Joe shares a personal story about bank checks and a debit card received at his home that were in his name but not from his bank, Dave's got a story from an email he received from the PR department at TikTok about romance scams, and our Catch of the Day is from listener John about a friend who was harassed on Facebook to click a link and how John addressed it.
Links to stories:
#BeCyberSmart: Tips to protect your heart and wallet

Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Guest Deral Heiland from Rapid7 talks with our UK Correspondent Carole Theriault about the state of IOT, Joe shares a personal story about bank checks and a debit card received at his home that were in his name but not from his bank, Dave's got a story from an email he received from the PR department at TikTok about romance scams, and our Catch of the Day is from listener John about a friend who was harassed on Facebook to click a link and how John addressed it.</p><p>Links to stories:</p><ul><li><a href="https://newsroom.tiktok.com/en-us/be-cyber-smart-about-romance-scams">#BeCyberSmart: Tips to protect your heart and wallet</a></li></ul><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>2873</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[76a49022-ad15-11eb-868a-23dfa3b0e457]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW4366392881.mp3?updated=1644956311" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>OWASP security logging and monitoring failures (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/85/notes</link>
      <description>The absence of telemetry that could help network defenders detect and respond to hostile attempts to compromise a system. </description>
      <pubDate>Tue, 15 Feb 2022 08:00:00 -0000</pubDate>
      <itunes:title>OWASP security logging and monitoring failures (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>85</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>The absence of telemetry that could help network defenders detect and respond to hostile attempts to compromise a system. </itunes:summary>
      <content:encoded>
        <![CDATA[<p>The absence of telemetry that could help network defenders detect and respond to hostile attempts to compromise a system. </p>]]>
      </content:encoded>
      <itunes:duration>364</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[cb90da24-7afa-11ec-bce1-97a3beff0f26]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW1520726166.mp3?updated=1642785660" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>If you wish for peace, prepare for cyberwar. </title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/183/notes</link>
      <description>Guest Nick Shevelyov, Chief Security Officer for Silicon Valley Bank. joins Dave sharing some personal history around security, and discussing his book "Cyber War… and Peace," Dave and Joe have some follow up from an anonymous listener about mobile device management issue at their work, Dave has a story where a woman was scammed out of thousands while someone contacted her to "help" with a problem with their bank, Joe's got a few stories about Facebook and ad scams, and our Catch of the Day is from listener Jonathan with a Geek Squad subscription scam.
Links to stories:

They Were ‘Calling to Help.’ Then They Stole Thousands

Facebook blames Apple after a historically bad quarter, saying iPhone privacy changes will cost it $10 billion

Scam ads: why an Australian billionaire is launching legal action against Facebook


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 10 Feb 2022 06:00:00 -0000</pubDate>
      <itunes:title>If you wish for peace, prepare for cyberwar. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>183</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Guest Nick Shevelyov, Chief Security Officer for Silicon Valley Bank. joins Dave sharing some personal history around security, and discussing his book "Cyber War… and Peace," Dave and Joe have some follow up from an anonymous listener about mobile device management issue at their work, Dave has a story where a woman was scammed out of thousands while someone contacted her to "help" with a problem with their bank, Joe's got a few stories about Facebook and ad scams, and our Catch of the Day is from listener Jonathan with a Geek Squad subscription scam.
Links to stories:

They Were ‘Calling to Help.’ Then They Stole Thousands

Facebook blames Apple after a historically bad quarter, saying iPhone privacy changes will cost it $10 billion

Scam ads: why an Australian billionaire is launching legal action against Facebook


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Guest Nick Shevelyov, Chief Security Officer for Silicon Valley Bank. joins Dave sharing some personal history around security, and discussing his book "Cyber War… and Peace," Dave and Joe have some follow up from an anonymous listener about mobile device management issue at their work, Dave has a story where a woman was scammed out of thousands while someone contacted her to "help" with a problem with their bank, Joe's got a few stories about Facebook and ad scams, and our Catch of the Day is from listener Jonathan with a Geek Squad subscription scam.</p><p>Links to stories:</p><ul>
<li><a href="https://www.wired.com/story/phone-scam-phishing-finance-apps/">They Were ‘Calling to Help.’ Then They Stole Thousands</a></li>
<li><a href="https://www.businessinsider.com/facebook-blames-apple-10-billion-loss-ad-privacy-warning-2022-2">Facebook blames Apple after a historically bad quarter, saying iPhone privacy changes will cost it $10 billion</a></li>
<li><a href="https://www.theguardian.com/money/2022/feb/03/scam-ads-why-an-australian-billionaire-is-launching-legal-action-against-facebook">Scam ads: why an Australian billionaire is launching legal action against Facebook</a></li>
</ul><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>2995</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[768ca6f6-ad15-11eb-868a-7bd1dcd8240f]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW5592664317.mp3?updated=1644266659" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>OWASP identification and authentication failures (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/84/notes</link>
      <description>Ineffectual confirmation of a user's identity or authentication in session management.</description>
      <pubDate>Tue, 08 Feb 2022 08:00:00 -0000</pubDate>
      <itunes:title>OWASP identification and authentication failures (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>84</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Ineffectual confirmation of a user's identity or authentication in session management.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Ineffectual confirmation of a user's identity or authentication in session management.</p>]]>
      </content:encoded>
      <itunes:duration>358</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[2029b40c-74d4-11ec-81c1-b78bc62ba5b2]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW5004282691.mp3?updated=1655138707" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>How to talk your way in anywhere. [Hacking Humans Goes to the Movies]</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans-goes-to-the-movies/6/notes</link>
      <description>Thanks for joining us for the latest episode of our fun project brought to you by the team of Hacking Humans, the CyberWire's social engineering podcast. Co-hosts Dave Bittner and Joe Carrigan are joined by Rick Howard in this series where they view clips from their favorite movies with examples of the social engineering scams and schemes you hear about on Hacking Humans. In this episode, Dave, Joe and Rick are watching Dave's and Rick's scene picks. They watch each of the selected scenes, describe the on-screen action for you, and then the team deconstructs what they saw. Grab a bowl of popcorn and join us for some Hollywood scams and frauds.
Links to this episode's clips if you'd like to watch along:

Dave's clip from the television show "Key &amp; Peele"

Rick's pick from "Sneakers"</description>
      <pubDate>Sun, 06 Feb 2022 08:00:00 -0000</pubDate>
      <itunes:title>How to talk your way in anywhere. [Hacking Humans Goes to the Movies]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>6</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Thanks for joining us for the latest episode of our fun project brought to you by the team of Hacking Humans, the CyberWire's social engineering podcast. Co-hosts Dave Bittner and Joe Carrigan are joined by Rick Howard in this series where they view clips from their favorite movies with examples of the social engineering scams and schemes you hear about on Hacking Humans. In this episode, Dave, Joe and Rick are watching Dave's and Rick's scene picks. They watch each of the selected scenes, describe the on-screen action for you, and then the team deconstructs what they saw. Grab a bowl of popcorn and join us for some Hollywood scams and frauds.
Links to this episode's clips if you'd like to watch along:

Dave's clip from the television show "Key &amp; Peele"

Rick's pick from "Sneakers"</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Thanks for joining us for the latest episode of our fun project brought to you by the team of Hacking Humans, the CyberWire's social engineering podcast. Co-hosts Dave Bittner and Joe Carrigan are joined by Rick Howard in this series where they view clips from their favorite movies with examples of the social engineering scams and schemes you hear about on Hacking Humans. In this episode, Dave, Joe and Rick are watching Dave's and Rick's scene picks. They watch each of the selected scenes, describe the on-screen action for you, and then the team deconstructs what they saw. Grab a bowl of popcorn and join us for some Hollywood scams and frauds.</p><p>Links to this episode's clips if you'd like to watch along:</p><ul>
<li>Dave's clip from the television show "<a href="https://www.youtube.com/watch?v=ZgyU0LyWZ9M">Key &amp; Peele</a>"</li>
<li>Rick's pick from "<a href="https://www.youtube.com/watch?v=ENT7cVk_oXs&amp;t=65s">Sneakers</a>"</li>
</ul>]]>
      </content:encoded>
      <itunes:duration>1329</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[aa65fa3c-85fe-11ec-9bd6-bfa738d71244]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW2904651765.mp3?updated=1668989432" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The ransomware game has evolved. </title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/182/notes</link>
      <description>Guest Allan Liska from Recorded Future joins Dave to discuss the evolution of ransomware and his new book "Ransomware: Understand. Prevent. Recover," Joe shares a question from listener Joan about an email her father received from "MasterCard Fraud Department" asking photo/video and the last 4 of his Social Security Number, Joe has a story about scams to watch out for during tax time in the US, Dave's story is about ransomware operators trying to recruit company insiders, and our Catch of the Day is from listener Michael who had some acquaintances fall for a scam.
Links to stories:

Latest IRS Scams: How to Spot Them and Fight Back

The Rising Insider Threat: Hackers Have Approached 65% of Executives or Their Employees To Assist in Ransomware Attacks


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 03 Feb 2022 06:00:00 -0000</pubDate>
      <itunes:title>The ransomware game has evolved. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>182</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Guest Allan Liska from Recorded Future joins Dave to discuss the evolution of ransomware and his new book "Ransomware: Understand. Prevent. Recover," Joe shares a question from listener Joan about an email her father received from "MasterCard Fraud Department" asking photo/video and the last 4 of his Social Security Number, Joe has a story about scams to watch out for during tax time in the US, Dave's story is about ransomware operators trying to recruit company insiders, and our Catch of the Day is from listener Michael who had some acquaintances fall for a scam.
Links to stories:

Latest IRS Scams: How to Spot Them and Fight Back

The Rising Insider Threat: Hackers Have Approached 65% of Executives or Their Employees To Assist in Ransomware Attacks


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Guest Allan Liska from Recorded Future joins Dave to discuss the evolution of ransomware and his new book "Ransomware: Understand. Prevent. Recover," Joe shares a question from listener Joan about an email her father received from "MasterCard Fraud Department" asking photo/video and the last 4 of his Social Security Number, Joe has a story about scams to watch out for during tax time in the US, Dave's story is about ransomware operators trying to recruit company insiders, and our Catch of the Day is from listener Michael who had some acquaintances fall for a scam.</p><p>Links to stories:</p><ul>
<li><a href="https://www.nerdwallet.com/article/taxes/avoid-irs-scams">Latest IRS Scams: How to Spot Them and Fight Back</a></li>
<li><a href="https://www.hitachi-id.com/resources/graphics/malware-employees-approached-by-pulse-0-0">The Rising Insider Threat: Hackers Have Approached 65% of Executives or Their Employees To Assist in Ransomware Attacks</a></li>
</ul><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>3134</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[7674d5f8-ad15-11eb-868a-670964b35c86]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW6720633798.mp3?updated=1643753161" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>OWASP broken access control (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/82/notes</link>
      <description>Software users are allowed access to data or functionality contrary to the defined zero trust policy by bypassing or manipulating the installed security controls. </description>
      <pubDate>Tue, 01 Feb 2022 08:00:00 -0000</pubDate>
      <itunes:title>OWASP broken access control (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>82</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Software users are allowed access to data or functionality contrary to the defined zero trust policy by bypassing or manipulating the installed security controls. </itunes:summary>
      <content:encoded>
        <![CDATA[<p>Software users are allowed access to data or functionality contrary to the defined zero trust policy by bypassing or manipulating the installed security controls. </p>]]>
      </content:encoded>
      <itunes:duration>450</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[1c2935ba-6383-11ec-8326-d710fe379fb3]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW3769262771.mp3?updated=1640217714" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Useful ransomware protection for you. </title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/181/notes</link>
      <description>Guest Roger Grimes, Data Driven Defense Evangelist at KnowBe4, joins Dave to discuss his new book "Ransomware Protection Playbook," Dave has a story about a Meta (Facebook) group with a cryptocurrency scam that promises "a new way to wealth," Joe's story has tales of account takeover attacks of high-profile gamers, and our Catch of the Day is from listener Jesse about a text they received from "Facebook" about a $600,000 windfall.
Links to stories:

We Infiltrated a Crypto Scam Network That’s Hosted by Meta

EA Confirms Account Takeover Attacks Compromising High-Profile Gamers via Phishing and Social Engineering Attacks


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 27 Jan 2022 06:00:00 -0000</pubDate>
      <itunes:title>Useful ransomware protection for you. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>181</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Guest Roger Grimes, Data Driven Defense Evangelist at KnowBe4, joins Dave to discuss his new book "Ransomware Protection Playbook," Dave has a story about a Meta (Facebook) group with a cryptocurrency scam that promises "a new way to wealth," Joe's story has tales of account takeover attacks of high-profile gamers, and our Catch of the Day is from listener Jesse about a text they received from "Facebook" about a $600,000 windfall.
Links to stories:

We Infiltrated a Crypto Scam Network That’s Hosted by Meta

EA Confirms Account Takeover Attacks Compromising High-Profile Gamers via Phishing and Social Engineering Attacks


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Guest Roger Grimes, Data Driven Defense Evangelist at KnowBe4, joins Dave to discuss his new book "Ransomware Protection Playbook," Dave has a story about a Meta (Facebook) group with a cryptocurrency scam that promises "a new way to wealth," Joe's story has tales of account takeover attacks of high-profile gamers, and our Catch of the Day is from listener Jesse about a text they received from "Facebook" about a $600,000 windfall.</p><p>Links to stories:</p><ul>
<li><a href="https://www.snopes.com/news/2022/01/17/crypto-scam-facebook-messenger/">We Infiltrated a Crypto Scam Network That’s Hosted by Meta</a></li>
<li><a href="https://www.cpomagazine.com/cyber-security/ea-confirms-account-takeover-attacks-compromising-high-profile-gamers-via-phishing-social-engineering-attacks/">EA Confirms Account Takeover Attacks Compromising High-Profile Gamers via Phishing and Social Engineering Attacks</a></li>
</ul><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>2695</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[765e7efc-ad15-11eb-868a-6be42e8d0e94]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW7291802836.mp3?updated=1643154933" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>OWASP security misconfiguration (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/81/notes</link>
      <description>The state of a web application when it's vulnerable to attack due to an insecure configuration. </description>
      <pubDate>Tue, 25 Jan 2022 08:00:00 -0000</pubDate>
      <itunes:title>OWASP security misconfiguration (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>81</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>The state of a web application when it's vulnerable to attack due to an insecure configuration. </itunes:summary>
      <content:encoded>
        <![CDATA[<p>The state of a web application when it's vulnerable to attack due to an insecure configuration. </p>]]>
      </content:encoded>
      <itunes:duration>423</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[7091a474-5e0c-11ec-8406-f30577bb34c7]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW4945144460.mp3?updated=1655138233" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The perfect environment for ATOs (account takeovers) to breed.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/180/notes</link>
      <description>Guest Jane Lee, Trust and Safety Architect at Sift, joins Dave to talk about the Digital Trust and Safety Index, Joe and Dave share some follow up from a listener, Ben, with a suggestion as an alternative to prevent clicking on those bonus phishing scams, Joe's story is about fake ticket scams for the Kansas City Chiefs NFL playoff game against the Pittsburgh Steelers, Dave's got a story about scams on Apple's App Store, and our Catch of the Day is from an anonymous listener about an email they received from their "IT department" requesting credentials (including password) when getting a new laptop. (Note: This is our first COTD that is not a scam, rather a bad policy.)
Links to stories:

Kansas City police warn Chiefs fans about ticket scams

APPLE’S $64 BILLION-A-YEAR APP STORE ISN’T CATCHING THE MOST EGREGIOUS SCAMS


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 20 Jan 2022 06:00:00 -0000</pubDate>
      <itunes:title>The perfect environment for ATOs (account takeovers) to breed.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>180</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Guest Jane Lee, Trust and Safety Architect at Sift, joins Dave to talk about the Digital Trust and Safety Index, Joe and Dave share some follow up from a listener, Ben, with a suggestion as an alternative to prevent clicking on those bonus phishing scams, Joe's story is about fake ticket scams for the Kansas City Chiefs NFL playoff game against the Pittsburgh Steelers, Dave's got a story about scams on Apple's App Store, and our Catch of the Day is from an anonymous listener about an email they received from their "IT department" requesting credentials (including password) when getting a new laptop. (Note: This is our first COTD that is not a scam, rather a bad policy.)
Links to stories:

Kansas City police warn Chiefs fans about ticket scams

APPLE’S $64 BILLION-A-YEAR APP STORE ISN’T CATCHING THE MOST EGREGIOUS SCAMS


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Guest Jane Lee, Trust and Safety Architect at Sift, joins Dave to talk about the Digital Trust and Safety Index, Joe and Dave share some follow up from a listener, Ben, with a suggestion as an alternative to prevent clicking on those bonus phishing scams, Joe's story is about fake ticket scams for the Kansas City Chiefs NFL playoff game against the Pittsburgh Steelers, Dave's got a story about scams on Apple's App Store, and our Catch of the Day is from an anonymous listener about an email they received from their "IT department" requesting credentials (including password) when getting a new laptop. (Note: This is our first COTD that is not a scam, rather a bad policy.)</p><p>Links to stories:</p><ul>
<li><a href="https://www.kmbc.com/article/kansas-city-missouri-police-warn-chiefs-fans-ticket-scams/38760648#">Kansas City police warn Chiefs fans about ticket scams</a></li>
<li><a href="https://www.theverge.com/2021/4/21/22385859/apple-app-store-scams-fraud-review-enforcement-top-grossing-kosta-eleftheriou">APPLE’S $64 BILLION-A-YEAR APP STORE ISN’T CATCHING THE MOST EGREGIOUS SCAMS</a></li>
</ul><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>2781</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[7646c262-ad15-11eb-868a-779c5bcb88ed]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW7720313673.mp3?updated=1642538403" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>OWASP insecure design (noun)</title>
      <link>https://thecyberwire.com/podcasts/word-notes/80/notes</link>
      <description>A broad OWASP Top 10 software development category representing missing, ineffective, or unforeseen security measures.</description>
      <pubDate>Tue, 18 Jan 2022 08:00:00 -0000</pubDate>
      <itunes:title>OWASP insecure design (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>80</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle>OWASP insecure design (noun) [Word Notes]</itunes:subtitle>
      <itunes:summary>A broad OWASP Top 10 software development category representing missing, ineffective, or unforeseen security measures.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A broad OWASP Top 10 software development category representing missing, ineffective, or unforeseen security measures.</p>]]>
      </content:encoded>
      <itunes:duration>499</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[612477f0-59f2-11ec-95bc-0fe08ee3b0e1]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW8090405050.mp3?updated=1655137697" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The only locks you should pick are your own.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/179/notes</link>
      <description>Guest Tom Tovar, CEO and Co-Creator of AppDome, joins Dave and Joe to discuss the results of a recent consumer survey, Dave's story is based on a tweet where the user's child's middle school had some unintended consequences of a phishing scam training, Joe has two stories: one on QR code scammers on parking kiosks, and one about a book publishing phishing scam, and our Catch of the Day is a message that purports to come from the USPS sent in by listener William about a missed package delivery.
Links to stories:


Tweet about phishing simulation gone wrong.

QR code scammers hitting on-street parking in Texas cities -- including Houston, officials say; This is what you need to know

FBI Arrests Suspect in Unpublished Book Manuscript Phishing Scam


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 13 Jan 2022 06:00:00 -0000</pubDate>
      <itunes:title>The only locks you should pick are your own.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>179</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Guest Tom Tovar, CEO and Co-Creator of AppDome, joins Dave and Joe to discuss the results of a recent consumer survey, Dave's story is based on a tweet where the user's child's middle school had some unintended consequences of a phishing scam training, Joe has two stories: one on QR code scammers on parking kiosks, and one about a book publishing phishing scam, and our Catch of the Day is a message that purports to come from the USPS sent in by listener William about a missed package delivery.
Links to stories:


Tweet about phishing simulation gone wrong.

QR code scammers hitting on-street parking in Texas cities -- including Houston, officials say; This is what you need to know

FBI Arrests Suspect in Unpublished Book Manuscript Phishing Scam


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Guest Tom Tovar, CEO and Co-Creator of AppDome, joins Dave and Joe to discuss the results of a recent consumer survey, Dave's story is based on a tweet where the user's child's middle school had some unintended consequences of a phishing scam training, Joe has two stories: one on QR code scammers on parking kiosks, and one about a book publishing phishing scam, and our Catch of the Day is a message that purports to come from the USPS sent in by listener William about a missed package delivery.</p><p>Links to stories:</p><ul>
<li>
<a href="https://twitter.com/snipethesnipers/status/1478495086958845960">Tweet about phishing simulation gone wrong</a>.</li>
<li><a href="https://www.click2houston.com/news/local/2022/01/05/qr-code-scammers-hitting-on-street-parking-in-texas-cities-this-is-what-houston-officials-want-you-to-know/">QR code scammers hitting on-street parking in Texas cities -- including Houston, officials say; This is what you need to know</a></li>
<li><a href="https://variety.com/2022/biz/news/unpublished-book-manuscripts-arrest-fbi-1235147730/">FBI Arrests Suspect in Unpublished Book Manuscript Phishing Scam</a></li>
</ul><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>2692</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[76319108-ad15-11eb-868a-37d58944f70f]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW4803395197.mp3?updated=1641859071" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Log4j vulnerability (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/83/notes</link>
      <description>An open source Java-based software tool available from the Apache Software Foundation designed to log security and performance information. </description>
      <pubDate>Tue, 11 Jan 2022 16:00:00 -0000</pubDate>
      <itunes:title>Log4j vulnerability (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>83</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>An open source Java-based software tool available from the Apache Software Foundation designed to log security and performance information. </itunes:summary>
      <content:encoded>
        <![CDATA[<p>An open source Java-based software tool available from the Apache Software Foundation designed to log security and performance information. </p>]]>
      </content:encoded>
      <itunes:duration>556</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c6bc4532-6f52-11ec-adb4-b391a3ac6476]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW5974966769.mp3?updated=1655145141" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Changing the game on ransomware. </title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/178/notes</link>
      <description>Guest Adam Flatley, Director of Threat Intelligence at Redacted, talks with Dave about "the only way to truly disrupt the ransomware problem is to target the actors themselves," Joe shares some statistics that will help you stay up-to-date on recent cybersecurity trends, Dave's story is about criminal indictments in a case of a Maryland company buying lead paint victims’ settlements for a fraction of their value, and our Catch of the Day comes from listener Brady about a slick mail campaign they received from "Amazon."
Links to stories:

22 cybersecurity statistics to know for 2022

Criminal indictments filed against Maryland company that targeted Baltimore lead paint victims’ settlements


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 06 Jan 2022 06:00:00 -0000</pubDate>
      <itunes:title>Changing the game on ransomware. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>178</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Guest Adam Flatley, Director of Threat Intelligence at Redacted, talks with Dave about "the only way to truly disrupt the ransomware problem is to target the actors themselves," Joe shares some statistics that will help you stay up-to-date on recent cybersecurity trends, Dave's story is about criminal indictments in a case of a Maryland company buying lead paint victims’ settlements for a fraction of their value, and our Catch of the Day comes from listener Brady about a slick mail campaign they received from "Amazon."
Links to stories:

22 cybersecurity statistics to know for 2022

Criminal indictments filed against Maryland company that targeted Baltimore lead paint victims’ settlements


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Guest Adam Flatley, Director of Threat Intelligence at Redacted, talks with Dave about "the only way to truly disrupt the ransomware problem is to target the actors themselves," Joe shares some statistics that will help you stay up-to-date on recent cybersecurity trends, Dave's story is about criminal indictments in a case of a Maryland company buying lead paint victims’ settlements for a fraction of their value, and our Catch of the Day comes from listener Brady about a slick mail campaign they received from "Amazon."</p><p>Links to stories:</p><ul>
<li><a href="https://www.welivesecurity.com/2021/12/30/22-cybersecurity-statistics-know-2022/">22 cybersecurity statistics to know for 2022</a></li>
<li><a href="https://www.baltimoresun.com/maryland/baltimore-city/bs-md-ci-access-funding-criminal-charges-20211222-eajvbepqofasbk5rifdztirlya-story.html">Criminal indictments filed against Maryland company that targeted Baltimore lead paint victims’ settlements</a></li>
</ul><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>2961</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[761cdf42-ad15-11eb-868a-2f10ec0875a1]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW9921146946.mp3?updated=1641321369" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>OWASP injection (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/79/notes</link>
      <description>A broad class of attack vectors, where an attacker supplies input to an applications command interpreter that results in unanticipated functionality. </description>
      <pubDate>Tue, 04 Jan 2022 08:00:00 -0000</pubDate>
      <itunes:title>OWASP injection (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>79</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A broad class of attack vectors, where an attacker supplies input to an applications command interpreter that results in unanticipated functionality. </itunes:summary>
      <content:encoded>
        <![CDATA[<p>A broad class of attack vectors, where an attacker supplies input to an applications command interpreter that results in unanticipated functionality. </p>]]>
      </content:encoded>
      <itunes:duration>392</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b2f09e54-53af-11ec-ab82-8f73e0d70664]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW1515204574.mp3?updated=1655137156" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Identity "protection" and a pigeon drop. [Hacking Humans Goes to the Movies]</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans-goes-to-the-movies/5/notes</link>
      <description>Thanks for joining us for Episode 5 of our fun project brought to you by the team of Hacking Humans, the CyberWire's social engineering podcast. Co-hosts Dave Bittner and Joe Carrigan are joined by Rick Howard in this series where they view clips from their favorite movies with examples of the social engineering scams and schemes you hear about on Hacking Humans. In this episode, Dave, Joe and Rick are watching Joe's and Dave's scene picks. They watch each of the selected scenes, describe the on-screen action for you, and then the team deconstructs what they saw. Grab your popcorn and join us for a trip to the movies.
Links to this episode's clips if you'd like to watch along:

Joe's clip from "Identity Thief"

Rick's pick from "The Flim-Flam Man"</description>
      <pubDate>Thu, 30 Dec 2021 08:00:00 -0000</pubDate>
      <itunes:title>Identity "protection" and a pigeon drop. [Hacking Humans Goes to the Movies]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>5</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Thanks for joining us for Episode 5 of our fun project brought to you by the team of Hacking Humans, the CyberWire's social engineering podcast. Co-hosts Dave Bittner and Joe Carrigan are joined by Rick Howard in this series where they view clips from their favorite movies with examples of the social engineering scams and schemes you hear about on Hacking Humans. In this episode, Dave, Joe and Rick are watching Joe's and Dave's scene picks. They watch each of the selected scenes, describe the on-screen action for you, and then the team deconstructs what they saw. Grab your popcorn and join us for a trip to the movies.
Links to this episode's clips if you'd like to watch along:

Joe's clip from "Identity Thief"

Rick's pick from "The Flim-Flam Man"</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Thanks for joining us for Episode 5 of our fun project brought to you by the team of Hacking Humans, the CyberWire's social engineering podcast. Co-hosts Dave Bittner and Joe Carrigan are joined by Rick Howard in this series where they view clips from their favorite movies with examples of the social engineering scams and schemes you hear about on Hacking Humans. In this episode, Dave, Joe and Rick are watching Joe's and Dave's scene picks. They watch each of the selected scenes, describe the on-screen action for you, and then the team deconstructs what they saw. Grab your popcorn and join us for a trip to the movies.</p><p>Links to this episode's clips if you'd like to watch along:</p><ul>
<li>Joe's clip from "<a href="https://www.youtube.com/watch?v=C5tslgbduiI">Identity Thief</a>"</li>
<li>Rick's pick from "<a href="https://www.youtube.com/watch?v=8hEm6LiU3rw">The Flim-Flam Man</a>"</li>
</ul>]]>
      </content:encoded>
      <itunes:duration>1283</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[af4450d0-62c2-11ec-8a74-8ff0ec420935]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW3873203099.mp3?updated=1668989419" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Encore: zero trust (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/73/notes</link>
      <description>A security philosophy that assumes adversaries have already penetrated the digital environment and tries to reduce the potential impact by limiting access by people, devices, and software to only the resources essential to perform their function and nothing more. </description>
      <pubDate>Tue, 28 Dec 2021 08:00:00 -0000</pubDate>
      <itunes:title>Encore: zero trust (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>73</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A security philosophy that assumes adversaries have already penetrated the digital environment and tries to reduce the potential impact by limiting access by people, devices, and software to only the resources essential to perform their function and nothing more. </itunes:summary>
      <content:encoded>
        <![CDATA[<p>A security philosophy that assumes adversaries have already penetrated the digital environment and tries to reduce the potential impact by limiting access by people, devices, and software to only the resources essential to perform their function and nothing more. </p>]]>
      </content:encoded>
      <itunes:duration>512</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[adfc6e1e-6354-11ec-9aa1-c31bdb04e285]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW6866917432.mp3?updated=1640197483" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The CyberWire: The 12 Days of Malware.</title>
      <link>https://thecyberwire.com/stories/f765b7d394aa4c16840fd96d405c2ee7/the-cyberwire-the-12-days-of-malware</link>
      <description>Merry Christmas and Happy Holidays from the CyberWire and our friends! Enjoy our rendition of the 12 Days of Malware created by Dave Bittner and performed by Dave and friends: Rachel Tobac, Jayson Street, Ron Eddings &amp; Chris Cochran, Ray [Redacted], Dinah Davis, Camille Stewart, Rick Howard, Michelle Dennedy, Jack Rhysider, Johannes Ullrich, and Charity Wright. Ba dum bum bum. Sing along if you are game! Check out our video for the full effect!

The 12 Days of Malware lyrics
On the first day of Christmas, my malware gave to me:
A keylogger logging my keys.

On the second day of Christmas, my malware gave to me:
2 Trojan Apps...
And a keylogger logging my keys.

On the third day of Christmas, my malware gave to me:
3 Web shells...
2 Trojan Apps...
And a keylogger logging my keys.

On the fourth day of Christmas, my malware gave to me:
4 Crypto scams...
3 Web shells...
2 Trojan Apps...
And a keylogger logging my keys.

On the fifth day of Christmas, my malware gave to me:
5 Zero Days!
4 Crypto scams...
3 Web shells...
2 Trojan Apps...
And a keylogger logging my keys.

On the sixth day of Christmas, my malware gave to me:
6 Passwords spraying...
5 Zero Days!
4 Crypto scams...
3 Web shells...
2 Trojan Apps...
And a keylogger logging my keys.

On the seventh day of Christmas, my malware gave to me:
7 Scripts a scraping...
6 Passwords spraying...
5 Zero Days!
4 Crypto scams...
3 Web shells...
2 Trojan Apps...
And a keylogger logging my keys.

On the eighth day of Christmas, my malware gave to me:
8 Worms a wiping...
7 Scripts a scraping...
6 Passwords spraying...
5 Zero Days!
4 Crypto scams...
3 Web shells...
2 Trojan Apps...
And a keylogger logging my keys.

On the ninth day of Christmas, my malware gave to me:
9 Rootkits rooting...
8 Worms a wiping...
7 Scripts a scraping...
6 Passwords spraying...
5 Zero Days!
4 Crypto scams...
3 Web shells...
2 Trojan Apps...
And a keylogger logging my keys.

On the tenth day of Christmas, my malware gave to me:
10 Darknet markets...
9 Rootkits rooting...
8 Worms a wiping...
7 Scripts a scraping...
6 Passwords spraying...
5 Zero Days! (Bah-dum-dum-dum!)
4 Crypto scams...
3 Web shells...
2 Trojan Apps...
And a keylogger logging my keys.

On the eleventh day of Christmas, my malware gave to me:
11 Phishers phishing...
10 Darknet markets...
9 Rootkits rooting...
8 Worms a wiping...
7 Scripts a scraping...
6 Passwords spraying...
5 Zero Days! (Bah-dum-dum-dum!)
4 Crypto scams...
3 Web shells...
2 Trojan Apps...
And a keylogger logging my keys.

On the twelfth day of Christmas, my malware gave to me:
12 Hackers hacking...
11 Phishers phishing...
10 Darknet markets...
9 Rootkits rooting...
8 Worms a wiping...
7 Scripts a scraping...
6 Passwords spraying...
5 Zero Days!
4 Crypto scams...
3 Web shells...
2 Trojan Apps...
And a keylogger logging my keys.</description>
      <pubDate>Sat, 25 Dec 2021 06:00:00 -0000</pubDate>
      <itunes:title>The CyberWire: The 12 Days of Malware.</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Merry Christmas and Happy Holidays from the CyberWire and our friends! Enjoy our rendition of the 12 Days of Malware created by Dave Bittner and performed by Dave and friends: Rachel Tobac, Jayson Street, Ron Eddings &amp; Chris Cochran, Ray [Redacted], Dinah Davis, Camille Stewart, Rick Howard, Michelle Dennedy, Jack Rhysider, Johannes Ullrich, and Charity Wright. Ba dum bum bum. Sing along if you are game! Check out our video for the full effect!

The 12 Days of Malware lyrics
On the first day of Christmas, my malware gave to me:
A keylogger logging my keys.

On the second day of Christmas, my malware gave to me:
2 Trojan Apps...
And a keylogger logging my keys.

On the third day of Christmas, my malware gave to me:
3 Web shells...
2 Trojan Apps...
And a keylogger logging my keys.

On the fourth day of Christmas, my malware gave to me:
4 Crypto scams...
3 Web shells...
2 Trojan Apps...
And a keylogger logging my keys.

On the fifth day of Christmas, my malware gave to me:
5 Zero Days!
4 Crypto scams...
3 Web shells...
2 Trojan Apps...
And a keylogger logging my keys.

On the sixth day of Christmas, my malware gave to me:
6 Passwords spraying...
5 Zero Days!
4 Crypto scams...
3 Web shells...
2 Trojan Apps...
And a keylogger logging my keys.

On the seventh day of Christmas, my malware gave to me:
7 Scripts a scraping...
6 Passwords spraying...
5 Zero Days!
4 Crypto scams...
3 Web shells...
2 Trojan Apps...
And a keylogger logging my keys.

On the eighth day of Christmas, my malware gave to me:
8 Worms a wiping...
7 Scripts a scraping...
6 Passwords spraying...
5 Zero Days!
4 Crypto scams...
3 Web shells...
2 Trojan Apps...
And a keylogger logging my keys.

On the ninth day of Christmas, my malware gave to me:
9 Rootkits rooting...
8 Worms a wiping...
7 Scripts a scraping...
6 Passwords spraying...
5 Zero Days!
4 Crypto scams...
3 Web shells...
2 Trojan Apps...
And a keylogger logging my keys.

On the tenth day of Christmas, my malware gave to me:
10 Darknet markets...
9 Rootkits rooting...
8 Worms a wiping...
7 Scripts a scraping...
6 Passwords spraying...
5 Zero Days! (Bah-dum-dum-dum!)
4 Crypto scams...
3 Web shells...
2 Trojan Apps...
And a keylogger logging my keys.

On the eleventh day of Christmas, my malware gave to me:
11 Phishers phishing...
10 Darknet markets...
9 Rootkits rooting...
8 Worms a wiping...
7 Scripts a scraping...
6 Passwords spraying...
5 Zero Days! (Bah-dum-dum-dum!)
4 Crypto scams...
3 Web shells...
2 Trojan Apps...
And a keylogger logging my keys.

On the twelfth day of Christmas, my malware gave to me:
12 Hackers hacking...
11 Phishers phishing...
10 Darknet markets...
9 Rootkits rooting...
8 Worms a wiping...
7 Scripts a scraping...
6 Passwords spraying...
5 Zero Days!
4 Crypto scams...
3 Web shells...
2 Trojan Apps...
And a keylogger logging my keys.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Merry Christmas and Happy Holidays from the CyberWire and our friends! Enjoy our rendition of the 12 Days of Malware created by Dave Bittner and performed by Dave and friends: Rachel Tobac, Jayson Street, Ron Eddings &amp; Chris Cochran, Ray [Redacted], Dinah Davis, Camille Stewart, Rick Howard, Michelle Dennedy, Jack Rhysider, Johannes Ullrich, and Charity Wright. Ba dum bum bum. Sing along if you are game! Check out <a href="https://cms.megaphone.fm/organizations/cd9023bc-9a2c-11ea-bbcb-a7f75b26f845/podcasts/f648c30a-dcde-11ea-aec8-7b76c1eb0a95/episodes/2406c22e-635c-11ec-aff6-db28c974e98c/thecyberwire.com/stories/f765b7d394aa4c16840fd96d405c2ee7/the-cyberwire-the-12-days-of-malware">our video</a> for the full effect!</p><p><br></p><p><strong>The 12 Days of Malware lyrics</strong></p><p><em>On the first day of Christmas, my malware gave to me:</em></p><p><em>A keylogger logging my keys.</em></p><p><br></p><p><em>On the second day of Christmas, my malware gave to me:</em></p><p><em>2 Trojan Apps...</em></p><p><em>And a keylogger logging my keys.</em></p><p><br></p><p><em>On the third day of Christmas, my malware gave to me:</em></p><p><em>3 Web shells...</em></p><p><em>2 Trojan Apps...</em></p><p><em>And a keylogger logging my keys.</em></p><p><br></p><p><em>On the fourth day of Christmas, my malware gave to me:</em></p><p><em>4 Crypto scams...</em></p><p><em>3 Web shells...</em></p><p><em>2 Trojan Apps...</em></p><p><em>And a keylogger logging my keys.</em></p><p><br></p><p><em>On the fifth day of Christmas, my malware gave to me:</em></p><p><em>5 Zero Days!</em></p><p><em>4 Crypto scams...</em></p><p><em>3 Web shells...</em></p><p><em>2 Trojan Apps...</em></p><p><em>And a keylogger logging my keys.</em></p><p><br></p><p><em>On the sixth day of Christmas, my malware gave to me:</em></p><p><em>6 Passwords spraying...</em></p><p><em>5 Zero Days!</em></p><p><em>4 Crypto scams...</em></p><p><em>3 Web shells...</em></p><p><em>2 Trojan Apps...</em></p><p><em>And a keylogger logging my keys.</em></p><p><br></p><p><em>On the seventh day of Christmas, my malware gave to me:</em></p><p><em>7 Scripts a scraping...</em></p><p><em>6 Passwords spraying...</em></p><p><em>5 Zero Days!</em></p><p><em>4 Crypto scams...</em></p><p><em>3 Web shells...</em></p><p><em>2 Trojan Apps...</em></p><p><em>And a keylogger logging my keys.</em></p><p><br></p><p><em>On the eighth day of Christmas, my malware gave to me:</em></p><p><em>8 Worms a wiping...</em></p><p><em>7 Scripts a scraping...</em></p><p><em>6 Passwords spraying...</em></p><p><em>5 Zero Days!</em></p><p><em>4 Crypto scams...</em></p><p><em>3 Web shells...</em></p><p><em>2 Trojan Apps...</em></p><p><em>And a keylogger logging my keys.</em></p><p><br></p><p><em>On the ninth day of Christmas, my malware gave to me:</em></p><p><em>9 Rootkits rooting...</em></p><p><em>8 Worms a wiping...</em></p><p><em>7 Scripts a scraping...</em></p><p><em>6 Passwords spraying...</em></p><p><em>5 Zero Days!</em></p><p><em>4 Crypto scams...</em></p><p><em>3 Web shells...</em></p><p><em>2 Trojan Apps...</em></p><p><em>And a keylogger logging my keys.</em></p><p><br></p><p><em>On the tenth day of Christmas, my malware gave to me:</em></p><p><em>10 Darknet markets...</em></p><p><em>9 Rootkits rooting...</em></p><p><em>8 Worms a wiping...</em></p><p><em>7 Scripts a scraping...</em></p><p><em>6 Passwords spraying...</em></p><p><em>5 Zero Days! (Bah-dum-dum-dum!)</em></p><p><em>4 Crypto scams...</em></p><p><em>3 Web shells...</em></p><p><em>2 Trojan Apps...</em></p><p><em>And a keylogger logging my keys.</em></p><p><br></p><p><em>On the eleventh day of Christmas, my malware gave to me:</em></p><p><em>11 Phishers phishing...</em></p><p><em>10 Darknet markets...</em></p><p><em>9 Rootkits rooting...</em></p><p><em>8 Worms a wiping...</em></p><p><em>7 Scripts a scraping...</em></p><p><em>6 Passwords spraying...</em></p><p><em>5 Zero Days! (Bah-dum-dum-dum!)</em></p><p><em>4 Crypto scams...</em></p><p><em>3 Web shells...</em></p><p><em>2 Trojan Apps...</em></p><p><em>And a keylogger logging my keys.</em></p><p><br></p><p><em>On the twelfth day of Christmas, my malware gave to me:</em></p><p><em>12 Hackers hacking...</em></p><p><em>11 Phishers phishing...</em></p><p><em>10 Darknet markets...</em></p><p><em>9 Rootkits rooting...</em></p><p><em>8 Worms a wiping...</em></p><p><em>7 Scripts a scraping...</em></p><p><em>6 Passwords spraying...</em></p><p><em>5 Zero Days!</em></p><p><em>4 Crypto scams...</em></p><p><em>3 Web shells...</em></p><p><em>2 Trojan Apps...</em></p><p><em>And a keylogger logging my keys.</em></p>]]>
      </content:encoded>
      <itunes:duration>448</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c7e1c0d4-6360-11ec-937e-53f11410eb18]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW1928773986.mp3?updated=1640203827" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Hustling the hustler and three-card Monte. [Hacking Humans Goes to the Movies]</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans-goes-to-the-movies/4/notes</link>
      <description>Thanks for joining us for Episode 4 of our fun project brought to you by the team of Hacking Humans, the CyberWire's social engineering podcast. Co-hosts Dave Bittner and Joe Carrigan are joined by Rick Howard in this series where they view clips from their favorite movies with examples of the social engineering scams and schemes you hear about on Hacking Humans. In this episode, Dave, Joe and Rick are watching Joe's and Rick's scene picks. They watch each of the selected scenes, describe the on-screen action for you, and then the team deconstructs what they saw. Grab your popcorn and join us for a trip to the movies.
Links to this episode's clips if you'd like to watch along:

Joe's clip from "The Fresh Prince Of Bel-Air: Pool Hall Hustle" scene

Rick's pick from "Lock, Stock and Two Smoking Barrels"</description>
      <pubDate>Fri, 24 Dec 2021 08:00:00 -0000</pubDate>
      <itunes:title>Hustling the hustler and three-card Monte. [Hacking Humans Goes to the Movies]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>4</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Thanks for joining us for Episode 4 of our fun project brought to you by the team of Hacking Humans, the CyberWire's social engineering podcast. Co-hosts Dave Bittner and Joe Carrigan are joined by Rick Howard in this series where they view clips from their favorite movies with examples of the social engineering scams and schemes you hear about on Hacking Humans. In this episode, Dave, Joe and Rick are watching Joe's and Rick's scene picks. They watch each of the selected scenes, describe the on-screen action for you, and then the team deconstructs what they saw. Grab your popcorn and join us for a trip to the movies.
Links to this episode's clips if you'd like to watch along:

Joe's clip from "The Fresh Prince Of Bel-Air: Pool Hall Hustle" scene

Rick's pick from "Lock, Stock and Two Smoking Barrels"</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Thanks for joining us for Episode 4 of our fun project brought to you by the team of Hacking Humans, the CyberWire's social engineering podcast. Co-hosts Dave Bittner and Joe Carrigan are joined by Rick Howard in this series where they view clips from their favorite movies with examples of the social engineering scams and schemes you hear about on Hacking Humans. In this episode, Dave, Joe and Rick are watching Joe's and Rick's scene picks. They watch each of the selected scenes, describe the on-screen action for you, and then the team deconstructs what they saw. Grab your popcorn and join us for a trip to the movies.</p><p>Links to this episode's clips if you'd like to watch along:</p><ul>
<li>Joe's clip from "<a href="https://www.youtube.com/watch?v=i7u1SGsT51w">The Fresh Prince Of Bel-Air: Pool Hall Hustle</a>" scene</li>
<li>Rick's pick from "<a href="https://www.youtube.com/watch?v=yrHEu-c2UFg">Lock, Stock and Two Smoking Barrels</a>"</li>
</ul>]]>
      </content:encoded>
      <itunes:duration>1214</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[8aa54216-62c2-11ec-8f4c-0bc335649f77]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW3442818371.mp3?updated=1668989410" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Even if a cause moves you, do your due diligence. </title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/177/notes</link>
      <description>Guest Amaya Hadnagy, Media Support for the Social-Engineer, LLC, joins Dave to share information about charity scams, Dave shares a personal story about some safety triggers he recently put into place to help protect his elderly parents financial accounts from scams, Joe's story comes from a listener Alice about someone scamming female Indian news anchors about jobs in Harvard University's journalism department, and our Catch of the Day comes from an imposter of Navy Federal Credit Union via listener Chris.
Links to stories:
The Harvard Job Offer No One at Harvard Ever Heard Of

Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 23 Dec 2021 06:00:00 -0000</pubDate>
      <itunes:title>Even if a cause moves you, do your due diligence. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>177</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Guest Amaya Hadnagy, Media Support for the Social-Engineer, LLC, joins Dave to share information about charity scams, Dave shares a personal story about some safety triggers he recently put into place to help protect his elderly parents financial accounts from scams, Joe's story comes from a listener Alice about someone scamming female Indian news anchors about jobs in Harvard University's journalism department, and our Catch of the Day comes from an imposter of Navy Federal Credit Union via listener Chris.
Links to stories:
The Harvard Job Offer No One at Harvard Ever Heard Of

Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Guest Amaya Hadnagy, Media Support for the Social-Engineer, LLC, joins Dave to share information about charity scams, Dave shares a personal story about some safety triggers he recently put into place to help protect his elderly parents financial accounts from scams, Joe's story comes from a listener Alice about someone scamming female Indian news anchors about jobs in Harvard University's journalism department, and our Catch of the Day comes from an imposter of Navy Federal Credit Union via listener Chris.</p><p>Links to stories:</p><ul><li><a href="https://www.nytimes.com/2021/12/16/technology/harvard-job-scam-india.html?auth=login-google">The Harvard Job Offer No One at Harvard Ever Heard Of</a></li></ul><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>1828</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[4c038070-357a-11eb-b2fc-439b5a1c1412]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW7055371955.mp3?updated=1640044536" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Conmen come in many flavors, all motivated by greed. [Hacking Humans Goes to the Movies]</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans-goes-to-the-movies/3/notes</link>
      <description>Thanks for joining us for our fun project brought to you by the team of Hacking Humans, the CyberWire's social engineering podcast. Co-hosts Dave Bittner and Joe Carrigan are joined by Rick Howard in this series where they view clips from their favorite movies with examples of the social engineering scams and schemes you hear about on Hacking Humans. In this episode, Dave, Joe and Rick are watching Dave's and Rick's scene picks. They watch each of the selected scenes, describe the on-screen action for you, and then the team deconstructs what they saw. Grab your popcorn and head to the movies with us.
Links to this episode's clips if you'd like to watch along:

Dave's clip from "Dirty Rotten Scoundrels"

Rick's pick from "The Sting"</description>
      <pubDate>Wed, 22 Dec 2021 08:00:00 -0000</pubDate>
      <itunes:title>Conmen come in many flavors, all motivated by greed. [Hacking Humans Goes to the Movies]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>3</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Thanks for joining us for our fun project brought to you by the team of Hacking Humans, the CyberWire's social engineering podcast. Co-hosts Dave Bittner and Joe Carrigan are joined by Rick Howard in this series where they view clips from their favorite movies with examples of the social engineering scams and schemes you hear about on Hacking Humans. In this episode, Dave, Joe and Rick are watching Dave's and Rick's scene picks. They watch each of the selected scenes, describe the on-screen action for you, and then the team deconstructs what they saw. Grab your popcorn and head to the movies with us.
Links to this episode's clips if you'd like to watch along:

Dave's clip from "Dirty Rotten Scoundrels"

Rick's pick from "The Sting"</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Thanks for joining us for our fun project brought to you by the team of Hacking Humans, the CyberWire's social engineering podcast. Co-hosts Dave Bittner and Joe Carrigan are joined by Rick Howard in this series where they view clips from their favorite movies with examples of the social engineering scams and schemes you hear about on Hacking Humans. In this episode, Dave, Joe and Rick are watching Dave's and Rick's scene picks. They watch each of the selected scenes, describe the on-screen action for you, and then the team deconstructs what they saw. Grab your popcorn and head to the movies with us.</p><p>Links to this episode's clips if you'd like to watch along:</p><ul>
<li>Dave's clip from "<a href="https://www.youtube.com/watch?v=EOyAHaO7lwA">Dirty Rotten Scoundrels</a>"</li>
<li>Rick's pick from "<a href="https://www.youtube.com/watch?v=TOuEQwYYD34">The Sting</a>"</li>
</ul>]]>
      </content:encoded>
      <itunes:duration>1334</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[0d887e94-62b6-11ec-aed4-0b4ee17d93ef]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW2178617914.mp3?updated=1668989401" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>OWASP cryptographic failures (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/78/notes</link>
      <description>Code that fails to protect sensitive information. </description>
      <pubDate>Tue, 21 Dec 2021 08:00:00 -0000</pubDate>
      <itunes:title>OWASP cryptographic failures (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>78</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Code that fails to protect sensitive information. </itunes:summary>
      <content:encoded>
        <![CDATA[<p>Code that fails to protect sensitive information. </p>]]>
      </content:encoded>
      <itunes:duration>395</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[128c0966-4ca3-11ec-aab0-af10fcbc8b29]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW8661360296.mp3?updated=1655136902" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The 3 M's: Minimize, monitor and manage. </title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/176/notes</link>
      <description>Guest Adam Levin, security expert and podcast host of "What the Hack with Adam Levin," joins Dave to share advice and discuss some experiences shared on his podcast, Dave and Joe have some listener follow up from David with clarification on 2FA, Joe's story is about a job scam for positions at a video game company, Dave's got a story about how tools like Google and smartphones affect our memories and how we judge our own abilities, our Catch of the Day is from a listener named Chris with a fake email from Amazon about a TV his father "purchased," and how Chris had to intervene.
Links to stories:

They thought they got their dream job at Riot Games — but it was a scam

Indeed's Guidelines for Safe Job Search

The internet is tricking our brains


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 16 Dec 2021 06:00:00 -0000</pubDate>
      <itunes:title>The 3 M's: Minimize, monitor and manage. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>176</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Guest Adam Levin, security expert and podcast host of "What the Hack with Adam Levin," joins Dave to share advice and discuss some experiences shared on his podcast, Dave and Joe have some listener follow up from David with clarification on 2FA, Joe's story is about a job scam for positions at a video game company, Dave's got a story about how tools like Google and smartphones affect our memories and how we judge our own abilities, our Catch of the Day is from a listener named Chris with a fake email from Amazon about a TV his father "purchased," and how Chris had to intervene.
Links to stories:

They thought they got their dream job at Riot Games — but it was a scam

Indeed's Guidelines for Safe Job Search

The internet is tricking our brains


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Guest Adam Levin, security expert and podcast host of "What the Hack with Adam Levin," joins Dave to share advice and discuss some experiences shared on his podcast, Dave and Joe have some listener follow up from David with clarification on 2FA, Joe's story is about a job scam for positions at a video game company, Dave's got a story about how tools like Google and smartphones affect our memories and how we judge our own abilities, our Catch of the Day is from a listener named Chris with a fake email from Amazon about a TV his father "purchased," and how Chris had to intervene.</p><p>Links to stories:</p><ul>
<li><a href="https://www.polygon.com/22822273/riot-games-job-recruiting-scam-lawsuit">They thought they got their dream job at Riot Games — but it was a scam</a></li>
<li><a href="https://support.indeed.com/hc/en-us/articles/216354123-Guidelines-for-Safe-Job-Search">Indeed's Guidelines for Safe Job Search</a></li>
<li><a href="https://www.nbcnews.com/tech/internet/internet-tricking-brains-rcna7193">The internet is tricking our brains</a></li>
</ul><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>2752</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[4bf6eb30-357a-11eb-b2fc-df54c681b271]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW7539091104.mp3?updated=1639426759" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>account takeover prevention (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/77/notes</link>
      <description>The prevention of the first part of an intrusion kill chain model exploitation technique, where the hacker steals valid logging credentials from a targeted victim. </description>
      <pubDate>Tue, 14 Dec 2021 08:00:00 -0000</pubDate>
      <itunes:title>account takeover prevention (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>77</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>The prevention of the first part of an intrusion kill chain model exploitation technique, where the hacker steals valid logging credentials from a targeted victim. </itunes:summary>
      <content:encoded>
        <![CDATA[<p>The prevention of the first part of an intrusion kill chain model exploitation technique, where the hacker steals valid logging credentials from a targeted victim. </p>]]>
      </content:encoded>
      <itunes:duration>383</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[32d367dc-48a7-11ec-b16b-4b1b73e95531]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW2648969857.mp3?updated=1655139926" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Scams abound this time of year. </title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/175/notes</link>
      <description>Guest Dave Senci of Mastercard's NuData Security talks about the security issues with remote access and coaching frauds, Dave's got a story about receiving a "Best Buy gift card" and USB mailing, Joe's story is from the Better Business Bureau about their "12 Scams of Christmas," and our Catch of the Day is from our listener Henry who received an email that appeals to one's faith.
Links to stories:

PSA: If You Get a 'Best Buy Gift Card' on a USB Drive in the Mail, Don't Plug It Into Your PC

The Naughty List: BBB's 12 Scams of Christmas


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 09 Dec 2021 06:00:00 -0000</pubDate>
      <itunes:title>Scams abound this time of year. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>175</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Guest Dave Senci of Mastercard's NuData Security talks about the security issues with remote access and coaching frauds, Dave's got a story about receiving a "Best Buy gift card" and USB mailing, Joe's story is from the Better Business Bureau about their "12 Scams of Christmas," and our Catch of the Day is from our listener Henry who received an email that appeals to one's faith.
Links to stories:

PSA: If You Get a 'Best Buy Gift Card' on a USB Drive in the Mail, Don't Plug It Into Your PC

The Naughty List: BBB's 12 Scams of Christmas


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Guest Dave Senci of Mastercard's NuData Security talks about the security issues with remote access and coaching frauds, Dave's got a story about receiving a "Best Buy gift card" and USB mailing, Joe's story is from the Better Business Bureau about their "12 Scams of Christmas," and our Catch of the Day is from our listener Henry who received an email that appeals to one's faith.</p><p>Links to stories:</p><ul>
<li><a href="https://www.pcmag.com/news/psa-if-you-get-a-best-buy-gift-card-on-a-usb-drive-in-the-mail-dont-plug">PSA: If You Get a 'Best Buy Gift Card' on a USB Drive in the Mail, Don't Plug It Into Your PC</a></li>
<li><a href="https://www.bbb.org/article/news-releases/23497-the-naughty-list-bbbs-12-scams-of-christmas">The Naughty List: BBB's 12 Scams of Christmas</a></li>
</ul><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>2635</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[4be75c2e-357a-11eb-b2fc-0f9bf0d1fcd7]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW5474897029.mp3?updated=1638822637" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>threat hunting (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/76/notes</link>
      <description>The process of proactively searching through networks to detect and isolate security threats, rather than relying on security solutions or services to detect those threats. </description>
      <pubDate>Tue, 07 Dec 2021 08:00:00 -0000</pubDate>
      <itunes:title>threat hunting (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>76</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>The process of proactively searching through networks to detect and isolate security threats, rather than relying on security solutions or services to detect those threats. </itunes:summary>
      <content:encoded>
        <![CDATA[<p>The process of proactively searching through networks to detect and isolate security threats, rather than relying on security solutions or services to detect those threats. </p>]]>
      </content:encoded>
      <itunes:duration>421</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[0c36984c-4401-11ec-9378-8ff93b0661bd]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW4280970020.mp3?updated=1655145584" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Do you really want that device to be a connected device? </title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/174/notes</link>
      <description>Guest Jay Radcliffe from Thermo Fisher Scientific shares his advice and security concerns with smart devices since the holiday gifting season is around the corner, Joe and Dave have some listener follow up about 2FA, Joe's got a story about the Robinhood breach, Dave's story is about numerous LinkedIn requests from HR specialists with GAN images (Generated Adversarial Network), and our Catch of the Day is from listener Michael who was just trying to sell his car and then he got a text message.
Links to stories:

Data Breach of Robinhood Trading Platform Blamed on Social Engineering, Similar to 2020 Twitter Breach

LinkedIn Fakes: A Wolf in Business Casual Clothing


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 02 Dec 2021 06:00:00 -0000</pubDate>
      <itunes:title>Do you really want that device to be a connected device? </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>174</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Guest Jay Radcliffe from Thermo Fisher Scientific shares his advice and security concerns with smart devices since the holiday gifting season is around the corner, Joe and Dave have some listener follow up about 2FA, Joe's got a story about the Robinhood breach, Dave's story is about numerous LinkedIn requests from HR specialists with GAN images (Generated Adversarial Network), and our Catch of the Day is from listener Michael who was just trying to sell his car and then he got a text message.
Links to stories:

Data Breach of Robinhood Trading Platform Blamed on Social Engineering, Similar to 2020 Twitter Breach

LinkedIn Fakes: A Wolf in Business Casual Clothing


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Guest Jay Radcliffe from Thermo Fisher Scientific shares his advice and security concerns with smart devices since the holiday gifting season is around the corner, Joe and Dave have some listener follow up about 2FA, Joe's got a story about the Robinhood breach, Dave's story is about numerous LinkedIn requests from HR specialists with GAN images (Generated Adversarial Network), and our Catch of the Day is from listener Michael who was just trying to sell his car and then he got a text message.</p><p>Links to stories:</p><ul>
<li><a href="https://www.cpomagazine.com/cyber-security/data-breach-of-robinhood-trading-platform-blamed-on-social-engineering-similar-to-2020-twitter-breach/">Data Breach of Robinhood Trading Platform Blamed on Social Engineering, Similar to 2020 Twitter Breach</a></li>
<li><a href="https://hatless1der.com/linkedin-fakes-a-wolf-in-business-casual-clothing/">LinkedIn Fakes: A Wolf in Business Casual Clothing</a></li>
</ul><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>2844</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[4bd8eb62-357a-11eb-b2fc-d7ba158c273a]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW3478451055.mp3?updated=1638374380" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>vulnerability management (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/75/notes</link>
      <description>The continuous practice of identifying classifying, prioritizing, remediating, and mitigating software vulnerabilities within this.</description>
      <pubDate>Tue, 30 Nov 2021 08:00:00 -0000</pubDate>
      <itunes:title>vulnerability management (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>75</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>The continuous practice of identifying classifying, prioritizing, remediating, and mitigating software vulnerabilities within this.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The continuous practice of identifying classifying, prioritizing, remediating, and mitigating software vulnerabilities within this.</p>]]>
      </content:encoded>
      <itunes:duration>496</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[7221994e-3dc7-11ec-a9e9-67e5d342718e]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW1000312189.mp3?updated=1655146470" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Misdirection and layering with a con in the middle. [Hacking Humans Goes to the Movies]</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans-goes-to-the-movies/2/notes</link>
      <description>Thanks for joining us for our fun project brought to you by the team of Hacking Humans, the CyberWire's social engineering podcast. Co-hosts Dave Bittner and Joe Carrigan are joined by Rick Howard in this series where they view clips from their favorite movies with examples of the social engineering scams and schemes you hear about on Hacking Humans. In this episode, Dave, Joe and Rick are watching Joe's and Rick's scene picks. They watch each of the selected scenes, describe the on-screen action for you, and then the team deconstructs what they saw. Grab your popcorn and join us for a trip to the movies.
Links to this episode's clips if you'd like to watch along:

Joe's clip from "The Simpsons: Father and Son Grifting" episode

Rick's pick from "Paper Moon"</description>
      <pubDate>Thu, 25 Nov 2021 06:00:00 -0000</pubDate>
      <itunes:title>Misdirection and layering with a con in the middle. [Hacking Humans Goes to the Movies]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>2</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Thanks for joining us for our fun project brought to you by the team of Hacking Humans, the CyberWire's social engineering podcast. Co-hosts Dave Bittner and Joe Carrigan are joined by Rick Howard in this series where they view clips from their favorite movies with examples of the social engineering scams and schemes you hear about on Hacking Humans. In this episode, Dave, Joe and Rick are watching Joe's and Rick's scene picks. They watch each of the selected scenes, describe the on-screen action for you, and then the team deconstructs what they saw. Grab your popcorn and join us for a trip to the movies.
Links to this episode's clips if you'd like to watch along:

Joe's clip from "The Simpsons: Father and Son Grifting" episode

Rick's pick from "Paper Moon"</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Thanks for joining us for our fun project brought to you by the team of Hacking Humans, the CyberWire's social engineering podcast. Co-hosts Dave Bittner and Joe Carrigan are joined by Rick Howard in this series where they view clips from their favorite movies with examples of the social engineering scams and schemes you hear about on Hacking Humans. In this episode, Dave, Joe and Rick are watching Joe's and Rick's scene picks. They watch each of the selected scenes, describe the on-screen action for you, and then the team deconstructs what they saw. Grab your popcorn and join us for a trip to the movies.</p><p>Links to this episode's clips if you'd like to watch along:</p><ul>
<li>Joe's clip from "<a href="https://www.youtube.com/watch?v=Dy7L_fyYAm8">The Simpsons: Father and Son Grifting</a>" episode</li>
<li>Rick's pick from "<a href="https://www.youtube.com/watch?v=iqueZ1KNeT8">Paper Moon</a>"</li>
</ul>]]>
      </content:encoded>
      <itunes:duration>1065</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[d78c0fea-4c76-11ec-a7d4-1755aa78bc0f]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW3763179785.mp3?updated=1668989320" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>software bill of materials (SBOM) (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/74/notes</link>
      <description>A formal record containing the details and supply chain relationships of various components used in building software. </description>
      <pubDate>Tue, 23 Nov 2021 08:00:00 -0000</pubDate>
      <itunes:title>software bill of materials (SBOM) (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>74</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A formal record containing the details and supply chain relationships of various components used in building software. </itunes:summary>
      <content:encoded>
        <![CDATA[<p>A formal record containing the details and supply chain relationships of various components used in building software. </p>]]>
      </content:encoded>
      <itunes:duration>419</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[7dae1ac0-3738-11ec-9a88-a748d0fe26c1]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW2556467651.mp3?updated=1635345794" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>A good amount of skepticism helps protect you online.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/173/notes</link>
      <description>Guest Blake Hall, CEO and founder of a company called ID.me, discusses protecting your identity online, Dave and Joe have some follow up from listener Rafa on 2FA he uses, Dave has a story about bots that take advantage of 2FA to break into your payment accounts, Joe's story is about scams carried out through QR codes, and our COTD comes from listener Wyatt about an award-winning email from Warren Buffett.
Links to stories:

The Booming Underground Market for Bots That Steal Your 2FA Codes

Fake “Sugar Daddies” are cheating on Instagram


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 18 Nov 2021 06:00:00 -0000</pubDate>
      <itunes:title>A good amount of skepticism helps protect you online.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>173</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Guest Blake Hall, CEO and founder of a company called ID.me, discusses protecting your identity online, Dave and Joe have some follow up from listener Rafa on 2FA he uses, Dave has a story about bots that take advantage of 2FA to break into your payment accounts, Joe's story is about scams carried out through QR codes, and our COTD comes from listener Wyatt about an award-winning email from Warren Buffett.
Links to stories:

The Booming Underground Market for Bots That Steal Your 2FA Codes

Fake “Sugar Daddies” are cheating on Instagram


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Guest Blake Hall, CEO and founder of a company called ID.me, discusses protecting your identity online, Dave and Joe have some follow up from listener Rafa on 2FA he uses, Dave has a story about bots that take advantage of 2FA to break into your payment accounts, Joe's story is about scams carried out through QR codes, and our COTD comes from listener Wyatt about an award-winning email from Warren Buffett.</p><p>Links to stories:</p><ul>
<li><a href="https://www.vice.com/en/article/y3vz5k/booming-underground-market-bots-2fa-otp-paypal-amazon-bank-apple-venmo">The Booming Underground Market for Bots That Steal Your 2FA Codes</a></li>
<li><a href="https://cooltechzone.com/news/fake-sugar-daddies-are-cheating-on-instagram">Fake “Sugar Daddies” are cheating on Instagram</a></li>
</ul><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>3048</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[4bcc10ae-357a-11eb-b2fc-63f40afc2121]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW9749846994.mp3?updated=1637257892" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>zero trust (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/73/notes</link>
      <description>A security philosophy that assumes adversaries have already penetrated the digital environment and tries to reduce the potential impact by limiting access by people, devices, and software to only the resources essential to perform their function and nothing more. </description>
      <pubDate>Tue, 16 Nov 2021 08:00:00 -0000</pubDate>
      <itunes:title>zero trust (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>73</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A security philosophy that assumes adversaries have already penetrated the digital environment and tries to reduce the potential impact by limiting access by people, devices, and software to only the resources essential to perform their function and nothing more. </itunes:summary>
      <content:encoded>
        <![CDATA[<p>A security philosophy that assumes adversaries have already penetrated the digital environment and tries to reduce the potential impact by limiting access by people, devices, and software to only the resources essential to perform their function and nothing more. </p>]]>
      </content:encoded>
      <itunes:duration>542</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b9c60568-32b0-11ec-ad3a-83f93ea2a35f]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW2934189791.mp3?updated=1634742366" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Let's go to the movies. [Hacking Humans Goes to the Movies]</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans-goes-to-the-movies/1/notes</link>
      <description>Welcome to a fun new project by the team who brings you Hacking Humans, the CyberWire's social engineering podcast. Co-hosts Dave Bittner and Joe Carrigan are joined by Rick Howard in this series. They view clips from their favorite movies with examples of the social engineering scams and schemes you hear about on Hacking Humans. In this first episode, Dave, Joe and Rick are watching Dave's and Joe's picks. They watch each of the selected scenes, describe the on-screen action for you, and then the team deconstructs what they saw. Grab your popcorn and join us for a trip to the movies.
Links to movie clips if you'd like to watch along:

Dave's pick from "The Grifters"

Joe's clip from "Matchstick Men"</description>
      <pubDate>Thu, 11 Nov 2021 06:00:00 -0000</pubDate>
      <itunes:title>Let's go to the movies. [Hacking Humans Goes to the Movies]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>1</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/f31f619a-416c-11ec-a3d5-578bdfcb207e/image/HH-Goes-to-Movies-Cover-Art-05.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Welcome to a fun new project by the team who brings you Hacking Humans, the CyberWire's social engineering podcast. Co-hosts Dave Bittner and Joe Carrigan are joined by Rick Howard in this series. They view clips from their favorite movies with examples of the social engineering scams and schemes you hear about on Hacking Humans. In this first episode, Dave, Joe and Rick are watching Dave's and Joe's picks. They watch each of the selected scenes, describe the on-screen action for you, and then the team deconstructs what they saw. Grab your popcorn and join us for a trip to the movies.
Links to movie clips if you'd like to watch along:

Dave's pick from "The Grifters"

Joe's clip from "Matchstick Men"</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Welcome to a fun new project by the team who brings you Hacking Humans, the CyberWire's social engineering podcast. Co-hosts Dave Bittner and Joe Carrigan are joined by Rick Howard in this series. They view clips from their favorite movies with examples of the social engineering scams and schemes you hear about on Hacking Humans. In this first episode, Dave, Joe and Rick are watching Dave's and Joe's picks. They watch each of the selected scenes, describe the on-screen action for you, and then the team deconstructs what they saw. Grab your popcorn and join us for a trip to the movies.</p><p>Links to movie clips if you'd like to watch along:</p><ul>
<li>Dave's pick from "<a href="https://www.youtube.com/watch?v=rzkI5Sy2sP8">The Grifters</a>"</li>
<li>Joe's clip from "<a href="https://www.youtube.com/watch?v=TOrEE5NeZ9w">Matchstick Men</a>"</li>
</ul>]]>
      </content:encoded>
      <itunes:duration>1511</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[6a8af9ce-426c-11ec-b600-b37c47872983]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW1686903459.mp3?updated=1668989297" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>OT security (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/72/notes</link>
      <description>Hardware and software designed to detect and prevent cyber adversary campaigns that target industrial operations. </description>
      <pubDate>Tue, 09 Nov 2021 08:00:00 -0000</pubDate>
      <itunes:title>OT security (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>72</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Hardware and software designed to detect and prevent cyber adversary campaigns that target industrial operations. </itunes:summary>
      <content:encoded>
        <![CDATA[<p>Hardware and software designed to detect and prevent cyber adversary campaigns that target industrial operations. </p>]]>
      </content:encoded>
      <itunes:duration>493</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[cfe4be4a-2dea-11ec-a91a-f7fbe08e4386]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW1854976598.mp3?updated=1634310900" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Cybersecurity awareness should be a year-round activity. </title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/172/notes</link>
      <description>Guest Dr. Jessica Barker from Cygenta talks with UK correspondent Carole Theriault about how every month should be cyber awareness month, Joe has a story about password spraying (kind of like a credential stuffing attack), Dave's story is about scams carried out through QR codes, and our COTD comes from listener Wyatt about an award-winning email from Warren Buffett.
Links to stories:

Microsoft warns over uptick in password spraying attacks

Scammers are emailing waves of unsolicited QR codes, aiming to steal Microsoft users' passwords


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 04 Nov 2021 05:00:00 -0000</pubDate>
      <itunes:title>Cybersecurity awareness should be a year-round activity. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>172</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Guest Dr. Jessica Barker from Cygenta talks with UK correspondent Carole Theriault about how every month should be cyber awareness month, Joe has a story about password spraying (kind of like a credential stuffing attack), Dave's story is about scams carried out through QR codes, and our COTD comes from listener Wyatt about an award-winning email from Warren Buffett.
Links to stories:

Microsoft warns over uptick in password spraying attacks

Scammers are emailing waves of unsolicited QR codes, aiming to steal Microsoft users' passwords


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Guest Dr. Jessica Barker from Cygenta talks with UK correspondent Carole Theriault about how every month should be cyber awareness month, Joe has a story about password spraying (kind of like a credential stuffing attack), Dave's story is about scams carried out through QR codes, and our COTD comes from listener Wyatt about an award-winning email from Warren Buffett.</p><p>Links to stories:</p><ul>
<li><a href="https://www.zdnet.com/article/microsoft-warns-over-uptick-in-password-spraying-attacks/">Microsoft warns over uptick in password spraying attacks</a></li>
<li><a href="https://www.cyberscoop.com/qr-code-phishing-scam/">Scammers are emailing waves of unsolicited QR codes, aiming to steal Microsoft users' passwords</a></li>
</ul><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>2018</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[4bb5e7e8-357a-11eb-b2fc-3b77a1b035f2]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW3804495931.mp3?updated=1635806240" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>cybersecurity skills gap (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/71/notes</link>
      <description>The difference between organizational employee job requirements and the available skillsets in the potential employee pool.</description>
      <pubDate>Tue, 02 Nov 2021 07:00:00 -0000</pubDate>
      <itunes:title>cybersecurity skills gap (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>71</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>The difference between organizational employee job requirements and the available skillsets in the potential employee pool.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The difference between organizational employee job requirements and the available skillsets in the potential employee pool.</p>]]>
      </content:encoded>
      <itunes:duration>463</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[05f07858-26f7-11ec-949e-0fd08a9e133b]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW8361529940.mp3?updated=1633559584" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The Malware Mash!</title>
      <link>https://thecyberwire.com/stories/123bc0f691444be6af3145a6dab6cee4/malware-mash</link>
      <description></description>
      <pubDate>Fri, 29 Oct 2021 05:00:00 -0000</pubDate>
      <itunes:title>The Malware Mash!</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary></itunes:summary>
      <content:encoded>
        <![CDATA[<p><br></p>]]>
      </content:encoded>
      <itunes:duration>185</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[5c40fa5c-384f-11ec-a98f-47a9ca613504]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW1150739707.mp3?updated=1666877087" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Good grammar is essential for business email compromise. </title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/171/notes</link>
      <description>Guest Brandon Hoffman from Intel 471 is back sharing some research on business email compromise, Dave's got a story on buying collectable sneakers and how bots make that really hard to do, Joe has two stories with different spins on romance scams: one notes they are the most prevalent scams targeting older adults; and the second is about a group of Nigerian men preying on women through money scams, and our Catch of the Day comes from reddit user steev p (Steve P) about a benefit scam from an impersonated Facebook friend.
Links to stories:

Bots have made it nearly impossible to buy hyped up shoes. What if they could be stopped? 

FTC warns of increase in romance scams, especially targeting older adults

Nigerian romance scam suspects targeted 100 women - FBI


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 28 Oct 2021 05:00:00 -0000</pubDate>
      <itunes:title>Good grammar is essential for business email compromise. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>171</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Guest Brandon Hoffman from Intel 471 is back sharing some research on business email compromise, Dave's got a story on buying collectable sneakers and how bots make that really hard to do, Joe has two stories with different spins on romance scams: one notes they are the most prevalent scams targeting older adults; and the second is about a group of Nigerian men preying on women through money scams, and our Catch of the Day comes from reddit user steev p (Steve P) about a benefit scam from an impersonated Facebook friend.
Links to stories:

Bots have made it nearly impossible to buy hyped up shoes. What if they could be stopped? 

FTC warns of increase in romance scams, especially targeting older adults

Nigerian romance scam suspects targeted 100 women - FBI


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Guest Brandon Hoffman from Intel 471 is back sharing some research on business email compromise, Dave's got a story on buying collectable sneakers and how bots make that really hard to do, Joe has two stories with different spins on romance scams: one notes they are the most prevalent scams targeting older adults; and the second is about a group of Nigerian men preying on women through money scams, and our Catch of the Day comes from reddit user steev p (Steve P) about a benefit scam from an impersonated Facebook friend.</p><p>Links to stories:</p><ul>
<li><a href="https://www.nytimes.com/interactive/2021/10/15/style/sneaker-bots.html">Bots have made it nearly impossible to buy hyped up shoes. What if they could be stopped? </a></li>
<li><a href="https://www.foxnews.com/lifestyle/ftc-warns-romance-scams-spike-older-adults">FTC warns of increase in romance scams, especially targeting older adults</a></li>
<li><a href="https://www.bbc.com/news/world-africa-58978287">Nigerian romance scam suspects targeted 100 women - FBI</a></li>
</ul><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>2502</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[4baafb44-357a-11eb-b2fc-774a9d600ed7]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW7651315855.mp3?updated=1635286875" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>digital transformation (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/70/notes</link>
      <description>The use of technology to radically improve the performance or reach of the business. </description>
      <pubDate>Tue, 26 Oct 2021 05:00:00 -0000</pubDate>
      <itunes:title>digital transformation (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>70</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>The use of technology to radically improve the performance or reach of the business. </itunes:summary>
      <content:encoded>
        <![CDATA[<p>The use of technology to radically improve the performance or reach of the business. </p>]]>
      </content:encoded>
      <itunes:duration>425</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[818f2dc8-224d-11ec-8aee-0be0bcf5110b]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW6638522011.mp3?updated=1633047478" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Joekens, Bittnercoins, and the serious impacts of spam analysis. </title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/170/notes</link>
      <description>UK Correspondent Carole Theriault returns with an interview with Paul, a spam analyst, Dave and Joe have some follow-up, Joe revisits NFTs with rug pull scams, Dave's story is about phishers using a symbol in place of the Verizon logo, and our Catch of the Day comes from listener Rafael in Spain about a Steam account takeover scam attempt his son experienced on Discord.
Links to stories:
Phishers Get Clever, Use Math Symbols for Verizon Logo

Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 21 Oct 2021 05:00:00 -0000</pubDate>
      <itunes:title>Joekens, Bittnercoins, and the serious impacts of spam analysis. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>170</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>UK Correspondent Carole Theriault returns with an interview with Paul, a spam analyst, Dave and Joe have some follow-up, Joe revisits NFTs with rug pull scams, Dave's story is about phishers using a symbol in place of the Verizon logo, and our Catch of the Day comes from listener Rafael in Spain about a Steam account takeover scam attempt his son experienced on Discord.
Links to stories:
Phishers Get Clever, Use Math Symbols for Verizon Logo

Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>UK Correspondent Carole Theriault returns with an interview with Paul, a spam analyst, Dave and Joe have some follow-up, Joe revisits NFTs with rug pull scams, Dave's story is about phishers using a symbol in place of the Verizon logo, and our Catch of the Day comes from listener Rafael in Spain about a Steam account takeover scam attempt his son experienced on Discord.</p><p>Links to stories:</p><ul><li><a href="https://www.inky.com/blog/phishers-get-clever-use-math-symbols-for-verizon-logo">Phishers Get Clever, Use Math Symbols for Verizon Logo</a></li></ul><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>2234</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[4ba001b2-357a-11eb-b2fc-f37da0e82704]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW6407564178.mp3?updated=1634742541" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>bulletproof hosting (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/69/notes</link>
      <description>Cloud services intended for cyber criminals and other bad actors designed to obstruct law enforcement and other kinds of government investigations, and to provide some protection against competitors.</description>
      <pubDate>Tue, 19 Oct 2021 07:00:00 -0000</pubDate>
      <itunes:title>bulletproof hosting (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>69</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Cloud services intended for cyber criminals and other bad actors designed to obstruct law enforcement and other kinds of government investigations, and to provide some protection against competitors.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Cloud services intended for cyber criminals and other bad actors designed to obstruct law enforcement and other kinds of government investigations, and to provide some protection against competitors.</p>]]>
      </content:encoded>
      <itunes:duration>392</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[64ea1774-1d5b-11ec-bfab-87ad621ca6e9]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW3801223190.mp3?updated=1632422974" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Physical pen testing: You've got to be able to think on your feet. </title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/169/notes</link>
      <description>Guest Marina Ciavatta CEO at Hekate talks with Dave about some of her social engineering and pen testing experiences, Dave's got a story is about getting your family to use a password manager, Joe's story is about NFTs (non-fungible tokens) and scams that have arisen around them, and our Catch of the Day is from listener William and it turns out Dave is in trouble with the IRS again on this one.
Links to stories:

How to Get Your Family to Actually Use a Password Manager

THE NFT SCAMMERS ARE HERE


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 14 Oct 2021 05:00:00 -0000</pubDate>
      <itunes:title>Physical pen testing: You've got to be able to think on your feet. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>169</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Guest Marina Ciavatta CEO at Hekate talks with Dave about some of her social engineering and pen testing experiences, Dave's got a story is about getting your family to use a password manager, Joe's story is about NFTs (non-fungible tokens) and scams that have arisen around them, and our Catch of the Day is from listener William and it turns out Dave is in trouble with the IRS again on this one.
Links to stories:

How to Get Your Family to Actually Use a Password Manager

THE NFT SCAMMERS ARE HERE


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Guest Marina Ciavatta CEO at Hekate talks with Dave about some of her social engineering and pen testing experiences, Dave's got a story is about getting your family to use a password manager, Joe's story is about NFTs (non-fungible tokens) and scams that have arisen around them, and our Catch of the Day is from listener William and it turns out Dave is in trouble with the IRS again on this one.</p><p>Links to stories:</p><ul>
<li><a href="https://www.wired.com/story/how-to-get-family-to-use-password-manager/">How to Get Your Family to Actually Use a Password Manager</a></li>
<li><a href="https://www.theverge.com/22683766/nft-scams-theft-social-engineering-opensea-community-recovery">THE NFT SCAMMERS ARE HERE</a></li>
</ul><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>2830</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[4b94c586-357a-11eb-b2fc-9720f43559a8]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW4017012445.mp3?updated=1634079197" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>endpoint security (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/68/notes</link>
      <description>The practice of securing a device that connects to a network in order to facilitate communication with other devices on the same or different networks. </description>
      <pubDate>Tue, 12 Oct 2021 07:00:00 -0000</pubDate>
      <itunes:title>endpoint security (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>68</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>The practice of securing a device that connects to a network in order to facilitate communication with other devices on the same or different networks. </itunes:summary>
      <content:encoded>
        <![CDATA[<p>The practice of securing a device that connects to a network in order to facilitate communication with other devices on the same or different networks. </p>]]>
      </content:encoded>
      <itunes:duration>511</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[e1f4c5dc-1718-11ec-af14-7f10000bb336]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW1066377155.mp3?updated=1631740503" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Measuring security awareness proactively. </title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/168/notes</link>
      <description>Guest Zach Schuler of NINJIO joins Dave to discuss measuring the effectiveness of awareness training, Joe's got a story about a school nurse who was scammed with a "Bank of America" Zelle transaction, Dave's story is about a phone scam a therapist received from a local "Sheriff's office," and our Catch of the Day is from Hacking Humans Senior producer Jennifer Eiben about some pricey potatoes and chocolate chip cookies she "ordered."
Links to stories:

School nurse falls victim to scam targeting Bank of America and Zelle customers

'He held me hostage with no gun but with his words': The phone scam gaslighting therapists


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 07 Oct 2021 05:00:00 -0000</pubDate>
      <itunes:title>Measuring security awareness proactively. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>168</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Guest Zach Schuler of NINJIO joins Dave to discuss measuring the effectiveness of awareness training, Joe's got a story about a school nurse who was scammed with a "Bank of America" Zelle transaction, Dave's story is about a phone scam a therapist received from a local "Sheriff's office," and our Catch of the Day is from Hacking Humans Senior producer Jennifer Eiben about some pricey potatoes and chocolate chip cookies she "ordered."
Links to stories:

School nurse falls victim to scam targeting Bank of America and Zelle customers

'He held me hostage with no gun but with his words': The phone scam gaslighting therapists


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Guest Zach Schuler of NINJIO joins Dave to discuss measuring the effectiveness of awareness training, Joe's got a story about a school nurse who was scammed with a "Bank of America" Zelle transaction, Dave's story is about a phone scam a therapist received from a local "Sheriff's office," and our Catch of the Day is from Hacking Humans Senior producer Jennifer Eiben about some pricey potatoes and chocolate chip cookies she "ordered."</p><p>Links to stories:</p><ul>
<li><a href="https://abc7news.com/7-on-your-side-7oys-michael-finney-bank-of-america/11035492/">School nurse falls victim to scam targeting Bank of America and Zelle customers</a></li>
<li><a href="https://www.sfchronicle.com/bayarea/article/phone-scam-therapists-16483251.php">'He held me hostage with no gun but with his words': The phone scam gaslighting therapists</a></li>
</ul><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>3011</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[4b89802c-357a-11eb-b2fc-27fd299349ed]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW9547692964.mp3?updated=1633368933" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Executive Order on Improving the Nation's Cybersecurity (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/67/notes</link>
      <description>President Biden's May, 2021 formal compliance mandate for federal civilian executive branch agencies, or FCEBs, to include specific shortterm and longterm deadlines designed to enhance the federal government's digital defense posture. </description>
      <pubDate>Tue, 05 Oct 2021 07:00:00 -0000</pubDate>
      <itunes:title>Executive Order on Improving the Nation's Cybersecurity (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>67</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>President Biden's May, 2021 formal compliance mandate for federal civilian executive branch agencies, or FCEBs, to include specific shortterm and longterm deadlines designed to enhance the federal government's digital defense posture. </itunes:summary>
      <content:encoded>
        <![CDATA[<p>President Biden's May, 2021 formal compliance mandate for federal civilian executive branch agencies, or FCEBs, to include specific shortterm and longterm deadlines designed to enhance the federal government's digital defense posture. </p>]]>
      </content:encoded>
      <itunes:duration>494</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[fcf15654-14b9-11ec-bf05-1f00f1234dd9]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW1692851152.mp3?updated=1631238209" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Capture the Flag, Black Badges and social engineering tricks. </title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/167/notes</link>
      <description>Guest Chris Kirsch, DefCon 25 Social Engineering Capture The Flag winner and Co-Founder and Chief Executive Officer at Rumble, talks with our UK Correspondent Carole Theriault about his experience at the event, Dave's story is about scammers bypassing social engineering and going directly to pitch employees to install ransomware, Joe's got a story about travel scams he came across while planning a recent trip, our Catch of the Day comes from Reddit about some text messages which cause emotions to flare.
Links to stories:

Nigerian Threat Actors Skip Social Engineering, Make Direct Pitches to Employees To Install Ransomware on Company Networks

15 Common Travel Scams (And How To Avoid Them)


Catch of the Day links:

Guess I made the scammer angry?

He blocked me before I could really mess with him, unfortunately

Did I win?


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 30 Sep 2021 05:00:00 -0000</pubDate>
      <itunes:title>Capture the Flag, Black Badges and social engineering tricks. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>167</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Guest Chris Kirsch, DefCon 25 Social Engineering Capture The Flag winner and Co-Founder and Chief Executive Officer at Rumble, talks with our UK Correspondent Carole Theriault about his experience at the event, Dave's story is about scammers bypassing social engineering and going directly to pitch employees to install ransomware, Joe's got a story about travel scams he came across while planning a recent trip, our Catch of the Day comes from Reddit about some text messages which cause emotions to flare.
Links to stories:

Nigerian Threat Actors Skip Social Engineering, Make Direct Pitches to Employees To Install Ransomware on Company Networks

15 Common Travel Scams (And How To Avoid Them)


Catch of the Day links:

Guess I made the scammer angry?

He blocked me before I could really mess with him, unfortunately

Did I win?


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Guest Chris Kirsch, DefCon 25 Social Engineering Capture The Flag winner and Co-Founder and Chief Executive Officer at Rumble, talks with our UK Correspondent Carole Theriault about his experience at the event, Dave's story is about scammers bypassing social engineering and going directly to pitch employees to install ransomware, Joe's got a story about travel scams he came across while planning a recent trip, our Catch of the Day comes from Reddit about some text messages which cause emotions to flare.</p><p>Links to stories:</p><ul>
<li><a href="https://www.cpomagazine.com/cyber-security/nigerian-threat-actors-skip-social-engineering-make-direct-pitches-to-employees-to-install-ransomware-on-company-networks/">Nigerian Threat Actors Skip Social Engineering, Make Direct Pitches to Employees To Install Ransomware on Company Networks</a></li>
<li><a href="https://expertvagabond.com/common-travel-scams/">15 Common Travel Scams (And How To Avoid Them)</a></li>
</ul><p><br></p><p>Catch of the Day links:</p><ul>
<li><a href="https://www.reddit.com/r/scambait/comments/pouk7u/guess_i_made_the_scammer_angry/">Guess I made the scammer angry?</a></li>
<li><a href="https://www.reddit.com/r/scambait/comments/poec5b/he_blocked_me_before_i_could_really_mess_with_him/">He blocked me before I could really mess with him, unfortunately</a></li>
<li><a href="https://www.reddit.com/r/scambait/comments/pnrbez/did_i_win/">Did I win?</a></li>
</ul><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>2421</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[4b7ea2b0-357a-11eb-b2fc-bbea22457dd3]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW4362711242.mp3?updated=1632780716" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>lateral movement (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/66/notes</link>
      <description>Phase of a typical cyber adversary group's attack sequence, after the initial compromise and usually after the group has established a command and control channel, where the group moves through the victims network by compromising as many systems as it can, by looking for the data, it has come to steal or to destroy.</description>
      <pubDate>Tue, 28 Sep 2021 07:00:00 -0000</pubDate>
      <itunes:title>lateral movement (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>66</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Phase of a typical cyber adversary group's attack sequence, after the initial compromise and usually after the group has established a command and control channel, where the group moves through the victims network by compromising as many systems as it can, by looking for the data, it has come to steal or to destroy.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Phase of a typical cyber adversary group's attack sequence, after the initial compromise and usually after the group has established a command and control channel, where the group moves through the victims network by compromising as many systems as it can, by looking for the data, it has come to steal or to destroy.</p>]]>
      </content:encoded>
      <itunes:duration>483</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[bc89674a-0c0e-11ec-ab8a-4bdd83600000]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW4814524944.mp3?updated=1630602044" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>They won't ask for sensitive information over the phone. </title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/166/notes</link>
      <description>Guest Alex Hinchliffe, Threat Intelligence Analyst from Unit 42 at Palo Alto Networks joins Dave to talk about some of his team's ransomware research, Joe's story is about a new jury duty scam that is out there (hint, they will not call you on the phone), Dave's got a story about Microsoft rolling out passwordless login options, our Catch of the Day comes from a listener named Lucio who shared several social engineering ploys with us.
Links to stories:

Brand New Jury Duty Scam

You Can Now Ditch the Password on Your Microsoft Account


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 23 Sep 2021 05:00:00 -0000</pubDate>
      <itunes:title>They won't ask for sensitive information over the phone. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>166</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Guest Alex Hinchliffe, Threat Intelligence Analyst from Unit 42 at Palo Alto Networks joins Dave to talk about some of his team's ransomware research, Joe's story is about a new jury duty scam that is out there (hint, they will not call you on the phone), Dave's got a story about Microsoft rolling out passwordless login options, our Catch of the Day comes from a listener named Lucio who shared several social engineering ploys with us.
Links to stories:

Brand New Jury Duty Scam

You Can Now Ditch the Password on Your Microsoft Account


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Guest Alex Hinchliffe, Threat Intelligence Analyst from Unit 42 at Palo Alto Networks joins Dave to talk about some of his team's ransomware research, Joe's story is about a new jury duty scam that is out there (hint, they will not call you on the phone), Dave's got a story about Microsoft rolling out passwordless login options, our Catch of the Day comes from a listener named Lucio who shared several social engineering ploys with us.</p><p>Links to stories:</p><ul>
<li><a href="https://scambusters.org/juryduty.html">Brand New Jury Duty Scam</a></li>
<li><a href="https://www.wired.com/story/passwordless-microsoft-account/">You Can Now Ditch the Password on Your Microsoft Account</a></li>
</ul><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>2342</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[4b73690e-357a-11eb-b2fc-1b7354fa5cdd]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW4249624812.mp3?updated=1632180956" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>common vulnerabilities and exposures (CVE) (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/65/notes</link>
      <description>A public list sponsored by the US government and designed to uniquely identify, without the need to manually cross- reference, all the known software vulnerabilities in the world. </description>
      <pubDate>Tue, 21 Sep 2021 07:00:00 -0000</pubDate>
      <itunes:title>common vulnerabilities and exposures (CVE) (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>65</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A public list sponsored by the US government and designed to uniquely identify, without the need to manually cross- reference, all the known software vulnerabilities in the world. </itunes:summary>
      <content:encoded>
        <![CDATA[<p>A public list sponsored by the US government and designed to uniquely identify, without the need to manually cross- reference, all the known software vulnerabilities in the world. </p>]]>
      </content:encoded>
      <itunes:duration>433</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[ca2556d0-069a-11ec-82b9-1336ee52fffc]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW7646230325.mp3?updated=1630001666" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Sometimes, deepfake victims don't want to be convinced it is fake. </title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/165/notes</link>
      <description>Guest Etay Maor of Cato Networks joins Dave Bittner to discuss the impact that deepfakes will have on our society, we share some fun feedback on the Lightning Rod story edit, Dave's story talks about how some of the most successful and lucrative online scams employ a “low-and-slow” approach, Joe's story is about 2 Arkansas farmer that scammed investors out of money for wind turbines, but used it for houses, cars and Disney World, and our Catch of the Day is from an unnamed listener with a supposed iPhone invoice.
Links to stories:

Gift Card Gang Extracts Cash From 100k Inboxes Daily

Arkansas wind farmers claimed their technology was more efficient than turbines — then spent investors’ money on houses, cars and at Disney World


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 16 Sep 2021 05:00:00 -0000</pubDate>
      <itunes:title>Sometimes, deepfake victims don't want to be convinced it is fake. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>165</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Guest Etay Maor of Cato Networks joins Dave Bittner to discuss the impact that deepfakes will have on our society, we share some fun feedback on the Lightning Rod story edit, Dave's story talks about how some of the most successful and lucrative online scams employ a “low-and-slow” approach, Joe's story is about 2 Arkansas farmer that scammed investors out of money for wind turbines, but used it for houses, cars and Disney World, and our Catch of the Day is from an unnamed listener with a supposed iPhone invoice.
Links to stories:

Gift Card Gang Extracts Cash From 100k Inboxes Daily

Arkansas wind farmers claimed their technology was more efficient than turbines — then spent investors’ money on houses, cars and at Disney World


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Guest Etay Maor of Cato Networks joins Dave Bittner to discuss the impact that deepfakes will have on our society, we share some fun feedback on the Lightning Rod story edit, Dave's story talks about how some of the most successful and lucrative online scams employ a “low-and-slow” approach, Joe's story is about 2 Arkansas farmer that scammed investors out of money for wind turbines, but used it for houses, cars and Disney World, and our Catch of the Day is from an unnamed listener with a supposed iPhone invoice.</p><p>Links to stories:</p><ul>
<li><a href="https://krebsonsecurity.com/2021/09/gift-card-gang-extracts-cash-from-100k-inboxes-daily/">Gift Card Gang Extracts Cash From 100k Inboxes Daily</a></li>
<li><a href="https://www.marketwatch.com/story/arkansas-wind-farmers-claimed-their-technology-was-more-efficient-than-turbines-but-they-spent-investors-money-on-houses-cars-and-at-disney-world-11631050243">Arkansas wind farmers claimed their technology was more efficient than turbines — then spent investors’ money on houses, cars and at Disney World</a></li>
</ul><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>2648</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[4b689682-357a-11eb-b2fc-7face9c1e9f7]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW8956284277.mp3?updated=1632337357" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>dead-box forensics (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/64/notes</link>
      <description>A forensic technique where practitioners capture an entire image of a system and analyze the contents offline.</description>
      <pubDate>Tue, 14 Sep 2021 07:00:00 -0000</pubDate>
      <itunes:title>dead-box forensics (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>64</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A forensic technique where practitioners capture an entire image of a system and analyze the contents offline.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A forensic technique where practitioners capture an entire image of a system and analyze the contents offline.</p>]]>
      </content:encoded>
      <itunes:duration>376</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[f35f900a-006f-11ec-82d3-7fe1357cf974]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW3508951503.mp3?updated=1629776673" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Collaboration platforms are a gateway for ransomware attacks. </title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/164/notes</link>
      <description>Guest Gil Friedrich from Avanan joins Dave to discuss how collaboration platforms, like Microsoft Teams, Slack and others, opened up a new gateway to ransomware attacks, Joe's story comes from listener Matt shared as a COTD candidate that's a phishing scam, Dave's got a story about China and Russia trying to turn your employees into spies, and our Catch of the Day comes from a listener named Iain with a timely story "from" Afghanistan.
Links to stories:

Guarding Against the Chinese Domain Name Email Scam

The FBI’s warning to Silicon Valley: China and Russia are trying to turn your employees into spies


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.
Note: Microsoft is a sponsor of the CyberWire, however, we cover them as we would any other company.</description>
      <pubDate>Thu, 09 Sep 2021 05:00:00 -0000</pubDate>
      <itunes:title>Collaboration platforms are a gateway for ransomware attacks. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>164</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Guest Gil Friedrich from Avanan joins Dave to discuss how collaboration platforms, like Microsoft Teams, Slack and others, opened up a new gateway to ransomware attacks, Joe's story comes from listener Matt shared as a COTD candidate that's a phishing scam, Dave's got a story about China and Russia trying to turn your employees into spies, and our Catch of the Day comes from a listener named Iain with a timely story "from" Afghanistan.
Links to stories:

Guarding Against the Chinese Domain Name Email Scam

The FBI’s warning to Silicon Valley: China and Russia are trying to turn your employees into spies


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.
Note: Microsoft is a sponsor of the CyberWire, however, we cover them as we would any other company.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Guest Gil Friedrich from Avanan joins Dave to discuss how collaboration platforms, like Microsoft Teams, Slack and others, opened up a new gateway to ransomware attacks, Joe's story comes from listener Matt shared as a COTD candidate that's a phishing scam, Dave's got a story about China and Russia trying to turn your employees into spies, and our Catch of the Day comes from a listener named Iain with a timely story "from" Afghanistan.</p><p>Links to stories:</p><ul>
<li><a href="https://www.hinshawlaw.com/newsroom-updates-chinese-domain-name-email-scam.html">Guarding Against the Chinese Domain Name Email Scam</a></li>
<li><a href="https://www-protocol-com.cdn.ampproject.org/c/s/www.protocol.com/amp/fbi-delta-protocol-economic-espionage-2654714751">The FBI’s warning to Silicon Valley: China and Russia are trying to turn your employees into spies</a></li>
</ul><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a>.</p><p><em>Note: Microsoft is a sponsor of the CyberWire, however, we cover them as we would any other company.</em></p>]]>
      </content:encoded>
      <itunes:duration>2009</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[4b5dbd7a-357a-11eb-b2fc-23f3de21350b]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW3493955047.mp3?updated=1630774343" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>cybersecurity maturity model certification (CMMC) (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/63/notes</link>
      <description>A supply chain cybersecurity accreditation standard designed for the protection of controlled unclassified information that the U.S. Department of Defense, or DoD, will require for all contract bids by October, 2025. </description>
      <pubDate>Tue, 07 Sep 2021 07:00:00 -0000</pubDate>
      <itunes:title>cybersecurity maturity model certification (CMMC) (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>63</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A supply chain cybersecurity accreditation standard designed for the protection of controlled unclassified information that the U.S. Department of Defense, or DoD, will require for all contract bids by October, 2025. </itunes:summary>
      <content:encoded>
        <![CDATA[<p>A supply chain cybersecurity accreditation standard designed for the protection of controlled unclassified information that the U.S. Department of Defense, or DoD, will require for all contract bids by October, 2025. </p>]]>
      </content:encoded>
      <itunes:duration>417</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[292e7922-fc4b-11eb-acfb-cff8919b2434]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW8221630589.mp3?updated=1628865503" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Don't blindly test your colleagues. </title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/163/notes</link>
      <description>Guest Javvad Malik from KnowBe4 shares his thoughts on bad security training with the CyberWire's UK correspondent Carole Theriault, Dave's story is about deepfake technology being used for business cases, Joe's gives a synopsis of Proofpoint's most recent State of the Phish report, our very first Catch of the Day about Discord comes from a listener named Henning.
Links to stories:

Deepfakes Are Now Making Business Pitches

Proofpoint's 2021 State of the Phish Report


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 02 Sep 2021 05:00:00 -0000</pubDate>
      <itunes:title>Don't blindly test your colleagues. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>163</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Guest Javvad Malik from KnowBe4 shares his thoughts on bad security training with the CyberWire's UK correspondent Carole Theriault, Dave's story is about deepfake technology being used for business cases, Joe's gives a synopsis of Proofpoint's most recent State of the Phish report, our very first Catch of the Day about Discord comes from a listener named Henning.
Links to stories:

Deepfakes Are Now Making Business Pitches

Proofpoint's 2021 State of the Phish Report


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Guest Javvad Malik from KnowBe4 shares his thoughts on bad security training with the CyberWire's UK correspondent Carole Theriault, Dave's story is about deepfake technology being used for business cases, Joe's gives a synopsis of Proofpoint's most recent State of the Phish report, our very first Catch of the Day about Discord comes from a listener named Henning.</p><p>Links to stories:</p><ul>
<li><a href="https://www.wired.com/story/deepfakes-making-business-pitches/">Deepfakes Are Now Making Business Pitches</a></li>
<li><a href="https://www.proofpoint.com/us/resources/threat-reports/state-of-phish">Proofpoint's 2021 State of the Phish Report</a></li>
</ul><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>2403</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[4b52c58c-357a-11eb-b2fc-3f8b0430daa6]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW2789337101.mp3?updated=1630349832" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>incident response (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/62/notes</link>
      <description>A collection of people, process, and technology that provides an organization the ability to detect and respond to cyber attacks.</description>
      <pubDate>Tue, 31 Aug 2021 07:00:00 -0000</pubDate>
      <itunes:title>incident response (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>62</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A collection of people, process, and technology that provides an organization the ability to detect and respond to cyber attacks.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A collection of people, process, and technology that provides an organization the ability to detect and respond to cyber attacks.</p>]]>
      </content:encoded>
      <itunes:duration>470</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[5ccec93a-f61a-11eb-afe9-4f9828ec7477]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW1520789136.mp3?updated=1628187453" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Companies don't want their customers to be victims of fraud. </title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/162/notes</link>
      <description>Guest Brandon Hoffman from Intel 471 joins Dave to talk about how cybercriminals are going after large retail and hospitality companies, Joe shares some advice for college students to avoid scams and ID theft, Dave got an edit to the tale of the lightning rod, our Catch of the Day comes from listener Shannon who received a beneficiary scam email.
Links to stories:

BBB Scam Alert: 6 Scams for College Students to Avoid

BBB Tip: 9 Tips for college students to avoid ID theft


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 26 Aug 2021 05:00:00 -0000</pubDate>
      <itunes:title>Companies don't want their customers to be victims of fraud. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>162</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Guest Brandon Hoffman from Intel 471 joins Dave to talk about how cybercriminals are going after large retail and hospitality companies, Joe shares some advice for college students to avoid scams and ID theft, Dave got an edit to the tale of the lightning rod, our Catch of the Day comes from listener Shannon who received a beneficiary scam email.
Links to stories:

BBB Scam Alert: 6 Scams for College Students to Avoid

BBB Tip: 9 Tips for college students to avoid ID theft


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Guest Brandon Hoffman from Intel 471 joins Dave to talk about how cybercriminals are going after large retail and hospitality companies, Joe shares some advice for college students to avoid scams and ID theft, Dave got an edit to the tale of the lightning rod, our Catch of the Day comes from listener Shannon who received a beneficiary scam email.</p><p>Links to stories:</p><ul>
<li><a href="https://www.bbb.org/article/news-releases/20499-bbb-tips-6-scams-for-college-students-to-avoid">BBB Scam Alert: 6 Scams for College Students to Avoid</a></li>
<li><a href="https://www.bbb.org/article/news-releases/10496-bbb-9-tips-to-avoid-id-theft-on-campus">BBB Tip: 9 Tips for college students to avoid ID theft</a></li>
</ul><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>2368</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[4b471ade-357a-11eb-b2fc-6ffdffb8ef2e]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW3019957242.mp3?updated=1629819467" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>script kiddies (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/61/notes</link>
      <description>Cybercriminals who lack the expertise to write their own programs use existing scripts, code, or tools authored by other more skilled hackers. </description>
      <pubDate>Tue, 24 Aug 2021 07:00:00 -0000</pubDate>
      <itunes:title>script kiddies (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>61</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Cybercriminals who lack the expertise to write their own programs use existing scripts, code, or tools authored by other more skilled hackers. </itunes:summary>
      <content:encoded>
        <![CDATA[<p>Cybercriminals who lack the expertise to write their own programs use existing scripts, code, or tools authored by other more skilled hackers. </p>]]>
      </content:encoded>
      <itunes:duration>338</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[eb79fbe6-f156-11eb-9cc2-6f5ae2de65f0]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW8131838906.mp3?updated=1627664054" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Effective cybersecurity training has to be meaningful to employees. </title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/161/notes</link>
      <description>Guest Jann Yogman, entertainment industry veteran and writer of Mimecast Awareness Training, joins Dave to share his thoughts on the ransomware epidemic and the cybersecurity awareness training problem, Joe's got a story about scams targeting families eligible for the IRS' child tax credit, Dave's story is about scams and fraud experienced by US military veterans, personnel, and their families, our Catch of the Day comes from listener Sawyer Dicky on Reddit who insists he's not the right guy.
Links to stories:

IRS warns of child tax credit scams

US military personnel lost over $822 million to scams since 2017


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 19 Aug 2021 05:00:00 -0000</pubDate>
      <itunes:title>Effective cybersecurity training has to be meaningful to employees. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>161</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Guest Jann Yogman, entertainment industry veteran and writer of Mimecast Awareness Training, joins Dave to share his thoughts on the ransomware epidemic and the cybersecurity awareness training problem, Joe's got a story about scams targeting families eligible for the IRS' child tax credit, Dave's story is about scams and fraud experienced by US military veterans, personnel, and their families, our Catch of the Day comes from listener Sawyer Dicky on Reddit who insists he's not the right guy.
Links to stories:

IRS warns of child tax credit scams

US military personnel lost over $822 million to scams since 2017


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Guest Jann Yogman, entertainment industry veteran and writer of Mimecast Awareness Training, joins Dave to share his thoughts on the ransomware epidemic and the cybersecurity awareness training problem, Joe's got a story about scams targeting families eligible for the IRS' child tax credit, Dave's story is about scams and fraud experienced by US military veterans, personnel, and their families, our Catch of the Day comes from listener Sawyer Dicky on Reddit who insists he's not the right guy.</p><p>Links to stories:</p><ul>
<li><a href="https://www.connectradio.fm/2021/08/11/irs-warns-of-child-tax-credit-scams/">IRS warns of child tax credit scams</a></li>
<li><a href="https://atlasvpn.com/blog/us-military-personnel-lost-over-822-million-to-scams-since-2017">US military personnel lost over $822 million to scams since 2017</a></li>
</ul><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>2192</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[4b3a7ba8-357a-11eb-b2fc-079a5098388c]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW5668086238.mp3?updated=1629387546" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>sandbox (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/60/notes</link>
      <description>An isolated and controlled set of resources that mimics real world environments and used to safely execute suspicious code without infecting or causing damage to the host machine, operating system, or network.</description>
      <pubDate>Tue, 17 Aug 2021 07:00:00 -0000</pubDate>
      <itunes:title>sandbox (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>60</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>An isolated and controlled set of resources that mimics real world environments and used to safely execute suspicious code without infecting or causing damage to the host machine, operating system, or network.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>An isolated and controlled set of resources that mimics real world environments and used to safely execute suspicious code without infecting or causing damage to the host machine, operating system, or network.</p>]]>
      </content:encoded>
      <itunes:duration>385</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[ac724b7e-f156-11eb-8137-af66dd4250f5]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW1864340628.mp3?updated=1627325364" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The attackers keep coming every single day. </title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/160/notes</link>
      <description>Guest Andrew Rubin, CEO and co-founder of Illumio, joins Dave to discuss Zero Trust, Dave and Joe share some follow-up from several listeners including one with a variation on prison pen pals we discussed some time ago and some advice on Dave's Google Authenticator issue he mentioned last week, Dave's story is about non-delivery scams, Joe's got a story on Imperial Kitten doing some catphishing, and our Catch of the Day comes from listener Timothy about with a sextortion campaign.
Links to stories:

5 reasons non-delivery scams work

I Knew You Were Trouble: TA456 Targets Defense Contractor with Alluring Social Media Persona


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 12 Aug 2021 05:00:00 -0000</pubDate>
      <itunes:title>The attackers keep coming every single day. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>160</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Guest Andrew Rubin, CEO and co-founder of Illumio, joins Dave to discuss Zero Trust, Dave and Joe share some follow-up from several listeners including one with a variation on prison pen pals we discussed some time ago and some advice on Dave's Google Authenticator issue he mentioned last week, Dave's story is about non-delivery scams, Joe's got a story on Imperial Kitten doing some catphishing, and our Catch of the Day comes from listener Timothy about with a sextortion campaign.
Links to stories:

5 reasons non-delivery scams work

I Knew You Were Trouble: TA456 Targets Defense Contractor with Alluring Social Media Persona


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Guest Andrew Rubin, CEO and co-founder of Illumio, joins Dave to discuss Zero Trust, Dave and Joe share some follow-up from several listeners including one with a variation on prison pen pals we discussed some time ago and some advice on Dave's Google Authenticator issue he mentioned last week, Dave's story is about non-delivery scams, Joe's got a story on Imperial Kitten doing some catphishing, and our Catch of the Day comes from listener Timothy about with a sextortion campaign.</p><p>Links to stories:</p><ul>
<li><a href="https://www.interpol.int/en/News-and-Events/News/2020/5-reasons-non-delivery-scams-work">5 reasons non-delivery scams work</a></li>
<li><a href="https://www.proofpoint.com/us/blog/threat-insight/i-knew-you-were-trouble-ta456-targets-defense-contractor-alluring-social-media">I Knew You Were Trouble: TA456 Targets Defense Contractor with Alluring Social Media Persona</a></li>
</ul><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>2709</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[4b2f2136-357a-11eb-b2fc-330fc7fb3cc8]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW6260390203.mp3?updated=1628537188" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>security orchestration, automation, and response (SOAR) (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/59/notes</link>
      <description>A stack of security software solutions and tools that allow organizations to orchestrate disparate internal and external tools which feed pre-built automation playbooks that respond to events or alert analysts if an event meets a certain threshold.</description>
      <pubDate>Tue, 10 Aug 2021 07:00:00 -0000</pubDate>
      <itunes:title>security orchestration, automation, and response (SOAR) (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>59</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A stack of security software solutions and tools that allow organizations to orchestrate disparate internal and external tools which feed pre-built automation playbooks that respond to events or alert analysts if an event meets a certain threshold.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A stack of security software solutions and tools that allow organizations to orchestrate disparate internal and external tools which feed pre-built automation playbooks that respond to events or alert analysts if an event meets a certain threshold.</p>]]>
      </content:encoded>
      <itunes:duration>386</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[9bbf1fac-e8d5-11eb-b313-0bbcbacf246e]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW9879320415.mp3?updated=1626394142" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Acceleration of our digital lives and impacts on cybercrime.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/159/notes</link>
      <description>Guest Darren Shou, Chief Technology Officer of NortonLifeLock, shares insight on some of the scams he and his colleagues have been tracking, Joe and Dave share some follow up from listener Robert about free learning resources, Joe's story comes from listener Sedric who is new to real estate Investing and was looking for a hard money loan, rather than a story, Dave continues the conversation on passwords and multi-factor authentication with comments from listener Coinsigliere, and our Catch of the Day, well "catches" of the day since we have two, include one from Pryce on a smishing scam and the second from Ronald with a subscription email scam..
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 05 Aug 2021 05:00:00 -0000</pubDate>
      <itunes:title>Acceleration of our digital lives and impacts on cybercrime.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>159</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Guest Darren Shou, Chief Technology Officer of NortonLifeLock, shares insight on some of the scams he and his colleagues have been tracking, Joe and Dave share some follow up from listener Robert about free learning resources, Joe's story comes from listener Sedric who is new to real estate Investing and was looking for a hard money loan, rather than a story, Dave continues the conversation on passwords and multi-factor authentication with comments from listener Coinsigliere, and our Catch of the Day, well "catches" of the day since we have two, include one from Pryce on a smishing scam and the second from Ronald with a subscription email scam..
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Guest Darren Shou, Chief Technology Officer of NortonLifeLock, shares insight on some of the scams he and his colleagues have been tracking, Joe and Dave share some follow up from listener Robert about free learning resources, Joe's story comes from listener Sedric who is new to real estate Investing and was looking for a hard money loan, rather than a story, Dave continues the conversation on passwords and multi-factor authentication with comments from listener <a href="https://twitter.com/coinsigliere">Coinsigliere</a>, and our Catch of the Day, well "catches" of the day since we have two, include one from Pryce on a smishing scam and the second from Ronald with a subscription email scam..</p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>2632</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[4af37514-357a-11eb-b2fc-97d16cf034ff]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW8475677618.mp3?updated=1627941879" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>personally identifiable information (PII) (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/58/notes</link>
      <description>A term of legal art that defines the types of data and circumstances that permits a third party to directly or indirectly identify an individual with collected data. </description>
      <pubDate>Tue, 03 Aug 2021 07:00:00 -0000</pubDate>
      <itunes:title>personally identifiable information (PII) (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>58</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A term of legal art that defines the types of data and circumstances that permits a third party to directly or indirectly identify an individual with collected data. </itunes:summary>
      <content:encoded>
        <![CDATA[<p>A term of legal art that defines the types of data and circumstances that permits a third party to directly or indirectly identify an individual with collected data. </p>]]>
      </content:encoded>
      <itunes:duration>446</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[acfe8d88-e0d4-11eb-b7dc-0361565ce802]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW4281513985.mp3?updated=1625848842" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>What are our devices doing to our compassion? </title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/158/notes</link>
      <description>Guest Dr. Charles Chaffin, author of the book "Numb: How the Information Age Dulls Our Senses and How We Can Get them Back," joins Dave this week, we have some listener follow up from John with a tip on ATM security, Dave's got a two-fer this week including a useful site called www.shouldiclick.org and a Twitter report on multi-factor authentication thanks Rachel Tobac for calling our attention to it, Joe's story is from Microsoft on trends in tech support scams, and our Catch of the Day is from a listener on Twitter called @DoNoEvilMan about a payout from the Federal Reserve via the FBI.
Links to stories:

Should I click or not?

Twitter Account Security report

Tech support scams adapt and persist in 2021, per new Microsoft research


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 29 Jul 2021 05:00:00 -0000</pubDate>
      <itunes:title>What are our devices doing to our compassion? </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>158</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Guest Dr. Charles Chaffin, author of the book "Numb: How the Information Age Dulls Our Senses and How We Can Get them Back," joins Dave this week, we have some listener follow up from John with a tip on ATM security, Dave's got a two-fer this week including a useful site called www.shouldiclick.org and a Twitter report on multi-factor authentication thanks Rachel Tobac for calling our attention to it, Joe's story is from Microsoft on trends in tech support scams, and our Catch of the Day is from a listener on Twitter called @DoNoEvilMan about a payout from the Federal Reserve via the FBI.
Links to stories:

Should I click or not?

Twitter Account Security report

Tech support scams adapt and persist in 2021, per new Microsoft research


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Guest Dr. Charles Chaffin, author of the book "Numb: How the Information Age Dulls Our Senses and How We Can Get them Back," joins Dave this week, we have some listener follow up from John with a tip on ATM security, Dave's got a two-fer this week including a useful site called www.shouldiclick.org and a Twitter report on multi-factor authentication thanks Rachel Tobac for calling our attention to it, Joe's story is from Microsoft on trends in tech support scams, and our Catch of the Day is from a listener on Twitter called @DoNoEvilMan about a payout from the Federal Reserve via the FBI.</p><p>Links to stories:</p><ul>
<li><a href="https://www.shouldiclick.org/">Should I click or not?</a></li>
<li><a href="https://transparency.twitter.com/en/reports/account-security.html#2020-jul-dec">Twitter Account Security report</a></li>
<li><a href="https://blogs.microsoft.com/on-the-issues/2021/07/21/tech-support-scams-adapt-2021-microsoft-study/">Tech support scams adapt and persist in 2021, per new Microsoft research</a></li>
</ul><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>2802</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[4b23aad6-357a-11eb-b2fc-93417fffa1c2]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW2815515575.mp3?updated=1627320789" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>secure access service edge (SASE) (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/57/notes</link>
      <description>A security architecture that incorporates the cloud shared responsibility model, a vendor provided security stack, an SD-WAN abstraction layer, and network peering with one or more of the big content providers and their associated fiber networks.</description>
      <pubDate>Tue, 27 Jul 2021 07:00:00 -0000</pubDate>
      <itunes:title>secure access service edge (SASE) (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>57</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A security architecture that incorporates the cloud shared responsibility model, a vendor provided security stack, an SD-WAN abstraction layer, and network peering with one or more of the big content providers and their associated fiber networks.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A security architecture that incorporates the cloud shared responsibility model, a vendor provided security stack, an SD-WAN abstraction layer, and network peering with one or more of the big content providers and their associated fiber networks.</p>]]>
      </content:encoded>
      <itunes:duration>505</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[7317ec22-dab7-11eb-9088-ff0869f4926c]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW9815194161.mp3?updated=1625176184" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>It's ok to be trusting, just be careful. </title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/157/notes</link>
      <description>Guest Gil Friedrich from Avanan joins Dave to talk about how bad actors are infiltrating organizations using collaboration apps, we have two pieces of listener follow up from Michael and Tobias, Joe has a story about fake information, Dave's story is about message spam on LinkedIn, and our Catch of the Day is from a listener named Lucio with a questionable Reddit communication.
Links to stories:

Propaganda as a Social Engineering Tool

Annoying LinkedIn Networkers Actually Russian Hackers Spreading Zero-Days, Google Says


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 22 Jul 2021 05:00:00 -0000</pubDate>
      <itunes:title>It's ok to be trusting, just be careful. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>157</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Guest Gil Friedrich from Avanan joins Dave to talk about how bad actors are infiltrating organizations using collaboration apps, we have two pieces of listener follow up from Michael and Tobias, Joe has a story about fake information, Dave's story is about message spam on LinkedIn, and our Catch of the Day is from a listener named Lucio with a questionable Reddit communication.
Links to stories:

Propaganda as a Social Engineering Tool

Annoying LinkedIn Networkers Actually Russian Hackers Spreading Zero-Days, Google Says


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Guest Gil Friedrich from Avanan joins Dave to talk about how bad actors are infiltrating organizations using collaboration apps, we have two pieces of listener follow up from Michael and Tobias, Joe has a story about fake information, Dave's story is about message spam on LinkedIn, and our Catch of the Day is from a listener named Lucio with a questionable Reddit communication.</p><p>Links to stories:</p><ul>
<li><a href="https://securityboulevard.com/2021/07/propaganda-as-social-engineering-tool/">Propaganda as a Social Engineering Tool</a></li>
<li><a href="https://www.vice.com/en/article/5dbk5q/annoying-linkedin-networkers-actually-russian-hackers-spreading-zero-days-google-says">Annoying LinkedIn Networkers Actually Russian Hackers Spreading Zero-Days, Google Says</a></li>
</ul><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>2532</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[4b187d8c-357a-11eb-b2fc-77b805791d37]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW1304458701.mp3?updated=1626799153" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>red teaming (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/56/notes</link>
      <description> The practice of emulating known adversary behavior against an organization's actual defensive posture.</description>
      <pubDate>Tue, 20 Jul 2021 07:00:00 -0000</pubDate>
      <itunes:title>red teaming (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>56</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary> The practice of emulating known adversary behavior against an organization's actual defensive posture.</itunes:summary>
      <content:encoded>
        <![CDATA[<p> The practice of emulating known adversary behavior against an organization's actual defensive posture.</p>]]>
      </content:encoded>
      <itunes:duration>386</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b3a7d9c4-d525-11eb-b275-3b3b3dca7e20]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW1237444731.mp3?updated=1624564066" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Threat actors changing ransomware tactics. </title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/156/notes</link>
      <description>Guest Kurtis Minder from GroupSense joins Dave to discuss divergent ransomware trends, the guys have a listener reminder about it being CompTIA, Joe, Dave has a story about a coupon scam in the Houston area, Joe's story is about a real estate rental scam and a scammer who likes to talk about his work, and our Catch of the Day is from a listener named Craig with an email about an unprofessional colleague and a questionable attachment.
Links to stories:

A ‘dark-side coupon group’ scammed stores out of millions, police say. ‘They were just going through the ink.’

Housing scams abundant in Jackson. This scammer is proud of it


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 15 Jul 2021 05:00:00 -0000</pubDate>
      <itunes:title>Threat actors changing ransomware tactics. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>156</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Guest Kurtis Minder from GroupSense joins Dave to discuss divergent ransomware trends, the guys have a listener reminder about it being CompTIA, Joe, Dave has a story about a coupon scam in the Houston area, Joe's story is about a real estate rental scam and a scammer who likes to talk about his work, and our Catch of the Day is from a listener named Craig with an email about an unprofessional colleague and a questionable attachment.
Links to stories:

A ‘dark-side coupon group’ scammed stores out of millions, police say. ‘They were just going through the ink.’

Housing scams abundant in Jackson. This scammer is proud of it


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Guest Kurtis Minder from GroupSense joins Dave to discuss divergent ransomware trends, the guys have a listener reminder about it being CompTIA, Joe, Dave has a story about a coupon scam in the Houston area, Joe's story is about a real estate rental scam and a scammer who likes to talk about his work, and our Catch of the Day is from a listener named Craig with an email about an unprofessional colleague and a questionable attachment.</p><p>Links to stories:</p><ul>
<li><a href="https://www.washingtonpost.com/nation/2021/07/02/coupon-fraud-houston/">A ‘dark-side coupon group’ scammed stores out of millions, police say. ‘They were just going through the ink.’</a></li>
<li><a href="https://www.jhnewsandguide.com/news/cops_courts/housing-scams-abundant-in-jackson-this-scammer-is-proud-of-it/article_b2b482a7-13ca-5471-8d75-be5cdb0f015d.html">Housing scams abundant in Jackson. This scammer is proud of it</a></li>
</ul><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>2441</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[4b0c9882-357a-11eb-b2fc-a33841c87c2f]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW5037348171.mp3?updated=1626114326" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>next generation firewall (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/55/notes</link>
      <description>A layer seven security orchestration platform deployed at the boundary between internal workloads slash data storage and untrusted sources that blocks incoming and outgoing network traffic with rules that tie applications to the authenticated user and provides most of the traditional security stack functions in one device or software application. </description>
      <pubDate>Tue, 13 Jul 2021 07:00:00 -0000</pubDate>
      <itunes:title>next generation firewall (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>55</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A layer seven security orchestration platform deployed at the boundary between internal workloads slash data storage and untrusted sources that blocks incoming and outgoing network traffic with rules that tie applications to the authenticated user and provides most of the traditional security stack functions in one device or software application. </itunes:summary>
      <content:encoded>
        <![CDATA[<p>A layer seven security orchestration platform deployed at the boundary between internal workloads slash data storage and untrusted sources that blocks incoming and outgoing network traffic with rules that tie applications to the authenticated user and provides most of the traditional security stack functions in one device or software application. </p>]]>
      </content:encoded>
      <itunes:duration>447</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[4fa645da-cfb9-11eb-b235-0f3c68fdd679]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW6099904136.mp3?updated=1623968144" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Introducing 8th Layer Insights: Deceptionology 101: Introduction to the Dark Arts</title>
      <link>https://thecyberwire.com/podcasts/8th-layer-insights/4/notes</link>
      <description>Have you ever noticed how fundamental deception is to the human condition? Deception and forms of social engineering have been with us since the beginning of recorded history. And yet, it seems like we are just as vulnerable to it as ever. But now the stakes are higher because technology allows social engineers to deceive at scale.
This episode explores the psychology of deception, provides a foundation for understanding social engineering, offers a few mental models for exploration and exploitation, and discusses how we can prepare our mental defenses.
Guests:


Rachael Tobac: (LinkedIn), CEO of SocialProof Security



Chris Hadnagy: (LinkedIn); CEO of Social Engineer, LLC; Founder of Innocent Lives Foundation; Founder of Social-Engineer.org



Lisa Forte: (LinkedIn); Partner at Red Goat Cyber Security; Co-Founder Cyber Volunteers 19



George Finney: (LinkedIn); Chief Security Officer at Southern Methodist University; Founder of Well Aware Security



Notes &amp; Resources:

CSO Online article on Social Engineering

OODA Loop

Understanding Framing Effects

More examples of Framing Effects

Harvard Business Review article on the Principles of Persuasion

A blog series I did on Deception (Part 1), (Part 2).

PsychologyToday article on Social Engineering


Recommended Books (Amazon affiliate links):


The Art of Deception: Controlling the Human Element of Security by Kevin Mitnick


Ghost in the Wires: My Adventures as the World's Most Wanted Hacker by Kevin Mitnick


Human Hacking: Win Friends, Influence People, and Leave Them Better Off for Having Met You by Chris Hadnagy


Influence, New and Expanded: The Psychology of Persuasion by Robert Cialdini


Pre-Suasion: A Revolutionary Way to Influence and Persuade by Robert Cialdini


Practical Social Engineering: A Primer for the Ethical Hacker by Joe Gray


Social Engineering: The Science of Human Hacking by Chris Hadnagy


Thinking, Fast and Slow by Daniel Kahneman.


Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors by Perry Carpenter


Well Aware: Master the Nine Cybersecurity Habits to Protect Your Future by George Finney


Music and Sound Effects by Blue Dot Sessions &amp; Storyblocks.
Artwork by Chris Machowski.</description>
      <pubDate>Sun, 11 Jul 2021 07:00:00 -0000</pubDate>
      <itunes:title>Introducing 8th Layer Insights: Deceptionology 101: Introduction to the Dark Arts</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>4</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Have you ever noticed how fundamental deception is to the human condition? Deception and forms of social engineering have been with us since the beginning of recorded history. And yet, it seems like we are just as vulnerable to it as ever. But now the stakes are higher because technology allows social engineers to deceive at scale.
This episode explores the psychology of deception, provides a foundation for understanding social engineering, offers a few mental models for exploration and exploitation, and discusses how we can prepare our mental defenses.
Guests:


Rachael Tobac: (LinkedIn), CEO of SocialProof Security



Chris Hadnagy: (LinkedIn); CEO of Social Engineer, LLC; Founder of Innocent Lives Foundation; Founder of Social-Engineer.org



Lisa Forte: (LinkedIn); Partner at Red Goat Cyber Security; Co-Founder Cyber Volunteers 19



George Finney: (LinkedIn); Chief Security Officer at Southern Methodist University; Founder of Well Aware Security



Notes &amp; Resources:

CSO Online article on Social Engineering

OODA Loop

Understanding Framing Effects

More examples of Framing Effects

Harvard Business Review article on the Principles of Persuasion

A blog series I did on Deception (Part 1), (Part 2).

PsychologyToday article on Social Engineering


Recommended Books (Amazon affiliate links):


The Art of Deception: Controlling the Human Element of Security by Kevin Mitnick


Ghost in the Wires: My Adventures as the World's Most Wanted Hacker by Kevin Mitnick


Human Hacking: Win Friends, Influence People, and Leave Them Better Off for Having Met You by Chris Hadnagy


Influence, New and Expanded: The Psychology of Persuasion by Robert Cialdini


Pre-Suasion: A Revolutionary Way to Influence and Persuade by Robert Cialdini


Practical Social Engineering: A Primer for the Ethical Hacker by Joe Gray


Social Engineering: The Science of Human Hacking by Chris Hadnagy


Thinking, Fast and Slow by Daniel Kahneman.


Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors by Perry Carpenter


Well Aware: Master the Nine Cybersecurity Habits to Protect Your Future by George Finney


Music and Sound Effects by Blue Dot Sessions &amp; Storyblocks.
Artwork by Chris Machowski.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Have you ever noticed how fundamental deception is to the human condition? Deception and forms of social engineering have been with us since the beginning of recorded history. And yet, it seems like we are just as vulnerable to it as ever. But now the stakes are higher because technology allows social engineers to deceive at scale.</p><p>This episode explores the psychology of deception, provides a foundation for understanding social engineering, offers a few mental models for exploration and exploitation, and discusses how we can prepare our mental defenses.</p><p><strong>Guests:</strong></p><ul>
<li>
<strong>Rachael Tobac: </strong>(<a href="https://www.linkedin.com/in/racheltobac/">LinkedIn</a>), CEO of <a href="https://www.socialproofsecurity.com/">SocialProof Security</a>
</li>
<li>
<strong>Chris Hadnagy: </strong>(<a href="https://www.linkedin.com/in/christopherhadnagy/">LinkedIn</a>); CEO of <a href="https://www.social-engineer.com/">Social Engineer, LLC</a>; Founder of <a href="https://www.innocentlivesfoundation.org/">Innocent Lives Foundation</a>; Founder of <a href="https://www.social-engineer.org/">Social-Engineer.org</a>
</li>
<li>
<strong>Lisa Forte: </strong>(<a href="https://www.linkedin.com/in/lisa-forte/">LinkedIn</a>);<strong> </strong>Partner at <a href="https://red-goat.com/">Red Goat Cyber Security</a>; Co-Founder <a href="https://cyberv19.org.uk/">Cyber Volunteers 19</a>
</li>
<li>
<strong>George Finney: </strong>(<a href="https://www.linkedin.com/in/georgefinney/">LinkedIn</a>);<strong> </strong>Chief Security Officer at <a href="https://www.smu.edu/">Southern Methodist University</a>; Founder of <a href="https://wellawaresecurity.com/">Well Aware Security</a>
</li>
</ul><p><br></p><p><strong>Notes &amp; Resources:</strong></p><ul>
<li>CSO Online <a href="https://www.csoonline.com/article/2124681/what-is-social-engineering.html">article</a> on Social Engineering</li>
<li><a href="https://en.wikipedia.org/wiki/OODA_loop">OODA Loop</a></li>
<li><a href="https://thedecisionlab.com/biases/framing-effect/">Understanding Framing Effects</a></li>
<li>More <a href="https://boycewire.com/framing-effect-definition-and-examples/">examples</a> of Framing Effects</li>
<li>Harvard Business Review <a href="https://hbr.org/2013/07/the-uses-and-abuses-of-influence%20">article</a> on the Principles of Persuasion</li>
<li>A blog series I did on Deception (<a href="https://www.infosecurity-magazine.com/blogs/deceptioneering-1-human/">Part 1</a>), (<a href="https://www.infosecurity-magazine.com/blogs/deceptioneering-2-principles/">Part 2</a>).</li>
<li>PsychologyToday <a href="%20https://www.psychologytoday.com/us/blog/human-hacking/202102/social-engineering-and-psychology">article</a> on Social Engineering</li>
</ul><p><br></p><p><strong>Recommended Books (Amazon affiliate links):</strong></p><ul>
<li>
<a href="https://amzn.to/3qLgnm7">The Art of Deception: Controlling the Human Element of Security</a> by Kevin Mitnick</li>
<li>
<a href="https://amzn.to/3AqOggf">Ghost in the Wires: My Adventures as the World's Most Wanted Hacker</a> by Kevin Mitnick</li>
<li>
<a href="https://amzn.to/3htV0S9">Human Hacking: Win Friends, Influence People, and Leave Them Better Off for Having Met You </a>by Chris Hadnagy</li>
<li>
<a href="https://amzn.to/3ye0yH0">Influence, New and Expanded: The Psychology of Persuasion</a> by Robert Cialdini</li>
<li>
<a href="https://amzn.to/3hvwpfI">Pre-Suasion: A Revolutionary Way to Influence and Persuade</a> by Robert Cialdini</li>
<li>
<a href="https://amzn.to/3huYXFZ">Practical Social Engineering: A Primer for the Ethical Hacker</a> by Joe Gray</li>
<li>
<a href="https://amzn.to/3xi1t9c">Social Engineering: The Science of Human Hacking</a> by Chris Hadnagy</li>
<li>
<a href="https://amzn.to/3geCNHo">Thinking, Fast and Slow</a> by Daniel Kahneman.</li>
<li>
<a href="https://amzn.to/2Rp90U5">Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors</a> by Perry Carpenter</li>
<li>
<a href="https://amzn.to/3ykhhIN">Well Aware: Master the Nine Cybersecurity Habits to Protect Your Future</a> by George Finney</li>
</ul><p><br></p><p>Music and Sound Effects by Blue Dot Sessions &amp; Storyblocks.</p><p>Artwork by <a href="https://www.linkedin.com/in/chris-machowsk-170b14139/">Chris Machowski</a>.</p>]]>
      </content:encoded>
      <itunes:duration>3567</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[e5f6c97c-e041-11eb-b6e0-0b4ff459cdc8]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW3694128941.mp3?updated=1625322162" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Collaboration, data portability, and employee mobility fuel insider risk. </title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/155/notes</link>
      <description>Guest Joe Payne of Code 42 joins Dave to discuss insider risks Joe has a story about Frank Abagnale who's conned everyone one way or another, Dave's story is about a real estate scam conning a single mother of her life savings, and our Catch of the Day is from listener Michael with an "Extremely Urgent Attention Required" email.
Links to stories:

Confessions of a Famous Fraudster: How and Why Social Engineering Scams Work

Real estate scam robs Florida mom of $63K in life savings


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 08 Jul 2021 05:00:00 -0000</pubDate>
      <itunes:title>Collaboration, data portability, and employee mobility fuel insider risk. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>155</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Guest Joe Payne of Code 42 joins Dave to discuss insider risks Joe has a story about Frank Abagnale who's conned everyone one way or another, Dave's story is about a real estate scam conning a single mother of her life savings, and our Catch of the Day is from listener Michael with an "Extremely Urgent Attention Required" email.
Links to stories:

Confessions of a Famous Fraudster: How and Why Social Engineering Scams Work

Real estate scam robs Florida mom of $63K in life savings


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Guest Joe Payne of Code 42 joins Dave to discuss insider risks Joe has a story about Frank Abagnale who's conned everyone one way or another, Dave's story is about a real estate scam conning a single mother of her life savings, and our Catch of the Day is from listener Michael with an "Extremely Urgent Attention Required" email.</p><p>Links to stories:</p><ul>
<li><a href="https://securityintelligence.com/articles/fraudster-how-why-social-engineering-scams-work/">Confessions of a Famous Fraudster: How and Why Social Engineering Scams Work</a></li>
<li><a href="https://www.foxnews.com/lifestyle/real-estate-scam-leaves-florida-mom-life-savings">Real estate scam robs Florida mom of $63K in life savings</a></li>
</ul><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>2472</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[4b0039fc-357a-11eb-b2fc-430f266fdd6b]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW9646575364.mp3?updated=1625674717" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>fast flux (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/54/notes</link>
      <description>A network designed to obfuscate the location of a cyber adversary's command and control server by manipulating the domain name system, or DNS, in a way that rotates the associated IP address among large numbers of compromised hosts in a botnet.</description>
      <pubDate>Tue, 06 Jul 2021 07:00:00 -0000</pubDate>
      <itunes:title>fast flux (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>54</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A network designed to obfuscate the location of a cyber adversary's command and control server by manipulating the domain name system, or DNS, in a way that rotates the associated IP address among large numbers of compromised hosts in a botnet.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A network designed to obfuscate the location of a cyber adversary's command and control server by manipulating the domain name system, or DNS, in a way that rotates the associated IP address among large numbers of compromised hosts in a botnet.</p>]]>
      </content:encoded>
      <itunes:duration>433</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[5b69d3cc-ca38-11eb-a5b3-a78d7b5cf543]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW3778851821.mp3?updated=1623362854" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>An inside view on North Korean cybercrime. </title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/154/notes</link>
      <description>The CyberWire's UK correspondent Carole Theriault returns to share an interview with Geoff White, reporter from the BBC and co-host of the Lazarus Heist podcast, Joe has some listener follow-up from Mike looking for advice on certifications for getting into cybersecurity, Dave's story is from Brian Krebs about catching an ATM shimmer gang, Joe's got a piece from MalwareBytes Labs about phishing for Bitcoin recovery codes, and our Catch of the Day is from listener Rohit with a pretty genuine-looking snail mail scam.
Links to stories:

How Cyber Sleuths Cracked an ATM Shimmer Gang

Bitcoin scammers phish for wallet recovery codes on Twitter


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 01 Jul 2021 05:00:00 -0000</pubDate>
      <itunes:title>An inside view on North Korean cybercrime. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>154</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>The CyberWire's UK correspondent Carole Theriault returns to share an interview with Geoff White, reporter from the BBC and co-host of the Lazarus Heist podcast, Joe has some listener follow-up from Mike looking for advice on certifications for getting into cybersecurity, Dave's story is from Brian Krebs about catching an ATM shimmer gang, Joe's got a piece from MalwareBytes Labs about phishing for Bitcoin recovery codes, and our Catch of the Day is from listener Rohit with a pretty genuine-looking snail mail scam.
Links to stories:

How Cyber Sleuths Cracked an ATM Shimmer Gang

Bitcoin scammers phish for wallet recovery codes on Twitter


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The CyberWire's UK correspondent Carole Theriault returns to share an interview with Geoff White, reporter from the BBC and co-host of the Lazarus Heist podcast, Joe has some listener follow-up from Mike looking for advice on certifications for getting into cybersecurity, Dave's story is from Brian Krebs about catching an ATM shimmer gang, Joe's got a piece from MalwareBytes Labs about phishing for Bitcoin recovery codes, and our Catch of the Day is from listener Rohit with a pretty genuine-looking snail mail scam.</p><p>Links to stories:</p><ul>
<li><a href="https://krebsonsecurity.com/2021/06/how-cyber-sleuths-cracked-an-atm-shimmer-gang/">How Cyber Sleuths Cracked an ATM Shimmer Gang</a></li>
<li><a href="https://blog.malwarebytes.com/social-engineering/2021/04/bitcoin-scammers-phish-for-wallet-recovery-codes-on-twitter/">Bitcoin scammers phish for wallet recovery codes on Twitter</a></li>
</ul><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>2135</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[4ae6c65c-357a-11eb-b2fc-af2f7375db40]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW9527507610.mp3?updated=1624994812" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>encryption (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/53/notes</link>
      <description>The process of converting plain text into an unrecognizable form or secret code to hide its true meaning.</description>
      <pubDate>Tue, 29 Jun 2021 07:00:00 -0000</pubDate>
      <itunes:title>encryption (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>53</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>The process of converting plain text into an unrecognizable form or secret code to hide its true meaning.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The process of converting plain text into an unrecognizable form or secret code to hide its true meaning.</p>]]>
      </content:encoded>
      <itunes:duration>407</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[eb3f0056-c88c-11eb-abc5-57316e8e937b]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW7472311114.mp3?updated=1622831357" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Bad password hygiene jeopardizes streaming services. </title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/153/notes</link>
      <description>Guest Matthew Gracey-McMinn joins us from Netacea to speak with Dave about security issues with streaming services, Joe shares some follow-up from listener Jason about a bracelet sale mentioned a few episodes ago, Joe's story is from UMBC about AI-generated fake news reports, Dave's got a story about a replacement scam for a hardware wallet used for storing cryptocurrency, and our Catch of the Day comes from a listener called R about a vishing scam for DirectTV.
Links to stories:

Study shows AI-generated fake reports fool experts

Criminals are mailing altered Ledger devices to steal cryptocurrency


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 24 Jun 2021 05:00:00 -0000</pubDate>
      <itunes:title>Bad password hygiene jeopardizes streaming services. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>153</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Guest Matthew Gracey-McMinn joins us from Netacea to speak with Dave about security issues with streaming services, Joe shares some follow-up from listener Jason about a bracelet sale mentioned a few episodes ago, Joe's story is from UMBC about AI-generated fake news reports, Dave's got a story about a replacement scam for a hardware wallet used for storing cryptocurrency, and our Catch of the Day comes from a listener called R about a vishing scam for DirectTV.
Links to stories:

Study shows AI-generated fake reports fool experts

Criminals are mailing altered Ledger devices to steal cryptocurrency


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Guest Matthew Gracey-McMinn joins us from Netacea to speak with Dave about security issues with streaming services, Joe shares some follow-up from listener Jason about a bracelet sale mentioned a few episodes ago, Joe's story is from UMBC about AI-generated fake news reports, Dave's got a story about a replacement scam for a hardware wallet used for storing cryptocurrency, and our Catch of the Day comes from a listener called R about a vishing scam for DirectTV.</p><p>Links to stories:</p><ul>
<li><a href="https://theconversation.com/study-shows-ai-generated-fake-reports-fool-experts-160909">Study shows AI-generated fake reports fool experts</a></li>
<li><a href="https://www.bleepingcomputer.com/news/cryptocurrency/criminals-are-mailing-altered-ledger-devices-to-steal-cryptocurrency/">Criminals are mailing altered Ledger devices to steal cryptocurrency</a></li>
</ul><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>2414</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[4ada83ba-357a-11eb-b2fc-a7814a391c16]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW6956872523.mp3?updated=1624374215" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>keylogger (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/52/notes</link>
      <description>Software or hardware that records the computer keys pressed by a user. </description>
      <pubDate>Tue, 22 Jun 2021 07:00:00 -0000</pubDate>
      <itunes:title>keylogger (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>52</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Software or hardware that records the computer keys pressed by a user. </itunes:summary>
      <content:encoded>
        <![CDATA[<p>Software or hardware that records the computer keys pressed by a user. </p>]]>
      </content:encoded>
      <itunes:duration>330</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[6e2dd19c-bf21-11eb-828e-2fd73174969a]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW7955283194.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Answering a job ad from a ransomware gang. </title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/152/notes</link>
      <description>Guest Mantas Sasnauskas from CyberNews joins Dave to talk about how he and his colleagues applied for a job with a ransomware gang, Joe and Dave reply to a listener named Christopher about certifications, Dave's story is about credential stuffing with payroll companies for $800,000,Joe shares a story about lewd phishing lures sent to people's email accounts, and our Catch of the Day is from from a listener named Stof who says, he “received this call just now, never heard one this convincing, nearly got me too!"
Links to stories:

How to hack into 5500 accounts… just using “credential stuffing”

Lewd Phishing Lures Aimed at Business Explode

Million-dollar deposits and friends in high places: how we applied for a job with a ransomware gang


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 17 Jun 2021 05:00:00 -0000</pubDate>
      <itunes:title>Answering a job ad from a ransomware gang. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>152</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Guest Mantas Sasnauskas from CyberNews joins Dave to talk about how he and his colleagues applied for a job with a ransomware gang, Joe and Dave reply to a listener named Christopher about certifications, Dave's story is about credential stuffing with payroll companies for $800,000,Joe shares a story about lewd phishing lures sent to people's email accounts, and our Catch of the Day is from from a listener named Stof who says, he “received this call just now, never heard one this convincing, nearly got me too!"
Links to stories:

How to hack into 5500 accounts… just using “credential stuffing”

Lewd Phishing Lures Aimed at Business Explode

Million-dollar deposits and friends in high places: how we applied for a job with a ransomware gang


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Guest Mantas Sasnauskas from CyberNews joins Dave to talk about how he and his colleagues applied for a job with a ransomware gang, Joe and Dave reply to a listener named Christopher about certifications, Dave's story is about credential stuffing with payroll companies for $800,000,Joe shares a story about lewd phishing lures sent to people's email accounts, and our Catch of the Day is from from a listener named Stof who says, he “received this call just now, never heard one this convincing, nearly got me too!"</p><p>Links to stories:</p><ul>
<li><a href="https://nakedsecurity.sophos.com/2021/06/04/how-to-hack-into-5500-accounts-just-using-credential-stuffing/">How to hack into 5500 accounts… just using “credential stuffing”</a></li>
<li><a href="https://threatpost.com/lewd-phishing-lures-business-explode/166734/">Lewd Phishing Lures Aimed at Business Explode</a></li>
<li><a href="https://cybernews.com/security/how-we-applied-to-work-with-ransomware-gang/">Million-dollar deposits and friends in high places: how we applied for a job with a ransomware gang</a></li>
</ul><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>2242</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[4acd8840-357a-11eb-b2fc-67e52708dd14]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW4992138080.mp3?updated=1623785853" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>non-fungible tokens (NFT) (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/51/notes</link>
      <description>Digital assets that are cryptographically protected on a blockchain and contain unique identification codes and metadata that makes them one of a kind.</description>
      <pubDate>Tue, 15 Jun 2021 07:00:00 -0000</pubDate>
      <itunes:title>non-fungible tokens (NFT) (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>51</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Digital assets that are cryptographically protected on a blockchain and contain unique identification codes and metadata that makes them one of a kind.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Digital assets that are cryptographically protected on a blockchain and contain unique identification codes and metadata that makes them one of a kind.</p>]]>
      </content:encoded>
      <itunes:duration>334</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[230fb09c-ba79-11eb-8a6a-27098ead3baf]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW2452407242.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Pandemic taxes: later due dates afford more time for scams. </title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/151/notes</link>
      <description>Guest Robert Capps of NuData Security joins Dave to discuss what businesses can do to bolster their protection against tax fraud, Joe and Dave have some follow-up from 2 episodes ago when they discussed a BazarLoader scam: Wired has a recent article with a twist about a totally fake streaming site called BravoMovies, Joe shares a story from a listener Jason about a friend of his who was targeted by a scammer on Facebook Marketplace, Dave's story is about scammers demanding ransom from families who report missing persons on social media, and our Catch of the Day is from Reddit on a Tron cryptocurrency scam.
Links to stories:


The Bizarro Streaming Site That Hackers Built From Scratch 

Scammers Target Families Who Post Missing Persons on Social Media

COTD post on Reddit: Crypto scammer doesn't understand compound interest and gives me a rate that would give me all of the crypto after 9 hours.



Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 10 Jun 2021 05:00:00 -0000</pubDate>
      <itunes:title>Pandemic taxes: later due dates afford more time for scams. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>151</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Guest Robert Capps of NuData Security joins Dave to discuss what businesses can do to bolster their protection against tax fraud, Joe and Dave have some follow-up from 2 episodes ago when they discussed a BazarLoader scam: Wired has a recent article with a twist about a totally fake streaming site called BravoMovies, Joe shares a story from a listener Jason about a friend of his who was targeted by a scammer on Facebook Marketplace, Dave's story is about scammers demanding ransom from families who report missing persons on social media, and our Catch of the Day is from Reddit on a Tron cryptocurrency scam.
Links to stories:


The Bizarro Streaming Site That Hackers Built From Scratch 

Scammers Target Families Who Post Missing Persons on Social Media

COTD post on Reddit: Crypto scammer doesn't understand compound interest and gives me a rate that would give me all of the crypto after 9 hours.



Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Guest Robert Capps of NuData Security joins Dave to discuss what businesses can do to bolster their protection against tax fraud, Joe and Dave have some follow-up from 2 episodes ago when they discussed a BazarLoader scam: Wired has a recent article with a twist about a totally fake streaming site called BravoMovies, Joe shares a story from a listener Jason about a friend of his who was targeted by a scammer on Facebook Marketplace, Dave's story is about scammers demanding ransom from families who report missing persons on social media, and our Catch of the Day is from Reddit on a Tron cryptocurrency scam.</p><p>Links to stories:</p><ul>
<li>
<a href="https://www.wired.com/story/bravomovies-fake-streaming-site-bazaloader/">The Bizarro Streaming Site That Hackers Built From Scratch</a> </li>
<li><a href="https://www.ic3.gov/Media/Y2021/PSA210514">Scammers Target Families Who Post Missing Persons on Social Media</a></li>
<li>COTD post on Reddit: <a href="https://www.reddit.com/r/scambait/comments/nqjsg6/crypto_scammer_doesnt_understand_compound/">Crypto scammer doesn't understand compound interest and gives me a rate that would give me all of the crypto after 9 hours.</a>
</li>
</ul><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>2369</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[4ac0c8d0-357a-11eb-b2fc-37f445da207c]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW9027407050.mp3?updated=1623178756" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>multi-factor authentication (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/50/notes</link>
      <description>The use of two or more verification methods to gain access to an account.</description>
      <pubDate>Tue, 08 Jun 2021 07:00:00 -0000</pubDate>
      <itunes:title>multi-factor authentication (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>50</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>The use of two or more verification methods to gain access to an account.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The use of two or more verification methods to gain access to an account.</p>]]>
      </content:encoded>
      <itunes:duration>361</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[7770cac0-b4b3-11eb-b9ba-0fa11a6aae81]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW1483815131.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The fight in the dog.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/150/notes</link>
      <description>Guests Jan Kallberg and Col Stephen Hamilton of Army Cyber Institute at West Point join Dave to talk about cognitive force protection, Joe and Dave have some follow-up from a listener named Obada about Apple only allowing 2FA through SMS, Dave shares a story about Google's plan to require MFA for all users, Joe's story is about a couple who had their Fidelity retirement account defrauded to the tune of $40,000, and our Catch of the Day is from a listener named Doal about becoming named the beneficiary of a similarly-named deceased person.
Links to stories:

Google to make multi-factor authentication its default mode

‘Sleeping Giant:' Thieves Target Retirement Accounts

How to protect troops from an assault in the cognitive domain


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 03 Jun 2021 05:00:00 -0000</pubDate>
      <itunes:title>The fight in the dog.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>150</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Guests Jan Kallberg and Col Stephen Hamilton of Army Cyber Institute at West Point join Dave to talk about cognitive force protection, Joe and Dave have some follow-up from a listener named Obada about Apple only allowing 2FA through SMS, Dave shares a story about Google's plan to require MFA for all users, Joe's story is about a couple who had their Fidelity retirement account defrauded to the tune of $40,000, and our Catch of the Day is from a listener named Doal about becoming named the beneficiary of a similarly-named deceased person.
Links to stories:

Google to make multi-factor authentication its default mode

‘Sleeping Giant:' Thieves Target Retirement Accounts

How to protect troops from an assault in the cognitive domain


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Guests Jan Kallberg and Col Stephen Hamilton of Army Cyber Institute at West Point join Dave to talk about cognitive force protection, Joe and Dave have some follow-up from a listener named Obada about Apple only allowing 2FA through SMS, Dave shares a story about Google's plan to require MFA for all users, Joe's story is about a couple who had their Fidelity retirement account defrauded to the tune of $40,000, and our Catch of the Day is from a listener named Doal about becoming named the beneficiary of a similarly-named deceased person.</p><p>Links to stories:</p><ul>
<li><a href="https://www.cyberscoop.com/google-multifactor-authentication-2sv-default/">Google to make multi-factor authentication its default mode</a></li>
<li><a href="https://www.nbcchicago.com/consumer/sleeping-giant-thieves-target-retirement-accounts/2518741/">‘Sleeping Giant:' Thieves Target Retirement Accounts</a></li>
<li><a href="https://www.c4isrnet.com/opinion/2020/11/04/how-to-protect-troops-from-an-assault-in-the-cognitive-domain/">How to protect troops from an assault in the cognitive domain</a></li>
</ul><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>2343</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[4ab42102-357a-11eb-b2fc-5f19da84538b]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW3475744895.mp3?updated=1622568510" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>machine learning (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/49/notes</link>
      <description>A programming technique where the developer doesn't specify each step of the algorithm in code, but instead teaches the algorithm to learn from the experience.</description>
      <pubDate>Tue, 01 Jun 2021 07:00:00 -0000</pubDate>
      <itunes:title>machine learning (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>49</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A programming technique where the developer doesn't specify each step of the algorithm in code, but instead teaches the algorithm to learn from the experience.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A programming technique where the developer doesn't specify each step of the algorithm in code, but instead teaches the algorithm to learn from the experience.</p>]]>
      </content:encoded>
      <itunes:duration>376</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[37562524-b0db-11eb-a3ed-5fd7819af2d7]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW2677221029.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Hacking people vs. hacking technologies to get into companies.  </title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/149/notes</link>
      <description>Guest Tim Sadler from Tessian on how oversharing on social media and in OOO messages can open the door for hackers, Joe shares a story about vishing emails from "Amazon" that had spam confidence levels of 1, Dave's story is about an elaborate BazarLoader campaign counting on a lot of human interaction, and our Catch of the Day is from a listener named Scott about a phishing fax, that's right, we said fax.
Links to stories:

Hello, Is It Me You’re Phishing For: Amazon Vishing Attacks

BazarCall Method: Call Centers Help Spread BazarLoader Malware


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 27 May 2021 05:00:00 -0000</pubDate>
      <itunes:title>Hacking people vs. hacking technologies to get into companies.  </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>149</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Guest Tim Sadler from Tessian on how oversharing on social media and in OOO messages can open the door for hackers, Joe shares a story about vishing emails from "Amazon" that had spam confidence levels of 1, Dave's story is about an elaborate BazarLoader campaign counting on a lot of human interaction, and our Catch of the Day is from a listener named Scott about a phishing fax, that's right, we said fax.
Links to stories:

Hello, Is It Me You’re Phishing For: Amazon Vishing Attacks

BazarCall Method: Call Centers Help Spread BazarLoader Malware


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Guest Tim Sadler from Tessian on how oversharing on social media and in OOO messages can open the door for hackers, Joe shares a story about vishing emails from "Amazon" that had spam confidence levels of 1, Dave's story is about an elaborate BazarLoader campaign counting on a lot of human interaction, and our Catch of the Day is from a listener named Scott about a phishing fax, that's right, we said fax.</p><p>Links to stories:</p><ul>
<li><a href="https://www.armorblox.com/blog/amazon-vishing-voice-phishing-attacks/">Hello, Is It Me You’re Phishing For: Amazon Vishing Attacks</a></li>
<li><a href="https://unit42.paloaltonetworks.com/bazarloader-malware/">BazarCall Method: Call Centers Help Spread BazarLoader Malware</a></li>
</ul><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>2363</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[4aa854d0-357a-11eb-b2fc-7fbe28b8f6bd]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW7581093653.mp3?updated=1621959189" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>intelligence (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/48/notes</link>
      <description>The process of turning raw information into intelligence products that leaders use to make decisions with.</description>
      <pubDate>Tue, 25 May 2021 07:00:00 -0000</pubDate>
      <itunes:title>intelligence (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>48</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>The process of turning raw information into intelligence products that leaders use to make decisions with.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The process of turning raw information into intelligence products that leaders use to make decisions with.</p>]]>
      </content:encoded>
      <itunes:duration>356</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[200b3600-a8fe-11eb-a8cb-cf3e3a086fd1]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW3176382412.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Whaling attacks are more targeted than phishing or spearphishing.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/148/notes</link>
      <description>Guest Kev Breen from Immersive Labs joins Dave to talk about how to address whaling attacks, Dave shares a discussion he had with. a colleague about password managers and elderly parents and Joe weighs in, Dave's story is about a smishing Trojan impersonating a Chrome app, Joe has a story about URL redirection making more effective phishing attacks, and our Catch of the Day is from a listener named Vaughn about a snail mail fraud scheme that references a website.
Links to stories:

Beware of this smishing trojan impersonating the Chrome app

Exploiting common URL redirection methods to create effective phishing attacks


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 20 May 2021 05:00:00 -0000</pubDate>
      <itunes:title>Whaling attacks are more targeted than phishing or spearphishing.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>148</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Guest Kev Breen from Immersive Labs joins Dave to talk about how to address whaling attacks, Dave shares a discussion he had with. a colleague about password managers and elderly parents and Joe weighs in, Dave's story is about a smishing Trojan impersonating a Chrome app, Joe has a story about URL redirection making more effective phishing attacks, and our Catch of the Day is from a listener named Vaughn about a snail mail fraud scheme that references a website.
Links to stories:

Beware of this smishing trojan impersonating the Chrome app

Exploiting common URL redirection methods to create effective phishing attacks


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Guest Kev Breen from Immersive Labs joins Dave to talk about how to address whaling attacks, Dave shares a discussion he had with. a colleague about password managers and elderly parents and Joe weighs in, Dave's story is about a smishing Trojan impersonating a Chrome app, Joe has a story about URL redirection making more effective phishing attacks, and our Catch of the Day is from a listener named Vaughn about a snail mail fraud scheme that references a website.</p><p>Links to stories:</p><ul>
<li><a href="https://blog.pradeo.com/fake-chrome-mobile-app-smishing-trojan">Beware of this smishing trojan impersonating the Chrome app</a></li>
<li><a href="https://www.helpnetsecurity.com/2021/05/10/exploiting-url-redirection-methods/">Exploiting common URL redirection methods to create effective phishing attacks</a></li>
</ul><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>2039</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[4a9d8474-357a-11eb-b2fc-335d3184e309]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW9170309872.mp3?updated=1621357417" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Introducing 8th Layer Insights [Trailer]</title>
      <description>Coming May 25, 2021. Get ready for a deep dive into what cybersecurity professionals often refer to as the "8th Layer" of security: HUMANS. This podcast is a multidisciplinary exploration into how the complexities of human nature affect security, risk, and life. Author, security researcher, and behavior science enthusiast Perry Carpenter taps experts for their insights and illumination. Topics include cybersecurity, psychology, behavior science, communication, leadership, and more.</description>
      <pubDate>Wed, 19 May 2021 06:00:00 -0000</pubDate>
      <itunes:title>Introducing 8th Layer Insights [Trailer]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle>Get ready for a deep dive into what cybersecurity professionals often refer to as the "8th Layer" of security: HUMANS.</itunes:subtitle>
      <itunes:summary>Coming May 25, 2021. Get ready for a deep dive into what cybersecurity professionals often refer to as the "8th Layer" of security: HUMANS. This podcast is a multidisciplinary exploration into how the complexities of human nature affect security, risk, and life. Author, security researcher, and behavior science enthusiast Perry Carpenter taps experts for their insights and illumination. Topics include cybersecurity, psychology, behavior science, communication, leadership, and more.</itunes:summary>
      <content:encoded>
        <![CDATA[<p><strong>Coming May 25, 2021</strong>. Get ready for a deep dive into what cybersecurity professionals often refer to as the "8th Layer" of security: HUMANS. This podcast is a multidisciplinary exploration into how the complexities of human nature affect security, risk, and life. Author, security researcher, and behavior science enthusiast Perry Carpenter taps experts for their insights and illumination. Topics include cybersecurity, psychology, behavior science, communication, leadership, and more.</p>]]>
      </content:encoded>
      <itunes:duration>274</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[05ff3f60-b824-11eb-b02b-ffb4bf3d8cee]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW5171278005.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>SaaS (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/47/notes</link>
      <description>A cloud-based software distribution method where app infrastructure, performance, and security are maintained by a service provider and accessible to users, typically via subscription, from any device connected to the internet.</description>
      <pubDate>Tue, 18 May 2021 07:00:00 -0000</pubDate>
      <itunes:title>SaaS (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>47</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A cloud-based software distribution method where app infrastructure, performance, and security are maintained by a service provider and accessible to users, typically via subscription, from any device connected to the internet.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A cloud-based software distribution method where app infrastructure, performance, and security are maintained by a service provider and accessible to users, typically via subscription, from any device connected to the internet.</p>]]>
      </content:encoded>
      <itunes:duration>364</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[478a0422-a78c-11eb-a869-03a0053e4152]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW6693177880.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>How to best fight fake news.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/147/notes</link>
      <description>Guest Helen Lee Bouygues of the Reboot Foundation joins Dave to talk about social media’s effect within the misinformation ecosystem and how users can best fight fake news, Dave and Joe share some follow-up from listener Jonathan on two-factor authentication, Joe's story is about an employee in Scotland sued for making payments based on phishing emails, Dave has a story about fake order confirmation phishing messages prompting us to call rather than click, our Catch of the Day comes from a listener named Wyatt who received a phishing email from some fellow jackpot winners.
Links to stories:

Why You Should Use a Physical Key to Sign Into Your Accounts

Publishing company defrauded of over £193,000 fail to appeal decision that ex-employee was not liable for damages

Company sues worker who fell for email scam

BazarBackdoor phishing campaign eschews links and files to avoid raising red flags


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 13 May 2021 05:00:00 -0000</pubDate>
      <itunes:title>How to best fight fake news.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>147</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Guest Helen Lee Bouygues of the Reboot Foundation joins Dave to talk about social media’s effect within the misinformation ecosystem and how users can best fight fake news, Dave and Joe share some follow-up from listener Jonathan on two-factor authentication, Joe's story is about an employee in Scotland sued for making payments based on phishing emails, Dave has a story about fake order confirmation phishing messages prompting us to call rather than click, our Catch of the Day comes from a listener named Wyatt who received a phishing email from some fellow jackpot winners.
Links to stories:

Why You Should Use a Physical Key to Sign Into Your Accounts

Publishing company defrauded of over £193,000 fail to appeal decision that ex-employee was not liable for damages

Company sues worker who fell for email scam

BazarBackdoor phishing campaign eschews links and files to avoid raising red flags


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Guest Helen Lee Bouygues of the Reboot Foundation joins Dave to talk about social media’s effect within the misinformation ecosystem and how users can best fight fake news, Dave and Joe share some follow-up from listener Jonathan on two-factor authentication, Joe's story is about an employee in Scotland sued for making payments based on phishing emails, Dave has a story about fake order confirmation phishing messages prompting us to call rather than click, our Catch of the Day comes from a listener named Wyatt who received a phishing email from some fellow jackpot winners.</p><p>Links to stories:</p><ul>
<li><a href="https://gizmodo.com/why-you-should-use-a-physical-key-to-sign-into-your-acc-1846793366">Why You Should Use a Physical Key to Sign Into Your Accounts</a></li>
<li><a href="https://www.scottishlegal.com/article/publishing-company-defrauded-of-over-193-000-fail-to-appeal-decision-that-ex-employee-was-not-liable-for-damages">Publishing company defrauded of over £193,000 fail to appeal decision that ex-employee was not liable for damages</a></li>
<li><a href="https://www.bbc.com/news/uk-scotland-glasgow-west-47135686">Company sues worker who fell for email scam</a></li>
<li><a href="https://www.scmagazine.com/home/security-news/phishing/bazarbackdoor-phishing-campaign-eschews-links-and-files-to-avoid-raising-red-flags/">BazarBackdoor phishing campaign eschews links and files to avoid raising red flags</a></li>
</ul><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>2363</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[4a926b7a-357a-11eb-b2fc-8f51c87365d1]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW5252136892.mp3?updated=1620759453" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>decryption (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/45/notes</link>
      <description>A process of converting encrypted data into something that a human or computer can understand.</description>
      <pubDate>Tue, 11 May 2021 05:00:00 -0000</pubDate>
      <itunes:title>decryption (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>45</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A process of converting encrypted data into something that a human or computer can understand.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A process of converting encrypted data into something that a human or computer can understand.</p>]]>
      </content:encoded>
      <itunes:duration>448</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[70ef836e-a8fe-11eb-8d60-53ab66af2fbb]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW1603894818.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Digital identities are at the core of recent breaches. </title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/146/notes</link>
      <description>Our UK correspondent Carole Theriault returns to share her interview with Julie Smith from the Security Alliance and Kelvin Coleman from National Cyber Security Alliance about Identity Management Day, Dave's story is about how Pixar uses colors to hack our moods and minds to see colors we've never seen before, Joe has a story about ways malicious actors can break into accounts with multi-factor authentication enabled, our Catch of the Day comes from a listener named Brett who works in a PC repair shop and "HackerDont'comebacker" software.
Links to stories:

How Pixar Uses Hyper-Colors to Hack Your Brain

How Social Engineering Tactics Can Crack Multi-factor Authentication


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 06 May 2021 05:00:00 -0000</pubDate>
      <itunes:title>Digital identities are at the core of recent breaches. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>146</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Our UK correspondent Carole Theriault returns to share her interview with Julie Smith from the Security Alliance and Kelvin Coleman from National Cyber Security Alliance about Identity Management Day, Dave's story is about how Pixar uses colors to hack our moods and minds to see colors we've never seen before, Joe has a story about ways malicious actors can break into accounts with multi-factor authentication enabled, our Catch of the Day comes from a listener named Brett who works in a PC repair shop and "HackerDont'comebacker" software.
Links to stories:

How Pixar Uses Hyper-Colors to Hack Your Brain

How Social Engineering Tactics Can Crack Multi-factor Authentication


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Our UK correspondent Carole Theriault returns to share her interview with Julie Smith from the Security Alliance and Kelvin Coleman from National Cyber Security Alliance about Identity Management Day, Dave's story is about how Pixar uses colors to hack our moods and minds to see colors we've never seen before, Joe has a story about ways malicious actors can break into accounts with multi-factor authentication enabled, our Catch of the Day comes from a listener named Brett who works in a PC repair shop and "HackerDont'comebacker" software.</p><p>Links to stories:</p><ul>
<li><a href="https://www.wired.com/story/how-pixar-uses-hyper-colors-to-hack-your-brain/">How Pixar Uses Hyper-Colors to Hack Your Brain</a></li>
<li><a href="https://securityboulevard.com/2021/04/how-social-engineering-tactics-can-crack-multi-factor-authentication/">How Social Engineering Tactics Can Crack Multi-factor Authentication</a></li>
</ul><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>2358</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[4a82fdca-357a-11eb-b2fc-67b37c8e54f3]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW2594744783.mp3?updated=1620147258" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>brute-force attack (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/46/notes</link>
      <description>A cryptographic hack that relies on guessing all possible letter combinations of a targeted password until the correct codeword is discovered.</description>
      <pubDate>Tue, 04 May 2021 07:00:00 -0000</pubDate>
      <itunes:title>brute-force attack (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>46</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A cryptographic hack that relies on guessing all possible letter combinations of a targeted password until the correct codeword is discovered.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A cryptographic hack that relies on guessing all possible letter combinations of a targeted password until the correct codeword is discovered.</p>]]>
      </content:encoded>
      <itunes:duration>392</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c15fc6b6-9edf-11eb-9693-8f6f9a990b56]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW6173731150.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Anyone can be a target of romance scams. </title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/145/notes</link>
      <description>Guest Stacey Nash, Head of Fraud and Central Operations at USAA, joins Dave to discuss romance or sweetheart scams, Joe and Dave share some listener follow-up, Joe's got a story about emails sent to British awards organizers asking them to transfer prize money to a PayPal account, Dave's story is about a Rolling Stones tribute band targeted in a bogus check racket, and our Catch of the Day comes from a listener named Konstantin about a fake tax refund.
Links to stories:

$40,000 Swindle Puts Spotlight on Literary Prize Scams

Scammers can’t get no satisfaction


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 29 Apr 2021 05:00:00 -0000</pubDate>
      <itunes:title>Anyone can be a target of romance scams. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>145</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Guest Stacey Nash, Head of Fraud and Central Operations at USAA, joins Dave to discuss romance or sweetheart scams, Joe and Dave share some listener follow-up, Joe's got a story about emails sent to British awards organizers asking them to transfer prize money to a PayPal account, Dave's story is about a Rolling Stones tribute band targeted in a bogus check racket, and our Catch of the Day comes from a listener named Konstantin about a fake tax refund.
Links to stories:

$40,000 Swindle Puts Spotlight on Literary Prize Scams

Scammers can’t get no satisfaction


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Guest Stacey Nash, Head of Fraud and Central Operations at USAA, joins Dave to discuss romance or sweetheart scams, Joe and Dave share some listener follow-up, Joe's got a story about emails sent to British awards organizers asking them to transfer prize money to a PayPal account, Dave's story is about a Rolling Stones tribute band targeted in a bogus check racket, and our Catch of the Day comes from a listener named Konstantin about a fake tax refund.</p><p>Links to stories:</p><ul>
<li><a href="https://www.nytimes.com/2021/04/16/books/phishing-book-prizes.html">$40,000 Swindle Puts Spotlight on Literary Prize Scams</a></li>
<li><a href="https://enewspaper.latimes.com/infinity/article_share.aspx?guid=186bdce6-acc0-408f-a477-47ad6ab40afe">Scammers can’t get no satisfaction</a></li>
</ul><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>2164</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[0127b0ba-acb0-11ea-88ee-bfb4b9cf955f]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW1744385778.mp3?updated=1619551409" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>denial-of-service attack (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/44/notes</link>
      <description>A cyber attack designed to impair or eliminate access to online services or data.</description>
      <pubDate>Tue, 27 Apr 2021 07:00:00 -0000</pubDate>
      <itunes:title>denial-of-service attack (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>44</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A cyber attack designed to impair or eliminate access to online services or data.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A cyber attack designed to impair or eliminate access to online services or data.</p>]]>
      </content:encoded>
      <itunes:duration>397</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[ab1967d6-93ea-11eb-9899-87a83a74b41c]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW4624703757.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Make systems to mitigate the mistakes. </title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/144/notes</link>
      <description>Guest Margaret Cunningham from Forcepoint talks with Dave about cognitive biases that lead to reasoning errors in cybersecurity, Joe shares some follow-up from a listener named Alex about the Alexa phone call Joe mentioned a few episodes back, Dave shares a note from listener Brandon about finding similar DNS names (check out https://dnstwister.report/), Dave's story is about dark patterns to get you to do something on a website, Joe shares a story phishing emails and defenses against them, and our Catch of the Day comes from a listener named Big Mike about an old time radio podcast he heard recently with great examples of social engineering.
Links to stories:

Dark patterns, the tricks websites use to make you say yes, explained

Why do phishing attacks work? Blame the humans, not the technology


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 22 Apr 2021 05:00:00 -0000</pubDate>
      <itunes:title>Make systems to mitigate the mistakes. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>144</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Guest Margaret Cunningham from Forcepoint talks with Dave about cognitive biases that lead to reasoning errors in cybersecurity, Joe shares some follow-up from a listener named Alex about the Alexa phone call Joe mentioned a few episodes back, Dave shares a note from listener Brandon about finding similar DNS names (check out https://dnstwister.report/), Dave's story is about dark patterns to get you to do something on a website, Joe shares a story phishing emails and defenses against them, and our Catch of the Day comes from a listener named Big Mike about an old time radio podcast he heard recently with great examples of social engineering.
Links to stories:

Dark patterns, the tricks websites use to make you say yes, explained

Why do phishing attacks work? Blame the humans, not the technology


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Guest Margaret Cunningham from Forcepoint talks with Dave about cognitive biases that lead to reasoning errors in cybersecurity, Joe shares some follow-up from a listener named Alex about the Alexa phone call Joe mentioned a few episodes back, Dave shares a note from listener Brandon about finding similar DNS names (check out https://dnstwister.report/), Dave's story is about dark patterns to get you to do something on a website, Joe shares a story phishing emails and defenses against them, and our Catch of the Day comes from a listener named Big Mike about an old time radio podcast he heard recently with great examples of social engineering.</p><p>Links to stories:</p><ul>
<li><a href="https://www.vox.com/recode/22351108/dark-patterns-ui-web-design-privacy">Dark patterns, the tricks websites use to make you say yes, explained</a></li>
<li><a href="https://www.zdnet.com/google-amp/article/why-do-phishing-attacks-work-blame-the-humans-not-the-technology/">Why do phishing attacks work? Blame the humans, not the technology</a></li>
</ul><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>2548</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[01238abc-acb0-11ea-88ee-8bc1e118945b]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW7098049740.mp3?updated=1619119899" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>cold boot attack (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/43/notes</link>
      <description>A type of side channel attack in which an attacker with physical access to a computer performs a memory dump of a computer’s Random Access Memory or RAM during the reboot process in order to steal sensitive data. </description>
      <pubDate>Tue, 20 Apr 2021 07:00:00 -0000</pubDate>
      <itunes:title>cold boot attack (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>43</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A type of side channel attack in which an attacker with physical access to a computer performs a memory dump of a computer’s Random Access Memory or RAM during the reboot process in order to steal sensitive data. </itunes:summary>
      <content:encoded>
        <![CDATA[<p>A type of side channel attack in which an attacker with physical access to a computer performs a memory dump of a computer’s Random Access Memory or RAM during the reboot process in order to steal sensitive data. </p>]]>
      </content:encoded>
      <itunes:duration>419</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[847ccd28-8e51-11eb-82d3-4b165591d679]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW1961963133.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Being aware can go a long way to prevent attacks. </title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/143/notes</link>
      <description>Guest Herb Stapleton, the FBI’s cyber division sector chief, joins Dave to talk about the FBI's Internet Crime Complaint Center (IC3) annual report and its findings, Joe's story is about an ongoing IRS impersonation scam targeting educational organizations, Dave shares a story from the BBC about people using their pets names as passwords (tell us that hasn't crossed your mind or your keyboard before), and our Catch of the Day comes from the Land Down Under via Gareth and Kingsley. COTD note: Just to be clear their jurisdiction is a single party consent jurisdiction.
Links to stories:

IRS warns university students and staff of impersonation email scam

Pets' names used as passwords by millions, study finds


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 15 Apr 2021 05:00:00 -0000</pubDate>
      <itunes:title>Being aware can go a long way to prevent attacks. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>143</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Guest Herb Stapleton, the FBI’s cyber division sector chief, joins Dave to talk about the FBI's Internet Crime Complaint Center (IC3) annual report and its findings, Joe's story is about an ongoing IRS impersonation scam targeting educational organizations, Dave shares a story from the BBC about people using their pets names as passwords (tell us that hasn't crossed your mind or your keyboard before), and our Catch of the Day comes from the Land Down Under via Gareth and Kingsley. COTD note: Just to be clear their jurisdiction is a single party consent jurisdiction.
Links to stories:

IRS warns university students and staff of impersonation email scam

Pets' names used as passwords by millions, study finds


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Guest Herb Stapleton, the FBI’s cyber division sector chief, joins Dave to talk about the FBI's Internet Crime Complaint Center (IC3) annual report and its findings, Joe's story is about an ongoing IRS impersonation scam targeting educational organizations, Dave shares a story from the BBC about people using their pets names as passwords (tell us that hasn't crossed your mind or your keyboard before), and our Catch of the Day comes from the Land Down Under via Gareth and Kingsley. COTD note: Just to be clear their jurisdiction is a single party consent jurisdiction.</p><p>Links to stories:</p><ul>
<li><a href="https://www.irs.gov/newsroom/irs-warns-university-students-and-staff-of-impersonation-email-scam">IRS warns university students and staff of impersonation email scam</a></li>
<li><a href="https://www.bbc.com/news/technology-56680790">Pets' names used as passwords by millions, study finds</a></li>
</ul><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>2132</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[011f82f0-acb0-11ea-88ee-33a4b9fde18b]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW5916933653.mp3?updated=1618337678" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>cloud computing (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/42/notes</link>
      <description>On-demand pay-as-you-go Internet delivered compute, storage, infrastructure, and security services that are partially managed by the cloud provider and partially managed by the customer.</description>
      <pubDate>Tue, 13 Apr 2021 07:00:00 -0000</pubDate>
      <itunes:title>cloud computing (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>42</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>On-demand pay-as-you-go Internet delivered compute, storage, infrastructure, and security services that are partially managed by the cloud provider and partially managed by the customer.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>On-demand pay-as-you-go Internet delivered compute, storage, infrastructure, and security services that are partially managed by the cloud provider and partially managed by the customer.</p>]]>
      </content:encoded>
      <itunes:duration>376</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[de8678f8-88e5-11eb-b21c-5bf0a76df753]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW9228777751.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Finding targets of opportunity. </title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/142/notes</link>
      <description>Guest Peter Warmka, founder of the Counterintelligence Institute, joins Dave to talk about how insider targets are chosen and assessed, Joe shares a weird phone call he received, Dave's story from a Twitter use named Jake on flower shop scams, Joe has a story about student loan forgiveness scams, and our Catch of the Day comes from a listener named Andrew about a pricey software subscription renewal scam.
Links to stories:

Twitter thread with flower shop scams from Australia

3 Ways to Spot Student Loan Scams


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 08 Apr 2021 05:00:00 -0000</pubDate>
      <itunes:title>Finding targets of opportunity. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>142</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Guest Peter Warmka, founder of the Counterintelligence Institute, joins Dave to talk about how insider targets are chosen and assessed, Joe shares a weird phone call he received, Dave's story from a Twitter use named Jake on flower shop scams, Joe has a story about student loan forgiveness scams, and our Catch of the Day comes from a listener named Andrew about a pricey software subscription renewal scam.
Links to stories:

Twitter thread with flower shop scams from Australia

3 Ways to Spot Student Loan Scams


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Guest Peter Warmka, founder of the Counterintelligence Institute, joins Dave to talk about how insider targets are chosen and assessed, Joe shares a weird phone call he received, Dave's story from a Twitter use named Jake on flower shop scams, Joe has a story about student loan forgiveness scams, and our Catch of the Day comes from a listener named Andrew about a pricey software subscription renewal scam.</p><p>Links to stories:</p><ul>
<li><a href="https://twitter.com/jcybersec_/status/1377923891214098433?s=27">Twitter thread with flower shop scams from Australia</a></li>
<li><a href="https://studentaid.gov/articles/student-loan-scams/">3 Ways to Spot Student Loan Scams</a></li>
</ul><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>2410</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[011b09aa-acb0-11ea-88ee-57cb6e68ad2d]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW7400945070.mp3?updated=1617726037" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>APT (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/41/notes</link>
      <description>An acronym for Advanced Persistent Threat to describe hacker groups or campaigns normally, but not always, associated with nation state cyber espionage and continuous low-level cyber conflict operations.</description>
      <pubDate>Tue, 06 Apr 2021 07:00:00 -0000</pubDate>
      <itunes:title>APT (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>41</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>An acronym for Advanced Persistent Threat to describe hacker groups or campaigns normally, but not always, associated with nation state cyber espionage and continuous low-level cyber conflict operations.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>An acronym for Advanced Persistent Threat to describe hacker groups or campaigns normally, but not always, associated with nation state cyber espionage and continuous low-level cyber conflict operations.</p>]]>
      </content:encoded>
      <itunes:duration>412</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[9f5eabb2-8342-11eb-9a54-a756b55394c6]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW8775491568.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The pandemic is slowing, time to travel? </title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/141/notes</link>
      <description>Guest Fleming Shi of Barracuda joins Dave to talk about about travel-related phishing attacks now that vaccines are more readily available, Dave and Joe share listener advice about preventative email blocking, Joe shares a story about romance scams by someone that includes fake W2s and other documents in the process, Dave's got a story about a phone scammer posing as McDonald's CEO, and our Catch of the Day is from a listener named Tarik with an email about his reported death. Tarik awards this email the Unlikely Phishing Hook of the Year Award presented by the Institute of Questionable Intentions.
Links to stories:

Irvine man accused of $1 million romance scam

Phone scammer pretending to be McDonald's CEO nearly cons Pennsylvania restaurant out of thousands: report


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 01 Apr 2021 05:00:00 -0000</pubDate>
      <itunes:title>The pandemic is slowing, time to travel? </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>141</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Guest Fleming Shi of Barracuda joins Dave to talk about about travel-related phishing attacks now that vaccines are more readily available, Dave and Joe share listener advice about preventative email blocking, Joe shares a story about romance scams by someone that includes fake W2s and other documents in the process, Dave's got a story about a phone scammer posing as McDonald's CEO, and our Catch of the Day is from a listener named Tarik with an email about his reported death. Tarik awards this email the Unlikely Phishing Hook of the Year Award presented by the Institute of Questionable Intentions.
Links to stories:

Irvine man accused of $1 million romance scam

Phone scammer pretending to be McDonald's CEO nearly cons Pennsylvania restaurant out of thousands: report


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Guest Fleming Shi of Barracuda joins Dave to talk about about travel-related phishing attacks now that vaccines are more readily available, Dave and Joe share listener advice about preventative email blocking, Joe shares a story about romance scams by someone that includes fake W2s and other documents in the process, Dave's got a story about a phone scammer posing as McDonald's CEO, and our Catch of the Day is from a listener named Tarik with an email about his reported death. Tarik awards this email the Unlikely Phishing Hook of the Year Award presented by the Institute of Questionable Intentions.</p><p>Links to stories:</p><ul>
<li><a href="https://www.ocregister.com/2021/03/10/irvine-man-accused-of-1-million-romance-scam/">Irvine man accused of $1 million romance scam</a></li>
<li><a href="https://www.foxnews.com/food-drink/phone-scammer-mcdonalds-ceo-pennsylvania-thousands-report">Phone scammer pretending to be McDonald's CEO nearly cons Pennsylvania restaurant out of thousands: report</a></li>
</ul><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>2090</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[0116c020-acb0-11ea-88ee-8388e81e5e59]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW2835771903.mp3?updated=1617148818" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>backdoor (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/40/notes</link>
      <description>An undocumented or publicly unknown method to access a computer system undetected or to break a cypher used to encode messages.</description>
      <pubDate>Tue, 30 Mar 2021 07:00:00 -0000</pubDate>
      <itunes:title>backdoor (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>40</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>An undocumented or publicly unknown method to access a computer system undetected or to break a cypher used to encode messages.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>An undocumented or publicly unknown method to access a computer system undetected or to break a cypher used to encode messages.</p>]]>
      </content:encoded>
      <itunes:duration>354</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[175e3dcc-804a-11eb-8a2e-57612301d3bc]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW1557462848.mp3?updated=1615558740" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Technology is not designed for older users.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/140/notes</link>
      <description>Guest Ming Yang of Orchard joins Dave to talk about ways to help your parents with technology (aka providing tech support for our parents). Dave shares the FBI's advisory warning of an expected increase in the use of deepfakes for social engineering attacks, Joe's got a story about phantom debts, and our Catch of the Day is from a listener named Anthony about an email from federalcrimeofinvestigation@gmail.com. Hmmm...seems legit.
Links to stories:

Malicious Actors Almost Certainly Will Leverage Synthetic Content for Cyber and Foreign Influence Operations

Beware Scammers Trying to Collect Phantom Debts


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 25 Mar 2021 05:00:00 -0000</pubDate>
      <itunes:title>Technology is not designed for older users.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>140</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Guest Ming Yang of Orchard joins Dave to talk about ways to help your parents with technology (aka providing tech support for our parents). Dave shares the FBI's advisory warning of an expected increase in the use of deepfakes for social engineering attacks, Joe's got a story about phantom debts, and our Catch of the Day is from a listener named Anthony about an email from federalcrimeofinvestigation@gmail.com. Hmmm...seems legit.
Links to stories:

Malicious Actors Almost Certainly Will Leverage Synthetic Content for Cyber and Foreign Influence Operations

Beware Scammers Trying to Collect Phantom Debts


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Guest Ming Yang of Orchard joins Dave to talk about ways to help your parents with technology (aka providing tech support for our parents). Dave shares the FBI's advisory warning of an expected increase in the use of deepfakes for social engineering attacks, Joe's got a story about phantom debts, and our Catch of the Day is from a listener named Anthony about an email from federalcrimeofinvestigation@gmail.com. Hmmm...seems legit.</p><p>Links to stories:</p><ul>
<li><a href="https://www.ic3.gov/Media/News/2021/210310-2.pdf">Malicious Actors Almost Certainly Will Leverage Synthetic Content for Cyber and Foreign Influence Operations</a></li>
<li><a href="https://www.aarp.org/money/scams-fraud/info-2021/debt-scams.html">Beware Scammers Trying to Collect Phantom Debts</a></li>
</ul><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>2237</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[011244dc-acb0-11ea-88ee-6b003a1649ec]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW3576400281.mp3?updated=1616525728" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>watering hole attack (noun) {Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/39/notes</link>
      <description>From the intrusion kill chain model, a technique where the hacker compromises sites commonly visited by members of a targeted community in order to deliver a malicious payload to the intended victim.</description>
      <pubDate>Tue, 23 Mar 2021 07:00:00 -0000</pubDate>
      <itunes:title>watering hole attack (noun) {Word Notes]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>39</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>From the intrusion kill chain model, a technique where the hacker compromises sites commonly visited by members of a targeted community in order to deliver a malicious payload to the intended victim.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>From the intrusion kill chain model, a technique where the hacker compromises sites commonly visited by members of a targeted community in order to deliver a malicious payload to the intended victim.</p>]]>
      </content:encoded>
      <itunes:duration>330</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[a9bb1c40-7b67-11eb-affd-33f9bb96fc20]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW3935326663.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Ideally, look for someone open to deception. </title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/139/notes</link>
      <description>Guest professional magician Brandon Williams talks with Joe about the art of deception. we have some follow-up on a watering hole attack we discussed a few episodes back, Joe's story is about the Attorney General of Vermont's top scams of 2020 report (no surprise #1 was SSN phishing), Dave's got a story about the level of sophistication of cybercriminals (hint: not all are that sophisticated), and our Catch of the Day is from a listener named Jo about a well-written request for donation.
Links to stories:

Top 10 scams of 2020 released by attorney general

Not all cybercriminals are sophisticated


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 18 Mar 2021 05:00:00 -0000</pubDate>
      <itunes:title>Ideally, look for someone open to deception. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>139</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Guest professional magician Brandon Williams talks with Joe about the art of deception. we have some follow-up on a watering hole attack we discussed a few episodes back, Joe's story is about the Attorney General of Vermont's top scams of 2020 report (no surprise #1 was SSN phishing), Dave's got a story about the level of sophistication of cybercriminals (hint: not all are that sophisticated), and our Catch of the Day is from a listener named Jo about a well-written request for donation.
Links to stories:

Top 10 scams of 2020 released by attorney general

Not all cybercriminals are sophisticated


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Guest professional magician Brandon Williams talks with Joe about the art of deception. we have some follow-up on a watering hole attack we discussed a few episodes back, Joe's story is about the Attorney General of Vermont's top scams of 2020 report (no surprise #1 was SSN phishing), Dave's got a story about the level of sophistication of cybercriminals (hint: not all are that sophisticated), and our Catch of the Day is from a listener named Jo about a well-written request for donation.</p><p>Links to stories:</p><ul>
<li><a href="https://vermontbiz.com/news/2021/march/01/top-10-scams-2020-released-attorney-general">Top 10 scams of 2020 released by attorney general</a></li>
<li><a href="https://www.welivesecurity.com/2021/03/03/not-all-cybercriminals-are-sophisticated/">Not all cybercriminals are sophisticated</a></li>
</ul><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>2365</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[010dcbf0-acb0-11ea-88ee-8f7b55644fd9]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW2124012958.mp3?updated=1615999254" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>network telescope (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/38/notes</link>
      <description>Network observation systems designed to monitor globally unreachable but unused Internet address space or the Deep Web in order to study a wide range of interesting Internet phenomena.</description>
      <pubDate>Tue, 16 Mar 2021 07:00:00 -0000</pubDate>
      <itunes:title>network telescope (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>38</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Network observation systems designed to monitor globally unreachable but unused Internet address space or the Deep Web in order to study a wide range of interesting Internet phenomena.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Network observation systems designed to monitor globally unreachable but unused Internet address space or the Deep Web in order to study a wide range of interesting Internet phenomena.</p>]]>
      </content:encoded>
      <itunes:duration>318</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[7d57c3b4-72f3-11eb-82af-ff7380b606b0]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW3919050920.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Insider threats and security concerns for APIs.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/138/notes</link>
      <description>Guest Inon Shkedy, security researcher at Traceable and API project leader at OWASP Foundation, talks with Dave about the risks various types of insider threats pose to APIs, we have some follow-up from a listener closing on their home, Dave's story is about a new wave of scams saying they are from the Social Security Administration, Joe's got Deepfakes of Tom Cruise (thanks to Rachel Tobac for this one), and our Catch of the Day is from a listener named John's son and a job interview scam he experienced.
Links to stories:

US government warns of Social Security scams using fake federal IDs

Here’s How Worried You Should Be About Those Tom Cruise Deepfakes

Deepfake videos of Tom Cruise show the technology's threat to society is very real


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 11 Mar 2021 06:00:00 -0000</pubDate>
      <itunes:title>Insider threats and security concerns for APIs.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>138</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Guest Inon Shkedy, security researcher at Traceable and API project leader at OWASP Foundation, talks with Dave about the risks various types of insider threats pose to APIs, we have some follow-up from a listener closing on their home, Dave's story is about a new wave of scams saying they are from the Social Security Administration, Joe's got Deepfakes of Tom Cruise (thanks to Rachel Tobac for this one), and our Catch of the Day is from a listener named John's son and a job interview scam he experienced.
Links to stories:

US government warns of Social Security scams using fake federal IDs

Here’s How Worried You Should Be About Those Tom Cruise Deepfakes

Deepfake videos of Tom Cruise show the technology's threat to society is very real


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Guest Inon Shkedy, security researcher at Traceable and API project leader at OWASP Foundation, talks with Dave about the risks various types of insider threats pose to APIs, we have some follow-up from a listener closing on their home, Dave's story is about a new wave of scams saying they are from the Social Security Administration, Joe's got Deepfakes of Tom Cruise (thanks to Rachel Tobac for this one), and our Catch of the Day is from a listener named John's son and a job interview scam he experienced.</p><p>Links to stories:</p><ul>
<li><a href="https://www.bleepingcomputer.com/news/security/us-government-warns-of-social-security-scams-using-fake-federal-ids/">US government warns of Social Security scams using fake federal IDs</a></li>
<li><a href="https://www.vice.com/en/article/n7vgm8/heres-how-worried-you-should-be-about-those-tom-cruise-deepfakes">Here’s How Worried You Should Be About Those Tom Cruise Deepfakes</a></li>
<li><a href="https://www.inputmag.com/tech/deepfake-videos-of-tom-cruise-show-just-fast-its-improving">Deepfake videos of Tom Cruise show the technology's threat to society is very real</a></li>
</ul><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>2302</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[0109dbda-acb0-11ea-88ee-1b632f359195]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW3631089742.mp3?updated=1615307012" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>SOC Triad (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/37/notes</link>
      <description>A best practice for framing cyber intelligence critical information requirements that recommends collecting and consolidating data from three specific sources: endpoint, network and log.</description>
      <pubDate>Tue, 09 Mar 2021 08:00:00 -0000</pubDate>
      <itunes:title>SOC Triad (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>37</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A best practice for framing cyber intelligence critical information requirements that recommends collecting and consolidating data from three specific sources: endpoint, network and log.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A best practice for framing cyber intelligence critical information requirements that recommends collecting and consolidating data from three specific sources: endpoint, network and log.</p>]]>
      </content:encoded>
      <itunes:duration>321</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[6edb9136-6d66-11eb-b085-e7da6901d770]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW7062420691.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Fraud activity within secure messaging apps in plain sight. </title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/137/notes</link>
      <description>Guest Brittany Allen of Sift joins Dave to talk about a new fraud ring on Telegram where bad actors leverage the app to steal from on-demand food delivery services, Joe's story involves two of the five parts of URLs in phishing attacks, Dave's got a story about a malvertising group called "ScamClub," and our Catch of the Day is from a listener named John about a letter he received in the mail from "TD Trust Bank" about an inheritance opportunity.
Links to stories:

New Phishing Attack Identified: Malformed URL Prefixes

“ScamClub” gang outed for exploiting iPhone browser bug to spew ads


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 04 Mar 2021 06:00:00 -0000</pubDate>
      <itunes:title>Fraud activity within secure messaging apps in plain sight. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>137</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Guest Brittany Allen of Sift joins Dave to talk about a new fraud ring on Telegram where bad actors leverage the app to steal from on-demand food delivery services, Joe's story involves two of the five parts of URLs in phishing attacks, Dave's got a story about a malvertising group called "ScamClub," and our Catch of the Day is from a listener named John about a letter he received in the mail from "TD Trust Bank" about an inheritance opportunity.
Links to stories:

New Phishing Attack Identified: Malformed URL Prefixes

“ScamClub” gang outed for exploiting iPhone browser bug to spew ads


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Guest Brittany Allen of Sift joins Dave to talk about a new fraud ring on Telegram where bad actors leverage the app to steal from on-demand food delivery services, Joe's story involves two of the five parts of URLs in phishing attacks, Dave's got a story about a malvertising group called "ScamClub," and our Catch of the Day is from a listener named John about a letter he received in the mail from "TD Trust Bank" about an inheritance opportunity.</p><p>Links to stories:</p><ul>
<li><a href="https://www.greathorn.com/blog-new-phishing-attack-identified-malformed-url-prefixes/">New Phishing Attack Identified: Malformed URL Prefixes</a></li>
<li><a href="https://nakedsecurity.sophos.com/2021/02/17/scamclub-gang-outed-for-exploiting-iphone-browser-bug-to-spew-ads/">“ScamClub” gang outed for exploiting iPhone browser bug to spew ads</a></li>
</ul><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>2495</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[01058896-acb0-11ea-88ee-d70d42dd0828]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW5309653675.mp3?updated=1614706065" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>supply chain attacks (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/36/notes</link>
      <description>Also known as a third-party attack or a value-chain attack, advisory groups gain access to a targeted victims network by first infiltrating a business partner's network that has access to the victim's systems or data.</description>
      <pubDate>Tue, 02 Mar 2021 08:00:00 -0000</pubDate>
      <itunes:title>supply chain attacks (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>36</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Also known as a third-party attack or a value-chain attack, advisory groups gain access to a targeted victims network by first infiltrating a business partner's network that has access to the victim's systems or data.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Also known as a third-party attack or a value-chain attack, advisory groups gain access to a targeted victims network by first infiltrating a business partner's network that has access to the victim's systems or data.</p>]]>
      </content:encoded>
      <itunes:duration>328</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[215b0fd2-6a36-11eb-a52e-2f5362318120]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW1261302229.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>How likely are online users to reveal private information? </title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/136/notes</link>
      <description>Guest Professor Lior Fink from Ben Gurion University shares insights from their study on "How We Can Be Manipulated Into Sharing Private Information Online," Dave's story is some good news about a Nigerian man sentenced for phishing the US heavy equipment company Caterpillar, Joe has a story with bad news about a sextortion email scam with a fake Zoom zero day component, and our Catch of the Day is a compelling phishing email a listener named Michael recently received.
Links to stories:

Nigerian man sentenced 10 years for $11 million phishing scam

Watch out for sextortion email scams


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 25 Feb 2021 06:00:00 -0000</pubDate>
      <itunes:title>How likely are online users to reveal private information? </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>136</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Guest Professor Lior Fink from Ben Gurion University shares insights from their study on "How We Can Be Manipulated Into Sharing Private Information Online," Dave's story is some good news about a Nigerian man sentenced for phishing the US heavy equipment company Caterpillar, Joe has a story with bad news about a sextortion email scam with a fake Zoom zero day component, and our Catch of the Day is a compelling phishing email a listener named Michael recently received.
Links to stories:

Nigerian man sentenced 10 years for $11 million phishing scam

Watch out for sextortion email scams


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Guest Professor Lior Fink from Ben Gurion University shares insights from their study on "How We Can Be Manipulated Into Sharing Private Information Online," Dave's story is some good news about a Nigerian man sentenced for phishing the US heavy equipment company Caterpillar, Joe has a story with bad news about a sextortion email scam with a fake Zoom zero day component, and our Catch of the Day is a compelling phishing email a listener named Michael recently received.</p><p>Links to stories:</p><ul>
<li><a href="https://www.cyberscoop.com/nigerian-email-scam-phishing-prison-sentence/">Nigerian man sentenced 10 years for $11 million phishing scam</a></li>
<li><a href="https://blog.avast.com/sextortion-email-scams-avast">Watch out for sextortion email scams</a></li>
</ul><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>1994</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[010165fe-acb0-11ea-88ee-b3e5cdd8ad63]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW7287906839.mp3?updated=1614098313" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>taint analysis (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/35/notes</link>
      <description>The process of software engineers checking the flow of user input in application code to determine if unanticipated input can affect program execution in malicious ways.</description>
      <pubDate>Tue, 23 Feb 2021 08:00:00 -0000</pubDate>
      <itunes:title>taint analysis (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>35</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>The process of software engineers checking the flow of user input in application code to determine if unanticipated input can affect program execution in malicious ways.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The process of software engineers checking the flow of user input in application code to determine if unanticipated input can affect program execution in malicious ways.</p>]]>
      </content:encoded>
      <itunes:duration>260</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[77736b44-6275-11eb-8668-37f217ba015b]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW8617665459.mp3?updated=1612297348" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Including your passwords in your final arrangements. </title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/135/notes</link>
      <description>Guest Sara Teare who is known as 1Password's Minister of Magic talks with Dave about things that people don't consider like custody of the digital keys to your stuff online, Dave and Joe share some listener feedback from Jonathan about replacing outdated equipment (aka an old phone), Joe's story is about ongoing campaign targeting security researchers working on vulnerability research and development at different companies and organizations, Dave's story has a holiday theme: emails pretending to confirm orders from lingerie and flower shops that are actually spreading malware, and our Catch of the Day is from a listener named Kristian and it's a "legitimate deal" from Colonel Gaddafi's daughter.
Links to stories:

New campaign targeting security researchers

Pre-Valentine’s Day Malware Attack Mimics Flower, Lingerie Stores


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 18 Feb 2021 06:00:00 -0000</pubDate>
      <itunes:title>Including your passwords in your final arrangements. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>135</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Guest Sara Teare who is known as 1Password's Minister of Magic talks with Dave about things that people don't consider like custody of the digital keys to your stuff online, Dave and Joe share some listener feedback from Jonathan about replacing outdated equipment (aka an old phone), Joe's story is about ongoing campaign targeting security researchers working on vulnerability research and development at different companies and organizations, Dave's story has a holiday theme: emails pretending to confirm orders from lingerie and flower shops that are actually spreading malware, and our Catch of the Day is from a listener named Kristian and it's a "legitimate deal" from Colonel Gaddafi's daughter.
Links to stories:

New campaign targeting security researchers

Pre-Valentine’s Day Malware Attack Mimics Flower, Lingerie Stores


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Guest Sara Teare who is known as 1Password's Minister of Magic talks with Dave about things that people don't consider like custody of the digital keys to your stuff online, Dave and Joe share some listener feedback from Jonathan about replacing outdated equipment (aka an old phone), Joe's story is about ongoing campaign targeting security researchers working on vulnerability research and development at different companies and organizations, Dave's story has a holiday theme: emails pretending to confirm orders from lingerie and flower shops that are actually spreading malware, and our Catch of the Day is from a listener named Kristian and it's a "legitimate deal" from Colonel Gaddafi's daughter.</p><p>Links to stories:</p><ul>
<li><a href="https://blog.google/threat-analysis-group/new-campaign-targeting-security-researchers/">New campaign targeting security researchers</a></li>
<li><a href="https://threatpost.com/valentines-day-malware-attack/163900/">Pre-Valentine’s Day Malware Attack Mimics Flower, Lingerie Stores</a></li>
</ul><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>2472</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[00fd30ce-acb0-11ea-88ee-bf97f63eaf4d]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW2510374381.mp3?updated=1613595052" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>ATM skimming (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/34/notes</link>
      <description>The process of stealing ATM customer credentials by means of physically and covertly installing one or more devices onto a public ATM machine.</description>
      <pubDate>Tue, 16 Feb 2021 08:00:00 -0000</pubDate>
      <itunes:title>ATM skimming (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>34</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>The process of stealing ATM customer credentials by means of physically and covertly installing one or more devices onto a public ATM machine.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The process of stealing ATM customer credentials by means of physically and covertly installing one or more devices onto a public ATM machine.</p>]]>
      </content:encoded>
      <itunes:duration>297</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[64c6f588-5e83-11eb-814d-17171942ef0c]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW4937352866.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>In the disinformation and misinformation crosshairs. </title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/134/notes</link>
      <description>Carole Theriault returns with a discussion on disinformation with guest, BBC host, podcaster and author Tim Harford, Dave's got a story about Covid vaccine phishing campaigns, Joe's story talks about data breaches that have increased 50% year over year since 2018, and our Catch of the Day is from a listener named John his wife saw on Facebook who translated it from Lithuanian.
Links to stories:

Count Yourself in For a Vaccine Phish

Deep Analysis of More than 60,000 Breach Reports Over Three Years


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 11 Feb 2021 06:00:00 -0000</pubDate>
      <itunes:title>In the disinformation and misinformation crosshairs. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>134</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Carole Theriault returns with a discussion on disinformation with guest, BBC host, podcaster and author Tim Harford, Dave's got a story about Covid vaccine phishing campaigns, Joe's story talks about data breaches that have increased 50% year over year since 2018, and our Catch of the Day is from a listener named John his wife saw on Facebook who translated it from Lithuanian.
Links to stories:

Count Yourself in For a Vaccine Phish

Deep Analysis of More than 60,000 Breach Reports Over Three Years


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Carole Theriault returns with a discussion on disinformation with guest, BBC host, podcaster and author Tim Harford, Dave's got a story about Covid vaccine phishing campaigns, Joe's story talks about data breaches that have increased 50% year over year since 2018, and our Catch of the Day is from a listener named John his wife saw on Facebook who translated it from Lithuanian.</p><p>Links to stories:</p><ul>
<li><a href="https://www.area1security.com/blog/pfizer-vaccine-phishing-campaign/">Count Yourself in For a Vaccine Phish</a></li>
<li><a href="https://www.securityweek.com/deep-analysis-more-60000-breach-reports-over-three-years">Deep Analysis of More than 60,000 Breach Reports Over Three Years</a></li>
</ul><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>2246</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[00f8e4e2-acb0-11ea-88ee-6f7dea68b03a]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW2147915104.mp3?updated=1612893883" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>APT side hustle (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/33/notes</link>
      <description>A nation-state hacking group’s practice of funding its town activities through cybercrime or cyber mercenary work.</description>
      <pubDate>Tue, 09 Feb 2021 08:00:00 -0000</pubDate>
      <itunes:title>APT side hustle (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>33</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A nation-state hacking group’s practice of funding its town activities through cybercrime or cyber mercenary work.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A nation-state hacking group’s practice of funding its town activities through cybercrime or cyber mercenary work.</p>]]>
      </content:encoded>
      <itunes:duration>329</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[34e2ce60-5784-11eb-9a3f-5bba83ca1b2b]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW6528966093.mp3?updated=1611324756" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Understanding human behavior is a key to security. </title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/133/notes</link>
      <description>Guest Nico Popp of Forcepoint joins Dave to discuss why understanding human behavior is a major key to security, Dave &amp; Joe discuss some listener follow-up about a Craigslist posting, Joe's story is about a scam website that is promising refunds to consumers all over the world, Dave shares a story about scam calls coming from call centers in India, and our Catch of the Day is from a listener about an email from former first lady Melania Trump.
Links to stories:

FTC warns of scam website that promises refund for victims of online scams

Scam “US Trading Commission” website is not the FTC

Who's Making All Those Scam Calls?


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 04 Feb 2021 06:00:00 -0000</pubDate>
      <itunes:title>Understanding human behavior is a key to security. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>133</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Guest Nico Popp of Forcepoint joins Dave to discuss why understanding human behavior is a major key to security, Dave &amp; Joe discuss some listener follow-up about a Craigslist posting, Joe's story is about a scam website that is promising refunds to consumers all over the world, Dave shares a story about scam calls coming from call centers in India, and our Catch of the Day is from a listener about an email from former first lady Melania Trump.
Links to stories:

FTC warns of scam website that promises refund for victims of online scams

Scam “US Trading Commission” website is not the FTC

Who's Making All Those Scam Calls?


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Guest Nico Popp of Forcepoint joins Dave to discuss why understanding human behavior is a major key to security, Dave &amp; Joe discuss some listener follow-up about a Craigslist posting, Joe's story is about a scam website that is promising refunds to consumers all over the world, Dave shares a story about scam calls coming from call centers in India, and our Catch of the Day is from a listener about an email from former first lady Melania Trump.</p><p>Links to stories:</p><ul>
<li><a href="https://grahamcluley.com/ftc-warns-of-scam-website-that-promises-refund-for-victims-of-online-scams/">FTC warns of scam website that promises refund for victims of online scams</a></li>
<li><a href="https://www.consumer.ftc.gov/blog/2021/01/scam-us-trading-commission-website-not-ftc">Scam “US Trading Commission” website is not the FTC</a></li>
<li><a href="https://www.nytimes.com/2021/01/27/magazine/scam-call-centers.html?smid=tw-share">Who's Making All Those Scam Calls?</a></li>
</ul><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>2371</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[00f48870-acb0-11ea-88ee-e78125c2c4ec]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW9937187255.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>endpoint (noun) [Word Notes}</title>
      <link>https://thecyberwire.com/podcasts/word-notes/32/notes</link>
      <description>A device connected to a network that accepts communications from other endpoints like laptops, mobile devices, IoT equipment, routers, switches, and any tool on the security stack.</description>
      <pubDate>Tue, 02 Feb 2021 08:00:00 -0000</pubDate>
      <itunes:title>endpoint (noun) [Word Notes}</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>32</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A device connected to a network that accepts communications from other endpoints like laptops, mobile devices, IoT equipment, routers, switches, and any tool on the security stack.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A device connected to a network that accepts communications from other endpoints like laptops, mobile devices, IoT equipment, routers, switches, and any tool on the security stack.</p>]]>
      </content:encoded>
      <itunes:duration>365</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[1667f402-53a5-11eb-b640-3f37f4f8f9e4]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW4131329808.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Covid has shifted the way we deal with money and increased fraud. </title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/132/notes</link>
      <description>Guest Eric Solis of MOVO Cash talks with Dave about the increase of fraud attacks on consumers and businesses by not having a body of regulations for digital payments, Dave's story is about his recent pillow purchase prompting him to do online reviews for an extra bonus, Joe shares some details from Verizon's Cyber-Espionage report, and our Catch of the Day is a letter from a listener named Jim who had a bad eBay transaction.
Links to stories:

Amazon is trying to crack down on fraudulent reviews. They’re thriving in Facebook groups.

Breach of Trust: How Cyber-Espionage Thrives On Human Nature


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 28 Jan 2021 06:00:00 -0000</pubDate>
      <itunes:title>Covid has shifted the way we deal with money and increased fraud. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>132</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Guest Eric Solis of MOVO Cash talks with Dave about the increase of fraud attacks on consumers and businesses by not having a body of regulations for digital payments, Dave's story is about his recent pillow purchase prompting him to do online reviews for an extra bonus, Joe shares some details from Verizon's Cyber-Espionage report, and our Catch of the Day is a letter from a listener named Jim who had a bad eBay transaction.
Links to stories:

Amazon is trying to crack down on fraudulent reviews. They’re thriving in Facebook groups.

Breach of Trust: How Cyber-Espionage Thrives On Human Nature


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Guest Eric Solis of MOVO Cash talks with Dave about the increase of fraud attacks on consumers and businesses by not having a body of regulations for digital payments, Dave's story is about his recent pillow purchase prompting him to do online reviews for an extra bonus, Joe shares some details from Verizon's Cyber-Espionage report, and our Catch of the Day is a letter from a listener named Jim who had a bad eBay transaction.</p><p>Links to stories:</p><ul>
<li><a href="https://www.theverge.com/2020/10/2/21497416/amazon-crack-down-fraudulent-reviews-facebook-wechat-groups">Amazon is trying to crack down on fraudulent reviews. They’re thriving in Facebook groups.</a></li>
<li><a href="https://www.cyberark.com/resources/blog/breach-of-trust-how-cyber-espionage-thrives-on-human-nature">Breach of Trust: How Cyber-Espionage Thrives On Human Nature</a></li>
</ul><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>2472</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[00f0767c-acb0-11ea-88ee-73c582370876]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW2044283558.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>unified extensible firmware interface (UEFI) (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/31/notes</link>
      <description>An extension of the traditional Basic Input/Output System or BIOS that, during the boot process, facilitates the communication between the computer’s firmware and the computer’s operating system.</description>
      <pubDate>Tue, 26 Jan 2021 08:00:00 -0000</pubDate>
      <itunes:title>unified extensible firmware interface (UEFI) (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>31</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>An extension of the traditional Basic Input/Output System or BIOS that, during the boot process, facilitates the communication between the computer’s firmware and the computer’s operating system.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>An extension of the traditional Basic Input/Output System or BIOS that, during the boot process, facilitates the communication between the computer’s firmware and the computer’s operating system.</p>]]>
      </content:encoded>
      <itunes:duration>356</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[0d37cd22-4f58-11eb-9c8d-3386ca09c81a]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW9134837790.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Targeted phishing campaigns and lottery scams abound. </title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/131/notes</link>
      <description>Guest Arjun Sambamoorthy of Armorblox talks with Dave about five targeted phishing campaigns that weaponize various Google services during their attack flow, Joe's story is about the MegaMillions jackpot that is approaching epic proportions and attracting the attention of scammers, Dave's story comes from a listener over on the Grumpy Old Geeks podcast about a Venmo incident, and our Catch of the Day comes from Joe's son who received an email from the FBI.
Links to stories:

Advisory: Beware of Scams as Jackpot Grows

Lottery Scams: Some scammers falsely use Mega Millions name


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 21 Jan 2021 06:00:00 -0000</pubDate>
      <itunes:title>Targeted phishing campaigns and lottery scams abound. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>131</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Guest Arjun Sambamoorthy of Armorblox talks with Dave about five targeted phishing campaigns that weaponize various Google services during their attack flow, Joe's story is about the MegaMillions jackpot that is approaching epic proportions and attracting the attention of scammers, Dave's story comes from a listener over on the Grumpy Old Geeks podcast about a Venmo incident, and our Catch of the Day comes from Joe's son who received an email from the FBI.
Links to stories:

Advisory: Beware of Scams as Jackpot Grows

Lottery Scams: Some scammers falsely use Mega Millions name


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Guest Arjun Sambamoorthy of Armorblox talks with Dave about five targeted phishing campaigns that weaponize various Google services during their attack flow, Joe's story is about the MegaMillions jackpot that is approaching epic proportions and attracting the attention of scammers, Dave's story comes from a listener over on the Grumpy Old Geeks podcast about a Venmo incident, and our Catch of the Day comes from Joe's son who received an email from the FBI.</p><p>Links to stories:</p><ul>
<li><a href="https://www.megamillions.com/News/2021/Advisory-Beware-of-Scams-as-Jackpot-Grows.aspx">Advisory: Beware of Scams as Jackpot Grows</a></li>
<li><a href="https://www.megamillions.com/About/Lottery-Scams.aspx">Lottery Scams: Some scammers falsely use Mega Millions name</a></li>
</ul><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>2053</itunes:duration>
      <itunes:explicit>yes</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[00ec4b92-acb0-11ea-88ee-077fd8f310a7]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW8787139343.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Daemon (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/30/notes</link>
      <description>An operating system program running in the background designed to perform a specific task when certain conditions or events occur.</description>
      <pubDate>Tue, 19 Jan 2021 08:00:00 -0000</pubDate>
      <itunes:title>Daemon (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>30</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>An operating system program running in the background designed to perform a specific task when certain conditions or events occur.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>An operating system program running in the background designed to perform a specific task when certain conditions or events occur.</p>]]>
      </content:encoded>
      <itunes:duration>289</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[3176faa2-4565-11eb-af2c-f3ddc64a7f99]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW7155401450.mp3?updated=1715035183" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>As B2C interactions shift online, call centers become new fraud vector.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/130/notes</link>
      <description>Guest Umesh Sachdev of Uniphore talks with Dave about how call centers are becoming the new fraud vector, Dave's story involves an email that has a Trump scandal .jar file attached that's really a RAT, Joe has a story about hackers spoofing a victim's phone number making emergency calls where the police respond to the victim's home with force, he also talks about credential stuffing for swatting a video doorbell, and our Catch of the Day comes from a listener Christian who received an email with a lazy trunk box scam.
Links to stories:

Hackers Using Fake Trump's Scandal Video to Spread QNode Malware

FBI Warn Hackers are Using Hijacked Home Security Devices for ‘Swatting’


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 14 Jan 2021 06:00:00 -0000</pubDate>
      <itunes:title>As B2C interactions shift online, call centers become new fraud vector.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>130</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Guest Umesh Sachdev of Uniphore talks with Dave about how call centers are becoming the new fraud vector, Dave's story involves an email that has a Trump scandal .jar file attached that's really a RAT, Joe has a story about hackers spoofing a victim's phone number making emergency calls where the police respond to the victim's home with force, he also talks about credential stuffing for swatting a video doorbell, and our Catch of the Day comes from a listener Christian who received an email with a lazy trunk box scam.
Links to stories:

Hackers Using Fake Trump's Scandal Video to Spread QNode Malware

FBI Warn Hackers are Using Hijacked Home Security Devices for ‘Swatting’


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Guest Umesh Sachdev of Uniphore talks with Dave about how call centers are becoming the new fraud vector, Dave's story involves an email that has a Trump scandal .jar file attached that's really a RAT, Joe has a story about hackers spoofing a victim's phone number making emergency calls where the police respond to the victim's home with force, he also talks about credential stuffing for swatting a video doorbell, and our Catch of the Day comes from a listener Christian who received an email with a lazy trunk box scam.</p><p>Links to stories:</p><ul>
<li><a href="https://thehackernews.com/2021/01/hackers-using-fake-trumps-scandal-video.html">Hackers Using Fake Trump's Scandal Video to Spread QNode Malware</a></li>
<li><a href="https://threatpost.com/fbi-warn-home-security-devices-swatting/162678/#:~:text=Stolen%20email%20credentials%20are%20being,of%20Investigation%20warned%20this%20week">FBI Warn Hackers are Using Hijacked Home Security Devices for ‘Swatting’</a></li>
</ul><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>2368</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[00e7fb82-acb0-11ea-88ee-f3da0f6e6b3b]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW4749826924.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>greyware (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/29/notes</link>
      <description>Also known as spyware and adware, it is a software category where developers design the application neither to cause explicit harm nor to accomplish some conventional legitimate purpose, but when run, usually annoys the user and often performs actions that the developer did not disclose, and that the user regards as undesirable.</description>
      <pubDate>Tue, 12 Jan 2021 08:00:00 -0000</pubDate>
      <itunes:title>greyware (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>29</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Also known as spyware and adware, it is a software category where developers design the application neither to cause explicit harm nor to accomplish some conventional legitimate purpose, but when run, usually annoys the user and often performs actions that the developer did not disclose, and that the user regards as undesirable.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Also known as spyware and adware, it is a software category where developers design the application neither to cause explicit harm nor to accomplish some conventional legitimate purpose, but when run, usually annoys the user and often performs actions that the developer did not disclose, and that the user regards as undesirable.</p>]]>
      </content:encoded>
      <itunes:duration>318</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[533ba944-417d-11eb-a679-a3ede670ae35]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW7470305862.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Combating growing online financial fraud.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/129/notes</link>
      <description>Dave switches gears and shares a story from the National Law Review with a social engineering spin to it about a theft exclusion in a title company's errors and omissions policy, Joe shares a story from Facebook taking action against hacking groups, The Catch of the Day comes Joe himself with a connection request he received on LinkedIn, and later in the show, Dave's conversation with Carey O’Connor Kolaja from AU10TIX on fraud in the financial services and payment industry, and how organizations are using emerging technical solutions to help combat it.
Links to stories:

Engineering Coverage for Social Engineering Schemes in Light of New Jersey Federal Court Opinion Finding No Errors and Omissions Coverage for Email Scam

Taking Action Against Hackers in Bangladesh and Vietnam


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 07 Jan 2021 06:00:00 -0000</pubDate>
      <itunes:title>Combating growing online financial fraud.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>129</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Dave switches gears and shares a story from the National Law Review with a social engineering spin to it about a theft exclusion in a title company's errors and omissions policy, Joe shares a story from Facebook taking action against hacking groups, The Catch of the Day comes Joe himself with a connection request he received on LinkedIn, and later in the show, Dave's conversation with Carey O’Connor Kolaja from AU10TIX on fraud in the financial services and payment industry, and how organizations are using emerging technical solutions to help combat it.
Links to stories:

Engineering Coverage for Social Engineering Schemes in Light of New Jersey Federal Court Opinion Finding No Errors and Omissions Coverage for Email Scam

Taking Action Against Hackers in Bangladesh and Vietnam


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Dave switches gears and shares a story from the National Law Review with a social engineering spin to it about a theft exclusion in a title company's errors and omissions policy, Joe shares a story from Facebook taking action against hacking groups, The Catch of the Day comes Joe himself with a connection request he received on LinkedIn, and later in the show, Dave's conversation with Carey O’Connor Kolaja from AU10TIX on fraud in the financial services and payment industry, and how organizations are using emerging technical solutions to help combat it.</p><p>Links to stories:</p><ul>
<li><a href="https://www.natlawreview.com/article/engineering-coverage-social-engineering-schemes-light-new-jersey-federal-court">Engineering Coverage for Social Engineering Schemes in Light of New Jersey Federal Court Opinion Finding No Errors and Omissions Coverage for Email Scam</a></li>
<li><a href="https://about.fb.com/news/2020/12/taking-action-against-hackers-in-bangladesh-and-vietnam/">Taking Action Against Hackers in Bangladesh and Vietnam</a></li>
</ul><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>2180</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[00e3ffa0-acb0-11ea-88ee-b3b82d4ac8fb]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW2186678211.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Unix (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/27/notes</link>
      <description>A family of multitasking, multi-user computer operating systems that derive from the original Unix system built by Ken Thompson and Dennis Ritchie in the 1960s.</description>
      <pubDate>Tue, 05 Jan 2021 08:00:00 -0000</pubDate>
      <itunes:title>Unix (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>27</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A family of multitasking, multi-user computer operating systems that derive from the original Unix system built by Ken Thompson and Dennis Ritchie in the 1960s.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A family of multitasking, multi-user computer operating systems that derive from the original Unix system built by Ken Thompson and Dennis Ritchie in the 1960s.</p>]]>
      </content:encoded>
      <itunes:duration>315</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[f542a3f0-38db-11eb-b715-b3636baca26d]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW9555456575.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>fuzzing (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/28/notes</link>
      <description>An automatic software bug and vulnerability discovery technique that input's invalid, unexpected and/or random data or fuzz into a program and then monitors the program's reaction to it.</description>
      <pubDate>Tue, 05 Jan 2021 08:00:00 -0000</pubDate>
      <itunes:title>fuzzing (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>28</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>An automatic software bug and vulnerability discovery technique that input's invalid, unexpected and/or random data or fuzz into a program and then monitors the program's reaction to it.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>An automatic software bug and vulnerability discovery technique that input's invalid, unexpected and/or random data or fuzz into a program and then monitors the program's reaction to it.</p>]]>
      </content:encoded>
      <itunes:duration>315</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[551c247a-3e60-11eb-9ce2-fbd20269c9f8]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW3226459436.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Encore: Don't go looking for morality here. [Hacking Humans]</title>
      <link>https://%20thecyberwire.com/podcasts/hacking-humans/88/notes</link>
      <description>Dave has a story of an investment scam featuring celebrities, Joe warns of scams surrounding the Coronavirus, the Catch of the Day features Joe's son-in-law's adventure with thousands of bot infiltrations, and later in the show, Dave's extended interview with magicians and entertainers Penn and Teller at RSAC 2020 in San Francisco.
Links to stories:
 Revealed: fake 'traders' allegedly prey on victims in global investment scam
 Coronavirus: Scammers follow the headlines
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 31 Dec 2020 06:00:00 -0000</pubDate>
      <itunes:title>Encore: Don't go looking for morality here.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/f7f5e0d0-4574-11eb-876b-830e570228d9/image/uploads_2F1608767415494-jhvf6yrzqlq-549f718e07505861b8c8cf6c04140e74_2FHH.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Dave has a story of an investment scam featuring celebrities, Joe warns of scams surrounding the Coronavirus, the Catch of the Day features Joe's son-in-law's adventure with thousands of bot infiltrations, and later in the show, Dave's extended...</itunes:subtitle>
      <itunes:summary>Dave has a story of an investment scam featuring celebrities, Joe warns of scams surrounding the Coronavirus, the Catch of the Day features Joe's son-in-law's adventure with thousands of bot infiltrations, and later in the show, Dave's extended interview with magicians and entertainers Penn and Teller at RSAC 2020 in San Francisco.
Links to stories:
 Revealed: fake 'traders' allegedly prey on victims in global investment scam
 Coronavirus: Scammers follow the headlines
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Dave has a story of an investment scam featuring celebrities, Joe warns of scams surrounding the Coronavirus, the Catch of the Day features Joe's son-in-law's adventure with thousands of bot infiltrations, and later in the show, Dave's extended interview with magicians and entertainers Penn and Teller at RSAC 2020 in San Francisco.</p><p>Links to stories:</p><p><a href="https://www.theguardian.com/world/2020/mar/01/revealed-fake-traders-allegedly-prey-on-victims-in-global-investment-scam"> Revealed: fake 'traders' allegedly prey on victims in global investment scam</a></p><p><a href="https://www.consumer.ftc.gov/blog/2020/02/coronavirus-scammers-follow-headlines"> Coronavirus: Scammers follow the headlines</a></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>2331</itunes:duration>
      <guid isPermaLink="false"><![CDATA[cf73ed10-4578-11eb-b730-47909dc0a6ed]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW4987872388.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>deep packet inspection (DPI) (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/26/notes</link>
      <description>A network monitoring and filtering technique that examines both the header information and the payload of every packet traversing a network access point.</description>
      <pubDate>Tue, 29 Dec 2020 08:00:00 -0000</pubDate>
      <itunes:title>deep packet inspection (DPI) (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>26</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A network monitoring and filtering technique that examines both the header information and the payload of every packet traversing a network access point.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A network monitoring and filtering technique that examines both the header information and the payload of every packet traversing a network access point.</p>]]>
      </content:encoded>
      <itunes:duration>334</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[e0c44ca8-3408-11eb-b097-2747ce7d6d5e]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW5904931366.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Encore: Separating fools from money. [Hacking Humans]</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/5/notes</link>
      <description>Dave shares a story of airport penetration testing with high degree of yuck-factor. Joe explores research on protecting passwords from social engineering. The catch-of-the-day comes courtesy of Graham Cluley's email spam box. Dave interviews Wired's Security Staff Writer Lily Hay Newman on her  article tracking Nigerian email scammers. 
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 24 Dec 2020 06:00:00 -0000</pubDate>
      <itunes:title>Encore: Separating fools from money. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/d4a2a818-4577-11eb-8893-2fbc369c006d/image/uploads_2F1608767431691-drkh74waxxa-714c92dec1eb78d1ae31562cababe2e3_2FHH.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Encore: Separating fools from money. </itunes:subtitle>
      <itunes:summary>Dave shares a story of airport penetration testing with high degree of yuck-factor. Joe explores research on protecting passwords from social engineering. The catch-of-the-day comes courtesy of Graham Cluley's email spam box. Dave interviews Wired's Security Staff Writer Lily Hay Newman on her  article tracking Nigerian email scammers. 
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Dave shares a story of airport penetration testing with high degree of yuck-factor. Joe explores research on protecting passwords from social engineering. The catch-of-the-day comes courtesy of Graham Cluley's email spam box. Dave interviews Wired's Security Staff Writer Lily Hay Newman on her <a href="https://www.wired.com/story/nigerian-email-scammers-more-effective-than-ever/"> article tracking Nigerian email scammers. </a></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>1802</itunes:duration>
      <guid isPermaLink="false"><![CDATA[9ec0d14c-4578-11eb-a8bf-272a5e7fffc1]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW9455171677.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>rootkit (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/25/notes</link>
      <description>A clandestine set of applications designed to give hackers access and control over a target device.</description>
      <pubDate>Tue, 22 Dec 2020 08:00:00 -0000</pubDate>
      <itunes:title>rootkit (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>25</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A clandestine set of applications designed to give hackers access and control over a target device.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A clandestine set of applications designed to give hackers access and control over a target device.</p>]]>
      </content:encoded>
      <itunes:duration>417</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[9b282646-2a9f-11eb-95e2-8bca9ac0fdc3]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW7885957308.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>tactics, techniques and procedures (TTPs) (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/24/notes</link>
      <description>A set of behaviors that precisely describes a cyber adversary attack campaign.</description>
      <pubDate>Tue, 22 Dec 2020 08:00:00 -0000</pubDate>
      <itunes:title>tactics, techniques and procedures (TTPs) (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>24</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A set of behaviors that precisely describes a cyber adversary attack campaign.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A set of behaviors that precisely describes a cyber adversary attack campaign.</p>]]>
      </content:encoded>
      <itunes:duration>403</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[607f08ee-285f-11eb-8a70-ff86d1040c27]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW1542562394.mp3?updated=1608663287" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Phishing lures that may be in your inbox soon, and how to deal "left of bang." </title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/128/notes</link>
      <description>Joe talks about phishing lures with holiday packages, current events, and things he expects to see in your inbox soon, Dave's shares a blog post on how to troll a Nigerian prince, The Catch of the Day comes from a listener named Christian who received an email from an ill churchgoer that tests US knowledge of geography, and later in the show, Carole Theriault returns with a conversation with Rebecca McKeown, an independent Chartered Psychologist, with experience researching and evaluating learning and development across the Ministry of Defence. She is studying the psychology of cyber response.
Links to stories:
How to Troll a Nigerian Prince

Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 17 Dec 2020 06:00:00 -0000</pubDate>
      <itunes:title>Phishing lures that may be in your inbox soon, and how to deal "left of bang." </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>128</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Joe talks about phishing lures with holiday packages, current events, and things he expects to see in your inbox soon, Dave's shares a blog post on how to troll a Nigerian prince, The Catch of the Day comes from a listener named Christian who received an email from an ill churchgoer that tests US knowledge of geography, and later in the show, Carole Theriault returns with a conversation with Rebecca McKeown, an independent Chartered Psychologist, with experience researching and evaluating learning and development across the Ministry of Defence. She is studying the psychology of cyber response.
Links to stories:
How to Troll a Nigerian Prince

Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Joe talks about phishing lures with holiday packages, current events, and things he expects to see in your inbox soon, Dave's shares a blog post on how to troll a Nigerian prince, The Catch of the Day comes from a listener named Christian who received an email from an ill churchgoer that tests US knowledge of geography, and later in the show, Carole Theriault returns with a conversation with Rebecca McKeown, an independent Chartered Psychologist, with experience researching and evaluating learning and development across the Ministry of Defence. She is studying the psychology of cyber response.</p><p>Links to stories:</p><ul><li><a href="https://keyfindings.blog/2020/01/26/how-to-troll-a-nigerian-prince/">How to Troll a Nigerian Prince</a></li></ul><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>2224</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[00d8039e-acb0-11ea-88ee-6f3b2d0bda10]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW4045662758.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>identity theft (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/22/notes</link>
      <description>In this case Identity is the set of credentials, usually electronic that vouch for who you are and theft is to steal. The theft of a person's identity for purposes of fraud.</description>
      <pubDate>Tue, 15 Dec 2020 08:00:00 -0000</pubDate>
      <itunes:title>identity theft (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>22</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>In this case Identity is the set of credentials, usually electronic that vouch for who you are and theft is to steal. The theft of a person's identity for purposes of fraud.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In this case Identity is the set of credentials, usually electronic that vouch for who you are and theft is to steal. The theft of a person's identity for purposes of fraud.</p>]]>
      </content:encoded>
      <itunes:duration>240</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[fb833a88-1ddb-11eb-8e40-bb3c9a3f0c9c]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW8766709973.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The landscape has shifted for holiday shopping to online. </title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/127/notes</link>
      <description>Joe provides some listener feedback on allowing site notifications, Dave shares good news in his story about taking down money mules, Joe's got not as good news about a phishing campaign targeting the COVID-19 vaccine cold chain, The Catch of the Day comes from a listener named Virginia who received a phishing email impersonating a bank, and later in the show, Dave's conversation with Neal Dennis from Cyware on the cybersecurity concerns and pitfalls customers need to look out for and why ecommerce has become a goldmine for hackers.
Links to stories:

U.S. Law Enforcement Takes Action Against Approximately 2,300 Money Mules In Global Crackdown On Money Laundering

IBM Uncovers Global Phishing Campaign Targeting the COVID-19 Vaccine Cold Chain


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 10 Dec 2020 06:00:00 -0000</pubDate>
      <itunes:title>The landscape has shifted for holiday shopping to online. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>127</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Joe provides some listener feedback on allowing site notifications, Dave shares good news in his story about taking down money mules, Joe's got not as good news about a phishing campaign targeting the COVID-19 vaccine cold chain, The Catch of the Day comes from a listener named Virginia who received a phishing email impersonating a bank, and later in the show, Dave's conversation with Neal Dennis from Cyware on the cybersecurity concerns and pitfalls customers need to look out for and why ecommerce has become a goldmine for hackers.
Links to stories:

U.S. Law Enforcement Takes Action Against Approximately 2,300 Money Mules In Global Crackdown On Money Laundering

IBM Uncovers Global Phishing Campaign Targeting the COVID-19 Vaccine Cold Chain


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Joe provides some listener feedback on allowing site notifications, Dave shares good news in his story about taking down money mules, Joe's got not as good news about a phishing campaign targeting the COVID-19 vaccine cold chain, The Catch of the Day comes from a listener named Virginia who received a phishing email impersonating a bank, and later in the show, Dave's conversation with Neal Dennis from Cyware on the cybersecurity concerns and pitfalls customers need to look out for and why ecommerce has become a goldmine for hackers.</p><p>Links to stories:</p><ul>
<li><a href="https://www.justice.gov/opa/pr/us-law-enforcement-takes-action-against-approximately-2300-money-mules-global-crackdown-money">U.S. Law Enforcement Takes Action Against Approximately 2,300 Money Mules In Global Crackdown On Money Laundering</a></li>
<li><a href="https://securityintelligence.com/posts/ibm-uncovers-global-phishing-covid-19-vaccine-cold-chain/">IBM Uncovers Global Phishing Campaign Targeting the COVID-19 Vaccine Cold Chain</a></li>
</ul><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>1987</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[00d3dc56-acb0-11ea-88ee-07669697a320]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW6203743825.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Virtual Private Network (VPN) (noun) [Word Notes}</title>
      <link>https://thecyberwire.com/podcasts/word-notes/20/notes</link>
      <description>A software, hardware or hybrid encryption layer between two devices on the network that makes the traffic between the sites opaque to the other devices on the same network.</description>
      <pubDate>Tue, 08 Dec 2020 08:00:00 -0000</pubDate>
      <itunes:title>Virtual Private Network (VPN) (noun) [Word Notes}</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>20</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A software, hardware or hybrid encryption layer between two devices on the network that makes the traffic between the sites opaque to the other devices on the same network.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A software, hardware or hybrid encryption layer between two devices on the network that makes the traffic between the sites opaque to the other devices on the same network.</p>]]>
      </content:encoded>
      <itunes:duration>385</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[f1ea115c-0fbe-11eb-8767-479068e1a518]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW9199914901.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>cyber threat intelligence (CTI) (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/23/notes</link>
      <description>Information used by leadership to make decisions regarding the cybersecurity posture of their organization.</description>
      <pubDate>Tue, 08 Dec 2020 08:00:00 -0000</pubDate>
      <itunes:title>cyber threat intelligence (CTI) (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>23</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Information used by leadership to make decisions regarding the cybersecurity posture of their organization.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Information used by leadership to make decisions regarding the cybersecurity posture of their organization.</p>]]>
      </content:encoded>
      <itunes:duration>362</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[9d21df5c-2368-11eb-b97c-43559c95243a]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW9696124098.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Going behind the scenes and preventing social engineering in financial institutions.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/126/notes</link>
      <description>Joe has a story about fake websites with advanced profiling tools and malicious software by OceanLotus, Dave's story is about sites that ask if it's ok to send you notifications, The Catch of the Day comes from a listener named William who received a phishing email from the boss, and later in the show, Dave's conversation with Mike Slaugh from USAA on his predictions for 2021 and best practices for organizations to protect themselves and consumers, including creating better means of identity verification.
Links to stories:

OceanLotus: Extending Cyber Espionage Operations Through Fake Websites

Be Very Sparing in Allowing Site Notifications


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 03 Dec 2020 06:00:00 -0000</pubDate>
      <itunes:title>Going behind the scenes and preventing social engineering in financial institutions.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>126</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Joe has a story about fake websites with advanced profiling tools and malicious software by OceanLotus, Dave's story is about sites that ask if it's ok to send you notifications, The Catch of the Day comes from a listener named William who received a phishing email from the boss, and later in the show, Dave's conversation with Mike Slaugh from USAA on his predictions for 2021 and best practices for organizations to protect themselves and consumers, including creating better means of identity verification.
Links to stories:

OceanLotus: Extending Cyber Espionage Operations Through Fake Websites

Be Very Sparing in Allowing Site Notifications


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Joe has a story about fake websites with advanced profiling tools and malicious software by OceanLotus, Dave's story is about sites that ask if it's ok to send you notifications, The Catch of the Day comes from a listener named William who received a phishing email from the boss, and later in the show, Dave's conversation with Mike Slaugh from USAA on his predictions for 2021 and best practices for organizations to protect themselves and consumers, including creating better means of identity verification.</p><p>Links to stories:</p><ul>
<li><a href="https://www.volexity.com/blog/2020/11/06/oceanlotus-extending-cyber-espionage-operations-through-fake-websites/">OceanLotus: Extending Cyber Espionage Operations Through Fake Websites</a></li>
<li><a href="Be%20Very%20Sparing%20in%20Allowing%20Site%20Notifications">Be Very Sparing in Allowing Site Notifications</a></li>
</ul><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>2339</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[00cfa442-acb0-11ea-88ee-67e4a3441ea9]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW5990872289.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Network Time Protocol (NTP) attack (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/19/notes</link>
      <description>A reflection or amplification distributed denial-of-service attack in which hackers query Internet network time protocol servers, NTP servers for short, for the correct time, but spoof the destination address of their target victims.</description>
      <pubDate>Tue, 01 Dec 2020 08:00:00 -0000</pubDate>
      <itunes:title>Network Time Protocol (NTP) attack (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>19</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A reflection or amplification distributed denial-of-service attack in which hackers query Internet network time protocol servers, NTP servers for short, for the correct time, but spoof the destination address of their target victims.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A reflection or amplification distributed denial-of-service attack in which hackers query Internet network time protocol servers, NTP servers for short, for the correct time, but spoof the destination address of their target victims.</p>]]>
      </content:encoded>
      <itunes:duration>397</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[d7a47fd6-0a5e-11eb-bd82-c77d725819b1]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW9519050384.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>smishing (SMS phishing) (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/17/notes</link>
      <description>From the intrusion kill-chain model, the delivery of a “lure” via a text message to a potential victim by pretending to be some trustworthy person or organization in order to trick the victim into revealing sensitive information. Smishing is a portmanteau word made of two other words, the acronym “SMS” and the cyber coinage “Phishing“. It’s a text-message-centric variation of the email-based phishing scams that have been around since the 1990s. The term “Smishing” arose in the late 2000s. </description>
      <pubDate>Tue, 01 Dec 2020 08:00:00 -0000</pubDate>
      <itunes:title>smishing (SMS phishing) (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>18</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>From the intrusion kill-chain model, the delivery of a “lure” via a text message to a potential victim by pretending to be some trustworthy person or organization in order to trick the victim into revealing sensitive information. Smishing is a portmanteau word made of two other words, the acronym “SMS” and the cyber coinage “Phishing“. It’s a text-message-centric variation of the email-based phishing scams that have been around since the 1990s. The term “Smishing” arose in the late 2000s. </itunes:summary>
      <content:encoded>
        <![CDATA[<p>From the intrusion kill-chain model, the delivery of a “lure” via a text message to a potential victim by pretending to be some trustworthy person or organization in order to trick the victim into revealing sensitive information. Smishing is a portmanteau word made of two other words, the acronym “SMS” and the cyber coinage “Phishing“. It’s a text-message-centric variation of the email-based phishing scams that have been around since the 1990s. The term “Smishing” arose in the late 2000s. </p>]]>
      </content:encoded>
      <itunes:duration>277</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[6ca4ca2a-07ec-11eb-a838-1380c253428a]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW1324636938.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Encore: Wearing a mask in the Oval Office and the art of deception. </title>
      <description>Joe shares his Classic Cons Part 3, Dave has an Apple device scam story, The Catch of the Day is your assassination heads-up, and later in the show our interview with Jonna Mendez, retired CIA intelligence officer and former Chief of Disguise.
Link to story:
 Twitter
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 26 Nov 2020 06:00:00 -0000</pubDate>
      <itunes:title>Encore: Wearing a mask in the Oval Office and the art of deception. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/8c472e3a-2f66-11eb-8c79-67be79b85289/image/uploads_2F1606339199136-2by7uwinq6-c32373d128500a96b1dc3ff5893817e6_2FHacking-Humans-iTunes-art-1400x1400.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Joe shares his Classic Cons Part 3, Dave has an Apple device scam story, The Catch of the Day is your assassination heads-up, and later in the show our interview with Jonna Mendez, retired CIA intelligence officer and former Chief of Disguise.
Link to story:
 Twitter
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Joe shares his Classic Cons Part 3, Dave has an Apple device scam story, The Catch of the Day is your assassination heads-up, and later in the show our interview with Jonna Mendez, retired CIA intelligence officer and former Chief of Disguise.</p><p>Link to story:</p><p><a href="https://twitter.com/floam/status/1262901978394431489?s=20"> Twitter</a></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>2613</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[8c472e3a-2f66-11eb-8c79-67be79b85289]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW6503471995.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>port mirroring (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/17/notes</link>
      <description>A network switch configuration setting that forwards a copy of each incoming and outgoing packet to a third switch port. Also known as SPAN or Switched Port Analyzer, RAP or Roving Analysis Port, and TAP or Test Access Point. When network managers and security investigators want to capture packets for analysis, they need some sort of generic TAP or Test Access Point. You can buy specialized equipment for this operation but most modern switches have this capability built in. </description>
      <pubDate>Tue, 24 Nov 2020 08:00:00 -0000</pubDate>
      <itunes:title>port mirroring (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>17</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle>port mirroring (noun) [Word Notes]</itunes:subtitle>
      <itunes:summary>A network switch configuration setting that forwards a copy of each incoming and outgoing packet to a third switch port. Also known as SPAN or Switched Port Analyzer, RAP or Roving Analysis Port, and TAP or Test Access Point. When network managers and security investigators want to capture packets for analysis, they need some sort of generic TAP or Test Access Point. You can buy specialized equipment for this operation but most modern switches have this capability built in. </itunes:summary>
      <content:encoded>
        <![CDATA[<p>A network switch configuration setting that forwards a copy of each incoming and outgoing packet to a third switch port. Also known as SPAN or Switched Port Analyzer, RAP or Roving Analysis Port, and TAP or Test Access Point. When network managers and security investigators want to capture packets for analysis, they need some sort of generic TAP or Test Access Point. You can buy specialized equipment for this operation but most modern switches have this capability built in. </p>]]>
      </content:encoded>
      <itunes:duration>277</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[52526e5c-07ec-11eb-8147-83425641e233]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW6472671527.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The public's expectations are changing.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/125/notes</link>
      <description>Dave has a story about the security risks of your outbound email, Joe's story is about a fake company, Ecapitalloans, using fake BBB affiliation, The Catch of the Day comes from a listener named Max with a new work phone with curious activity from previous number owner, and later in the show, Dave's conversation with Bill Coletti, crisis communications and reputation management expert at Kith, and author of the book Critical Moments: A New Mindset for Reputation Management. 
Links to stories:

The 2020 Outbound Email Data Breach Report Finds growing email volumes and stressed employees are causing rising breach risk

BBB Warning: Ecapitalloans steals personal information and money from loan applicants

Ecapitalloans.co


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 19 Nov 2020 06:00:00 -0000</pubDate>
      <itunes:title>The public's expectations are changing.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>125</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Dave has a story about the security risks of your outbound email, Joe's story is about a fake company, Ecapitalloans, using fake BBB affiliation, The Catch of the Day comes from a listener named Max with a new work phone with curious activity from previous number owner, and later in the show, Dave's conversation with Bill Coletti, crisis communications and reputation management expert at Kith, and author of the book Critical Moments: A New Mindset for Reputation Management. 
Links to stories:

The 2020 Outbound Email Data Breach Report Finds growing email volumes and stressed employees are causing rising breach risk

BBB Warning: Ecapitalloans steals personal information and money from loan applicants

Ecapitalloans.co


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Dave has a story about the security risks of your outbound email, Joe's story is about a fake company, Ecapitalloans, using fake BBB affiliation, The Catch of the Day comes from a listener named Max with a new work phone with curious activity from previous number owner, and later in the show, Dave's conversation with Bill Coletti, crisis communications and reputation management expert at Kith, and author of the book Critical Moments: A New Mindset for Reputation Management. </p><p>Links to stories:</p><ul>
<li><a href="https://www.egress.com/en-us/news/2020-outbound-email-security-report">The 2020 Outbound Email Data Breach Report Finds growing email volumes and stressed employees are causing rising breach risk</a></li>
<li><a href="https://www.bbb.org/article/news-releases/23286-bbb-alert-bogus-online-lender-claiming-false-bbb-affiliation">BBB Warning: Ecapitalloans steals personal information and money from loan applicants</a></li>
<li><a href="https://reportscam.com/ecapitalloansco">Ecapitalloans.co</a></li>
</ul><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>2443</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[00c6ff90-acb0-11ea-88ee-afa9943e0d37]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW2370279899.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>shadow IT (noun) {Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/15/notes</link>
      <description>Technology, software and hardware deployed without explicit organizational approval. In the early days of the computer era from the 1980s through the 2000s security and information system practitioners considered shadow IT as completely negative. Those unauthorized systems were nothing more than a hindrance that created more technical debt in organizations that were already swimming in it with the known and authorized systems. </description>
      <pubDate>Tue, 17 Nov 2020 08:00:00 -0000</pubDate>
      <itunes:title>shadow IT (noun) {Word Notes]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>15</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Technology, software and hardware deployed without explicit organizational approval. In the early days of the computer era from the 1980s through the 2000s security and information system practitioners considered shadow IT as completely negative. Those unauthorized systems were nothing more than a hindrance that created more technical debt in organizations that were already swimming in it with the known and authorized systems. </itunes:summary>
      <content:encoded>
        <![CDATA[<p>Technology, software and hardware deployed without explicit organizational approval. In the early days of the computer era from the 1980s through the 2000s security and information system practitioners considered shadow IT as completely negative. Those unauthorized systems were nothing more than a hindrance that created more technical debt in organizations that were already swimming in it with the known and authorized systems. </p>]]>
      </content:encoded>
      <itunes:duration>294</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[5d8864ae-f787-11ea-95d7-0b7d98dab1b3]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW5003658503.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Network Detection and Response (NDR) (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/16/notes</link>
      <description>NDR tools provide anomaly detection and potential attack prevention by collecting telemetry across the entire intrusion kill chain on transactions across the network, between servers, hosts, and cloud-workloads, and running machine learning algorithms against this compiled and very large data set. NDR is an extension of the EDR, or endpoint detection and response idea that emerged in 2013. </description>
      <pubDate>Tue, 17 Nov 2020 08:00:00 -0000</pubDate>
      <itunes:title>Network Detection and Response (NDR) (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>16</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>NDR tools provide anomaly detection and potential attack prevention by collecting telemetry across the entire intrusion kill chain on transactions across the network, between servers, hosts, and cloud-workloads, and running machine learning algorithms against this compiled and very large data set. NDR is an extension of the EDR, or endpoint detection and response idea that emerged in 2013. </itunes:summary>
      <content:encoded>
        <![CDATA[<p>NDR tools provide anomaly detection and potential attack prevention by collecting telemetry across the entire intrusion kill chain on transactions across the network, between servers, hosts, and cloud-workloads, and running machine learning algorithms against this compiled and very large data set. NDR is an extension of the EDR, or endpoint detection and response idea that emerged in 2013. </p>]]>
      </content:encoded>
      <itunes:duration>379</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[74d78526-fc51-11ea-bdc9-6faa1d308bcc]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW1401460992.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Ransomware: Statistically, it's likely to happen to anybody. </title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/124/notes</link>
      <description>Joe has a story about how Emotet is being used in phishing emails through thread hijacking, Dave's story is a two-fer: one is about bad guys using image manipulation and the other has Elon Musk giving away Bitcoin again taking advantage of the US election, The Catch of the Day is from a listener named John about an email-based vishing attack, and later in the show, we welcome back Kurtis Minder of GroupSense on the burgeoning ransomware negotiation industry. 
Links to stories:

Spike in Emotet activity could mean big payday for ransomware gangs

Sneaky Office 365 phishing inverts images to evade detection


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 12 Nov 2020 06:00:00 -0000</pubDate>
      <itunes:title>Ransomware: Statistically, it's likely to happen to anybody. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>124</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Joe has a story about how Emotet is being used in phishing emails through thread hijacking, Dave's story is a two-fer: one is about bad guys using image manipulation and the other has Elon Musk giving away Bitcoin again taking advantage of the US election, The Catch of the Day is from a listener named John about an email-based vishing attack, and later in the show, we welcome back Kurtis Minder of GroupSense on the burgeoning ransomware negotiation industry. 
Links to stories:

Spike in Emotet activity could mean big payday for ransomware gangs

Sneaky Office 365 phishing inverts images to evade detection


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Joe has a story about how Emotet is being used in phishing emails through thread hijacking, Dave's story is a two-fer: one is about bad guys using image manipulation and the other has Elon Musk giving away Bitcoin again taking advantage of the US election, The Catch of the Day is from a listener named John about an email-based vishing attack, and later in the show, we welcome back Kurtis Minder of GroupSense on the burgeoning ransomware negotiation industry. </p><p>Links to stories:</p><ul>
<li><a href="https://www.zdnet.com/google-amp/article/spike-in-emotet-activity-could-mean-big-payday-for-ransomware-gangs/">Spike in Emotet activity could mean big payday for ransomware gangs</a></li>
<li><a href="https://www.bleepingcomputer.com/news/security/sneaky-office-365-phishing-inverts-images-to-evade-detection/">Sneaky Office 365 phishing inverts images to evade detection</a></li>
</ul><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>2180</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[00c2bd72-acb0-11ea-88ee-0fa00a9621b4]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW7606141427.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>remote access Trojan or RAT (noun) [Word Notes}</title>
      <link>https://thecyberwire.com/podcasts/word-notes/14/notes</link>
      <description>From the intrusion kill chain model, a program that provides command and control services for an attack campaign. While the first ever deployed RAT is unknown, one early example is Back Orifice made famous by the notorious hacktivist group called “The Cult of the Dead Cow,” or cDc, Back Orifice was written by the hacker, Sir Dystic AKA Josh Bookbinder and released to the public at DEFCON in 1998.</description>
      <pubDate>Tue, 10 Nov 2020 08:00:00 -0000</pubDate>
      <itunes:title>remote access Trojan or RAT (noun) [Word Notes}</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>14</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>From the intrusion kill chain model, a program that provides command and control services for an attack campaign. While the first ever deployed RAT is unknown, one early example is Back Orifice made famous by the notorious hacktivist group called “The Cult of the Dead Cow,” or cDc, Back Orifice was written by the hacker, Sir Dystic AKA Josh Bookbinder and released to the public at DEFCON in 1998.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>From the intrusion kill chain model, a program that provides command and control services for an attack campaign. While the first ever deployed RAT is unknown, one early example is Back Orifice made famous by the notorious hacktivist group called “The Cult of the Dead Cow,” or cDc, Back Orifice was written by the hacker, Sir Dystic AKA Josh Bookbinder and released to the public at DEFCON in 1998.</p>]]>
      </content:encoded>
      <itunes:duration>282</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[3f33e1ea-f787-11ea-891c-f70fa2bea6b1]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW5546541260.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Too good to be true. </title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/123/notes</link>
      <description>Dave has a story about a fake Facebook copyright violation scam trying to trick you out of your TFA to get into your account, Joe story about the largest elder fraud scam in US history, The Catch of the Day is about a scam using a Google code for verification and includes Hacking Humans in the response, and later in the show, Dave's conversation with Mallory Sofastaii from WMAR Baltimore returns with her reporting on a fake website luring victims through social media ads.
. 
Links to stories and Catch of the Day:

Facebook “copyright violation” tries to get past 2FA – don’t fall for it!

Feds Bust Massive Magazine-Subscription Scam Targeting Older Consumers

Feds in Minnesota charge 60 in $335M magazine fraud that defrauded seniors nationwide


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 05 Nov 2020 06:00:00 -0000</pubDate>
      <itunes:title>Too good to be true. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>123</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Dave has a story about a fake Facebook copyright violation scam trying to trick you out of your TFA to get into your account, Joe story about the largest elder fraud scam in US history, The Catch of the Day is about a scam using a Google code for verification and includes Hacking Humans in the response, and later in the show, Dave's conversation with Mallory Sofastaii from WMAR Baltimore returns with her reporting on a fake website luring victims through social media ads.
. 
Links to stories and Catch of the Day:

Facebook “copyright violation” tries to get past 2FA – don’t fall for it!

Feds Bust Massive Magazine-Subscription Scam Targeting Older Consumers

Feds in Minnesota charge 60 in $335M magazine fraud that defrauded seniors nationwide


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Dave has a story about a fake Facebook copyright violation scam trying to trick you out of your TFA to get into your account, Joe story about the largest elder fraud scam in US history, The Catch of the Day is about a scam using a Google code for verification and includes Hacking Humans in the response, and later in the show, Dave's conversation with Mallory Sofastaii from WMAR Baltimore returns with her reporting on a fake website luring victims through social media ads.</p><p>. </p><p>Links to stories and Catch of the Day:</p><ul>
<li><a href="https://nakedsecurity.sophos.com/2020/10/27/facebook-copyright-violation-tries-to-get-past-2fa-dont-fall-for-it/">Facebook “copyright violation” tries to get past 2FA – don’t fall for it!</a></li>
<li><a href="https://www.aarp.org/money/scams-fraud/info-2020/telemarketing-magazine-subscription-scam.html">Feds Bust Massive Magazine-Subscription Scam Targeting Older Consumers</a></li>
<li><a href="https://www.startribune.com/feds-in-minnesota-charge-60-in-335m-magazine-fraud-scheme-that-targeted-seniors/572897881/">Feds in Minnesota charge 60 in $335M magazine fraud that defrauded seniors nationwide</a></li>
</ul><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>2176</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[00beae44-acb0-11ea-88ee-bb3a606d95ba]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW1903952192.mp3?updated=1604502355" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>business email compromise or BEC (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/13/notes</link>
      <description>A social engineering scam where fraudsters spoof an email message from a trusted company officer that directs a staff member to transfer funds to an account controlled by the criminal. </description>
      <pubDate>Tue, 03 Nov 2020 08:00:00 -0000</pubDate>
      <itunes:title>business email compromise or BEC (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>13</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A social engineering scam where fraudsters spoof an email message from a trusted company officer that directs a staff member to transfer funds to an account controlled by the criminal. </itunes:summary>
      <content:encoded>
        <![CDATA[<p>A social engineering scam where fraudsters spoof an email message from a trusted company officer that directs a staff member to transfer funds to an account controlled by the criminal. </p>]]>
      </content:encoded>
      <itunes:duration>227</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[21785b22-f787-11ea-8320-47f98952b3ad]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW3568716863.mp3?updated=1598880607" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>David Sanger on the HBO documentary based off his book, "The Perfect Weapon". [Special Edition]</title>
      <link>https://thecyberwire.com/podcasts/special-edition/38/notes</link>
      <description>On this Special Edition, our extended conversation with author and New York Times national security correspondent David E. Sanger. The Perfect Weapon explores the rise of cyber conflict as the primary way nations now compete with and sabotage one another. ‌</description>
      <pubDate>Sun, 01 Nov 2020 08:00:00 -0000</pubDate>
      <itunes:title>David Sanger on the HBO documentary based off his book, "The Perfect Weapon". [Special Edition]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>122</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>On this Special Edition, our extended conversation with author and New York Times national security correspondent David E. Sanger. The Perfect Weapon explores the rise of cyber conflict as the primary way nations now compete with and sabotage one another. ‌</itunes:summary>
      <content:encoded>
        <![CDATA[<p>On this Special Edition, our extended conversation with author and <em>New York Times </em>national security correspondent David E. Sanger. <em>The Perfect Weapon </em>explores the rise of cyber conflict as the primary way nations now compete with and sabotage one another. ‌</p>]]>
      </content:encoded>
      <itunes:duration>1620</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[1e28bd92-1bb1-11eb-8689-4fa7393050d2]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW7863000676.mp3?updated=1662646042" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The Malware Mash!</title>
      <link>https://thecyberwire.com/stories/123bc0f691444be6af3145a6dab6cee4/malware-mash</link>
      <description></description>
      <pubDate>Fri, 30 Oct 2020 05:00:00 -0000</pubDate>
      <itunes:title>The Malware Mash!</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary></itunes:summary>
      <content:encoded>
        <![CDATA[<p><br></p>]]>
      </content:encoded>
      <itunes:duration>185</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[9cecb558-18a4-11eb-a2eb-bb578dc0145e]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW8264278345.mp3?updated=1666877087" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>New consequences, extortion and cyber insurance.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/122/notes</link>
      <description>Joe has a story about a woman who called a fake customer service number and got scammed, Dave's story talks about how phishing kits are not that. hard to find, just check YouTube, The Catch of the Day is an opportunity for a listener remove their name from the BLACKLIST, and later in the show, Dave's conversation with John Pescatore from SANS on Thinking Through the Unthinkable: Should You Pay Off a Ransomware Demand. 
Links to stories and Catch of the Day:

Local Doctor Scammed After Calling Fake Customer Service Number

Phishing kits as far as the eye can see

Sawyer Dickey: " Your name is in the US.BLACKLIST which makes it impossible for you to send money"


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 29 Oct 2020 05:00:00 -0000</pubDate>
      <itunes:title>New consequences, extortion and cyber insurance.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>122</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Joe has a story about a woman who called a fake customer service number and got scammed, Dave's story talks about how phishing kits are not that. hard to find, just check YouTube, The Catch of the Day is an opportunity for a listener remove their name from the BLACKLIST, and later in the show, Dave's conversation with John Pescatore from SANS on Thinking Through the Unthinkable: Should You Pay Off a Ransomware Demand. 
Links to stories and Catch of the Day:

Local Doctor Scammed After Calling Fake Customer Service Number

Phishing kits as far as the eye can see

Sawyer Dickey: " Your name is in the US.BLACKLIST which makes it impossible for you to send money"


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Joe has a story about a woman who called a fake customer service number and got scammed, Dave's story talks about how phishing kits are not that. hard to find, just check YouTube, The Catch of the Day is an opportunity for a listener remove their name from the BLACKLIST, and later in the show, Dave's conversation with John Pescatore from SANS on Thinking Through the Unthinkable: Should You Pay Off a Ransomware Demand. </p><p>Links to stories and Catch of the Day:</p><ul>
<li><a href="https://www.nbcwashington.com/news/consumer/local-doctor-scammed-after-calling-fake-customer-service-number/2449537/">Local Doctor Scammed After Calling Fake Customer Service Number</a></li>
<li><a href="https://isc.sans.edu/forums/diary/Phishing+kits+as+far+as+the+eye+can+see/26660/">Phishing kits as far as the eye can see</a></li>
<li><a href="https://www.reddit.com/r/scambait/comments/j9gwmx/sawyer_dickey_your_name_is_in_the_usblacklist/">Sawyer Dickey: " Your name is in the US.BLACKLIST which makes it impossible for you to send money"</a></li>
</ul><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>2423</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[00b9f228-acb0-11ea-88ee-9b5d6f1880f4]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW1049378805.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>anagram (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/11/notes</link>
      <description>A word, phrase, or sentence formed from another by rearranging its letters. For example, cracking a columnar transposition cipher by hand involves looking for anagrams.</description>
      <pubDate>Tue, 27 Oct 2020 07:00:00 -0000</pubDate>
      <itunes:title>anagram (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>11</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A word, phrase, or sentence formed from another by rearranging its letters. For example, cracking a columnar transposition cipher by hand involves looking for anagrams.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A word, phrase, or sentence formed from another by rearranging its letters. For example, cracking a columnar transposition cipher by hand involves looking for anagrams.</p>]]>
      </content:encoded>
      <itunes:duration>214</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[70e0ce10-e6d4-11ea-9ea0-2b2b40874d07]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW4712651416.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>What is true and important versus what is the spin. </title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/121/notes</link>
      <description>Dave's story is about some cybercriminal gangs that have stolen $22 million from users of the Electrum wallet app, Joe's story talks about a business email compromise scam cost a US company $15 million, The Catch of the Day is a gift card scam that includes references to National Treasure movie, and later in the show, Dave's conversation with Bill Harrod, Federal CTO of MobileIron on election disinformation campaigns. 
Links to stories and Catch of the Day:

Bitcoin wallet update trick has netted criminals more than $22 million

The anatomy of a $15 million cyber heist on a US company

Uno reverses, 50000 credits worth of nitrous oxide,


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 22 Oct 2020 05:00:00 -0000</pubDate>
      <itunes:title>What is true and important versus what is the spin. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>121</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Dave's story is about some cybercriminal gangs that have stolen $22 million from users of the Electrum wallet app, Joe's story talks about a business email compromise scam cost a US company $15 million, The Catch of the Day is a gift card scam that includes references to National Treasure movie, and later in the show, Dave's conversation with Bill Harrod, Federal CTO of MobileIron on election disinformation campaigns. 
Links to stories and Catch of the Day:

Bitcoin wallet update trick has netted criminals more than $22 million

The anatomy of a $15 million cyber heist on a US company

Uno reverses, 50000 credits worth of nitrous oxide,


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Dave's story is about some cybercriminal gangs that have stolen $22 million from users of the Electrum wallet app, Joe's story talks about a business email compromise scam cost a US company $15 million, The Catch of the Day is a gift card scam that includes references to National Treasure movie, and later in the show, Dave's conversation with Bill Harrod, Federal CTO of MobileIron on election disinformation campaigns. </p><p>Links to stories and Catch of the Day:</p><ul>
<li><a href="https://www.zdnet.com/article/bitcoin-wallet-trick-has-netted-criminals-more-than-22-million/">Bitcoin wallet update trick has netted criminals more than $22 million</a></li>
<li><a href="https://www.bleepingcomputer.com/news/security/the-anatomy-of-a-15-million-cyber-heist-on-a-us-company/">The anatomy of a $15 million cyber heist on a US company</a></li>
<li><a href="https://www.reddit.com/r/scambait/comments/jb65rz/uno_reverses_50000_credits_worth_of_nitrous_oxide/">Uno reverses, 50000 credits worth of nitrous oxide,</a></li>
</ul><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>2137</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[00b5bda2-acb0-11ea-88ee-235a358f02e8]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW1008208775.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>rogue access point (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/10/notes</link>
      <description>1. A wireless access point installed by employees in an office or data center environment as a convenience to connectivity without the consent or the knowledge of the network manager. 2. A wireless access point, sometimes called an Evil Twin, installed by a cyber adversary in or near an office or data center environment designed to bypass security controls, gain access, and/or surveil the network traffic of the victim’s network. Both kinds, the employee installed and the adversary installed rogue access points, increase the attack surface of the organization. The employee installed device, because of its electronic footprint range, might make it easier for hackers and mischief makers outside of the organization’s network to bypass the corporate security controls and gain access without permission. The adversary installed device is designed specifically to bypass the security controls of the target network.</description>
      <pubDate>Tue, 20 Oct 2020 05:00:00 -0000</pubDate>
      <itunes:title>rogue access point (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>10</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>1. A wireless access point installed by employees in an office or data center environment as a convenience to connectivity without the consent or the knowledge of the network manager. 2. A wireless access point, sometimes called an Evil Twin, installed by a cyber adversary in or near an office or data center environment designed to bypass security controls, gain access, and/or surveil the network traffic of the victim’s network. Both kinds, the employee installed and the adversary installed rogue access points, increase the attack surface of the organization. The employee installed device, because of its electronic footprint range, might make it easier for hackers and mischief makers outside of the organization’s network to bypass the corporate security controls and gain access without permission. The adversary installed device is designed specifically to bypass the security controls of the target network.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>1. A wireless access point installed by employees in an office or data center environment as a convenience to connectivity without the consent or the knowledge of the network manager. 2. A wireless access point, sometimes called an Evil Twin, installed by a cyber adversary in or near an office or data center environment designed to bypass security controls, gain access, and/or surveil the network traffic of the victim’s network. Both kinds, the employee installed and the adversary installed rogue access points, increase the attack surface of the organization. The employee installed device, because of its electronic footprint range, might make it easier for hackers and mischief makers outside of the organization’s network to bypass the corporate security controls and gain access without permission. The adversary installed device is designed specifically to bypass the security controls of the target network.</p>]]>
      </content:encoded>
      <itunes:duration>247</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[53562552-e6d4-11ea-b693-7f28982c2c88]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW4033961888.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Use a Dance Dance Revolution floor lock for your data centers. </title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/120/notes</link>
      <description>Starting with some listener follow-up on password managers, Joe's story has an angel investor bilking people out of due diligence fees, Dave's story comes from Graham Cluley on a malware campaign talking about details on Donald Trump's COVID-19 status, The Catch of the Day is an animal vaccine phishing scam, and later in the show, we’ve got a special treat for you: David Spark from the The CISO/Security Vendor Relationship Series podcast joins us to play the Best Worst Idea game. 
Links to stories:

Promising Infusions of Cash, Fake Investor John Bernard Walked Away With $30M

Hackers disguise malware attack as new details on Donald Trump’s COVID-19 illness


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 15 Oct 2020 05:00:00 -0000</pubDate>
      <itunes:title>Use a Dance Dance Revolution floor lock for your data centers. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>120</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Starting with some listener follow-up on password managers, Joe's story has an angel investor bilking people out of due diligence fees, Dave's story comes from Graham Cluley on a malware campaign talking about details on Donald Trump's COVID-19 status, The Catch of the Day is an animal vaccine phishing scam, and later in the show, we’ve got a special treat for you: David Spark from the The CISO/Security Vendor Relationship Series podcast joins us to play the Best Worst Idea game. 
Links to stories:

Promising Infusions of Cash, Fake Investor John Bernard Walked Away With $30M

Hackers disguise malware attack as new details on Donald Trump’s COVID-19 illness


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Starting with some listener follow-up on password managers, Joe's story has an angel investor bilking people out of due diligence fees, Dave's story comes from Graham Cluley on a malware campaign talking about details on Donald Trump's COVID-19 status, The Catch of the Day is an animal vaccine phishing scam, and later in the show, we’ve got a special treat for you: David Spark from the The CISO/Security Vendor Relationship Series podcast joins us to play the Best Worst Idea game. </p><p>Links to stories:</p><ul>
<li><a href="https://krebsonsecurity.com/2020/10/promising-infusions-of-cash-fake-investor-john-bernard-walked-away-with-30m/">Promising Infusions of Cash, Fake Investor John Bernard Walked Away With $30M</a></li>
<li><a href="https://www.tripwire.com/state-of-security/featured/hackers-disguise-malware-attack-details-donald-trumps-covid-19-illness/">Hackers disguise malware attack as new details on Donald Trump’s COVID-19 illness</a></li>
</ul><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>2168</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[00b16694-acb0-11ea-88ee-8f2379750d25]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW8107644449.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>darknet (noun)  [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/9/notes</link>
      <description>A subset of the internet where communications between two parties or client-server transactions are obscured from search engines and surveillance systems by layers of encryption. The U.S. Navy designed the original Darknet by developing The Onion Router network, or TOR, back in the 1990s. Roger Dingledine and Nick Mathewson deployed the first alpha implementation in 2002 with some initial funding by the Electronic Frontier Foundation (EFF.) The TOR Project became a non-profit in 2006 and is funded by the U.S, Sweden, different NGOs, and individual sponsors.</description>
      <pubDate>Tue, 13 Oct 2020 05:00:00 -0000</pubDate>
      <itunes:title>darknet (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>9</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A subset of the internet where communications between two parties or client-server transactions are obscured from search engines and surveillance systems by layers of encryption. The U.S. Navy designed the original Darknet by developing The Onion Router network, or TOR, back in the 1990s. Roger Dingledine and Nick Mathewson deployed the first alpha implementation in 2002 with some initial funding by the Electronic Frontier Foundation (EFF.) The TOR Project became a non-profit in 2006 and is funded by the U.S, Sweden, different NGOs, and individual sponsors.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A subset of the internet where communications between two parties or client-server transactions are obscured from search engines and surveillance systems by layers of encryption. The U.S. Navy designed the original Darknet by developing The Onion Router network, or TOR, back in the 1990s. Roger Dingledine and Nick Mathewson deployed the first alpha implementation in 2002 with some initial funding by the Electronic Frontier Foundation (EFF.) The TOR Project became a non-profit in 2006 and is funded by the U.S, Sweden, different NGOs, and individual sponsors.</p>]]>
      </content:encoded>
      <itunes:duration>287</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[52844122-e6d4-11ea-ae1d-9f0be38d3446]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW5209748034.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Don't click any button...even the 'No' button.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/119/notes</link>
      <description>Dave's story is about how some adware took a turn for the worse (and how his dad has fallen adware in the past), Joe's story talks about how someone is trying to phish AT&amp;T employees and others, The Catch of the Day is an OfferUp scam on an rtx 3080 (you gamers know what that is), and later in the show, Dave's conversation with Caleb Barlow from Cynergistek reacting to the recent story of the tragic death of a woman due to hospital ransomware.
Links to stories:

Linkury adware caught distributing full-blown malware

Phishing Page Targets AT&amp;T’s Employee Multi-Factor Authentication


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 08 Oct 2020 05:00:00 -0000</pubDate>
      <itunes:title>Don't click any button...even the 'No' button.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>119</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Dave's story is about how some adware took a turn for the worse (and how his dad has fallen adware in the past), Joe's story talks about how someone is trying to phish AT&amp;T employees and others, The Catch of the Day is an OfferUp scam on an rtx 3080 (you gamers know what that is), and later in the show, Dave's conversation with Caleb Barlow from Cynergistek reacting to the recent story of the tragic death of a woman due to hospital ransomware.
Links to stories:

Linkury adware caught distributing full-blown malware

Phishing Page Targets AT&amp;T’s Employee Multi-Factor Authentication


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Dave's story is about how some adware took a turn for the worse (and how his dad has fallen adware in the past), Joe's story talks about how someone is trying to phish AT&amp;T employees and others, The Catch of the Day is an OfferUp scam on an rtx 3080 (you gamers know what that is), and later in the show, Dave's conversation with Caleb Barlow from Cynergistek reacting to the recent story of the tragic death of a woman due to hospital ransomware.</p><p>Links to stories:</p><ul>
<li><a href="https://www.zdnet.com/article/linkury-adware-caught-distributing-full-blown-malware/">Linkury adware caught distributing full-blown malware</a></li>
<li><a href="https://blog.sucuri.net/2020/09/phishing-page-targets-atts-employee-multi-factor-authentication.html">Phishing Page Targets AT&amp;T’s Employee Multi-Factor Authentication</a></li>
</ul><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>2526</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[00acfd0c-acb0-11ea-88ee-b3e304179324]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW4634546043.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>phishing (verb) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/8/notes</link>
      <description>From the intrusion kill chain model, the delivery of a “lure” to a potential victim by pretending to be some trustworthy person or organization in order to trick the victim into revealing sensitive information. According to Knowbe4, the word “phishing” first appeared in a Usenet newsgroup called AOHell in 1996 and some of the very first phishing attacks used AOL Instant Messenger to deliver fake messages purportedly from AOL employees in the early 2000s. The word is part of l33tspeak that started in the early days of the internet (1980s) as a shorthand to let readers know the author was part of the hacker community. In this case, the letters “ph” replace the letter “f” in the word fishing, as in “I fish, with an ‘f,’ for bass in the lake.” In hacking, “I Phish, with a ‘ph,’ for login credentials from key employees at my target’s organization.</description>
      <pubDate>Tue, 06 Oct 2020 05:00:00 -0000</pubDate>
      <itunes:title>phishing (verb)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>8</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>From the intrusion kill chain model, the delivery of a “lure” to a potential victim by pretending to be some trustworthy person or organization in order to trick the victim into revealing sensitive information. According to Knowbe4, the word “phishing” first appeared in a Usenet newsgroup called AOHell in 1996 and some of the very first phishing attacks used AOL Instant Messenger to deliver fake messages purportedly from AOL employees in the early 2000s. The word is part of l33tspeak that started in the early days of the internet (1980s) as a shorthand to let readers know the author was part of the hacker community. In this case, the letters “ph” replace the letter “f” in the word fishing, as in “I fish, with an ‘f,’ for bass in the lake.” In hacking, “I Phish, with a ‘ph,’ for login credentials from key employees at my target’s organization.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>From the intrusion kill chain model, the delivery of a “lure” to a potential victim by pretending to be some trustworthy person or organization in order to trick the victim into revealing sensitive information. According to Knowbe4, the word “phishing” first appeared in a Usenet newsgroup called AOHell in 1996 and some of the very first phishing attacks used AOL Instant Messenger to deliver fake messages purportedly from AOL employees in the early 2000s. The word is part of l33tspeak that started in the early days of the internet (1980s) as a shorthand to let readers know the author was part of the hacker community. In this case, the letters “ph” replace the letter “f” in the word fishing, as in “I fish, with an ‘f,’ for bass in the lake.” In hacking, “I Phish, with a ‘ph,’ for login credentials from key employees at my target’s organization.</p>]]>
      </content:encoded>
      <itunes:duration>257</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[3050d3fe-e6d4-11ea-8404-7fb3e45b6c16]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW9572869164.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Cookies make for some tasty phishing lure. </title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/118/notes</link>
      <description>In addition to his regular story Dave shares a situation where his mom almost took the bait, Dave's story is about an SMS phishing (smishing) Apple scam in UK (ps, there's never a free iPhone &amp; Joe is still not an Apple fan), Joe's story talks about why you don't trust anything political on a social network, The Catch of the Day is from a Reddit user invited to join the Illuminati game, and later in the show, Dave's conversation with Alex Mosher from MobileIron on MobileIron's Phishing with Cookies Campaign.
Links to stories and Catch of the Day:

SMS phishing scam pretends to be Apple “chatbot” – don’t fall for it!

Chinese propaganda network on Facebook used AI-generated faces

Catch of the Day on Reddit


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 01 Oct 2020 05:00:00 -0000</pubDate>
      <itunes:title>Cookies make for some tasty phishing lure. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>118</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>In addition to his regular story Dave shares a situation where his mom almost took the bait, Dave's story is about an SMS phishing (smishing) Apple scam in UK (ps, there's never a free iPhone &amp; Joe is still not an Apple fan), Joe's story talks about why you don't trust anything political on a social network, The Catch of the Day is from a Reddit user invited to join the Illuminati game, and later in the show, Dave's conversation with Alex Mosher from MobileIron on MobileIron's Phishing with Cookies Campaign.
Links to stories and Catch of the Day:

SMS phishing scam pretends to be Apple “chatbot” – don’t fall for it!

Chinese propaganda network on Facebook used AI-generated faces

Catch of the Day on Reddit


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In addition to his regular story Dave shares a situation where his mom almost took the bait, Dave's story is about an SMS phishing (smishing) Apple scam in UK (ps, there's never a free iPhone &amp; Joe is still not an Apple fan), Joe's story talks about why you don't trust anything political on a social network, The Catch of the Day is from a Reddit user invited to join the Illuminati game, and later in the show, Dave's conversation with Alex Mosher from MobileIron on MobileIron's Phishing with Cookies Campaign.</p><p>Links to stories and Catch of the Day:</p><ul>
<li><a href="https://nakedsecurity.sophos.com/2020/09/24/sms-phishing-scam-pretends-to-be-apple-chatbot-dont-fall-for-it/">SMS phishing scam pretends to be Apple “chatbot” – don’t fall for it!</a></li>
<li><a href="https://techcrunch.com/2020/09/22/facebook-gans-takes-down-networks-of-fake-accounts-originating-in-china-and-the-philippines/?guccounter=1">Chinese propaganda network on Facebook used AI-generated faces</a></li>
<li><a href="https://www.reddit.com/r/scambait/comments/ix8v7q/well_it_was_fast/">Catch of the Day on Reddit</a></li>
</ul><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>2163</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[00a8de16-acb0-11ea-88ee-eb5013b59f88]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW1827486550.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>credential stealing (verb) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/7/notes</link>
      <description>From the intrusion kill chain model, the first part of an exploitation technique where the hacker tricks their victims into revealing their login credentials. In the second part of the technique, hackers legitimately log into the targeted system and gain access to the underlying network with the same permissions as the victim. Hackers use this method 80% of the time compared to other ways to gain access to a system like developing zero day exploits for known software packages. The most common way hackers steal credentials is with some version of a phishing attack.</description>
      <pubDate>Tue, 29 Sep 2020 05:00:00 -0000</pubDate>
      <itunes:title>credential stealing (verb)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>7</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>From the intrusion kill chain model, the first part of an exploitation technique where the hacker tricks their victims into revealing their login credentials. In the second part of the technique, hackers legitimately log into the targeted system and gain access to the underlying network with the same permissions as the victim. Hackers use this method 80% of the time compared to other ways to gain access to a system like developing zero day exploits for known software packages. The most common way hackers steal credentials is with some version of a phishing attack.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>From the intrusion kill chain model, the first part of an exploitation technique where the hacker tricks their victims into revealing their login credentials. In the second part of the technique, hackers legitimately log into the targeted system and gain access to the underlying network with the same permissions as the victim. Hackers use this method 80% of the time compared to other ways to gain access to a system like developing zero day exploits for known software packages. The most common way hackers steal credentials is with some version of a phishing attack.</p>]]>
      </content:encoded>
      <itunes:duration>229</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[083601b4-e6d4-11ea-ae53-c3fca772d578]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW8067883267.mp3?updated=1597064974" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>It's human nature. </title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/117/notes</link>
      <description>Dave and Joe have some follow-up from a listener on OG accounts, Joe's story talks about a new phishing campaign inspired by Twitter from earlier this summer, Dave shares a story about using security awareness training as phishing lures, The Catch of the Day is a SunTrust phishing scam, and later in the show, Dave's conversation with Tim Sadler from Tessian on the Psychology of Human Error report.
Links to stories and Catch of the Day:

New Twitter phishing scam inspired from Twitter’s latest security response

This security awareness training email is actually a phishing scam

Catch of the Day on Twitter


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 24 Sep 2020 05:00:00 -0000</pubDate>
      <itunes:title>It's human nature. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>117</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Dave and Joe have some follow-up from a listener on OG accounts, Joe's story talks about a new phishing campaign inspired by Twitter from earlier this summer, Dave shares a story about using security awareness training as phishing lures, The Catch of the Day is a SunTrust phishing scam, and later in the show, Dave's conversation with Tim Sadler from Tessian on the Psychology of Human Error report.
Links to stories and Catch of the Day:

New Twitter phishing scam inspired from Twitter’s latest security response

This security awareness training email is actually a phishing scam

Catch of the Day on Twitter


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Dave and Joe have some follow-up from a listener on OG accounts, Joe's story talks about a new phishing campaign inspired by Twitter from earlier this summer, Dave shares a story about using security awareness training as phishing lures, The Catch of the Day is a SunTrust phishing scam, and later in the show, Dave's conversation with Tim Sadler from Tessian on the Psychology of Human Error report.</p><p>Links to stories and Catch of the Day:</p><ul>
<li><a href="https://www.hackread.com/twitter-phishing-scam-latest-security-response/">New Twitter phishing scam inspired from Twitter’s latest security response</a></li>
<li><a href="https://www.bleepingcomputer.com/news/security/this-security-awareness-training-email-is-actually-a-phishing-scam/">This security awareness training email is actually a phishing scam</a></li>
<li><a href="https://twitter.com/_acart/status/1305618491752378368">Catch of the Day on Twitter</a></li>
</ul><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>2021</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[00a4b412-acb0-11ea-88ee-175089af738c]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW2795920488.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The Bombe (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/5/notes</link>
      <description>An electro-mechanical device used to break Enigma-enciphered messages about enemy military operations during the Second World War. The first bombe–named Victory and designed by Alan Turning and Gordon Welchman– started code-breaking at Bletchley Park on 14 March 1940, a year after WWII began. By the end of the war, five years later, almost 2000, mostly women, sailors and airmen operated 211 bombe machines in the effort. The allies essentially knew what the German forces were going to do before the German commanders in the field knew. Historians speculate that the effort at Bletchley Park shortened the war by years and estimate the number of lives saved to be between 14 and 21 million.</description>
      <pubDate>Tue, 22 Sep 2020 05:00:00 -0000</pubDate>
      <itunes:title>The Bombe (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>5</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>An electro-mechanical device used to break Enigma-enciphered messages about enemy military operations during the Second World War. The first bombe–named Victory and designed by Alan Turning and Gordon Welchman– started code-breaking at Bletchley Park on 14 March 1940, a year after WWII began. By the end of the war, five years later, almost 2000, mostly women, sailors and airmen operated 211 bombe machines in the effort. The allies essentially knew what the German forces were going to do before the German commanders in the field knew. Historians speculate that the effort at Bletchley Park shortened the war by years and estimate the number of lives saved to be between 14 and 21 million.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>An electro-mechanical device used to break Enigma-enciphered messages about enemy military operations during the Second World War. The first bombe–named Victory and designed by Alan Turning and Gordon Welchman– started code-breaking at Bletchley Park on 14 March 1940, a year after WWII began. By the end of the war, five years later, almost 2000, mostly women, sailors and airmen operated 211 bombe machines in the effort. The allies essentially knew what the German forces were going to do before the German commanders in the field knew. Historians speculate that the effort at Bletchley Park shortened the war by years and estimate the number of lives saved to be between 14 and 21 million.</p>]]>
      </content:encoded>
      <itunes:duration>255</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[fe6c0c50-e6d3-11ea-9ab4-77a1973c1b80]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW8441278428.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Your information is already on the Dark Web.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/116/notes</link>
      <description>Dave and Joe have some follow-up on mobile banking apps, Dave talks about the website bitcoinabuse.com, Joe's story Brian Krebs did on old Gmail emails and people using them either errantly or maliciously to create accounts, The Catch of the Day is about a Netflix-themed campaign that's currently running, and later in the show, Dave's conversation with Shai Cohen from TransUnion on identity fraud at center of many digital COVID-19 scams.
Links to stories:

Bitcoin Abuse Database

The Joys of Owning an ‘OG’ Email Account


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 17 Sep 2020 05:00:00 -0000</pubDate>
      <itunes:title>Your information is already on the Dark Web.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>116</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Dave and Joe have some follow-up on mobile banking apps, Dave talks about the website bitcoinabuse.com, Joe's story Brian Krebs did on old Gmail emails and people using them either errantly or maliciously to create accounts, The Catch of the Day is about a Netflix-themed campaign that's currently running, and later in the show, Dave's conversation with Shai Cohen from TransUnion on identity fraud at center of many digital COVID-19 scams.
Links to stories:

Bitcoin Abuse Database

The Joys of Owning an ‘OG’ Email Account


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Dave and Joe have some follow-up on mobile banking apps, Dave talks about the website bitcoinabuse.com, Joe's story Brian Krebs did on old Gmail emails and people using them either errantly or maliciously to create accounts, The Catch of the Day is about a Netflix-themed campaign that's currently running, and later in the show, Dave's conversation with Shai Cohen from TransUnion on identity fraud at center of many digital COVID-19 scams.</p><p>Links to stories:</p><ul>
<li><a href="https://www.bitcoinabuse.com/">Bitcoin Abuse Database</a></li>
<li><a href="https://krebsonsecurity.com/2020/09/the-joys-of-owning-an-og-email-account/">The Joys of Owning an ‘OG’ Email Account</a></li>
</ul><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>2160</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[00a09fee-acb0-11ea-88ee-9b96c850580e]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW6946296780.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>cross-site scripting (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/6/notes</link>
      <description>From the intrusion kill chain model, a malicious code delivery technique that allows hackers to send code of their choosing to their victim’s browser. XSS takes advantage of the fact that roughly 90% of web developers use the JavaScript scripting language to create dynamic content on their websites. Through various methods, hackers store their own malicious javascript code on unprotected websites. When the victim browses the site, the web server delivers that malicious code to the victim’s computer and the victim’s browser runs the code.</description>
      <pubDate>Tue, 15 Sep 2020 05:00:00 -0000</pubDate>
      <itunes:title>cross-site scripting (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>6</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>From the intrusion kill chain model, a malicious code delivery technique that allows hackers to send code of their choosing to their victim’s browser. XSS takes advantage of the fact that roughly 90% of web developers use the JavaScript scripting language to create dynamic content on their websites. Through various methods, hackers store their own malicious javascript code on unprotected websites. When the victim browses the site, the web server delivers that malicious code to the victim’s computer and the victim’s browser runs the code.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>From the intrusion kill chain model, a malicious code delivery technique that allows hackers to send code of their choosing to their victim’s browser. XSS takes advantage of the fact that roughly 90% of web developers use the JavaScript scripting language to create dynamic content on their websites. Through various methods, hackers store their own malicious javascript code on unprotected websites. When the victim browses the site, the web server delivers that malicious code to the victim’s computer and the victim’s browser runs the code.</p>]]>
      </content:encoded>
      <itunes:duration>226</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[2a9c12ca-e6d4-11ea-ae53-cf5f505b96df]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW8085500951.mp3?updated=1597064950" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The story is what gets people in. </title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/115/notes</link>
      <description>Joe shares a story on the ability to make a scam work through storytelling skills, Dave's story is about a guy duping a convenience store clerk into taking over her shift and later robbing the place, The Catch of the Day is about an email from a fake landlord, and later in the show, Dave's conversation with Mallory Sofastaii a reporter and anchor at WMAR2 on Impostor uses Maryland man's identity to steal unemployment insurance benefits.

Links to stories and Catch of the Day:

The Age-Old Secrets of Modern Scams

Twitter: @findmyscammer


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 10 Sep 2020 05:00:00 -0000</pubDate>
      <itunes:title>The story is what gets people in. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>115</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Joe shares a story on the ability to make a scam work through storytelling skills, Dave's story is about a guy duping a convenience store clerk into taking over her shift and later robbing the place, The Catch of the Day is about an email from a fake landlord, and later in the show, Dave's conversation with Mallory Sofastaii a reporter and anchor at WMAR2 on Impostor uses Maryland man's identity to steal unemployment insurance benefits.

Links to stories and Catch of the Day:

The Age-Old Secrets of Modern Scams

Twitter: @findmyscammer


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Joe shares a story on the ability to make a scam work through storytelling skills, Dave's story is about a guy duping a convenience store clerk into taking over her shift and later robbing the place, The Catch of the Day is about an email from a fake landlord, and later in the show, Dave's conversation with Mallory Sofastaii a reporter and anchor at WMAR2 on Impostor uses Maryland man's identity to steal unemployment insurance benefits.</p><p><br></p><p>Links to stories and Catch of the Day:</p><ul>
<li><a href="https://www.wsj.com/articles/the-age-old-secrets-of-modern-scams-11598673662?mod=searchresults&amp;page=1&amp;pos=1">The Age-Old Secrets of Modern Scams</a></li>
<li><a href="https://twitter.com/findmyscammer/status/1299870571333742592/photo/1">Twitter: @findmyscammer</a></li>
</ul><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>2059</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[009c822e-acb0-11ea-88ee-13b3fddcda3f]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW1096906430.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>penetration test (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/4/notes</link>
      <description>The process of evaluating the security of a system or network by simulating an attack on it. Sometimes called "ethical hacking" or white hat hacking. The phrase started to appear in U.S. military circles in the mid 1960s as time sharing computers became more necessary for daily operations. Computer security experts from Rand Corporation began describing computer compromises as “penetrations.” By the early 1970s, government leaders formed tiger teams of penetration testers to probe for weaknesses in various government systems.</description>
      <pubDate>Tue, 08 Sep 2020 05:00:00 -0000</pubDate>
      <itunes:title>penetration test (noun)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>4</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>The process of evaluating the security of a system or network by simulating an attack on it. Sometimes called "ethical hacking" or white hat hacking. The phrase started to appear in U.S. military circles in the mid 1960s as time sharing computers became more necessary for daily operations. Computer security experts from Rand Corporation began describing computer compromises as “penetrations.” By the early 1970s, government leaders formed tiger teams of penetration testers to probe for weaknesses in various government systems.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The process of evaluating the security of a system or network by simulating an attack on it. Sometimes called "ethical hacking" or white hat hacking. The phrase started to appear in U.S. military circles in the mid 1960s as time sharing computers became more necessary for daily operations. Computer security experts from Rand Corporation began describing computer compromises as “penetrations.” By the early 1970s, government leaders formed tiger teams of penetration testers to probe for weaknesses in various government systems.</p>]]>
      </content:encoded>
      <itunes:duration>248</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c5c02e04-e6d3-11ea-9329-fbd3732e6a85]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW9085156601.mp3?updated=1596826238" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>It's evolving rapidly and getting more furious by the minute. </title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/114/notes</link>
      <description>Dave &amp; Joe have a tip as some follow-up on cloning social media accounts, Dave's story is about turning the tables on hackers in the UK, Joe talks about Kaspersky's Spam and phishing report, The Catch of the Day is is from a listener, Bob, who received an email from Eddy looking for the love of a woman (but, Bob is not a woman), and later in the show, Dave's conversation with Max Heinemeyer from Darktrace on threats that he and his team have tracked throughout the onset and spread of COVID. 
Links to stories:

Boomer outsmarts hackers: “Kiss your cash goodbye”

Spam and phishing in Q2 2020


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 03 Sep 2020 05:00:00 -0000</pubDate>
      <itunes:title>It's evolving rapidly and getting more furious by the minute. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>114</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Dave &amp; Joe have a tip as some follow-up on cloning social media accounts, Dave's story is about turning the tables on hackers in the UK, Joe talks about Kaspersky's Spam and phishing report, The Catch of the Day is is from a listener, Bob, who received an email from Eddy looking for the love of a woman (but, Bob is not a woman), and later in the show, Dave's conversation with Max Heinemeyer from Darktrace on threats that he and his team have tracked throughout the onset and spread of COVID. 
Links to stories:

Boomer outsmarts hackers: “Kiss your cash goodbye”

Spam and phishing in Q2 2020


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Dave &amp; Joe have a tip as some follow-up on cloning social media accounts, Dave's story is about turning the tables on hackers in the UK, Joe talks about Kaspersky's Spam and phishing report, The Catch of the Day is is from a listener, Bob, who received an email from Eddy looking for the love of a woman (but, Bob is not a woman), and later in the show, Dave's conversation with Max Heinemeyer from Darktrace on threats that he and his team have tracked throughout the onset and spread of COVID. </p><p>Links to stories:</p><ul>
<li><a href="https://cybernews.com/security/boomer-outsmarts-hackers-kiss-your-cash-goodbye/">Boomer outsmarts hackers: “Kiss your cash goodbye”</a></li>
<li><a href="https://securelist.com/spam-and-phishing-in-q2-2020/97987/">Spam and phishing in Q2 2020</a></li>
</ul><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>2227</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[00985172-acb0-11ea-88ee-230284e419a3]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW9397781248.mp3?updated=1598985875" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>social engineering (noun)  [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/3/notes</link>
      <description>The art of convincing a person or persons to take an action that may or may not be in their best interests. Social engineering in some form or the other has been around since the beginning of time. The biblical story of Esau and Jacob might be considered one of the earliest written social engineering stories. As applied to cybersecurity, it usually involves hackers obtaining information illegitimately by deceiving or manipulating people who have legitimate access to that information. Common tactics involve phishing attacks and watering hole attacks.</description>
      <pubDate>Tue, 01 Sep 2020 05:03:00 -0000</pubDate>
      <itunes:title>social engineering (noun) </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>3</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>The art of convincing a person or persons to take an action that may or may not be in their best interests. Social engineering in some form or the other has been around since the beginning of time. The biblical story of Esau and Jacob might be considered one of the earliest written social engineering stories. As applied to cybersecurity, it usually involves hackers obtaining information illegitimately by deceiving or manipulating people who have legitimate access to that information. Common tactics involve phishing attacks and watering hole attacks.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The art of convincing a person or persons to take an action that may or may not be in their best interests. Social engineering in some form or the other has been around since the beginning of time. The biblical story of Esau and Jacob might be considered one of the earliest written social engineering stories. As applied to cybersecurity, it usually involves hackers obtaining information illegitimately by deceiving or manipulating people who have legitimate access to that information. Common tactics involve phishing attacks and watering hole attacks.</p>]]>
      </content:encoded>
      <itunes:duration>250</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c0ac7fd0-e6d3-11ea-8dbc-ffcb644bd082]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW5727513847.mp3?updated=1597097824" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Take a deep breath. </title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/113/notes</link>
      <description>Joe's story is about the effectiveness of social media account cloning, Dave talks about toll fraud, The Catch of the Day is a Bitcoin scam with some scam baiting on the side, and later in the show, Dave's conversation with Ben Rothke from Tapad on Medium piece: A conversation with an iTunes card scammer.
Links to stories:

Attack of the Instagram clones

A Game of Phones: Fighting Phone Phreaks in the 21st Century


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 27 Aug 2020 05:00:00 -0000</pubDate>
      <itunes:title>Take a deep breath. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>113</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Joe's story is about the effectiveness of social media account cloning, Dave talks about toll fraud, The Catch of the Day is a Bitcoin scam with some scam baiting on the side, and later in the show, Dave's conversation with Ben Rothke from Tapad on Medium piece: A conversation with an iTunes card scammer.
Links to stories:

Attack of the Instagram clones

A Game of Phones: Fighting Phone Phreaks in the 21st Century


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Joe's story is about the effectiveness of social media account cloning, Dave talks about toll fraud, The Catch of the Day is a Bitcoin scam with some scam baiting on the side, and later in the show, Dave's conversation with Ben Rothke from Tapad on Medium piece: A conversation with an iTunes card scammer.</p><p>Links to stories:</p><ul>
<li><a href="https://www.welivesecurity.com/2020/08/17/attack-instagram-clones/">Attack of the Instagram clones</a></li>
<li><a href="https://duo.com/blog/a-game-of-phones">A Game of Phones: Fighting Phone Phreaks in the 21st Century</a></li>
</ul><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>2177</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[00939538-acb0-11ea-88ee-5b8491c874b3]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW2879369895.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>man trap (noun)  [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/12/notes</link>
      <description>A physical security access control device consisting of an enclosed hallway with interlocking doors on each end where both doors can’t be open at the same time. A person presents credentials to the entry doorway. If authorized, the entry door opens and the person walks into the mantrap. The man trap exit door will not open until the entry door closes. The person presents credentials to the exit door. If authorized, the exit door will open. If not, the person is captured in the man trap until security arrives to handle the situation. Physical security leadership installs man traps to separate unrestricted areas from restricted areas, to prevent tailgating by uncleared personnel, and to impede access by unauthorized persons.</description>
      <pubDate>Tue, 25 Aug 2020 05:00:00 -0000</pubDate>
      <itunes:title>man trap (noun) </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>12</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A physical security access control device consisting of an enclosed hallway with interlocking doors on each end where both doors can’t be open at the same time. A person presents credentials to the entry doorway. If authorized, the entry door opens and the person walks into the mantrap. The man trap exit door will not open until the entry door closes. The person presents credentials to the exit door. If authorized, the exit door will open. If not, the person is captured in the man trap until security arrives to handle the situation. Physical security leadership installs man traps to separate unrestricted areas from restricted areas, to prevent tailgating by uncleared personnel, and to impede access by unauthorized persons.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A physical security access control device consisting of an enclosed hallway with interlocking doors on each end where both doors can’t be open at the same time. A person presents credentials to the entry doorway. If authorized, the entry door opens and the person walks into the mantrap. The man trap exit door will not open until the entry door closes. The person presents credentials to the exit door. If authorized, the exit door will open. If not, the person is captured in the man trap until security arrives to handle the situation. Physical security leadership installs man traps to separate unrestricted areas from restricted areas, to prevent tailgating by uncleared personnel, and to impede access by unauthorized persons.</p>]]>
      </content:encoded>
      <itunes:duration>282</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b591761e-e60b-11ea-8ae7-c37a81f62bb5]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW2030082450.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Many times it is less sophisticated than we think. </title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/112/notes</link>
      <description>Dave's story is about robocalls to a telephony honeypot, Joe talks about postcards impersonating HIPAA communications (you have one? please let Joe know), The Catch of the Day is an email that our editor, Tom, received from the FBI about his COVID-19 death,, and later in the show, Dave's conversation with Rachel Tobac from SocialProof with her insights on the Twitter hack.
Links to stories:

A simple telephony honeypot received 1.5 million robocalls across 11 months

Fraudulent HIPAA Communications: An Alert from the Office for Civil Rights


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 20 Aug 2020 05:00:00 -0000</pubDate>
      <itunes:title>Many times it is less sophisticated than we think. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>112</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Dave's story is about robocalls to a telephony honeypot, Joe talks about postcards impersonating HIPAA communications (you have one? please let Joe know), The Catch of the Day is an email that our editor, Tom, received from the FBI about his COVID-19 death,, and later in the show, Dave's conversation with Rachel Tobac from SocialProof with her insights on the Twitter hack.
Links to stories:

A simple telephony honeypot received 1.5 million robocalls across 11 months

Fraudulent HIPAA Communications: An Alert from the Office for Civil Rights


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Dave's story is about robocalls to a telephony honeypot, Joe talks about postcards impersonating HIPAA communications <em>(you have one? please let Joe know)</em>, The Catch of the Day is an email that our editor, Tom, received from the FBI about his COVID-19 death,, and later in the show, Dave's conversation with Rachel Tobac from SocialProof with her insights on the Twitter hack.</p><p>Links to stories:</p><ul>
<li><a href="https://www.zdnet.com/article/a-simple-telephony-honeypot-received-1-5-million-robocalls-across-11-months/">A simple telephony honeypot received 1.5 million robocalls across 11 months</a></li>
<li><a href="https://www.natlawreview.com/article/fraudulent-hipaa-communications-alert-office-civil-rights">Fraudulent HIPAA Communications: An Alert from the Office for Civil Rights</a></li>
</ul><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>2422</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[008edd54-acb0-11ea-88ee-83b5b49a32d2]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW5544582310.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Zero-day (adjective) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/2/notes</link>
      <description>A class of software-security-weakness-issues where independent researchers discover a software flaw before the owners of the code discover it. Zero-day, or 0-day in hacker slang, refers to the moment the race starts, on day zero, between network defenders who are trying to fix the flaw before hackers leverage it to cause damage. It is a race because on day zero, there is no known fix to the issue.</description>
      <pubDate>Tue, 18 Aug 2020 05:00:00 -0000</pubDate>
      <itunes:title>Zero-day (adjective) </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>2</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A class of software-security-weakness-issues where independent researchers discover a software flaw before the owners of the code discover it. Zero-day, or 0-day in hacker slang, refers to the moment the race starts, on day zero, between network defenders who are trying to fix the flaw before hackers leverage it to cause damage. It is a race because on day zero, there is no known fix to the issue.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A class of software-security-weakness-issues where independent researchers discover a software flaw before the owners of the code discover it. Zero-day, or 0-day in hacker slang, refers to the moment the race starts, on day zero, between network defenders who are trying to fix the flaw before hackers leverage it to cause damage. It is a race because on day zero, there is no known fix to the issue.</p>]]>
      </content:encoded>
      <itunes:duration>237</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[2344e7da-e153-11ea-99a1-43056dd53cdc]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW1992218078.mp3?updated=1596826955" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Flying under the radar. </title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/111/notes</link>
      <description>Dave's story is about a forgotten scam, Joe talks about the recent Twitter hack, The Catch of the Day is a pretty standard phishing email for you to be on the lookout for, and later in the show, Dave's conversation with Carolyn Crandall from Attivo Networks on why human-controlled ransomware, Ransomware 2.0, is so threatening to today’s remote businesses.

Links to stories:

Question Quiz - The Forgotten Scam

The Teenager Allegedly Behind the Twitter Hack and How He Did It


Catch of the Day:

Fake email notice for business owners on Bluehost.

Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 13 Aug 2020 05:00:00 -0000</pubDate>
      <itunes:title>Flying under the radar. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>111</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Dave's story is about a forgotten scam, Joe talks about the recent Twitter hack, The Catch of the Day is a pretty standard phishing email for you to be on the lookout for, and later in the show, Dave's conversation with Carolyn Crandall from Attivo Networks on why human-controlled ransomware, Ransomware 2.0, is so threatening to today’s remote businesses.

Links to stories:

Question Quiz - The Forgotten Scam

The Teenager Allegedly Behind the Twitter Hack and How He Did It


Catch of the Day:

Fake email notice for business owners on Bluehost.

Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Dave's story is about a forgotten scam, Joe talks about the recent Twitter hack, The Catch of the Day is a pretty standard phishing email for you to be on the lookout for, and later in the show, Dave's conversation with Carolyn Crandall from Attivo Networks on why human-controlled ransomware, Ransomware 2.0, is so threatening to today’s remote businesses.</p><p><br></p><p>Links to stories:</p><ul>
<li><a href="https://blogs.akamai.com/sitr/2020/07/question-quiz---the-forgotten-scam.html">Question Quiz - The Forgotten Scam</a></li>
<li><a href="https://www.wsj.com/articles/the-teenager-behind-the-twitter-hack-and-how-he-did-it-11596563449?mod=searchresults&amp;page=1&amp;pos=4">The Teenager Allegedly Behind the Twitter Hack and How He Did It</a></li>
</ul><p><br></p><p>Catch of the Day:</p><ul><li>
<a href="https://twitter.com/JoeManna/status/1291420345728032768">Fake email notice for business owners on Bluehost</a>.</li></ul><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>1776</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[008aebf4-acb0-11ea-88ee-83417cf1adf2]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW3741250742.mp3?updated=1597498993" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>NMAP (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/1/notes</link>
      <description>A network mapping tool that pings IP addresses looking for a response and can discover host names, open communications ports, operating system names and versions. Written and maintained by Gordon Lyon, a.k.a. Fyodor, it is a free and open source software application used by both system admins and hackers alike and has been a staple in the security community for well over two decades.</description>
      <pubDate>Tue, 11 Aug 2020 04:00:00 -0000</pubDate>
      <itunes:title>NMAP (noun)</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>1</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A network mapping tool that pings IP addresses looking for a response and can discover host names, open communications ports, operating system names and versions. Written and maintained by Gordon Lyon, a.k.a. Fyodor, it is a free and open source software application used by both system admins and hackers alike and has been a staple in the security community for well over two decades.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A network mapping tool that pings IP addresses looking for a response and can discover host names, open communications ports, operating system names and versions. Written and maintained by Gordon Lyon, a.k.a. Fyodor, it is a free and open source software application used by both system admins and hackers alike and has been a staple in the security community for well over two decades.</p>]]>
      </content:encoded>
      <itunes:duration>233</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[1005ce0e-dbe1-11ea-8c2b-cff88830d11b]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW8331047476.mp3?updated=1655146122" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Ignore the actor, focus on the behavior. </title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/110/notes</link>
      <description>Dave shares an horrific cyberstalking story from the local area, Joe's story is about a phishing campaign impersonating voicemail alerts, The Catch of the Day is an HR front for a check floating scam, and later in the show, Dave's conversation with Johnathan Hunt of GitLab on his perspective of dealing with bad actors: ignore them.
Links to stories:

Anne Arundel man sentenced for ‘cyberstalking’ ex-girlfriend by hacking her accounts and getting her arrested

New Voicemail-Themed Phishing Attacks Use Evasion Techniques and Steal Credentials


Catch of the Day:
I was just super bored. But now I have something to do.

Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 06 Aug 2020 05:00:00 -0000</pubDate>
      <itunes:title>Ignore the actor, focus on the behavior. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>110</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Dave shares an horrific cyberstalking story from the local area, Joe's story is about a phishing campaign impersonating voicemail alerts, The Catch of the Day is an HR front for a check floating scam, and later in the show, Dave's conversation with Johnathan Hunt of GitLab on his perspective of dealing with bad actors: ignore them.
Links to stories:

Anne Arundel man sentenced for ‘cyberstalking’ ex-girlfriend by hacking her accounts and getting her arrested

New Voicemail-Themed Phishing Attacks Use Evasion Techniques and Steal Credentials


Catch of the Day:
I was just super bored. But now I have something to do.

Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Dave shares an horrific cyberstalking story from the local area, Joe's story is about a phishing campaign impersonating voicemail alerts, The Catch of the Day is an HR front for a check floating scam, and later in the show, Dave's conversation with Johnathan Hunt of GitLab on his perspective of dealing with bad actors: ignore them.</p><p>Links to stories:</p><ul>
<li><a href="https://www.baltimoresun.com/news/crime/bs-md-ci-cr-federal-cyberstalking-sentence-20200727-p7qx4ci4bzhhvad5idf4nwtlgy-story.html">Anne Arundel man sentenced for ‘cyberstalking’ ex-girlfriend by hacking her accounts and getting her arrested</a></li>
<li><a href="https://www.zscaler.com/blogs/research/new-voicemail-themed-phishing-attacks-use-evasion-techniques-and-steal-credentials">New Voicemail-Themed Phishing Attacks Use Evasion Techniques and Steal Credentials</a></li>
</ul><p><br></p><p>Catch of the Day:</p><ul><li><a href="https://www.reddit.com/r/scambait/comments/hw7gcx/i_was_just_super_bored_but_now_i_have_something/">I was just super bored. But now I have something to do.</a></li></ul><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>2022</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[00866c82-acb0-11ea-88ee-9f035014dc53]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW2839974395.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Be the custodian of your own digital identity. </title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/109/notes</link>
      <description>Dave talks about a deepfake recording impersonating a CEO, Joe's story is about a new phishing campaign, The Catch of the Day is a very persistent cash app scammer, and later in the show, Dave's conversation with Bruce Esposito from One Identity on digital identities and what they could mean for privacy.
Links to stories:

Listen to This Deepfake Audio Impersonating a CEO in Brazen Fraud Attempt

New phishing campaign abuses a trio of enterprise cloud services


Catch of the Day:
Monica played dumb with a cash app scammer for 3 days. 

Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 30 Jul 2020 05:00:00 -0000</pubDate>
      <itunes:title>Be the custodian of your own digital identity.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>109</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Dave talks about a deepfake recording impersonating a CEO, Joe's story is about a new phishing campaign, The Catch of the Day is a very persistent cash app scammer, and later in the show, Dave's conversation with Bruce Esposito from One Identity on digital identities and what they could mean for privacy.
Links to stories:

Listen to This Deepfake Audio Impersonating a CEO in Brazen Fraud Attempt

New phishing campaign abuses a trio of enterprise cloud services


Catch of the Day:
Monica played dumb with a cash app scammer for 3 days. 

Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Dave talks about a deepfake recording impersonating a CEO, Joe's story is about a new phishing campaign, The Catch of the Day is a very persistent cash app scammer, and later in the show, Dave's conversation with Bruce Esposito from One Identity on digital identities and what they could mean for privacy.</p><p>Links to stories:</p><ul>
<li><a href="https://www.vice.com/en_us/article/pkyqvb/deepfake-audio-impersonating-ceo-fraud-attempt">Listen to This Deepfake Audio Impersonating a CEO in Brazen Fraud Attempt</a></li>
<li><a href="https://www.bleepingcomputer.com/news/security/new-phishing-campaign-abuses-a-trio-of-enterprise-cloud-services/">New phishing campaign abuses a trio of enterprise cloud services</a></li>
</ul><p><br></p><p>Catch of the Day:</p><ul><li><a href="https://www.reddit.com/r/scambait/comments/hvmt31/playing_dumb_with_the_cash_app_scam/">Monica played dumb with a cash app scammer for 3 days. </a></li></ul><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>2035</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[00819efa-acb0-11ea-88ee-bb85f6d4ce71]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW2265317623.mp3?updated=1596301378" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Never think of security as a destination. </title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/108/notes</link>
      <description>Dave talks about gift card scams associated with YouTube live streams, Joe's story is about a scam impersonating Canadian hospital staff, The Catch of the Day is phish impersonating a small game developer going after podcasters, and later in the show, Dave's conversation with Richard Torres from Syntax on phishing attacks increasing 350% during COVID-19.
Links to stories:

PSN / XBOX / STEAM CODES GIVEAWAY | V BUCKS GIVEAWAY

Scam impersonating hospital staff, phishing for personal information: VCH


Catch of the Day:
Cellar Door Games impersonation

Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 23 Jul 2020 05:00:00 -0000</pubDate>
      <itunes:title>Never think of security as a destination. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>108</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Dave talks about gift card scams associated with YouTube live streams, Joe's story is about a scam impersonating Canadian hospital staff, The Catch of the Day is phish impersonating a small game developer going after podcasters, and later in the show, Dave's conversation with Richard Torres from Syntax on phishing attacks increasing 350% during COVID-19.
Links to stories:

PSN / XBOX / STEAM CODES GIVEAWAY | V BUCKS GIVEAWAY

Scam impersonating hospital staff, phishing for personal information: VCH


Catch of the Day:
Cellar Door Games impersonation

Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Dave talks about gift card scams associated with YouTube live streams, Joe's story is about a scam impersonating Canadian hospital staff, The Catch of the Day is phish impersonating a small game developer going after podcasters, and later in the show, Dave's conversation with Richard Torres from Syntax on phishing attacks increasing 350% during COVID-19.</p><p>Links to stories:</p><ul>
<li><a href="https://www.youtube.com/watch?v=otHhgDQrXTE">PSN / XBOX / STEAM CODES GIVEAWAY | V BUCKS GIVEAWAY</a></li>
<li><a href="https://www.citynews1130.com/2020/07/12/scam-impersonating-hospital-staff-vch/">Scam impersonating hospital staff, phishing for personal information: VCH</a></li>
</ul><p><br></p><p>Catch of the Day:</p><ul><li><a href="https://twitter.com/CellarDoorGames/status/1281269430996152321">Cellar Door Games impersonation</a></li></ul><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>2168</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[007d9de6-acb0-11ea-88ee-bb550d702760]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW7392571249.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>A little dose of skepticism. </title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/107/notes</link>
      <description>We have some listener follow-up sharing dnstwister.report site, Dave has a story of consent phishing, Joe talks about calendar invite phishing, The Catch of the Day is a lazy money multiplying scam, and later in the show, Dave's conversation with Don MacLennan from Barracuda Networks on brand impersonation.
Links to stories:

Microsoft warns of Office 365 phishing via malicious OAuth apps

Abnormal Attack Stories: Calendar Invite Phishing


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 16 Jul 2020 05:00:00 -0000</pubDate>
      <itunes:title>A little dose of skepticism. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>107</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>We have some listener follow-up sharing dnstwister.report site, Dave has a story of consent phishing, Joe talks about calendar invite phishing, The Catch of the Day is a lazy money multiplying scam, and later in the show, Dave's conversation with Don MacLennan from Barracuda Networks on brand impersonation.
Links to stories:

Microsoft warns of Office 365 phishing via malicious OAuth apps

Abnormal Attack Stories: Calendar Invite Phishing


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>We have some listener follow-up sharing dnstwister.report site, Dave has a story of consent phishing, Joe talks about calendar invite phishing, The Catch of the Day is a lazy money multiplying scam, and later in the show, Dave's conversation with Don MacLennan from Barracuda Networks on brand impersonation.</p><p>Links to stories:</p><ul>
<li><a href="https://www.bleepingcomputer.com/news/security/microsoft-warns-of-office-365-phishing-via-malicious-oauth-apps/">Microsoft warns of Office 365 phishing via malicious OAuth apps</a></li>
<li><a href="https://abnormalsecurity.com/blog/abnormal-attack-stories-calendar-invite-phishing/">Abnormal Attack Stories: Calendar Invite Phishing</a></li>
</ul><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>2066</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[0079732e-acb0-11ea-88ee-c7bbac23ef83]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW5566125721.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Send me money so I know you are real.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/106/notes</link>
      <description>We have some follow-up, and this time, Joe was not right, Dave's story is about poison-selling scam, Joe about an impersonation site, The Catch of the Day claims to be notice of a United Nations payment, and later in the show, Dave's conversation with Satnam Narang from Tenable on the increase of scams on Venmo, PayPal and Cash App on giveaways due to the opportunity provided by the economic fallout of COVID-19.
Links to stories:

How to Passcode-Lock Any App on Your Phone

Privnotes.com Is Phishing Bitcoin from Users of Private Messaging Service Privnote.com


Catch of the Day:
7 Spam Email Examples that Will Make You LOL

Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 09 Jul 2020 05:00:00 -0000</pubDate>
      <itunes:title>Send me money so I know you are real.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>106</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>We have some follow-up, and this time, Joe was not right, Dave's story is about poison-selling scam, Joe about an impersonation site, The Catch of the Day claims to be notice of a United Nations payment, and later in the show, Dave's conversation with Satnam Narang from Tenable on the increase of scams on Venmo, PayPal and Cash App on giveaways due to the opportunity provided by the economic fallout of COVID-19.
Links to stories:

How to Passcode-Lock Any App on Your Phone

Privnotes.com Is Phishing Bitcoin from Users of Private Messaging Service Privnote.com


Catch of the Day:
7 Spam Email Examples that Will Make You LOL

Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>We have some follow-up, and this time, Joe was not right, Dave's story is about poison-selling scam, Joe about an impersonation site, The Catch of the Day claims to be notice of a United Nations payment, and later in the show, Dave's conversation with Satnam Narang from Tenable on the increase of scams on Venmo, PayPal and Cash App on giveaways due to the opportunity provided by the economic fallout of COVID-19.</p><p>Links to stories:</p><ul>
<li><a href="https://www.wired.com/story/how-to-passcode-lock-any-app-on-your-phone/">How to Passcode-Lock Any App on Your Phone</a></li>
<li><a href="https://krebsonsecurity.com/2020/06/privnotes-com-is-phishing-bitcoin-from-users-of-private-messaging-service-privnote-com/">Privnotes.com Is Phishing Bitcoin from Users of Private Messaging Service Privnote.com</a></li>
</ul><p><br></p><p>Catch of the Day:</p><ul><li><a href="https://www.ezcomputersolutions.com/blog/hilarious-spam-email-examples/">7 Spam Email Examples that Will Make You LOL</a></li></ul><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>2274</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[00758aca-acb0-11ea-88ee-37d1c97e05a5]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW3064792278.mp3?updated=1594221586" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Because they deserve the money!</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/105/notes</link>
      <description>Dave's story shows Macs are not immune, Joe talks about a dark place in his soul (aka survey scams), some listener follow-up saying Joe was right!, The Catch of the Day an advanced fee scam from the US government, and later in the show, Dave's conversation with Aviv Grafi from Votiro on a multistage attack using a zero day exploit to deliver a trojan relating to COVID-19 Stay at Home orders.

Links to stories:

New Shlayer Mac malware spreads via poisoned search engine results

Anatomy of a survey scam – how innocent questions can rip you off


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 02 Jul 2020 05:00:00 -0000</pubDate>
      <itunes:title>Because they deserve the money!</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>105</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Dave's story shows Macs are not immune, Joe talks about a dark place in his soul (aka survey scams), some listener follow-up saying Joe was right!, The Catch of the Day an advanced fee scam from the US government, and later in the show, Dave's conversation with Aviv Grafi from Votiro on a multistage attack using a zero day exploit to deliver a trojan relating to COVID-19 Stay at Home orders.

Links to stories:

New Shlayer Mac malware spreads via poisoned search engine results

Anatomy of a survey scam – how innocent questions can rip you off


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Dave's story shows Macs are not immune, Joe talks about a dark place in his soul (aka survey scams), some listener follow-up saying Joe was right!, The Catch of the Day an advanced fee scam from the US government, and later in the show, Dave's conversation with Aviv Grafi from Votiro on a multistage attack using a zero day exploit to deliver a trojan relating to COVID-19 Stay at Home orders.</p><p><br></p><p>Links to stories:</p><ul>
<li><a href="https://securityaffairs.co/wordpress/105028/malware/shlayer-mac-malware-search-engines.html">New Shlayer Mac malware spreads via poisoned search engine results</a></li>
<li><a href="https://nakedsecurity.sophos.com/2020/06/22/anatomy-of-a-survey-scam-how-innocent-questions-can-rip-you-off/">Anatomy of a survey scam – how innocent questions can rip you off</a></li>
</ul><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>2164</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[0071246c-acb0-11ea-88ee-e747becbd576]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW9039858932.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Close in your pajamas. </title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/104/notes</link>
      <description>Joe shares a different spin on ransom attacks, Dave has a story on phone number reuse, The Catch of the Day is a notice from British Gas (accent included), and later in the show, Dave's conversation with Stan Holland from Atlantic Bay Mortgage on their experience adapting to COVID-19.
Links to stories:

Extortionists threaten to destroy sites in fake ransom attacks

How I Accidentally Hijacked Someone's WhatsApp


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 25 Jun 2020 05:00:00 -0000</pubDate>
      <itunes:title>Close in your pajamas. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>104</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Joe shares a different spin on ransom attacks, Dave has a story on phone number reuse, The Catch of the Day is a notice from British Gas (accent included), and later in the show, Dave's conversation with Stan Holland from Atlantic Bay Mortgage on their experience adapting to COVID-19.
Links to stories:

Extortionists threaten to destroy sites in fake ransom attacks

How I Accidentally Hijacked Someone's WhatsApp


Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Joe shares a different spin on ransom attacks, Dave has a story on phone number reuse, The Catch of the Day is a notice from British Gas (accent included), and later in the show, Dave's conversation with Stan Holland from Atlantic Bay Mortgage on their experience adapting to COVID-19.</p><p>Links to stories:</p><ul>
<li><a href="https://www.bleepingcomputer.com/news/security/extortionists-threaten-to-destroy-sites-in-fake-ransom-attacks/">Extortionists threaten to destroy sites in fake ransom attacks</a></li>
<li><a href="How%20I%20Accidentally%20Hijacked%20Someone's%20WhatsApp">How I Accidentally Hijacked Someone's WhatsApp</a></li>
</ul><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>2178</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[006cc71e-acb0-11ea-88ee-9b479b237c9b]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW5372044740.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>It can happen to anybody. </title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/103/notes</link>
      <description>Dave shares a story of an attempt on his father's Verizon account, Joe has the story of an Amazon gift card phishing attempt, The Catch of the Day is a funny phishing email, and later in the show, Joe checks in with Kurtis Minder from GroupSense. They dig a little deeper into some of the topics Kurtis discussed in his previous appearance on our show. 
Link to story:
Multifactor Authentication Hacking is Getting Real
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 18 Jun 2020 05:00:00 -0000</pubDate>
      <itunes:title>It can happen to anybody. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>103</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Dave shares a story of an attempt on his father's Verizon account, Joe has the story of an Amazon gift card phishing attempt, The Catch of the Day is a funny phishing email, and later in the show, Joe checks in with Kurtis Minder from GroupSense. They dig a little deeper into some of the topics Kurtis discussed in his previous appearance on our show. 
Link to story:
Multifactor Authentication Hacking is Getting Real
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Dave shares a story of an attempt on his father's Verizon account, Joe has the story of an Amazon gift card phishing attempt, The Catch of the Day is a funny phishing email, and later in the show, Joe checks in with Kurtis Minder from GroupSense. They dig a little deeper into some of the topics Kurtis discussed in his previous appearance on our show. </p><p>Link to story:</p><p><a href="https://blog.concannon.tech/tech-talk/sms-target-validation/">Multifactor Authentication Hacking is Getting Real</a></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>2642</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[0066c742-acb0-11ea-88ee-8f86691264fe]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW8858901456.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Taking a selfie with your ID. </title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/102/notes</link>
      <description>Joe talks about HROs (High Reliability Organizations), Dave has a scam on Upwork gigs, The Catch of the Day talks about giving a scammer the runaround, and later in the show our interview with Sanjay Gupta from Mitek on how cybercriminals are capitalizing on the recently-deceased and creating synthetic identities.
Link to stories:
The Unaddressed Gap in Cybersecurity: Human Performance
People who turned to Upwork to find freelance gigs say they've lost thousands of dollars to scams
Catch of the Day:
Person Tests Scammer’s Patience By Pretending To Be Not The Sharpest Tool In The Shed
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 11 Jun 2020 05:00:00 -0000</pubDate>
      <itunes:title>Taking a selfie with your ID. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>102</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Joe talks about HROs (High Reliability Organizations), Dave has a scam on Upwork gigs, The Catch of the Day talks about giving a scammer the runaround, and later in the show our interview with Sanjay Gupta from Mitek on how cybercriminals are capitalizing on the recently-deceased and creating synthetic identities.
Link to stories:
The Unaddressed Gap in Cybersecurity: Human Performance
People who turned to Upwork to find freelance gigs say they've lost thousands of dollars to scams
Catch of the Day:
Person Tests Scammer’s Patience By Pretending To Be Not The Sharpest Tool In The Shed
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Joe talks about HROs (High Reliability Organizations), Dave has a scam on Upwork gigs, The Catch of the Day talks about giving a scammer the runaround, and later in the show our interview with Sanjay Gupta from Mitek on how cybercriminals are capitalizing on the recently-deceased and creating synthetic identities.</p><p>Link to stories:</p><p><a href="https://sloanreview.mit.edu/article/the-unaddressed-gap-in-cybersecurity-human-performance/#article-authors">The Unaddressed Gap in Cybersecurity: Human Performance</a></p><p><a href="https://www.nbcnews.com/tech/security/people-who-turned-upwork-find-freelance-gigs-say-they-were-n1218421">People who turned to Upwork to find freelance gigs say they've lost thousands of dollars to scams</a></p><p>Catch of the Day:</p><p><a href="https://www.boredpanda.com/scammer-gets-trolled/?utm_source=google&amp;utm_medium=organic&amp;utm_campaign=organic">Person Tests Scammer’s Patience By Pretending To Be Not The Sharpest Tool In The Shed</a></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>2260</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[36dc1ac6-aa57-11ea-a851-cb318eb560ef]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW8827656873.mp3?updated=1633705676" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Seniors and millennials more alike than people think.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/101/notes</link>
      <description>Dave has a ransomware story from inside a virtual machine, Joe talks phishing with Google firebase storage URLs, some listener follow-up, The Catch of the Day comes from Joe's daughter and "Apple", and later in the show our interview with Paige Schaffer from Generali Global Assistance on the digital habits of seniors and millennials and the latest scams.
Link to stories:
 The ransomware that attacks you from inside a virtual machine
 Phishing in a Bucket: Utilizing Google Firebase Storage
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 04 Jun 2020 05:00:00 -0000</pubDate>
      <itunes:title>Seniors and millennials more alike than people think.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>101</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Dave has a ransomware story from inside a virtual machine, Joe talks phishing with Google firebase storage URLs, some listener follow-up, The Catch of the Day comes from Joe's daughter and "Apple", and later in the show our interview with Paige Schaffer from Generali Global Assistance on the digital habits of seniors and millennials and the latest scams.
Link to stories:
 The ransomware that attacks you from inside a virtual machine
 Phishing in a Bucket: Utilizing Google Firebase Storage
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Dave has a ransomware story from inside a virtual machine, Joe talks phishing with Google firebase storage URLs, some listener follow-up, The Catch of the Day comes from Joe's daughter and "Apple", and later in the show our interview with Paige Schaffer from Generali Global Assistance on the digital habits of seniors and millennials and the latest scams.</p><p>Link to stories:</p><p><a href="https://nakedsecurity.sophos.com/2020/05/22/the-ransomware-that-attacks-you-from-inside-a-virtual-machine/"> The ransomware that attacks you from inside a virtual machine</a></p><p><a href="https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/phishing-in-a-bucket-utilizing-google-firebase-storage/"> Phishing in a Bucket: Utilizing Google Firebase Storage</a></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>2107</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[7bf426d6-a5bf-11ea-8ac0-cf728768a478]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW5309727496.mp3?updated=1633705700" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>HH Extra - Happy 100 shows! </title>
      <description>We'd like to thank you, our dear listeners, for sticking with us and our podcast through thick and thin, bad accents and even worse ones, with this - a collection of some of our favorite Catch of the Day segments. From Australia to Brazil, Italy to the Oval Office, they're all here. 
Here's to another 100 episodes.
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 28 May 2020 05:00:00 -0000</pubDate>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/884b4252-a50b-11ea-9279-777a7fe13241/image/Hacking-Humans-iTunes-art-1400x1400.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>We'd like to thank you, our dear listeners, for sticking with us and our podcast through thick and thin, bad accents and even worse ones, with this - a collection of some of our favorite Catch of the Day segments. From Australia to Brazil, Italy to...</itunes:subtitle>
      <itunes:summary>We'd like to thank you, our dear listeners, for sticking with us and our podcast through thick and thin, bad accents and even worse ones, with this - a collection of some of our favorite Catch of the Day segments. From Australia to Brazil, Italy to the Oval Office, they're all here. 
Here's to another 100 episodes.
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>We'd like to thank you, our dear listeners, for sticking with us and our podcast through thick and thin, bad accents and even worse ones, with this - a collection of some of our favorite Catch of the Day segments. From Australia to Brazil, Italy to the Oval Office, they're all here. </p><p>Here's to another 100 episodes.</p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>550</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[24322f32-887f-48f2-b074-d7c9329b875b]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW1067165471.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Wearing a mask in the Oval Office.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/100/notes</link>
      <description>Joe shares his Classic Cons Part 3, Dave has an Apple device scam story, The Catch of the Day is your assassination heads-up, and later in the show our interview with Jonna Mendez, retired CIA intelligence officer and former Chief of Disguise.
Link to story:
 Twitter
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 28 May 2020 05:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>100</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/8833f8c2-a50b-11ea-9279-5b115c80b35d/image/Hacking-Humans-iTunes-art-1400x1400.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Joe shares his Classic Cons Part 3, Dave has an Apple device scam story,  The Catch of the Day is your assassination heads-up, and later in the show our interview with Jonna Mendez, retired CIA intelligence officer and former Chief of Disguise.  Link...</itunes:subtitle>
      <itunes:summary>Joe shares his Classic Cons Part 3, Dave has an Apple device scam story, The Catch of the Day is your assassination heads-up, and later in the show our interview with Jonna Mendez, retired CIA intelligence officer and former Chief of Disguise.
Link to story:
 Twitter
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Joe shares his Classic Cons Part 3, Dave has an Apple device scam story, The Catch of the Day is your assassination heads-up, and later in the show our interview with Jonna Mendez, retired CIA intelligence officer and former Chief of Disguise.</p><p>Link to story:</p><p><a href="https://twitter.com/floam/status/1262901978394431489?s=20"> Twitter</a></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>2510</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[15e72144-de52-4074-8576-f349fd98895d]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW9774888724.mp3?updated=1633705762" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>How scammers fill the gap.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/99/notes</link>
      <description>Dave has a story on a possible Disney-styled phishing email, Joe has the skinny on a circular pyramid scheme, some listener follow-up, The Catch of the Day is a YouTube verification badge for you, and later in the show our interview with Neill Feather from SiteLock. He joins us to explain how scammers fill the gap when popular retail items are sold out.
Link to story:
 New phishing/scam email attempt
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 21 May 2020 05:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>99</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/8865726c-a50b-11ea-9279-733ec6e31d36/image/Hacking-Humans-iTunes-art-1400x1400.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Dave has a story on a possible Disney-styled phishing email, Joe has the skinny on a circular pyramid scheme, some listener follow-up, The Catch of the Day is a YouTube verification badge for you, and later in the show our interview with Neill Feather...</itunes:subtitle>
      <itunes:summary>Dave has a story on a possible Disney-styled phishing email, Joe has the skinny on a circular pyramid scheme, some listener follow-up, The Catch of the Day is a YouTube verification badge for you, and later in the show our interview with Neill Feather from SiteLock. He joins us to explain how scammers fill the gap when popular retail items are sold out.
Link to story:
 New phishing/scam email attempt
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Dave has a story on a possible Disney-styled phishing email, Joe has the skinny on a circular pyramid scheme, some listener follow-up, The Catch of the Day is a YouTube verification badge for you, and later in the show our interview with Neill Feather from SiteLock. He joins us to explain how scammers fill the gap when popular retail items are sold out.</p><p>Link to story:</p><p><a href="https://www.reddit.com/r/DisneyPlus/comments/eraopp/new_phishingscam_email_attempt/"> New phishing/scam email attempt</a></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>2127</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[01ffb88c-e3b3-40b9-962a-35f6002332fd]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW7632706919.mp3?updated=1633705839" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Every day you're a firefighter.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/98/notes</link>
      <description>Dave and Joe have a follow up for a listener, Joe has two stories on different levels of effort of phishing schemes, The Catch of the Day is looking for a sugar baby, and later in the show our interview with Marcus Carey, enterprise architect at ReliaQuest. He’s the author of the book Tribe of Hackers, and he wonders if we are living in a cybersecurity groundhog day.
Links to stories:
 Anatomy of a Well-Crafted UPS, FedEX, and DHL Phishing Email During COVID-19
 Phishers target investment brokers, aim for Office, SharePoint login credentials
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 14 May 2020 05:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>98</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/8890c4e4-a50b-11ea-9279-4752fb27a4cd/image/Hacking-Humans-iTunes-art-1400x1400.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Dave and Joe have a follow up for a listener, Joe has two stories on different levels of effort of phishing schemes, The Catch of the Day is looking for a sugar baby, and later in the show our interview with Marcus Carey, enterprise architect at...</itunes:subtitle>
      <itunes:summary>Dave and Joe have a follow up for a listener, Joe has two stories on different levels of effort of phishing schemes, The Catch of the Day is looking for a sugar baby, and later in the show our interview with Marcus Carey, enterprise architect at ReliaQuest. He’s the author of the book Tribe of Hackers, and he wonders if we are living in a cybersecurity groundhog day.
Links to stories:
 Anatomy of a Well-Crafted UPS, FedEX, and DHL Phishing Email During COVID-19
 Phishers target investment brokers, aim for Office, SharePoint login credentials
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Dave and Joe have a follow up for a listener, Joe has two stories on different levels of effort of phishing schemes, The Catch of the Day is looking for a sugar baby, and later in the show our interview with Marcus Carey, enterprise architect at ReliaQuest. He’s the author of the book Tribe of Hackers, and he wonders if we are living in a cybersecurity groundhog day.</p><p>Links to stories:</p><p><a href="https://votiro.com/anatomy-of-a-well-crafted-ups-fedex-and-dhl-phishing-email-during-covid-19/"> Anatomy of a Well-Crafted UPS, FedEX, and DHL Phishing Email During COVID-19</a></p><p><a href="https://www.helpnetsecurity.com/2020/05/05/phishers-target-investment-brokers/"> Phishers target investment brokers, aim for Office, SharePoint login credentials</a></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>2174</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[177bf738-0672-4c29-94d6-e459032ab46b]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW3172652247.mp3?updated=1633705879" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Exploiting our distractions. </title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/97/notes</link>
      <description>Dave has the story of PR firms selling lies online, Joe has the story of a sophisticated Business Email Compromise attack, The Catch of the Day advises you to update your account information IMMEDIATELY, and later in the show our interview with Dave Baggett, CEO and Founder of INKY. This will be a discussion of fake stimulus payment phishing scam recently found by INKY.
Links to stories:
 Disinformation For Hire: How A New Breed Of PR Firms Is Selling Lies Online
 IR Case: The Florentine Banker Group
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 07 May 2020 05:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>97</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/88b1b17c-a50b-11ea-9279-a7ca031eebcd/image/Hacking-Humans-iTunes-art-1400x1400.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Dave has the story of PR firms selling lies online, Joe has the story of a sophisticated Business Email Compromise attack, The Catch of the Day advises you to update your account information IMMEDIATELY, and later in the show our interview with Dave...</itunes:subtitle>
      <itunes:summary>Dave has the story of PR firms selling lies online, Joe has the story of a sophisticated Business Email Compromise attack, The Catch of the Day advises you to update your account information IMMEDIATELY, and later in the show our interview with Dave Baggett, CEO and Founder of INKY. This will be a discussion of fake stimulus payment phishing scam recently found by INKY.
Links to stories:
 Disinformation For Hire: How A New Breed Of PR Firms Is Selling Lies Online
 IR Case: The Florentine Banker Group
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Dave has the story of PR firms selling lies online, Joe has the story of a sophisticated Business Email Compromise attack, The Catch of the Day advises you to update your account information IMMEDIATELY, and later in the show our interview with Dave Baggett, CEO and Founder of INKY. This will be a discussion of fake stimulus payment phishing scam recently found by INKY.</p><p>Links to stories:</p><p><a href="https://www.buzzfeednews.com/article/craigsilverman/disinformation-for-hire-black-pr-firms"> Disinformation For Hire: How A New Breed Of PR Firms Is Selling Lies Online</a></p><p><a href="https://research.checkpoint.com/2020/ir-case-the-florentine-banker-group/"> IR Case: The Florentine Banker Group</a></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>2150</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[1603b631-e127-4dcf-a033-45acf77aaf3f]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW6638011867.mp3?updated=1633705911" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Passwords are the easiest things to steal.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/96/notes</link>
      <description>Joe takes a look at a massive sextortion spam scheme, Dave has some advice for all of us, the Catch of the Day comes from down under, and later in the show our conversation with Andrew Shikiar, Executive Director and Chief Marketing Officer at FIDO Alliance on why phishing and passwords remain such a huge security problem and options for doing away with passwords. 
Links to stories:
 Following the money in a massive “sextortion” spam scheme
 When in Doubt: Hang Up, Look Up, &amp; Call Back
The Catch of the Day
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 30 Apr 2020 05:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>96</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/88c4bf6a-a50b-11ea-9279-a30818052766/image/Hacking-Humans-iTunes-art-1400x1400.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Joe takes a look at a massive sextortion spam scheme, Dave has some advice for all of us, the Catch of the Day comes from down under, and later in the show our conversation with Andrew Shikiar, Executive Director and Chief Marketing Officer at FIDO...</itunes:subtitle>
      <itunes:summary>Joe takes a look at a massive sextortion spam scheme, Dave has some advice for all of us, the Catch of the Day comes from down under, and later in the show our conversation with Andrew Shikiar, Executive Director and Chief Marketing Officer at FIDO Alliance on why phishing and passwords remain such a huge security problem and options for doing away with passwords. 
Links to stories:
 Following the money in a massive “sextortion” spam scheme
 When in Doubt: Hang Up, Look Up, &amp; Call Back
The Catch of the Day
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Joe takes a look at a massive sextortion spam scheme, Dave has some advice for all of us, the Catch of the Day comes from down under, and later in the show our conversation with Andrew Shikiar, Executive Director and Chief Marketing Officer at FIDO Alliance on why phishing and passwords remain such a huge security problem and options for doing away with passwords. </p><p>Links to stories:</p><p><a href="https://news.sophos.com/en-us/2020/04/22/following-the-sextortion-money/"> Following the money in a massive “sextortion” spam scheme</a></p><p><a href="https://krebsonsecurity.com/2020/04/when-in-doubt-hang-up-look-up-call-back/"> When in Doubt: Hang Up, Look Up, &amp; Call Back</a></p><p><a href="https://twitter.com/Necr0nomican/status/1253077112489013248%20">The Catch of the Day</a></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>2571</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[9514cce4-461e-407e-955c-f23188026406]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW5417594089.mp3?updated=1633705976" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Wallet inspector.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/95/notes</link>
      <description>Dave warns of fake QR code websites stealing Bitcoin, Joe has the return of classic cons, the Catch of the Day forgets one crucial element, and later in the show, our interview with Kurtis Minder. He’s with a company called Groupsense and they’ve been commemorating the 20th anniversary of the Dark Web.
Links to stories:
 Network of fake QR code generators will steal your Bitcoin
 Paris Gold Ring Scam
The Simpsons - Wallet Inspector
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 23 Apr 2020 05:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>95</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/88de158c-a50b-11ea-9279-2f4ec195758c/image/Hacking-Humans-iTunes-art-1400x1400.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Dave warns of fake QR code websites stealing Bitcoin, Joe has the return of classic cons, the Catch of the Day forgets one crucial element, and later in the show, our interview with Kurtis Minder. He’s with a company called Groupsense and they’ve...</itunes:subtitle>
      <itunes:summary>Dave warns of fake QR code websites stealing Bitcoin, Joe has the return of classic cons, the Catch of the Day forgets one crucial element, and later in the show, our interview with Kurtis Minder. He’s with a company called Groupsense and they’ve been commemorating the 20th anniversary of the Dark Web.
Links to stories:
 Network of fake QR code generators will steal your Bitcoin
 Paris Gold Ring Scam
The Simpsons - Wallet Inspector
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Dave warns of fake QR code websites stealing Bitcoin, Joe has the return of classic cons, the Catch of the Day forgets one crucial element, and later in the show, our interview with Kurtis Minder. He’s with a company called Groupsense and they’ve been commemorating the 20th anniversary of the Dark Web.</p><p>Links to stories:</p><p><a href="https://www.zdnet.com/article/network-of-fake-qr-code-generators-will-steal-your-bitcoin/"> Network of fake QR code generators will steal your Bitcoin</a></p><p><a href="https://europeforvisitors.com/paris/articles/paris-gold-ring-scam.htm"> Paris Gold Ring Scam</a></p><p><a href="https://www.youtube.com/watch?v=X6zsxsC6iZw">The Simpsons - Wallet Inspector</a></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>2059</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[fece8ed3-20ba-4bec-8f31-5c28229e60fd]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW6237199026.mp3?updated=1633705966" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>They're getting smart, but we're getting smarter.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/94/notes</link>
      <description>Joe has the story of a cold-calling conman, Dave has a story of vindication for seniors who lost money in phone scams, the Catch of the Day has Joe doing his research, and later in the show my conversation with Dustin Warren from SpyCloud. His team has been monitoring criminal forums during the COVID-19 pandemic, and he’s here to share what they’ve been seeing.
Links to stories:
Coronavirus conman barges in on 83-year-old woman
 Western Union Paying $153M In Compensation To Seniors Who Lost Money In Phone Scams
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 16 Apr 2020 05:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>94</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/88f5c150-a50b-11ea-9279-53818490e697/image/Hacking-Humans-iTunes-art-1400x1400.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Joe has the story of a cold-calling conman, Dave has a story of vindication for seniors who lost money in phone scams, the Catch of the Day has Joe doing his research, and later in the show my conversation with Dustin Warren from SpyCloud. His team...</itunes:subtitle>
      <itunes:summary>Joe has the story of a cold-calling conman, Dave has a story of vindication for seniors who lost money in phone scams, the Catch of the Day has Joe doing his research, and later in the show my conversation with Dustin Warren from SpyCloud. His team has been monitoring criminal forums during the COVID-19 pandemic, and he’s here to share what they’ve been seeing.
Links to stories:
Coronavirus conman barges in on 83-year-old woman
 Western Union Paying $153M In Compensation To Seniors Who Lost Money In Phone Scams
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Joe has the story of a cold-calling conman, Dave has a story of vindication for seniors who lost money in phone scams, the Catch of the Day has Joe doing his research, and later in the show my conversation with Dustin Warren from SpyCloud. His team has been monitoring criminal forums during the COVID-19 pandemic, and he’s here to share what they’ve been seeing.</p><p>Links to stories:</p><p><a href="https://www.bbc.com/news/business-52136560">Coronavirus conman barges in on 83-year-old woman</a></p><p><a href="https://dailyvoice.com/new-jersey/hackensack/police-fire/western-union-paying-153m-in-compensation-to-seniors-who-lost-money-in-phone-scams/784720/"> Western Union Paying $153M In Compensation To Seniors Who Lost Money In Phone Scams</a></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>1574</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c799495e-cd0d-4413-9ff2-7e047d445f44]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW2682863114.mp3?updated=1633705972" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Even famous people get scammed.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/93/notes</link>
      <description>Dave has the story of a Walking Dead actress raising money for a scammer, Joe has an article warning of Government websites giving bad security advice, the Catch of the Day tries to put the fear of God in it's victim, and later in the show Carole Theriault returns with an interview with a couple of researchers from a firm called Lookout, who analyzed a phishing scam with over four thousand victims.
Links to stories:
 Lehigh Valley cancer scammer ensnares ‘Walking Dead’ actress
 US Government Sites Give Bad Security Advice
 It’s Way Too Easy to Get a .gov Domain Name
The Catch of the Day:
https://twitter.com/thedave2006/status/1223736469568851969
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 09 Apr 2020 05:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>93</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/89077fd0-a50b-11ea-9279-ef7890194f76/image/Hacking-Humans-iTunes-art-1400x1400.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Dave has the story of a Walking Dead actress raising money for a scammer, Joe has an article warning of Government websites giving bad security advice, the Catch of the Day tries to put the fear of God in it's victim, and later in the show Carole...</itunes:subtitle>
      <itunes:summary>Dave has the story of a Walking Dead actress raising money for a scammer, Joe has an article warning of Government websites giving bad security advice, the Catch of the Day tries to put the fear of God in it's victim, and later in the show Carole Theriault returns with an interview with a couple of researchers from a firm called Lookout, who analyzed a phishing scam with over four thousand victims.
Links to stories:
 Lehigh Valley cancer scammer ensnares ‘Walking Dead’ actress
 US Government Sites Give Bad Security Advice
 It’s Way Too Easy to Get a .gov Domain Name
The Catch of the Day:
https://twitter.com/thedave2006/status/1223736469568851969
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Dave has the story of a Walking Dead actress raising money for a scammer, Joe has an article warning of Government websites giving bad security advice, the Catch of the Day tries to put the fear of God in it's victim, and later in the show Carole Theriault returns with an interview with a couple of researchers from a firm called Lookout, who analyzed a phishing scam with over four thousand victims.</p><p>Links to stories:</p><p><a href="https://www.lehighvalleylive.com/news/2019/11/lehigh-valley-cancer-scammer-ensnares-walking-dead-actress.html"> Lehigh Valley cancer scammer ensnares ‘Walking Dead’ actress</a></p><p><a href="https://krebsonsecurity.com/2020/03/us-government-sites-give-bad-security-advice/"> US Government Sites Give Bad Security Advice</a></p><p><a href="https://krebsonsecurity.com/2019/11/its-way-too-easy-to-get-a-gov-domain-name/"> It’s Way Too Easy to Get a .gov Domain Name</a></p><p>The Catch of the Day:</p><p><a href="https://twitter.com/thedave2006/status/1223736469568851969">https://twitter.com/thedave2006/status/1223736469568851969</a></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>2081</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b3e53951-ff9a-4721-bd4c-ea50ca96b173]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW6163143953.mp3?updated=1633706045" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Shedding light on the human element.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/92/notes</link>
      <description>Joe has the story of a very exposing scam, Dave has the scoop on a rare BadUSB attack, The Catch of the Day is a 'lame scammer who needs to get a life' and later in the show our conversation with Tom Miller from ClearForce on continuous discovery in the workplace, and the human side of protecting your business.
Links to stories:
 ‘What kind of breast check-up would need my face?’: Woman falls victim to Facebook Messenger scam
 Rare BadUSB attack detected in the wild against US hospitality provider
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 02 Apr 2020 05:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>92</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/891d97c0-a50b-11ea-9279-5b37b4bb4a32/image/Hacking-Humans-iTunes-art-1400x1400.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Joe has the story of a very exposing scam, Dave has the scoop on a rare BadUSB attack, The Catch of the Day is a 'lame scammer who needs to get a life' and later in the show our conversation with Tom Miller from ClearForce on continuous discovery in...</itunes:subtitle>
      <itunes:summary>Joe has the story of a very exposing scam, Dave has the scoop on a rare BadUSB attack, The Catch of the Day is a 'lame scammer who needs to get a life' and later in the show our conversation with Tom Miller from ClearForce on continuous discovery in the workplace, and the human side of protecting your business.
Links to stories:
 ‘What kind of breast check-up would need my face?’: Woman falls victim to Facebook Messenger scam
 Rare BadUSB attack detected in the wild against US hospitality provider
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Joe has the story of a very exposing scam, Dave has the scoop on a rare BadUSB attack, The Catch of the Day is a 'lame scammer who needs to get a life' and later in the show our conversation with Tom Miller from ClearForce on continuous discovery in the workplace, and the human side of protecting your business.</p><p>Links to stories:</p><p><a href="http://www.straitstimes.com/singapore/what-kind-of-breast-check-up-would-need-my-face-woman-falls-victim-to-facebook-messenger"> ‘What kind of breast check-up would need my face?’: Woman falls victim to Facebook Messenger scam</a></p><p><a href="https://www.zdnet.com/article/rare-badusb-attack-detected-in-the-wild-against-us-hospitality-provider/"> Rare BadUSB attack detected in the wild against US hospitality provider</a></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>1907</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[d9d99f38-7a77-4af3-81a1-154063a01677]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW8546488306.mp3?updated=1633706065" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Paging Dr. Dochterman.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/91/notes</link>
      <description>Dave shares an example of modern-day snake oil, Joe brings us his favorite old-time scams, the Catch of the Day is straight from Dr. Dochterman - you really can't make this stuff up - and later in the show Joe speaks with Scott Knauss - a security consultant who was targeted by scammers.
Links to stories:
 Coronavirus Scam Alert: Beware Fake Fox News Articles Promising A CBD Oil Cure
Slowing the Scammers
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 26 Mar 2020 05:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>91</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/8938383c-a50b-11ea-9279-6b9ef242dfda/image/Hacking-Humans-iTunes-art-1400x1400.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Dave shares an example of modern-day snake oil, Joe brings us his favorite old-time scams, the Catch of the Day is straight from Dr. Dochterman - you really can't make this stuff up - and later in the show Joe speaks with Scott Knauss - a security...</itunes:subtitle>
      <itunes:summary>Dave shares an example of modern-day snake oil, Joe brings us his favorite old-time scams, the Catch of the Day is straight from Dr. Dochterman - you really can't make this stuff up - and later in the show Joe speaks with Scott Knauss - a security consultant who was targeted by scammers.
Links to stories:
 Coronavirus Scam Alert: Beware Fake Fox News Articles Promising A CBD Oil Cure
Slowing the Scammers
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Dave shares an example of modern-day snake oil, Joe brings us his favorite old-time scams, the Catch of the Day is straight from Dr. Dochterman - you really can't make this stuff up - and later in the show Joe speaks with Scott Knauss - a security consultant who was targeted by scammers.</p><p>Links to stories:</p><p><a href="https://www.forbes.com/sites/thomasbrewster/2020/03/19/coronavirus-scam-alert-beware-fake-fox-news-text-messages-promising-a-cbd-oil-cure/#46f9b4376ca0"> Coronavirus Scam Alert: Beware Fake Fox News Articles Promising A CBD Oil Cure</a></p><p><a href="https://www.immauss.com/WorkFromHomeScam">Slowing the Scammers</a></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>2467</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[10504f42-eede-442f-928a-9cad5e6b076d]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW1292312592.mp3?updated=1633706138" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Disinformation vs. misinformation. </title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/90/notes</link>
      <description>Dave shares the story of a malicious website posing as a Coronavirus map supposedly from Johns Hopkins University, Joe has the story of an elderly woman who lost a lot of money to two men claiming her grandson was in a car accident, the Catch of the Day's dying wish is to give you money to build an orphanage, and later in the show Carole Theriault returns and speaks with Samuel C. Woolley from University of Texas at Austin on disinformation campaigns.
Links to stories:
the Botometer
The Catch of the Day:
 Been going back and forth with these a-holes for a few weeks now. More pictures in comments.
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 19 Mar 2020 05:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>90</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/894cfc18-a50b-11ea-9279-57ba21935124/image/Hacking-Humans-iTunes-art-1400x1400.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Dave shares the story of a malicious website posing as a Coronavirus map supposedly from Johns Hopkins University, Joe has the story of an elderly woman who lost a lot of money to two men claiming her grandson was in a car accident, the Catch of the...</itunes:subtitle>
      <itunes:summary>Dave shares the story of a malicious website posing as a Coronavirus map supposedly from Johns Hopkins University, Joe has the story of an elderly woman who lost a lot of money to two men claiming her grandson was in a car accident, the Catch of the Day's dying wish is to give you money to build an orphanage, and later in the show Carole Theriault returns and speaks with Samuel C. Woolley from University of Texas at Austin on disinformation campaigns.
Links to stories:
the Botometer
The Catch of the Day:
 Been going back and forth with these a-holes for a few weeks now. More pictures in comments.
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Dave shares the story of a malicious website posing as a Coronavirus map supposedly from Johns Hopkins University, Joe has the story of an elderly woman who lost a lot of money to two men claiming her grandson was in a car accident, the Catch of the Day's dying wish is to give you money to build an orphanage, and later in the show Carole Theriault returns and speaks with Samuel C. Woolley from University of Texas at Austin on disinformation campaigns.</p><p>Links to stories:</p><p><a href="https://botometer.iuni.iu.edu/#!/">the Botometer</a></p><p>The Catch of the Day:</p><p><a href="https://www.reddit.com/r/scambait/comments/fh7mfh/been_going_back_and_forth_with_these_aholes_for_a/"> Been going back and forth with these a-holes for a few weeks now. More pictures in comments.</a></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>1810</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[1378a037-920f-48fe-ac31-2313b4bd3d8b]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW6838539691.mp3?updated=1633706125" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Winking emoji.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/89/notes</link>
      <description>Joe shares the story of a phishing website posing as the Singapore Police site, Dave shares a harmful, simple little message, the Catch of the Day drags her scammer through the mud and asks if he wants his casserole dish back. Later in the show our conversation with Gretel Egan from Proofpoint on their 2020 State of the Phish report.
Links to stories:
 SPF warns of phishing website posing as police site
 Nemty Ransomware Actively Distributed via 'Love Letter' Spam
 2020 State of the Phish Report
The Catch of the Day:
 “My Wife Spent Three Days Trolling A Scammer”
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 12 Mar 2020 05:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>89</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/896fe4f8-a50b-11ea-9279-13b9509a2c9e/image/Hacking-Humans-iTunes-art-1400x1400.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Joe shares the story of a phishing website posing as the Singapore Police site, Dave shares a harmful, simple little message, the Catch of the Day drags her scammer through the mud and asks if he wants his casserole dish back. Later in the show our...</itunes:subtitle>
      <itunes:summary>Joe shares the story of a phishing website posing as the Singapore Police site, Dave shares a harmful, simple little message, the Catch of the Day drags her scammer through the mud and asks if he wants his casserole dish back. Later in the show our conversation with Gretel Egan from Proofpoint on their 2020 State of the Phish report.
Links to stories:
 SPF warns of phishing website posing as police site
 Nemty Ransomware Actively Distributed via 'Love Letter' Spam
 2020 State of the Phish Report
The Catch of the Day:
 “My Wife Spent Three Days Trolling A Scammer”
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Joe shares the story of a phishing website posing as the Singapore Police site, Dave shares a harmful, simple little message, the Catch of the Day drags her scammer through the mud and asks if he wants his casserole dish back. Later in the show our conversation with Gretel Egan from Proofpoint on their 2020 State of the Phish report.</p><p>Links to stories:</p><p><a href="https://www.channelnewsasia.com/news/singapore/phishing-website-scam-fake-police-spf-singapore-12480726"> SPF warns of phishing website posing as police site</a></p><p><a href="https://www.bleepingcomputer.com/news/security/nemty-ransomware-actively-distributed-via-love-letter-spam/"> Nemty Ransomware Actively Distributed via 'Love Letter' Spam</a></p><p><a href="https://www.proofpoint.com/us/resources/threat-reports/state-of-phish"> 2020 State of the Phish Report</a></p><p>The Catch of the Day:</p><p><a href="https://www.boredpanda.com/woman-prank-scammer/?utm_source=google&amp;utm_medium=organic&amp;utm_campaign=organic"> “My Wife Spent Three Days Trolling A Scammer”</a></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>1890</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[72feceac-87db-48bc-bf78-fd9d89f2f3f3]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW9774134870.mp3?updated=1633706137" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Don't go looking for morality here.</title>
      <link>https://%20thecyberwire.com/podcasts/hacking-humans/88/notes</link>
      <description>Dave has a story of an investment scam featuring celebrities, Joe warns of scams surrounding the Coronavirus, the Catch of the Day features Joe's son-in-law's adventure with thousands of bot infiltrations, and later in the show, Dave's extended interview with magicians and entertainers Penn and Teller at RSAC 2020 in San Francisco.
Links to stories:
 Revealed: fake 'traders' allegedly prey on victims in global investment scam
 Coronavirus: Scammers follow the headlines
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 05 Mar 2020 06:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>88</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/8988ca0e-a50b-11ea-9279-0b3aaf0c9fc5/image/Hacking-Humans-iTunes-art-1400x1400.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Dave has a story of an investment scam featuring celebrities, Joe warns of scams surrounding the Coronavirus, the Catch of the Day features Joe's son-in-law's adventure with thousands of bot infiltrations, and later in the show, Dave's extended...</itunes:subtitle>
      <itunes:summary>Dave has a story of an investment scam featuring celebrities, Joe warns of scams surrounding the Coronavirus, the Catch of the Day features Joe's son-in-law's adventure with thousands of bot infiltrations, and later in the show, Dave's extended interview with magicians and entertainers Penn and Teller at RSAC 2020 in San Francisco.
Links to stories:
 Revealed: fake 'traders' allegedly prey on victims in global investment scam
 Coronavirus: Scammers follow the headlines
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Dave has a story of an investment scam featuring celebrities, Joe warns of scams surrounding the Coronavirus, the Catch of the Day features Joe's son-in-law's adventure with thousands of bot infiltrations, and later in the show, Dave's extended interview with magicians and entertainers Penn and Teller at RSAC 2020 in San Francisco.</p><p>Links to stories:</p><p><a href="https://www.theguardian.com/world/2020/mar/01/revealed-fake-traders-allegedly-prey-on-victims-in-global-investment-scam"> Revealed: fake 'traders' allegedly prey on victims in global investment scam</a></p><p><a href="https://www.consumer.ftc.gov/blog/2020/02/coronavirus-scammers-follow-headlines"> Coronavirus: Scammers follow the headlines</a></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>2229</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[f724181f-e45b-4349-bb24-33eae732163b]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW6345782109.mp3?updated=1633706192" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The art of cheating. </title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/87/notes</link>
      <description>Joe shares some insights into the art of cheating travelers, Dave has a story of a woman facing drug charges trying to kidnap another woman's baby, an update on last week's bizarre phone scam, The Catch of the Day features otters, sexy ham, frustrated scammers and... you're just going to need to listen. Later in the show, our interview with Tim Sadler from Tessian on human element of cybersecurity and phishing schemes.
Links to stories:
 The art of cheating travelers at dhabas
 Woman who posed as baby photographer charged after drugging a mother and planning to steal her child, prosecutors say
The Catch of the Day
Inside a scam call center
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 27 Feb 2020 06:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>87</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/89a528de-a50b-11ea-9279-6f23a282e846/image/Hacking-Humans-iTunes-art-1400x1400.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Joe shares some insights into the art of cheating travelers, Dave has a story of a woman facing drug charges trying to kidnap another woman's baby, an update on last week's bizarre phone scam, The Catch of the Day features otters, sexy ham, frustrated...</itunes:subtitle>
      <itunes:summary>Joe shares some insights into the art of cheating travelers, Dave has a story of a woman facing drug charges trying to kidnap another woman's baby, an update on last week's bizarre phone scam, The Catch of the Day features otters, sexy ham, frustrated scammers and... you're just going to need to listen. Later in the show, our interview with Tim Sadler from Tessian on human element of cybersecurity and phishing schemes.
Links to stories:
 The art of cheating travelers at dhabas
 Woman who posed as baby photographer charged after drugging a mother and planning to steal her child, prosecutors say
The Catch of the Day
Inside a scam call center
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Joe shares some insights into the art of cheating travelers, Dave has a story of a woman facing drug charges trying to kidnap another woman's baby, an update on last week's bizarre phone scam, The Catch of the Day features otters, sexy ham, frustrated scammers and... you're just going to need to listen. Later in the show, our interview with Tim Sadler from Tessian on human element of cybersecurity and phishing schemes.</p><p>Links to stories:</p><p><a href="https://www.reddit.com/r/india/comments/903opf/the_art_of_cheating_travellers_at_dhabas/"> The art of cheating travelers at dhabas</a></p><p><a href="https://www.cnn.com/2020/02/19/us/photographer-date-rape-drug-charges/index.html"> Woman who posed as baby photographer charged after drugging a mother and planning to steal her child, prosecutors say</a></p><p><a href="https://www.littlethings.com/scammer-gets-scammed/2">The Catch of the Day</a></p><p><a href="https://www.youtube.com/watch?v=xb_rgQ4IDS8&amp;feature=youtu.be">Inside a scam call center</a></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>2020</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[44559de1-4d66-4b04-be09-93876f3c3f81]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW4944351041.mp3?updated=1633706210" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Hi, I'm trying to steal your money. </title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/86/notes</link>
      <description>Dave shares the most bizarrely honest phone scam of all time, Joe has a pretend PayPal phishing scam, the Catch of the Day finally lets Dave show us his best Blanche Devereaux, and later in the show Christopher Hadnagy from Social Engineer LLC returns with an update on the trends he’s been tracking.

Links to stories:
 Active PayPal Phishing Scam Targets SSNs, Passport Photos
 Current PayPal phishing campaign or "give me all your personal information"
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 20 Feb 2020 06:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>86</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/89bb051e-a50b-11ea-9279-8f5ed97bb939/image/Hacking-Humans-iTunes-art-1400x1400.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Dave shares the most bizarrely honest phone scam of all time, Joe has a pretend PayPal phishing scam, the Catch of the Day finally lets Dave show us his best Blanche Devereaux, and later in the show Christopher Hadnagy from Social Engineer LLC returns...</itunes:subtitle>
      <itunes:summary>Dave shares the most bizarrely honest phone scam of all time, Joe has a pretend PayPal phishing scam, the Catch of the Day finally lets Dave show us his best Blanche Devereaux, and later in the show Christopher Hadnagy from Social Engineer LLC returns with an update on the trends he’s been tracking.

Links to stories:
 Active PayPal Phishing Scam Targets SSNs, Passport Photos
 Current PayPal phishing campaign or "give me all your personal information"
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Dave shares the most bizarrely honest phone scam of all time, Joe has a pretend PayPal phishing scam, the Catch of the Day finally lets Dave show us his best Blanche Devereaux, and later in the show Christopher Hadnagy from Social Engineer LLC returns with an update on the trends he’s been tracking.</p><p><br></p><p>Links to stories:</p><p><a href="https://threatpost.com/active-paypal-phishing-scam-targets-ssns-passport-photos/152755/"> Active PayPal Phishing Scam Targets SSNs, Passport Photos</a></p><p><a href="https://isc.sans.edu/forums/diary/Current+PayPal+phishing+campaign+or+give+me+all+your+personal+information/25786/"> Current PayPal phishing campaign or "give me all your personal information"</a></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>1795</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[059591fb-1173-45a8-a9f7-236af06ce64e]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW9997692737.mp3?updated=1633706234" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Fake news and misplaced trust.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/85/notes</link>
      <description>Joe shares a collection of romance scams from the great plains, Dave has a report which uncovered a root system of fake news, the catch of the day comes straight from... Warren Buffett? Later in the show Carole Theriault speaks with Lisa Forte from Red Goat on how her experiences working with the police have informed her perspective on the human factors in cyber security.
Links to stories:
 Don't Get CatPhished This Valentine's Day By a Scammer
 These Fake Local News Sites Have Confused People For Years. We Found Out Who Created Them.
 Researchers propose detecting deepfakes with surprising new tool: Mice
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 13 Feb 2020 06:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>85</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/89df5342-a50b-11ea-9279-cbdf1e5893c8/image/Hacking-Humans-iTunes-art-1400x1400.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Joe shares a collection of romance scams from the great plains, Dave has a report which uncovered a root system of fake news, the catch of the day comes straight from... Warren Buffett? Later in the show Carole Theriault speaks with Lisa Forte from...</itunes:subtitle>
      <itunes:summary>Joe shares a collection of romance scams from the great plains, Dave has a report which uncovered a root system of fake news, the catch of the day comes straight from... Warren Buffett? Later in the show Carole Theriault speaks with Lisa Forte from Red Goat on how her experiences working with the police have informed her perspective on the human factors in cyber security.
Links to stories:
 Don't Get CatPhished This Valentine's Day By a Scammer
 These Fake Local News Sites Have Confused People For Years. We Found Out Who Created Them.
 Researchers propose detecting deepfakes with surprising new tool: Mice
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Joe shares a collection of romance scams from the great plains, Dave has a report which uncovered a root system of fake news, the catch of the day comes straight from... Warren Buffett? Later in the show Carole Theriault speaks with Lisa Forte from Red Goat on how her experiences working with the police have informed her perspective on the human factors in cyber security.</p><p>Links to stories:</p><p><a href="https://www.bbb.org/article/news-releases/21486-bbb-valentine-advice-be-careful-with-online-dating-sites"> Don't Get CatPhished This Valentine's Day By a Scammer</a></p><p><a href="https://www.buzzfeednews.com/article/craigsilverman/these-fake-local-news-sites-have-confused-people-for-years"> These Fake Local News Sites Have Confused People For Years. We Found Out Who Created Them.</a></p><p><a href="https://www.cnet.com/news/researchers-propose-detecting-deepfakes-with-surprising-new-tool-mice/"> Researchers propose detecting deepfakes with surprising new tool: Mice</a></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>2000</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[e1f56a93-ce4a-4c0c-9b75-8201b75f1e31]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW5374997055.mp3?updated=1633706272" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>I wouldn't want my computer to be disappointed.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/84/notes</link>
      <description>Dave finally has good news. Joe shares a fake website created by the US Trading Commission... which doesn't exist. The catch of the day threatens FULL DATA LOSS! Later in the show, Anna Collard is the founder of security content publisher of Popcorn Training – a South African company that promotes Cyber Security awareness by using story-based techniques. Our conversation centers on the state of cyber security in Africa.
Links to stories:
 DOJ sues US telecom providers for connecting Indian robocall scammers
The aforementioned DOJ complaint
 Uncle Sam compensates you for data leaks (yeah, right)
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 06 Feb 2020 06:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>84</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/89f5616e-a50b-11ea-9279-2fa443926800/image/Hacking-Humans-iTunes-art-1400x1400.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Dave finally has good news. Joe shares a fake website created by the US Trading Commission... which doesn't exist. The catch of the day threatens FULL DATA LOSS! Later in the show, Anna Collard is the founder of security content publisher of  – a...</itunes:subtitle>
      <itunes:summary>Dave finally has good news. Joe shares a fake website created by the US Trading Commission... which doesn't exist. The catch of the day threatens FULL DATA LOSS! Later in the show, Anna Collard is the founder of security content publisher of Popcorn Training – a South African company that promotes Cyber Security awareness by using story-based techniques. Our conversation centers on the state of cyber security in Africa.
Links to stories:
 DOJ sues US telecom providers for connecting Indian robocall scammers
The aforementioned DOJ complaint
 Uncle Sam compensates you for data leaks (yeah, right)
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Dave finally has good news. Joe shares a fake website created by the US Trading Commission... which doesn't exist. The catch of the day threatens FULL DATA LOSS! Later in the show, Anna Collard is the founder of security content publisher of <a href="https://popcorntraining.com/">Popcorn Training</a> – a South African company that promotes Cyber Security awareness by using story-based techniques. Our conversation centers on the state of cyber security in Africa.</p><p>Links to stories:</p><p><a href="https://arstechnica.com/tech-policy/2020/01/doj-sues-us-telecom-providers-for-connecting-indian-robocall-scammers/"> DOJ sues US telecom providers for connecting Indian robocall scammers</a></p><p><a href="https://www.justice.gov/opa/press-release/file/1240026/download">The aforementioned DOJ complaint</a></p><p><a href="https://www.kaspersky.com/blog/data-leak-compensation-scam/32057/"> Uncle Sam compensates you for data leaks (yeah, right)</a></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>1742</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[46438667-adcc-4e7b-b7aa-de62b3a0bcbd]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW2564560095.mp3?updated=1633706287" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>They had no idea.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/83/notes</link>
      <description>Dave shares a particularly exposing sextortion scam. Joe has a story of a million-dollar scam that targeted college students in Miami just trying to pay their tuition. The catch of the day comes straight from The U.S. President. Later in the show, part two of Carole Theriault's interview with Jamie Bartlett, the brains and host behind The Missing Cryptoqueen, an amazing BBC podcast about trying to get to the bottom of the OneCoin scam.
Links to stories:
 Fresh New Nest Video Extortion Scam Plays Out Like a Spy Game
 WeChat and stolen credit cards: How scammers victimized Miami Chinese college students
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 30 Jan 2020 06:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>83</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/8a1626b0-a50b-11ea-9279-b7dc91d3ef70/image/Hacking-Humans-iTunes-art-1400x1400.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Dave shares a particularly exposing sextortion scam. Joe has a story of a million-dollar scam that targeted college students in Miami just trying to pay their tuition. The catch of the day comes straight from The U.S. President. Later in the show,...</itunes:subtitle>
      <itunes:summary>Dave shares a particularly exposing sextortion scam. Joe has a story of a million-dollar scam that targeted college students in Miami just trying to pay their tuition. The catch of the day comes straight from The U.S. President. Later in the show, part two of Carole Theriault's interview with Jamie Bartlett, the brains and host behind The Missing Cryptoqueen, an amazing BBC podcast about trying to get to the bottom of the OneCoin scam.
Links to stories:
 Fresh New Nest Video Extortion Scam Plays Out Like a Spy Game
 WeChat and stolen credit cards: How scammers victimized Miami Chinese college students
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Dave shares a particularly exposing sextortion scam. Joe has a story of a million-dollar scam that targeted college students in Miami just trying to pay their tuition. The catch of the day comes straight from The U.S. President. Later in the show, part two of Carole Theriault's interview with Jamie Bartlett, the brains and host behind The Missing Cryptoqueen, an amazing BBC podcast about trying to get to the bottom of the OneCoin scam.</p><p>Links to stories:</p><p><a href="https://www.bleepingcomputer.com/news/security/new-nest-video-extortion-scam-plays-out-like-a-spy-game/"> Fresh New Nest Video Extortion Scam Plays Out Like a Spy Game</a></p><p><a href="https://www.miamiherald.com/news/local/crime/article229266704.html"> WeChat and stolen credit cards: How scammers victimized Miami Chinese college students</a></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>1809</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[2959b4bf-fe82-4a9e-ab37-31f5583d8490]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW2763278491.mp3?updated=1633706325" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Flipping the script.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/82/notes</link>
      <description>Dave's phone is blowing up with smishing attempts. Joe shares a story about fake license renewal attempts from The New Zealand Transportation Agency. The catch of the day flips the script on their attacker. Later in the show Carole Theriault speaks with Jamie Bartlett, the brains and host behind The Missing Cryptoqueen, an amazing BBC podcast about trying to get to the bottom of the OneCoin scam.
Links to stories:
Fresh Apple #Phishing found
The catch of the day
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 23 Jan 2020 06:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>82</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/8a2b0044-a50b-11ea-9279-77f1c333284b/image/Hacking-Humans-iTunes-art-1400x1400.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Dave's phone is blowing up with smishing attempts. Joe shares a story about fake license renewal attempts from The New Zealand Transportation Agency. The catch of the day flips the script on their attacker. Later in the show Carole Theriault speaks...</itunes:subtitle>
      <itunes:summary>Dave's phone is blowing up with smishing attempts. Joe shares a story about fake license renewal attempts from The New Zealand Transportation Agency. The catch of the day flips the script on their attacker. Later in the show Carole Theriault speaks with Jamie Bartlett, the brains and host behind The Missing Cryptoqueen, an amazing BBC podcast about trying to get to the bottom of the OneCoin scam.
Links to stories:
Fresh Apple #Phishing found
The catch of the day
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Dave's phone is blowing up with smishing attempts. Joe shares a story about fake license renewal attempts from The New Zealand Transportation Agency. The catch of the day flips the script on their attacker. Later in the show Carole Theriault speaks with Jamie Bartlett, the brains and host behind The Missing Cryptoqueen, an amazing BBC podcast about trying to get to the bottom of the OneCoin scam.</p><p>Links to stories:</p><p><a href="https://twitter.com/JCyberSec_/status/1217480287514292225?s=20">Fresh Apple #Phishing found</a></p><p><a href="https://twitter.com/sjmurdoch/status/1217157683796680708">The catch of the day</a></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>1818</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[18649c18-f911-44fc-9bec-7fa1aceac81b]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW6184438504.mp3?updated=1633706359" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Life in the (second) age of pirates.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/81/notes</link>
      <description>Dave has an account from a man who was almost scammed by an impersonation of his own close friend. Joe has the story of a sophisticated phishing scheme involving Microsoft Office 365. The catch of the day goes all the way back to the age of pirates. Carole Theriault interviews Andrew Brandt from Sophos regarding their 2020 threat report.
Links to stories:
 Tricky Phish Angles for Persistence, Not Passwords
SophosLabs 2020 Threat Report 
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 16 Jan 2020 06:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>81</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/8a4403aa-a50b-11ea-9279-2bd8e2bfc38b/image/Hacking-Humans-iTunes-art-1400x1400.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Dave has an account from a man who was almost scammed by an impersonation of his own close friend. Joe has the story of a sophisticated phishing scheme involving Microsoft Office 365. The catch of the day goes all the way back to the age of pirates....</itunes:subtitle>
      <itunes:summary>Dave has an account from a man who was almost scammed by an impersonation of his own close friend. Joe has the story of a sophisticated phishing scheme involving Microsoft Office 365. The catch of the day goes all the way back to the age of pirates. Carole Theriault interviews Andrew Brandt from Sophos regarding their 2020 threat report.
Links to stories:
 Tricky Phish Angles for Persistence, Not Passwords
SophosLabs 2020 Threat Report 
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Dave has an account from a man who was almost scammed by an impersonation of his own close friend. Joe has the story of a sophisticated phishing scheme involving Microsoft Office 365. The catch of the day goes all the way back to the age of pirates. Carole Theriault interviews Andrew Brandt from Sophos regarding their 2020 threat report.</p><p>Links to stories:</p><p><a href="https://krebsonsecurity.com/2020/01/tricky-phish-angles-for-persistence-not-passwords/"> Tricky Phish Angles for Persistence, Not Passwords</a></p><p><a href="https://www.sophos.com/en-us/labs/security-threat-report.aspx">SophosLabs 2020 Threat Report</a> </p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>1887</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b5e95933-8f29-4f6f-97dd-d9c90fb70f03]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW4593001232.mp3?updated=1633706385" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Ransomware is a reality.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/80/notes</link>
      <description>Dave has a master list of cyberbadness. Joe has some handy red flags this tax season straight from our beloved IRS. The catch of the day features an alluring proposition from someone who is probably not "Sofia". Our guest is Devon Kerr with Elastic Security Intelligence and Analytics who shares his insights about Ransomware. 
Links to stories:
 7 types of virus – a short glossary of contemporary cyberbadness
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 09 Jan 2020 06:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>80</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/8a5a449e-a50b-11ea-9279-93dcc85581de/image/Hacking-Humans-iTunes-art-1400x1400.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Dave has a master list of cyberbadness. Joe has some handy red flags this tax season straight from our beloved IRS. The catch of the day features an alluring proposition from someone who is probably not "Sofia". Our guest is Devon Kerr with Elastic...</itunes:subtitle>
      <itunes:summary>Dave has a master list of cyberbadness. Joe has some handy red flags this tax season straight from our beloved IRS. The catch of the day features an alluring proposition from someone who is probably not "Sofia". Our guest is Devon Kerr with Elastic Security Intelligence and Analytics who shares his insights about Ransomware. 
Links to stories:
 7 types of virus – a short glossary of contemporary cyberbadness
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Dave has a master list of cyberbadness. Joe has some handy red flags this tax season straight from our beloved IRS. The catch of the day features an alluring proposition from someone who is probably not "Sofia". Our guest is Devon Kerr with Elastic Security Intelligence and Analytics who shares his insights about Ransomware. </p><p>Links to stories:</p><p><a href="https://nakedsecurity.sophos.com/2019/12/28/7-types-of-virus-a-short-glossary-of-contemporary-cyberbadness/"> 7 types of virus – a short glossary of contemporary cyberbadness</a></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>1730</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[51b296da-f995-4e92-9592-1a480b7b185d]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW7843362950.mp3?updated=1633706410" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Leading by example and positive reenforcement.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/79/notes</link>
      <description>Dave has a warning from a galaxy far, far away. Joe has a report of a scam attempt on a listener who fancies fancy pens. The catch of the day features a Tinder dating app bot scam. Our guest is Dennis Dillman from Barracuda Networks, sharing his thoughts on employee training.
Links to stories:
 https://www.bleepingcomputer.com/news/security/fake-star-wars-streaming-sites-steal-fans-credit-cards/
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 02 Jan 2020 06:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>79</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/8a8ab016-a50b-11ea-9279-8367e54429e3/image/Hacking-Humans-iTunes-art-1400x1400.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Leading by example and positive reenforcement.</itunes:subtitle>
      <itunes:summary>Dave has a warning from a galaxy far, far away. Joe has a report of a scam attempt on a listener who fancies fancy pens. The catch of the day features a Tinder dating app bot scam. Our guest is Dennis Dillman from Barracuda Networks, sharing his thoughts on employee training.
Links to stories:
 https://www.bleepingcomputer.com/news/security/fake-star-wars-streaming-sites-steal-fans-credit-cards/
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Dave has a warning from a galaxy far, far away. Joe has a report of a scam attempt on a listener who fancies fancy pens. The catch of the day features a Tinder dating app bot scam. Our guest is Dennis Dillman from Barracuda Networks, sharing his thoughts on employee training.</p><p>Links to stories:</p><p><a href="https://www.bleepingcomputer.com/news/security/fake-star-wars-streaming-sites-steal-fans-credit-cards/"> https://www.bleepingcomputer.com/news/security/fake-star-wars-streaming-sites-steal-fans-credit-cards/</a></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>1761</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[3d5ee722-b172-48eb-bc15-63d8a351f0da]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW3459988237.mp3?updated=1633706451" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Telling The Truth In A Dishonest Way - Rebroadcast</title>
      <description>Today's episode is a re-broadcast of an episode from August 2018. 
Dave looks at Hollywood script pitch event scams. Joe describes a romance scam murder scheme. Spontaneously combusting ATM cards. Guest Jayson E. Street from SphereNY describes his security awareness engagements.
Links to stories mentioned in this week's show:
https://www.hollywoodreporter.com/news/why-are-wannabe-screenwriters-getting-scammed-1130919
https://nakedsecurity.sophos.com/2018/08/17/romance-scam-victim-allegedly-plotted-to-kill-her-mother-for-cash/
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 26 Dec 2019 06:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/8a9c3e9e-a50b-11ea-9279-07c9d7127e11/image/Hacking-Humans-iTunes-art-1400x1400.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Today's episode is a re-broadcast of an episode from August 2018.  Dave looks at Hollywood script pitch event scams. Joe describes a romance scam murder scheme. Spontaneously combusting ATM cards. Guest Jayson E. Street from SphereNY describes...</itunes:subtitle>
      <itunes:summary>Today's episode is a re-broadcast of an episode from August 2018. 
Dave looks at Hollywood script pitch event scams. Joe describes a romance scam murder scheme. Spontaneously combusting ATM cards. Guest Jayson E. Street from SphereNY describes his security awareness engagements.
Links to stories mentioned in this week's show:
https://www.hollywoodreporter.com/news/why-are-wannabe-screenwriters-getting-scammed-1130919
https://nakedsecurity.sophos.com/2018/08/17/romance-scam-victim-allegedly-plotted-to-kill-her-mother-for-cash/
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Today's episode is a re-broadcast of an episode from August 2018. </p><p>Dave looks at Hollywood script pitch event scams. Joe describes a romance scam murder scheme. Spontaneously combusting ATM cards. Guest Jayson E. Street from SphereNY describes his security awareness engagements.</p><p>Links to stories mentioned in this week's show:</p><p>https://www.hollywoodreporter.com/news/why-are-wannabe-screenwriters-getting-scammed-1130919</p><p>https://nakedsecurity.sophos.com/2018/08/17/romance-scam-victim-allegedly-plotted-to-kill-her-mother-for-cash/</p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>1860</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[7b34b69f-7d12-4cd1-ae71-8d4fced35738]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW2243856159.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Managing access and insider threats.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/78/notes</link>
      <description>Joe's wife has been getting suspicious shipping notices. Dave describes a phone scam where crooks intercept phone calls. The catch of the day turns the tables on a would-be scammer. Carole Theriault speaks with Peter Draper from Gurucul about their 2020 Insider Threat Report.
Links to stories:
https://www.ctvnews.ca/canada/police-warn-of-new-phone-scam-where-criminals-intercept-your-calls-1.4706758
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 19 Dec 2019 06:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>78</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/8ab465be-a50b-11ea-9279-97b4c78c1d9a/image/Hacking-Humans-iTunes-art-1400x1400.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Joe's wife has been getting suspicious shipping notices. Dave describes a phone scam where crooks intercept phone calls. The catch of the day turns the tables on a would-be scammer. Carole Theriault speaks with Peter Draper from Gurucul about their...</itunes:subtitle>
      <itunes:summary>Joe's wife has been getting suspicious shipping notices. Dave describes a phone scam where crooks intercept phone calls. The catch of the day turns the tables on a would-be scammer. Carole Theriault speaks with Peter Draper from Gurucul about their 2020 Insider Threat Report.
Links to stories:
https://www.ctvnews.ca/canada/police-warn-of-new-phone-scam-where-criminals-intercept-your-calls-1.4706758
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Joe's wife has been getting suspicious shipping notices. Dave describes a phone scam where crooks intercept phone calls. The catch of the day turns the tables on a would-be scammer. Carole Theriault speaks with Peter Draper from Gurucul about their 2020 Insider Threat Report.</p><p>Links to stories:</p><p><a href="https://www.ctvnews.ca/canada/police-warn-of-new-phone-scam-where-criminals-intercept-your-calls-1.4706758">https://www.ctvnews.ca/canada/police-warn-of-new-phone-scam-where-criminals-intercept-your-calls-1.4706758</a></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>1879</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[fedb30df-4951-4660-85b9-e92d3fe6a466]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW4815701251.mp3?updated=1633706510" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>If you didn't ask for it don't install it.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/77/notes</link>
      <description>Dave describes a gas-pump hidden camera scam. Joe shares the story of a fraudulent Microsoft Windows Update notice. The catch of the day involves a scammer making use of an online celebrity's profile picture. Our guest is Karl Sigler from Trustwave with tips for staying safe online through the holidays. 
Links to stories:
https://krebsonsecurity.com/2019/11/hidden-cam-above-bluetooth-pump-skimmer/
https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/fake-windows-update-spam-leads-to-cyborg-ransomware-and-its-builder/
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 12 Dec 2019 06:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>77</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/8ac9cc06-a50b-11ea-9279-839c2b5d8ce5/image/Hacking-Humans-iTunes-art-1400x1400.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>If you didn't ask for it don't install it.</itunes:subtitle>
      <itunes:summary>Dave describes a gas-pump hidden camera scam. Joe shares the story of a fraudulent Microsoft Windows Update notice. The catch of the day involves a scammer making use of an online celebrity's profile picture. Our guest is Karl Sigler from Trustwave with tips for staying safe online through the holidays. 
Links to stories:
https://krebsonsecurity.com/2019/11/hidden-cam-above-bluetooth-pump-skimmer/
https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/fake-windows-update-spam-leads-to-cyborg-ransomware-and-its-builder/
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Dave describes a gas-pump hidden camera scam. Joe shares the story of a fraudulent Microsoft Windows Update notice. The catch of the day involves a scammer making use of an online celebrity's profile picture. Our guest is Karl Sigler from Trustwave with tips for staying safe online through the holidays. </p><p>Links to stories:</p><p><a href="https://krebsonsecurity.com/2019/11/hidden-cam-above-bluetooth-pump-skimmer/">https://krebsonsecurity.com/2019/11/hidden-cam-above-bluetooth-pump-skimmer/</a></p><p><a href="https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/fake-windows-update-spam-leads-to-cyborg-ransomware-and-its-builder/">https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/fake-windows-update-spam-leads-to-cyborg-ransomware-and-its-builder/</a></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>1641</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[9e1b5146-5663-46be-bcd2-724f51b17f69]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW5824927091.mp3?updated=1633706522" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>I really wanted that shed.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/76/notes</link>
      <description>Joe shares the story of a woman losing her life savings to a scammer claiming to be from the FBI. Dave describes the $139 shed scam. The catch of the day is another threat of revealing compromising photos. Carole Theriault speaks with Chris Bush from ObserveIT about security threats from employee burnout.
Links to stories:
https://www.wsj.com/articles/robocall-scams-exist-because-they-workone-womans-story-shows-how-11574351204
https://youtu.be/zFQUCCbodHc
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 05 Dec 2019 06:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>76</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/8ade2232-a50b-11ea-9279-63cce28a3a30/image/Hacking-Humans-iTunes-art-1400x1400.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>I really wanted that shed.</itunes:subtitle>
      <itunes:summary>Joe shares the story of a woman losing her life savings to a scammer claiming to be from the FBI. Dave describes the $139 shed scam. The catch of the day is another threat of revealing compromising photos. Carole Theriault speaks with Chris Bush from ObserveIT about security threats from employee burnout.
Links to stories:
https://www.wsj.com/articles/robocall-scams-exist-because-they-workone-womans-story-shows-how-11574351204
https://youtu.be/zFQUCCbodHc
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Joe shares the story of a woman losing her life savings to a scammer claiming to be from the FBI. Dave describes the $139 shed scam. The catch of the day is another threat of revealing compromising photos. Carole Theriault speaks with Chris Bush from ObserveIT about security threats from employee burnout.</p><p>Links to stories:</p><p><a href="https://www.wsj.com/articles/robocall-scams-exist-because-they-workone-womans-story-shows-how-11574351204">https://www.wsj.com/articles/robocall-scams-exist-because-they-workone-womans-story-shows-how-11574351204</a></p><p><a href="https://youtu.be/zFQUCCbodHc">https://youtu.be/zFQUCCbodHc</a></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>1889</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[7a8db7cc-68a7-4246-b8a2-08990552a530]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW4946779709.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Security has to be friendly.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/75/notes</link>
      <description>Dave wonders about Juice Jacking warnings. Joe shares findings from Agari's latest email fraud and identity deception report. The catch of the day promises romance in exchange for airline tickets. Our guests are David Spark and Allan Alford, cohosts of the Defense in Depth podcast. 
Links to stories:
 https://www.goodmorningamerica.com/travel/story/travelers-beware-juice-jacking-public-charging-stations-safely-67004765
 https://www.agari.com/cyber-intelligence-research/e-books/q4-2019-report.pdf
https://cisoseries.com/introducing-defense-in-depth-podcast/
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 21 Nov 2019 06:00:00 -0000</pubDate>
      <itunes:title>Security has to be friendly.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>75</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/8af9e88c-a50b-11ea-9279-af9ef1dfc03d/image/Hacking-Humans-iTunes-art-1400x1400.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Dave wonders about Juice Jacking warnings. Joe shares findings from Agari's latest email fraud and identity deception report. The catch of the day promises romance in exchange for airline tickets. Our guests are David Spark and Allan Alford, cohosts of the Defense in Depth podcast. 
Links to stories:
 https://www.goodmorningamerica.com/travel/story/travelers-beware-juice-jacking-public-charging-stations-safely-67004765
 https://www.agari.com/cyber-intelligence-research/e-books/q4-2019-report.pdf
https://cisoseries.com/introducing-defense-in-depth-podcast/
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Dave wonders about Juice Jacking warnings. Joe shares findings from Agari's latest email fraud and identity deception report. The catch of the day promises romance in exchange for airline tickets. Our guests are David Spark and Allan Alford, cohosts of the Defense in Depth podcast. </p><p>Links to stories:</p><p><a href="https://www.goodmorningamerica.com/travel/story/travelers-beware-juice-jacking-public-charging-stations-safely-67004765"> https://www.goodmorningamerica.com/travel/story/travelers-beware-juice-jacking-public-charging-stations-safely-67004765</a></p><p><a href="https://www.agari.com/cyber-intelligence-research/e-books/q4-2019-report.pdf"> https://www.agari.com/cyber-intelligence-research/e-books/q4-2019-report.pdf</a></p><p><a href="https://cisoseries.com/introducing-defense-in-depth-podcast/">https://cisoseries.com/introducing-defense-in-depth-podcast/</a></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>1775</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[e358d0a9-f66b-4a9a-85b0-1848ff5023b6]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW4310972197.mp3?updated=1633712607" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Skepticism is the first step.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/74/notes</link>
      <description>Joe shares stories of typo-squatting. Dave reminds warns us against responding to malicious email, even just for fun. The catch of the day is from a listener, leading on a romance scammer. Carole Theriault returns with an interview with Chris Olson from The Media Trust on how targeted advertising can enable election interference.
Links from this week's stories:
https://www.securityweek.com/err-human-squat-criminal
https://info.phishlabs.com/blog/dont-respond-suspicious-emails
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 14 Nov 2019 06:00:00 -0000</pubDate>
      <itunes:title>Skepticism is the first step.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>74</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/8b12c4e2-a50b-11ea-9279-97b8de43a9bd/image/Hacking-Humans-iTunes-art-1400x1400.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Joe shares stories of typo-squatting. Dave reminds warns us against responding to malicious email, even just for fun. The catch of the day is from a listener, leading on a romance scammer. Carole Theriault returns with an interview with Chris Olson from The Media Trust on how targeted advertising can enable election interference.
Links from this week's stories:
https://www.securityweek.com/err-human-squat-criminal
https://info.phishlabs.com/blog/dont-respond-suspicious-emails
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Joe shares stories of typo-squatting. Dave reminds warns us against responding to malicious email, even just for fun. The catch of the day is from a listener, leading on a romance scammer. Carole Theriault returns with an interview with Chris Olson from The Media Trust on how targeted advertising can enable election interference.</p><p>Links from this week's stories:</p><p><a href="https://www.securityweek.com/err-human-squat-criminal">https://www.securityweek.com/err-human-squat-criminal</a></p><p><a href="https://info.phishlabs.com/blog/dont-respond-suspicious-emails">https://info.phishlabs.com/blog/dont-respond-suspicious-emails</a></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>1986</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[6ddd482f5a28439cbf2579be6c0fe35b]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW9550525152.mp3?updated=1633712556" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>When you are the target, objectivity is gone.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/73/notes</link>
      <description>Joe shares a report on who's more susceptible for scams. Dave shares a story from a listener who what hit by a scam attempt while staying at a hotel. Our catch of the day involves an attempt to scam someone selling a motorcycle. Our guest is Maria Konnikova, an award-winning author, journalist, and international champion poker player. Her latest book is The Biggest Bluff.
Links to stories:
 https://www.washingtonpost.com/business/2019/10/28/this-might-surprise-you-seniors-are-not-more-susceptible-scams-younger-adults-are/
 https://www.ftc.gov/system/files/documents/reports/protecting-older-consumers-2018-2019-report-federal-trade-commission/p144401_protecting_older_consumers_2019_1.pdf
https://twentytwowords.com/man-gets-revenge-on-craigslist-scammer-in-the-most-satisfying-way-imaginable/
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 07 Nov 2019 06:00:00 -0000</pubDate>
      <itunes:title>When you are the target, objectivity is gone.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>73</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/8b219c2e-a50b-11ea-9279-cb19f26e0aab/image/Hacking-Humans-iTunes-art-1400x1400.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Joe shares a report on who's more susceptible for scams. Dave shares a story from a listener who what hit by a scam attempt while staying at a hotel. Our catch of the day involves an attempt to scam someone selling a motorcycle. Our guest is Maria Konnikova, an award-winning author, journalist, and international champion poker player. Her latest book is The Biggest Bluff.
Links to stories:
 https://www.washingtonpost.com/business/2019/10/28/this-might-surprise-you-seniors-are-not-more-susceptible-scams-younger-adults-are/
 https://www.ftc.gov/system/files/documents/reports/protecting-older-consumers-2018-2019-report-federal-trade-commission/p144401_protecting_older_consumers_2019_1.pdf
https://twentytwowords.com/man-gets-revenge-on-craigslist-scammer-in-the-most-satisfying-way-imaginable/
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Joe shares a report on who's more susceptible for scams. Dave shares a story from a listener who what hit by a scam attempt while staying at a hotel. Our catch of the day involves an attempt to scam someone selling a motorcycle. Our guest is Maria Konnikova, an award-winning author, journalist, and international champion poker player. Her latest book is The Biggest Bluff.</p><p>Links to stories:</p><p><a href="https://www.washingtonpost.com/business/2019/10/28/this-might-surprise-you-seniors-are-not-more-susceptible-scams-younger-adults-are/"> https://www.washingtonpost.com/business/2019/10/28/this-might-surprise-you-seniors-are-not-more-susceptible-scams-younger-adults-are/</a></p><p><a href="https://www.ftc.gov/system/files/documents/reports/protecting-older-consumers-2018-2019-report-federal-trade-commission/p144401_protecting_older_consumers_2019_1.pdf"> https://www.ftc.gov/system/files/documents/reports/protecting-older-consumers-2018-2019-report-federal-trade-commission/p144401_protecting_older_consumers_2019_1.pdf</a></p><p><a href="https://twentytwowords.com/man-gets-revenge-on-craigslist-scammer-in-the-most-satisfying-way-imaginable/">https://twentytwowords.com/man-gets-revenge-on-craigslist-scammer-in-the-most-satisfying-way-imaginable/</a></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>1886</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[9a960b5c41844818aea34356df493cba]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW9440707289.mp3?updated=1633712499" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The Malware Mash!</title>
      <description>Happy Halloween from Joe, Dave, and everyone at the CyberWire!</description>
      <pubDate>Thu, 31 Oct 2019 12:01:00 -0000</pubDate>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/8b438e06-a50b-11ea-9279-b3a5f19fdc1d/image/Hacking-Humans-iTunes-art-1400x1400.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>The Malware Mash!</itunes:subtitle>
      <itunes:summary>Happy Halloween from Joe, Dave, and everyone at the CyberWire!</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Happy Halloween from Joe, Dave, and everyone at the CyberWire!</p>]]>
      </content:encoded>
      <itunes:duration>231</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[43dc8587fb63442abbd274e9a148282c]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW5322114526.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Don't dismiss the fraudsters.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/72/notes</link>
      <description>Dave describes a credential gathering scam targeting users of the Stripe online payment system. Joe responds to an email message from his boss, and learns a valuable lesson. Our catch of the day follows someone as they string along a text messaging scammer. Carole Theriault returns with an interview with J Bennett of Signifyd, an AI firm fighting romance scams.
Links to stories:
 https://cofense.com/credential-phish-masks-scam-page-url-thwart-vigilant-users/
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 31 Oct 2019 05:00:00 -0000</pubDate>
      <itunes:title>Don't dismiss the fraudsters.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>72</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/8b5e9106-a50b-11ea-9279-c7cede6065e4/image/Hacking-Humans-iTunes-art-1400x1400.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Dave describes a credential gathering scam targeting users of the Stripe online payment system. Joe responds to an email message from his boss, and learns a valuable lesson. Our catch of the day follows someone as they string along a text messaging scammer. Carole Theriault returns with an interview with J Bennett of Signifyd, an AI firm fighting romance scams.
Links to stories:
 https://cofense.com/credential-phish-masks-scam-page-url-thwart-vigilant-users/
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Dave describes a credential gathering scam targeting users of the Stripe online payment system. Joe responds to an email message from his boss, and learns a valuable lesson. Our catch of the day follows someone as they string along a text messaging scammer. Carole Theriault returns with an interview with J Bennett of Signifyd, an AI firm fighting romance scams.</p><p>Links to stories:</p><p><a href="https://cofense.com/credential-phish-masks-scam-page-url-thwart-vigilant-users/"> https://cofense.com/credential-phish-masks-scam-page-url-thwart-vigilant-users/</a></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>2098</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[db86142a3d4249e6b382948172530252]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW7235916045.mp3?updated=1633712419" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The ability to fundamentally deceive someone.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/71/notes</link>
      <description>Joe has the story of a convincing scammer who makes an innocent woman doubt herself. Dave describes an online utility that helps users delete unwanted user accounts and also rates the difficulty of doing so. The catch of the day requests help in an investment scam (but lacks punctuation). Our guest is Henry Ajder from Deeptrace Labs on their research on Deep Fakes. 
Links to stories:
https://www.walesonline.co.uk/news/wales-news/swansea-mum-scammed-out-1000-17065476
https://backgroundchecks.org/justdeleteme/
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 24 Oct 2019 05:00:00 -0000</pubDate>
      <itunes:title>The ability to fundamentally deceive someone.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>71</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/8b82b41e-a50b-11ea-9279-6b98ef8a8b26/image/Hacking-Humans-iTunes-art-1400x1400.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Joe has the story of a convincing scammer who makes an innocent woman doubt herself. Dave describes an online utility that helps users delete unwanted user accounts and also rates the difficulty of doing so. The catch of the day requests help in an investment scam (but lacks punctuation). Our guest is Henry Ajder from Deeptrace Labs on their research on Deep Fakes. 
Links to stories:
https://www.walesonline.co.uk/news/wales-news/swansea-mum-scammed-out-1000-17065476
https://backgroundchecks.org/justdeleteme/
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Joe has the story of a convincing scammer who makes an innocent woman doubt herself. Dave describes an online utility that helps users delete unwanted user accounts and also rates the difficulty of doing so. The catch of the day requests help in an investment scam (but lacks punctuation). Our guest is Henry Ajder from Deeptrace Labs on their research on Deep Fakes. </p><p>Links to stories:</p><p><a href="https://www.walesonline.co.uk/news/wales-news/swansea-mum-scammed-out-1000-17065476">https://www.walesonline.co.uk/news/wales-news/swansea-mum-scammed-out-1000-17065476</a></p><p><a href="https://backgroundchecks.org/justdeleteme/">https://backgroundchecks.org/justdeleteme/</a></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>1935</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[f89d1304ae304ef7953fd7671559a776]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW1003872731.mp3?updated=1633712358" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The fallacy of futility.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/70/notes</link>
      <description>Dave describes a ponzi scheme that bought up legitimate investment firms. Joe shares research into deep fakes. The catch of the day includes an invitation to join the illuminati. Ray [REDACTED] returns with followup from his prior visit, along with new information to share.
Links to stories:
 https://13wham.com/news/local/feds-in-rochester-to-detail-multi-million-dollar-ponzi-scheme
 https://nakedsecurity.sophos.com/2019/10/09/deepfakes-have-doubled-overwhelmingly-targeting-women/
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 17 Oct 2019 05:00:00 -0000</pubDate>
      <itunes:title>The fallacy of futility.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>70</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/8ba0be28-a50b-11ea-9279-aff7b06e4328/image/Hacking-Humans-iTunes-art-1400x1400.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Dave describes a ponzi scheme that bought up legitimate investment firms. Joe shares research into deep fakes. The catch of the day includes an invitation to join the illuminati. Ray [REDACTED] returns with followup from his prior visit, along with new information to share.
Links to stories:
 https://13wham.com/news/local/feds-in-rochester-to-detail-multi-million-dollar-ponzi-scheme
 https://nakedsecurity.sophos.com/2019/10/09/deepfakes-have-doubled-overwhelmingly-targeting-women/
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Dave describes a ponzi scheme that bought up legitimate investment firms. Joe shares research into deep fakes. The catch of the day includes an invitation to join the illuminati. Ray [REDACTED] returns with followup from his prior visit, along with new information to share.</p><p>Links to stories:</p><p><a href="https://13wham.com/news/local/feds-in-rochester-to-detail-multi-million-dollar-ponzi-scheme"> https://13wham.com/news/local/feds-in-rochester-to-detail-multi-million-dollar-ponzi-scheme</a></p><p><a href="https://nakedsecurity.sophos.com/2019/10/09/deepfakes-have-doubled-overwhelmingly-targeting-women/"> https://nakedsecurity.sophos.com/2019/10/09/deepfakes-have-doubled-overwhelmingly-targeting-women/</a></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>1808</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c5697390ba934a93978db74587054b2c]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW5286086323.mp3?updated=1633711716" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Don't trust ransomware to tell you its real name.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/69/notes</link>
      <description>Joe describes online redirect scams, URL encoding and the clever combination of the two. Dave shares delightful satire about Russian brides and Nigerian princes, together at last. The catch of the day involves a student getting the best of scammers, getting them to send him money. Our guest is Fabian Wosar from Emsisoft, well-known for decrypting ransomware. 
Links from today's stories - 
https://waterfordwhispersnews.com/2019/09/25/hot-woman-in-your-area-marries-nigerian-prince-whos-email-you-ignored/
 https://www.thesun.co.uk/tech/10052181/student-limerick-online-scammer-charity/
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 10 Oct 2019 05:00:00 -0000</pubDate>
      <itunes:title>Don't trust ransomware to tell you its real name.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>69</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/8bc2d242-a50b-11ea-9279-47a3f2358b64/image/Hacking-Humans-iTunes-art-1400x1400.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Joe describes online redirect scams, URL encoding and the clever combination of the two. Dave shares delightful satire about Russian brides and Nigerian princes, together at last. The catch of the day involves a student getting the best of scammers, getting them to send him money. Our guest is Fabian Wosar from Emsisoft, well-known for decrypting ransomware. 
Links from today's stories - 
https://waterfordwhispersnews.com/2019/09/25/hot-woman-in-your-area-marries-nigerian-prince-whos-email-you-ignored/
 https://www.thesun.co.uk/tech/10052181/student-limerick-online-scammer-charity/
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Joe describes online redirect scams, URL encoding and the clever combination of the two. Dave shares delightful satire about Russian brides and Nigerian princes, together at last. The catch of the day involves a student getting the best of scammers, getting them to send him money. Our guest is Fabian Wosar from Emsisoft, well-known for decrypting ransomware. </p><p>Links from today's stories - </p><p><a href="https://waterfordwhispersnews.com/2019/09/25/hot-woman-in-your-area-marries-nigerian-prince-whos-email-you-ignored/">https://waterfordwhispersnews.com/2019/09/25/hot-woman-in-your-area-marries-nigerian-prince-whos-email-you-ignored/</a></p><p><a href="https://www.thesun.co.uk/tech/10052181/student-limerick-online-scammer-charity/"> https://www.thesun.co.uk/tech/10052181/student-limerick-online-scammer-charity/</a></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>1926</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[4b47ec2872a74864ae9a50acdba68832]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW8233414064.mp3?updated=1633710962" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The ultimate hacking tool.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/68/notes</link>
      <description>Joe reviews highlights from a Proofpoint report on the human aspects of cyber attacks. Dave describes the FTC's cases against online dating site Match.com. The catch of the day comes straight from Her Majesty the Queen. Carole Theriault returns with an interview with Corin Imai, Senior Security advisor at DomainTools, about phishing attacks they’ve been tracking in the UK.
Links to stories:
 https://www.helpnetsecurity.com/2019/09/10/cyberattacks-human-interaction/
 https://techcrunch.com/2019/09/26/dating-app-maker-match-sued-by-ftc-for-fraud/
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 03 Oct 2019 05:00:00 -0000</pubDate>
      <itunes:title>The ultimate hacking tool.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>68</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/8bdec420-a50b-11ea-9279-b3282bbf38c7/image/Hacking-Humans-iTunes-art-1400x1400.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Joe reviews highlights from a Proofpoint report on the human aspects of cyber attacks. Dave describes the FTC's cases against online dating site Match.com. The catch of the day comes straight from Her Majesty the Queen. Carole Theriault returns with an interview with Corin Imai, Senior Security advisor at DomainTools, about phishing attacks they’ve been tracking in the UK.
Links to stories:
 https://www.helpnetsecurity.com/2019/09/10/cyberattacks-human-interaction/
 https://techcrunch.com/2019/09/26/dating-app-maker-match-sued-by-ftc-for-fraud/
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Joe reviews highlights from a Proofpoint report on the human aspects of cyber attacks. Dave describes the FTC's cases against online dating site Match.com. The catch of the day comes straight from Her Majesty the Queen. Carole Theriault returns with an interview with Corin Imai, Senior Security advisor at DomainTools, about phishing attacks they’ve been tracking in the UK.</p><p>Links to stories:</p><p><a href="https://www.helpnetsecurity.com/2019/09/10/cyberattacks-human-interaction/"> https://www.helpnetsecurity.com/2019/09/10/cyberattacks-human-interaction/</a></p><p><a href="https://techcrunch.com/2019/09/26/dating-app-maker-match-sued-by-ftc-for-fraud/"> https://techcrunch.com/2019/09/26/dating-app-maker-match-sued-by-ftc-for-fraud/</a></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>1981</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[9e44f7f7a9084dee91fb2f603d9ade9b]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW2597854483.mp3?updated=1633710215" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The usefulness of single sign on.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/67/notes</link>
      <description>Joe outlines online threats from social media. Dave shares a story of scammers try to scare a community into purchasing security products. The catch of the day features a promise of riches from Facebook's Mark Zuckerberg. Our guest is Yaser Masoudnia from LastPass who addresses listener questions about Single Sign On.
Links to stories:
 https://info.phishlabs.com/blog/how-social-media-is-abused-for-phishing-attacks
 http://www.pressandguide.com/news/police_fire/email-scam-trying-to-convince-dearborn-residents-crime-is-up/article_249b1f2c-cb34-11e9-a5b0-cf725769167a.html
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 26 Sep 2019 05:00:00 -0000</pubDate>
      <itunes:title>The usefulness of single sign on.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>67</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/8c0b777c-a50b-11ea-9279-dbabc1a485c6/image/Hacking-Humans-iTunes-art-1400x1400.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Joe outlines online threats from social media. Dave shares a story of scammers try to scare a community into purchasing security products. The catch of the day features a promise of riches from Facebook's Mark Zuckerberg. Our guest is Yaser Masoudnia from LastPass who addresses listener questions about Single Sign On.
Links to stories:
 https://info.phishlabs.com/blog/how-social-media-is-abused-for-phishing-attacks
 http://www.pressandguide.com/news/police_fire/email-scam-trying-to-convince-dearborn-residents-crime-is-up/article_249b1f2c-cb34-11e9-a5b0-cf725769167a.html
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Joe outlines online threats from social media. Dave shares a story of scammers try to scare a community into purchasing security products. The catch of the day features a promise of riches from Facebook's Mark Zuckerberg. Our guest is Yaser Masoudnia from LastPass who addresses listener questions about Single Sign On.</p><p>Links to stories:</p><p><a href="https://info.phishlabs.com/blog/how-social-media-is-abused-for-phishing-attacks"> https://info.phishlabs.com/blog/how-social-media-is-abused-for-phishing-attacks</a></p><p><a href="http://www.pressandguide.com/news/police_fire/email-scam-trying-to-convince-dearborn-residents-crime-is-up/article_249b1f2c-cb34-11e9-a5b0-cf725769167a.html"> http://www.pressandguide.com/news/police_fire/email-scam-trying-to-convince-dearborn-residents-crime-is-up/article_249b1f2c-cb34-11e9-a5b0-cf725769167a.html</a></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>1844</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[8f59036ea1484b66b823f78ff6f96d32]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW1284209126.mp3?updated=1633710522" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Algorithms controlling truth in our society. </title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/66/notes</link>
      <description>Special guest host Graham Cluley joins Dave while Joe takes a short break. Dave shares the success of the FBI's reWired campaign which has apprehended alleged scammers around the world. Graham describes a website hoping to spare users the hardship of multifactor authentication. The catch of the day involves a generous soccer star. Our guest is Matt Price from ZeroFOX with insights on Deep Fake technology.
Links to today's stories:
 https://www.fbi.gov/news/stories/operation-rewired-bec-takedown-091019
https://dontduo.com/
https://www.smashingsecurity.com/
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter. </description>
      <pubDate>Thu, 19 Sep 2019 05:00:00 -0000</pubDate>
      <itunes:title>Algorithms controlling truth in our society.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>66</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/8c248a6e-a50b-11ea-9279-376605cd5e13/image/Hacking-Humans-iTunes-art-1400x1400.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Special guest host Graham Cluley joins Dave while Joe takes a short break. Dave shares the success of the FBI's reWired campaign which has apprehended alleged scammers around the world. Graham describes a website hoping to spare users the hardship of multifactor authentication. The catch of the day involves a generous soccer star. Our guest is Matt Price from ZeroFOX with insights on Deep Fake technology.
Links to today's stories:
 https://www.fbi.gov/news/stories/operation-rewired-bec-takedown-091019
https://dontduo.com/
https://www.smashingsecurity.com/
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter. </itunes:summary>
      <content:encoded>
        <![CDATA[<p>Special guest host Graham Cluley joins Dave while Joe takes a short break. Dave shares the success of the FBI's reWired campaign which has apprehended alleged scammers around the world. Graham describes a website hoping to spare users the hardship of multifactor authentication. The catch of the day involves a generous soccer star. Our guest is Matt Price from ZeroFOX with insights on Deep Fake technology.</p><p>Links to today's stories:</p><p><a href="https://www.fbi.gov/news/stories/operation-rewired-bec-takedown-091019"> https://www.fbi.gov/news/stories/operation-rewired-bec-takedown-091019</a></p><p><a href="https://dontduo.com/">https://dontduo.com/</a></p><p><a href="https://www.smashingsecurity.com/">https://www.smashingsecurity.com/</a></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a>. </p>]]>
      </content:encoded>
      <itunes:duration>1920</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[7c19422e4458454c870bcef52721c7e3]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW7415113000.mp3?updated=1633710142" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>An ethical hacker can be a teacher.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/65/notes</link>
      <description>A listener updates us on "notice of arrest" policies. Dave notes increased instances of Google Calendar spam. Joe shares a claim that AI voice mimicry was used to dupe a company out of nearly a quarter million dollars. (Dave is skeptical.) The catch of the day accuses the target of naughty behavior. Carole Theriault interviews ethical hacker Zoe Rose.
Links to stories:
https://www.popsci.com/google-calendar-spam-what-to-do/
 https://www.wsj.com/articles/fraudsters-use-ai-to-mimic-ceos-voice-in-unusual-cybercrime-case-11567157402
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 12 Sep 2019 05:00:00 -0000</pubDate>
      <itunes:title>An ethical hacker can be a teacher.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>65</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/8c4448e0-a50b-11ea-9279-6f8781383a91/image/Hacking-Humans-iTunes-art-1400x1400.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A listener updates us on "notice of arrest" policies. Dave notes increased instances of Google Calendar spam. Joe shares a claim that AI voice mimicry was used to dupe a company out of nearly a quarter million dollars. (Dave is skeptical.) The catch of the day accuses the target of naughty behavior. Carole Theriault interviews ethical hacker Zoe Rose.
Links to stories:
https://www.popsci.com/google-calendar-spam-what-to-do/
 https://www.wsj.com/articles/fraudsters-use-ai-to-mimic-ceos-voice-in-unusual-cybercrime-case-11567157402
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A listener updates us on "notice of arrest" policies. Dave notes increased instances of Google Calendar spam. Joe shares a claim that AI voice mimicry was used to dupe a company out of nearly a quarter million dollars. (Dave is skeptical.) The catch of the day accuses the target of naughty behavior. Carole Theriault interviews ethical hacker Zoe Rose.</p><p>Links to stories:</p><p><a href="https://www.popsci.com/google-calendar-spam-what-to-do/">https://www.popsci.com/google-calendar-spam-what-to-do/</a></p><p><a href="https://www.wsj.com/articles/fraudsters-use-ai-to-mimic-ceos-voice-in-unusual-cybercrime-case-11567157402"> https://www.wsj.com/articles/fraudsters-use-ai-to-mimic-ceos-voice-in-unusual-cybercrime-case-11567157402</a></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>2132</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[9399dfb7c6b64e578ae20a618fc31fd2]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW6432155809.mp3?updated=1633710049" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Think before you post.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/64/notes</link>
      <description>Follow-up from down under. Joe shares the story of a Mom scammed out of Gaelic Football League tickets. Dave describes a bounty hunter hoaxing suicide threats to get location information from mobile providers. The catch of the day requires a response from the grave. Our guest is Ben Yelin, senior law and policy analyst from the University of Maryland Center for Health and Homeland Security. He digs in to a particular Facebook scam that refuses to die.
Links to stories:
https://m.independent.ie/irish-news/news/im-just-broken-up-mother-devastated-as-shes-scammed-out-of-money-while-trying-to-buy-allireland-final-tickets-38446401.html
https://www.thedailybeast.com/feds-say-bounty-hunter-matthew-marre-used-suicide-hoax-to-con-verizon-t-mobile-out-of-customer-data
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 05 Sep 2019 05:00:00 -0000</pubDate>
      <itunes:title>Think before you post.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>64</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/8c5cb416-a50b-11ea-9279-cb3b2047db32/image/Hacking-Humans-iTunes-art-1400x1400.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Follow-up from down under. Joe shares the story of a Mom scammed out of Gaelic Football League tickets. Dave describes a bounty hunter hoaxing suicide threats to get location information from mobile providers. The catch of the day requires a response from the grave. Our guest is Ben Yelin, senior law and policy analyst from the University of Maryland Center for Health and Homeland Security. He digs in to a particular Facebook scam that refuses to die.
Links to stories:
https://m.independent.ie/irish-news/news/im-just-broken-up-mother-devastated-as-shes-scammed-out-of-money-while-trying-to-buy-allireland-final-tickets-38446401.html
https://www.thedailybeast.com/feds-say-bounty-hunter-matthew-marre-used-suicide-hoax-to-con-verizon-t-mobile-out-of-customer-data
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Follow-up from down under. Joe shares the story of a Mom scammed out of Gaelic Football League tickets. Dave describes a bounty hunter hoaxing suicide threats to get location information from mobile providers. The catch of the day requires a response from the grave. Our guest is Ben Yelin, senior law and policy analyst from the University of Maryland Center for Health and Homeland Security. He digs in to a particular Facebook scam that refuses to die.</p><p>Links to stories:</p><p>https://m.independent.ie/irish-news/news/im-just-broken-up-mother-devastated-as-shes-scammed-out-of-money-while-trying-to-buy-allireland-final-tickets-38446401.html</p><p>https://www.thedailybeast.com/feds-say-bounty-hunter-matthew-marre-used-suicide-hoax-to-con-verizon-t-mobile-out-of-customer-data</p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>1899</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b1ae880e795c414181fcab0519afba2a]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW2390783738.mp3?updated=1633709974" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Securing your SMS.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/63/notes</link>
      <description>Dave shares a story of digital voice assistants being channeled toward scammers. Joe tracks scammers taking advantage of social tools on the Steam gaming platform. The catch of the day involves South African kickbacks. Our guest is researcher/technologist Ray [REDACTED], who shares his expertise on scammers targeting SMS.
Links to stories:
 https://nakedsecurity.sophos.com/2019/08/20/scammers-use-bogus-search-results-to-fool-voice-assistants/
 https://www.bleepingcomputer.com/news/security/steam-accounts-being-stolen-through-elaborate-free-game-scam/
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 29 Aug 2019 05:00:00 -0000</pubDate>
      <itunes:title>Securing your SMS.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>63</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/8c7abe84-a50b-11ea-9279-d3d354fa0b14/image/Hacking-Humans-iTunes-art-1400x1400.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Dave shares a story of digital voice assistants being channeled toward scammers. Joe tracks scammers taking advantage of social tools on the Steam gaming platform. The catch of the day involves South African kickbacks. Our guest is researcher/technologist Ray [REDACTED], who shares his expertise on scammers targeting SMS.
Links to stories:
 https://nakedsecurity.sophos.com/2019/08/20/scammers-use-bogus-search-results-to-fool-voice-assistants/
 https://www.bleepingcomputer.com/news/security/steam-accounts-being-stolen-through-elaborate-free-game-scam/
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Dave shares a story of digital voice assistants being channeled toward scammers. Joe tracks scammers taking advantage of social tools on the Steam gaming platform. The catch of the day involves South African kickbacks. Our guest is researcher/technologist <a href="https://twitter.com/RayRedacted">Ray [REDACTED]</a>, who shares his expertise on scammers targeting SMS.</p><p>Links to stories:</p><p><a href="https://nakedsecurity.sophos.com/2019/08/20/scammers-use-bogus-search-results-to-fool-voice-assistants/"> https://nakedsecurity.sophos.com/2019/08/20/scammers-use-bogus-search-results-to-fool-voice-assistants/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/steam-accounts-being-stolen-through-elaborate-free-game-scam/"> https://www.bleepingcomputer.com/news/security/steam-accounts-being-stolen-through-elaborate-free-game-scam/</a></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>1903</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[a0e0e1c8d67a447a85c625c269d57c54]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW6003105520.mp3?updated=1633709912" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Backups backups backups.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/62/notes</link>
      <description>Joe describes a primitive (but effective) phishing scheme being tracked by Bleeping Computer. Dave shares news from a Black Hat presentation on phishing stats from Google. The catch of the day is a friendly invitation from Hawaii. Our guest is Michael Gillespie from Emsisoft describing the ID Ransomware project.
Links from today's stories:
https://www.bleepingcomputer.com/news/security/beware-of-emails-asking-you-to-confirm-your-unsubscribe-request/
https://www.fastcompany.com/90387855/we-keep-falling-for-phishing-emails-and-google-just-revealed-why
https://id-ransomware.malwarehunterteam.com/
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 22 Aug 2019 05:00:00 -0000</pubDate>
      <itunes:title>Backups backups backups.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>62</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/8c9630ba-a50b-11ea-9279-f334c341388f/image/Hacking-Humans-iTunes-art-1400x1400.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Joe describes a primitive (but effective) phishing scheme being tracked by Bleeping Computer. Dave shares news from a Black Hat presentation on phishing stats from Google. The catch of the day is a friendly invitation from Hawaii. Our guest is Michael Gillespie from Emsisoft describing the ID Ransomware project.
Links from today's stories:
https://www.bleepingcomputer.com/news/security/beware-of-emails-asking-you-to-confirm-your-unsubscribe-request/
https://www.fastcompany.com/90387855/we-keep-falling-for-phishing-emails-and-google-just-revealed-why
https://id-ransomware.malwarehunterteam.com/
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Joe describes a primitive (but effective) phishing scheme being tracked by Bleeping Computer. Dave shares news from a Black Hat presentation on phishing stats from Google. The catch of the day is a friendly invitation from Hawaii. Our guest is Michael Gillespie from Emsisoft describing the ID Ransomware project.</p><p>Links from today's stories:</p><p><a href="https://www.bleepingcomputer.com/news/security/beware-of-emails-asking-you-to-confirm-your-unsubscribe-request/">https://www.bleepingcomputer.com/news/security/beware-of-emails-asking-you-to-confirm-your-unsubscribe-request/</a></p><p><a href="https://www.fastcompany.com/90387855/we-keep-falling-for-phishing-emails-and-google-just-revealed-why">https://www.fastcompany.com/90387855/we-keep-falling-for-phishing-emails-and-google-just-revealed-why</a></p><p><a href="https://id-ransomware.malwarehunterteam.com/">https://id-ransomware.malwarehunterteam.com/</a></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>1805</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[862e56f2696446fbb29ace9c851cff73]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW6578270926.mp3?updated=1633709616" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Swamping search results for reputation management.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/61/notes</link>
      <description>Dave shares the story of a small community hospital dealing with a ransomware attack. Joe reviews the different types of extortion emails. The catch of the day is an inheritance scam from Canada. Carole Theriault interviews Craig Silverman from Buzzfeed about online reputation management companies.
Links to stories:
https://www.azcentral.com/story/news/local/arizona/2019/07/30/how-4-technicians-saved-arizona-hospital-hacker-ransomware-wickenburg-community-hospital/1842572001/
https://www.bleepingcomputer.com/news/security/extortion-emails-on-the-rise-a-look-at-the-different-types/
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 15 Aug 2019 05:00:00 -0000</pubDate>
      <itunes:title>Swamping search results for reputation management.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>61</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/8cae9b6e-a50b-11ea-9279-a325cb1ccc64/image/Hacking-Humans-iTunes-art-1400x1400.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Dave shares the story of a small community hospital dealing with a ransomware attack. Joe reviews the different types of extortion emails. The catch of the day is an inheritance scam from Canada. Carole Theriault interviews Craig Silverman from Buzzfeed about online reputation management companies.
Links to stories:
https://www.azcentral.com/story/news/local/arizona/2019/07/30/how-4-technicians-saved-arizona-hospital-hacker-ransomware-wickenburg-community-hospital/1842572001/
https://www.bleepingcomputer.com/news/security/extortion-emails-on-the-rise-a-look-at-the-different-types/
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Dave shares the story of a small community hospital dealing with a ransomware attack. Joe reviews the different types of extortion emails. The catch of the day is an inheritance scam from Canada. Carole Theriault interviews Craig Silverman from Buzzfeed about online reputation management companies.</p><p>Links to stories:</p><p><a href="https://www.azcentral.com/story/news/local/arizona/2019/07/30/how-4-technicians-saved-arizona-hospital-hacker-ransomware-wickenburg-community-hospital/1842572001/">https://www.azcentral.com/story/news/local/arizona/2019/07/30/how-4-technicians-saved-arizona-hospital-hacker-ransomware-wickenburg-community-hospital/1842572001/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/extortion-emails-on-the-rise-a-look-at-the-different-types/">https://www.bleepingcomputer.com/news/security/extortion-emails-on-the-rise-a-look-at-the-different-types/</a></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>2218</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[7f45ca84dc504cf6bf97a7fffd30a7d0]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW4604706028.mp3?updated=1633709317" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Positive pretexting on the rise.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/60/notes</link>
      <description>Joe shares a cautionary Facebook tale from his own life. Dave has the story of an Australian IT company put out of business by scammers. The catch of the day tracks the response writer and comedian Dave Holmes had to scammers pretending to be from the IRS. Rachel Tobac from Social Proof Security returns with voting security information and the latest scams she's been tracking.
Links to today's stories:
https://www.crn.com.au/news/it-suppliers-forced-to-close-after-procurement-scam-528609
https://cheezburger.com/719877/troll-comedian-gets-a-scam-call-and-decides-to-play-along
https://www.vampirecaveman.com/
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 08 Aug 2019 05:00:00 -0000</pubDate>
      <itunes:title>Positive pretexting on the rise.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>60</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/8cc6c644-a50b-11ea-9279-7bd93b044b9d/image/Hacking-Humans-iTunes-art-1400x1400.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Joe shares a cautionary Facebook tale from his own life. Dave has the story of an Australian IT company put out of business by scammers. The catch of the day tracks the response writer and comedian Dave Holmes had to scammers pretending to be from the IRS. Rachel Tobac from Social Proof Security returns with voting security information and the latest scams she's been tracking.
Links to today's stories:
https://www.crn.com.au/news/it-suppliers-forced-to-close-after-procurement-scam-528609
https://cheezburger.com/719877/troll-comedian-gets-a-scam-call-and-decides-to-play-along
https://www.vampirecaveman.com/
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Joe shares a cautionary Facebook tale from his own life. Dave has the story of an Australian IT company put out of business by scammers. The catch of the day tracks the response writer and comedian Dave Holmes had to scammers pretending to be from the IRS. Rachel Tobac from <a href="https://www.socialproofsecurity.com/">Social Proof Security</a> returns with voting security information and the latest scams she's been tracking.</p><p>Links to today's stories:</p><p><a href="https://www.crn.com.au/news/it-suppliers-forced-to-close-after-procurement-scam-528609">https://www.crn.com.au/news/it-suppliers-forced-to-close-after-procurement-scam-528609</a></p><p><a href="https://cheezburger.com/719877/troll-comedian-gets-a-scam-call-and-decides-to-play-along">https://cheezburger.com/719877/troll-comedian-gets-a-scam-call-and-decides-to-play-along</a></p><p><a href="https://www.vampirecaveman.com/">https://www.vampirecaveman.com/</a></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>1918</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[371ffd07cfba494198442e89416f5c7c]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW1113923844.mp3?updated=1633709190" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Images are the language of the brain.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/59/notes</link>
      <description>Dave outlines a church donation scam. Joe shares reporting from Ars Technica on romance scams coming out of Africa. The catch of the day is courtesy of London comedian James Veitch Our guest is Garry Berman from Cyberman Security who's developed a cyber security comic book series to help raise awareness.
Links to this week's stories:
 https://www.churchlawandtax.com/blog/2018/june/what-to-know-about-new-donation-scam.html
 https://arstechnica.com/information-technology/2019/07/im-not-100-with-anybody-ars-dissects-a-nigerian-twitter-catfish-scam/
 https://www.boredpanda.com/funny-phishing-scam-emails-dot-con-james-veitch/
https://www.cyberheroescomics.com/
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 01 Aug 2019 05:00:00 -0000</pubDate>
      <itunes:title>Images are the language of the brain.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>59</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/8cda1794-a50b-11ea-9279-6b6b5edbbafc/image/Hacking-Humans-iTunes-art-1400x1400.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Dave outlines a church donation scam. Joe shares reporting from Ars Technica on romance scams coming out of Africa. The catch of the day is courtesy of London comedian James Veitch Our guest is Garry Berman from Cyberman Security who's developed a cyber security comic book series to help raise awareness.
Links to this week's stories:
 https://www.churchlawandtax.com/blog/2018/june/what-to-know-about-new-donation-scam.html
 https://arstechnica.com/information-technology/2019/07/im-not-100-with-anybody-ars-dissects-a-nigerian-twitter-catfish-scam/
 https://www.boredpanda.com/funny-phishing-scam-emails-dot-con-james-veitch/
https://www.cyberheroescomics.com/
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Dave outlines a church donation scam. Joe shares reporting from Ars Technica on romance scams coming out of Africa. The catch of the day is courtesy of London comedian <a href="https://en.wikipedia.org/wiki/James_Veitch_(comedian)">James Veitch</a> Our guest is Garry Berman from Cyberman Security who's developed a <a href="https://www.cyberheroescomics.com/">cyber security comic</a> book series to help raise awareness.</p><p>Links to this week's stories:</p><p><a href="https://www.churchlawandtax.com/blog/2018/june/what-to-know-about-new-donation-scam.html"> https://www.churchlawandtax.com/blog/2018/june/what-to-know-about-new-donation-scam.html</a></p><p><a href="https://arstechnica.com/information-technology/2019/07/im-not-100-with-anybody-ars-dissects-a-nigerian-twitter-catfish-scam/"> https://arstechnica.com/information-technology/2019/07/im-not-100-with-anybody-ars-dissects-a-nigerian-twitter-catfish-scam/</a></p><p><a href="https://www.boredpanda.com/funny-phishing-scam-emails-dot-con-james-veitch/"> https://www.boredpanda.com/funny-phishing-scam-emails-dot-con-james-veitch/</a></p><p><a href="https://www.cyberheroescomics.com/">https://www.cyberheroescomics.com/</a></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>1899</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[d768227c9ba6432791ee8c44d5ca8331]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW3576183998.mp3?updated=1633708370" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Looking after Dad.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/58/notes</link>
      <description>Joe shares a story on the market economy of phishing. Dave explains how gamers are being taken advantage of on popular chat app Discord. The catch of the day included a little bit of showbiz razzle-dazzle. Our anonymous guest this week shares his efforts to keep his father from falling for online scams.
Links to stories:
 https://blogs.akamai.com/sitr/2019/06/phishing-factories-and-economies.html
https://twitter.com/Splatter_Shah/status/1143556723266994176
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 25 Jul 2019 05:00:00 -0000</pubDate>
      <itunes:title>Looking after Dad.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>58</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/8ced5566-a50b-11ea-9279-7fe398a2d530/image/Hacking-Humans-iTunes-art-1400x1400.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Joe shares a story on the market economy of phishing. Dave explains how gamers are being taken advantage of on popular chat app Discord. The catch of the day included a little bit of showbiz razzle-dazzle. Our anonymous guest this week shares his efforts to keep his father from falling for online scams.
Links to stories:
 https://blogs.akamai.com/sitr/2019/06/phishing-factories-and-economies.html
https://twitter.com/Splatter_Shah/status/1143556723266994176
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Joe shares a story on the market economy of phishing. Dave explains how gamers are being taken advantage of on popular chat app Discord. The catch of the day included a little bit of showbiz razzle-dazzle. Our anonymous guest this week shares his efforts to keep his father from falling for online scams.</p><p>Links to stories:</p><p><a href="https://blogs.akamai.com/sitr/2019/06/phishing-factories-and-economies.html"> https://blogs.akamai.com/sitr/2019/06/phishing-factories-and-economies.html</a></p><p><a href="https://twitter.com/Splatter_Shah/status/1143556723266994176">https://twitter.com/Splatter_Shah/status/1143556723266994176</a></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>1933</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[71fd4a6b0aba4b62aea3db7460c41cfb]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW9434108944.mp3?updated=1633708295" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The skills gap disconnect.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/57/notes</link>
      <description>Dave shares a listener story of scammers calling drug stores to try to gather customer rewards points. Joe describes federal contractors being scammed out of over $10 million of hardware, some of it classified communications equipment. The catch of the day starts with a bank email scam and ends with a Rick roll. Carole Theriault speaks with Michael Madon, head of security at Mimecast about the cyber security skills gap.
Links to stories - 
https://qz.com/1661537/us-defense-contractor-falls-for-3-million-email-scam/
https://www.newshub.co.nz/home/entertainment/2018/01/man-sets-up-rick-astley-hotline-to-rescue-people-from-annoying-salespeople.html
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter. </description>
      <pubDate>Thu, 18 Jul 2019 05:00:00 -0000</pubDate>
      <itunes:title>The skills gap disconnect.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>57</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/8d0dec4a-a50b-11ea-9279-d71e5545e0d1/image/Hacking-Humans-iTunes-art-1400x1400.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Dave shares a listener story of scammers calling drug stores to try to gather customer rewards points. Joe describes federal contractors being scammed out of over $10 million of hardware, some of it classified communications equipment. The catch of the day starts with a bank email scam and ends with a Rick roll. Carole Theriault speaks with Michael Madon, head of security at Mimecast about the cyber security skills gap.
Links to stories - 
https://qz.com/1661537/us-defense-contractor-falls-for-3-million-email-scam/
https://www.newshub.co.nz/home/entertainment/2018/01/man-sets-up-rick-astley-hotline-to-rescue-people-from-annoying-salespeople.html
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter. </itunes:summary>
      <content:encoded>
        <![CDATA[<p>Dave shares a listener story of scammers calling drug stores to try to gather customer rewards points. Joe describes federal contractors being scammed out of over $10 million of hardware, some of it classified communications equipment. The catch of the day starts with a bank email scam and ends with a Rick roll. Carole Theriault speaks with Michael Madon, head of security at Mimecast about the cyber security skills gap.</p><p>Links to stories - </p><p><a href="https://qz.com/1661537/us-defense-contractor-falls-for-3-million-email-scam/">https://qz.com/1661537/us-defense-contractor-falls-for-3-million-email-scam/</a></p><p><a href="https://www.newshub.co.nz/home/entertainment/2018/01/man-sets-up-rick-astley-hotline-to-rescue-people-from-annoying-salespeople.html">https://www.newshub.co.nz/home/entertainment/2018/01/man-sets-up-rick-astley-hotline-to-rescue-people-from-annoying-salespeople.html</a></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a>. </p>]]>
      </content:encoded>
      <itunes:duration>2117</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[03a770def6c14d6086d64a776041d553]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW6580869632.mp3?updated=1633708212" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Know and spot the patterns.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/56/notes</link>
      <description>Joe shares the heartbreaking tale of a catphishing case that leads to murder. Dave describes a shoe company using an unusual method to trick engagement with an online ad. The catch of the day engages a Nigerian scammer promising a fortune in precious minerals. Dave interview Michael Coates, head of Altitude Networks and former CISO at Twitter. 
Links to this week's stories - 
 https://www.nbcnews.com/news/us-news/after-alaska-teen-s-murder-cybersecurity-experts-warn-catfishing-predators-n1019536
 https://medium.com/shanghaiist/chinese-shoe-company-tricks-people-into-swiping-instagram-ad-with-fake-strand-of-hair-54d8a2d8ec1d
https://www.419eater.com/html/user_subs/godfather/godfather.htm
https://altitudenetworks.com/
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 11 Jul 2019 05:00:00 -0000</pubDate>
      <itunes:title>Know and spot the patterns.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>56</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/8d2685b6-a50b-11ea-9279-d71620472e9c/image/Hacking-Humans-iTunes-art-1400x1400.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Joe shares the heartbreaking tale of a catphishing case that leads to murder. Dave describes a shoe company using an unusual method to trick engagement with an online ad. The catch of the day engages a Nigerian scammer promising a fortune in precious minerals. Dave interview Michael Coates, head of Altitude Networks and former CISO at Twitter. 
Links to this week's stories - 
 https://www.nbcnews.com/news/us-news/after-alaska-teen-s-murder-cybersecurity-experts-warn-catfishing-predators-n1019536
 https://medium.com/shanghaiist/chinese-shoe-company-tricks-people-into-swiping-instagram-ad-with-fake-strand-of-hair-54d8a2d8ec1d
https://www.419eater.com/html/user_subs/godfather/godfather.htm
https://altitudenetworks.com/
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Joe shares the heartbreaking tale of a catphishing case that leads to murder. Dave describes a shoe company using an unusual method to trick engagement with an online ad. The catch of the day engages a Nigerian scammer promising a fortune in precious minerals. Dave interview Michael Coates, head of Altitude Networks and former CISO at Twitter. </p><p>Links to this week's stories - </p><p><a href="https://www.nbcnews.com/news/us-news/after-alaska-teen-s-murder-cybersecurity-experts-warn-catfishing-predators-n1019536"> https://www.nbcnews.com/news/us-news/after-alaska-teen-s-murder-cybersecurity-experts-warn-catfishing-predators-n1019536</a></p><p><a href="https://medium.com/shanghaiist/chinese-shoe-company-tricks-people-into-swiping-instagram-ad-with-fake-strand-of-hair-54d8a2d8ec1d"> https://medium.com/shanghaiist/chinese-shoe-company-tricks-people-into-swiping-instagram-ad-with-fake-strand-of-hair-54d8a2d8ec1d</a></p><p><a href="https://www.419eater.com/html/user_subs/godfather/godfather.htm">https://www.419eater.com/html/user_subs/godfather/godfather.htm</a></p><p><a href="https://altitudenetworks.com/">https://altitudenetworks.com/</a></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>2075</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b817e58585114811bd843b1988f85989]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW5596278854.mp3?updated=1633708131" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Encore — Separating fools from money.</title>
      <link>https://traffic.libsyn.com/secure/hackinghumans/Encore__Separating_fools_from_their_money.mp3</link>
      <description>We're taking a break for the Independence Day holiday in the US, so enjoy this episode from the early days of our show.
 Dave shares a story of airport penetration testing with high degree of yuck-factor. Joe explores research on protecting passwords from social engineering. The catch-of-the-day comes courtesy of Graham Cluley's email spam box. Dave interviews Wired's Security Staff Writer Lily Hay Newman on her  article tracking Nigerian email scammers. 
 Thanks to our show sponsor KnowBe4.</description>
      <pubDate>Thu, 04 Jul 2019 05:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/8d4a3272-a50b-11ea-9279-b3efaf1c3f6e/image/Hacking-Humans-iTunes-art-1400x1400.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Separating fools from money.</itunes:subtitle>
      <itunes:summary>We're taking a break for the Independence Day holiday in the US, so enjoy this episode from the early days of our show.
 Dave shares a story of airport penetration testing with high degree of yuck-factor. Joe explores research on protecting passwords from social engineering. The catch-of-the-day comes courtesy of Graham Cluley's email spam box. Dave interviews Wired's Security Staff Writer Lily Hay Newman on her  article tracking Nigerian email scammers. 
 Thanks to our show sponsor KnowBe4.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>We're taking a break for the Independence Day holiday in the US, so enjoy this episode from the early days of our show.</p> <p>Dave shares a story of airport penetration testing with high degree of yuck-factor. Joe explores research on protecting passwords from social engineering. The catch-of-the-day comes courtesy of Graham Cluley's email spam box. Dave interviews Wired's Security Staff Writer Lily Hay Newman on her <a href="https://www.wired.com/story/nigerian-email-scammers-more-effective-than-ever/"> article tracking Nigerian email scammers. </a></p> <p>Thanks to our show sponsor <a href="https://www.knowbe4.com/">KnowBe4.</a></p>]]>
      </content:encoded>
      <itunes:duration>1831</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[3caab7754c144508b3ddcb8ab380ddc8]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW7388098736.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Be wary of all emails.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/55/notes</link>
      <description>Dave shares the story of one Katie Jones, the fake online persona used to gain the confidence of high-status individuals. Joe describes the tragic case of Christine Lu, a Harvard Medical professor who was scammed out of her life savings. The Catch of the Day warns recipients not to trust the FBI. Carole Theriault interviews Akamai's Larry Cashdollar about scammers using Google Translate to obfuscate web sites.

Links to this week's stories:
https://www.apnews.com/bc2f19097a4c4fffaa00de6770b8a60d
https://thispersondoesnotexist.com/
 https://www.nbcboston.com/on-air/as-seen-on/Woman-Scammed-Into-Giving-Away-Life-Savings_NECN-511108952.html
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 27 Jun 2019 05:00:00 -0000</pubDate>
      <itunes:title>Be wary of all emails.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>55</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/8d6361d4-a50b-11ea-9279-77ad98561604/image/Hacking-Humans-iTunes-art-1400x1400.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Dave shares the story of one Katie Jones, the fake online persona used to gain the confidence of high-status individuals. Joe describes the tragic case of Christine Lu, a Harvard Medical professor who was scammed out of her life savings. The Catch of the Day warns recipients not to trust the FBI. Carole Theriault interviews Akamai's Larry Cashdollar about scammers using Google Translate to obfuscate web sites.

Links to this week's stories:
https://www.apnews.com/bc2f19097a4c4fffaa00de6770b8a60d
https://thispersondoesnotexist.com/
 https://www.nbcboston.com/on-air/as-seen-on/Woman-Scammed-Into-Giving-Away-Life-Savings_NECN-511108952.html
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Dave shares the story of one Katie Jones, the fake online persona used to gain the confidence of high-status individuals. Joe describes the tragic case of Christine Lu, a Harvard Medical professor who was scammed out of her life savings. The Catch of the Day warns recipients not to trust the FBI. Carole Theriault interviews Akamai's Larry Cashdollar about scammers using Google Translate to obfuscate web sites.</p><p><br></p><p>Links to this week's stories:</p><p><a href="https://www.apnews.com/bc2f19097a4c4fffaa00de6770b8a60d">https://www.apnews.com/bc2f19097a4c4fffaa00de6770b8a60d</a></p><p><a href="https://thispersondoesnotexist.com/">https://thispersondoesnotexist.com/</a></p><p><a href="https://www.nbcboston.com/on-air/as-seen-on/Woman-Scammed-Into-Giving-Away-Life-Savings_NECN-511108952.html"> https://www.nbcboston.com/on-air/as-seen-on/Woman-Scammed-Into-Giving-Away-Life-Savings_NECN-511108952.html</a></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>2184</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b483cb9aae5f4a8db4e467f7e2278dba]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW6609932369.mp3?updated=1633707807" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The knowledge / intention behavior gap.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/54/notes</link>
      <description>Joe shares the story of an elaborate check fraud scam involving HR impersonators. Dave reads an email from a listener who got phished by his own company, and has questions about authorization app vs. hardware keys. Our catch of the day involves an orphan looking to share her inheritance. Dave interviews author Perry Carpenter, who's new book is Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us about Driving Secure Behaviors.
Links to stories:
https://twitter.com/sigalow/status/1138918411394781185?s=12
https://www.yubico.com/2019/01/yubico-launches-the-security-key-nfc-and-a-private-preview-of-the-yubikey-for-lightning-at-ces-2019/
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 20 Jun 2019 05:00:00 -0000</pubDate>
      <itunes:title>The knowledge / intention behavior gap.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>54</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/8d75ed22-a50b-11ea-9279-7b0cc802c3ff/image/Hacking-Humans-iTunes-art-1400x1400.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Joe shares the story of an elaborate check fraud scam involving HR impersonators. Dave reads an email from a listener who got phished by his own company, and has questions about authorization app vs. hardware keys. Our catch of the day involves an orphan looking to share her inheritance. Dave interviews author Perry Carpenter, who's new book is Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us about Driving Secure Behaviors.
Links to stories:
https://twitter.com/sigalow/status/1138918411394781185?s=12
https://www.yubico.com/2019/01/yubico-launches-the-security-key-nfc-and-a-private-preview-of-the-yubikey-for-lightning-at-ces-2019/
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Joe shares the story of an elaborate check fraud scam involving HR impersonators. Dave reads an email from a listener who got phished by his own company, and has questions about authorization app vs. hardware keys. Our catch of the day involves an orphan looking to share her inheritance. Dave interviews author Perry Carpenter, who's new book is Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us about Driving Secure Behaviors.</p><p>Links to stories:</p><p><a href="https://twitter.com/sigalow/status/1138918411394781185?s=12">https://twitter.com/sigalow/status/1138918411394781185?s=12</a></p><p><a href="https://www.yubico.com/2019/01/yubico-launches-the-security-key-nfc-and-a-private-preview-of-the-yubikey-for-lightning-at-ces-2019/">https://www.yubico.com/2019/01/yubico-launches-the-security-key-nfc-and-a-private-preview-of-the-yubikey-for-lightning-at-ces-2019/</a></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>1923</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[e890aa0186a34e12850f8ca2f5997b91]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW8023267872.mp3?updated=1633707710" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Just because I trusted you yesterday doesn't mean I trust you today.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/53/notes</link>
      <description>Dave describes researchers spotting scammers on dating sites using AI. Joe shares a phishing scheme that asks users to manage undelivered mail. The catch of the day involves cute puppies and Mogwai meat. Dave interview Avi Solomon, director of information technology for Rumberger, Kirk and Caldwell, an Orlando, Florida litigation firm.
Links to today's stories:
https://www.bbc.com/news/technology-48472811
https://arxiv.org/pdf/1905.12593.pdf
 https://www.bleepingcomputer.com/news/security/new-phishing-scam-asks-you-to-manage-your-undelivered-email/
https://www.419eater.com/html/tommy_mark.htm
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 13 Jun 2019 05:00:00 -0000</pubDate>
      <itunes:title>Just because I trusted you yesterday doesn't mean I trust you today.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>53</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/8dba19c0-a50b-11ea-9279-f31b3d893cea/image/Hacking-Humans-iTunes-art-1400x1400.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Dave describes researchers spotting scammers on dating sites using AI. Joe shares a phishing scheme that asks users to manage undelivered mail. The catch of the day involves cute puppies and Mogwai meat. Dave interview Avi Solomon, director of information technology for Rumberger, Kirk and Caldwell, an Orlando, Florida litigation firm.
Links to today's stories:
https://www.bbc.com/news/technology-48472811
https://arxiv.org/pdf/1905.12593.pdf
 https://www.bleepingcomputer.com/news/security/new-phishing-scam-asks-you-to-manage-your-undelivered-email/
https://www.419eater.com/html/tommy_mark.htm
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Dave describes researchers spotting scammers on dating sites using AI. Joe shares a phishing scheme that asks users to manage undelivered mail. The catch of the day involves cute puppies and Mogwai meat. Dave interview Avi Solomon, director of information technology for Rumberger, Kirk and Caldwell, an Orlando, Florida litigation firm.</p><p>Links to today's stories:</p><p><a href="https://www.bbc.com/news/technology-48472811">https://www.bbc.com/news/technology-48472811</a></p><p><a href="https://arxiv.org/pdf/1905.12593.pdf">https://arxiv.org/pdf/1905.12593.pdf</a></p><p><a href="https://www.bleepingcomputer.com/news/security/new-phishing-scam-asks-you-to-manage-your-undelivered-email/"> https://www.bleepingcomputer.com/news/security/new-phishing-scam-asks-you-to-manage-your-undelivered-email/</a></p><p><a href="https://www.419eater.com/html/tommy_mark.htm">https://www.419eater.com/html/tommy_mark.htm</a></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>1921</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[ff774695644e4a36ac6b1ea8168129fc]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW8734924855.mp3?updated=1633707644" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The best way to break in is to walk through the front door.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/52/notes</link>
      <description>Joe describes one of history's great con artists, Victor Lustig, who sold the Eiffel Tower. Twice. Dave shares a story from a listener involving a UPS tracking number scam. The catch of the day involves am attempted romance scam on the XBOX platform. Dave interviews Sherri Davidoff, CEO of LMG Security and is the hacker named "Alien" in Jeremy Smith's book, "Breaking and Entering." She has her own book coming out this summer,  "Data Breaches: Crisis and Opportunity."
 
Links to this week's stories:
http://mentalfloss.com/article/12809/smooth-operator-how-victor-lustig-sold-eiffel-tower
https://community.ebay.com/t5/Archive-Shipping-Returns/Seller-Scam-UPS-Tracking-Shows-Delivered/td-p/26206551
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 06 Jun 2019 05:00:00 -0000</pubDate>
      <itunes:title>The best way to break in is to walk through the front door.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>52</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/8dd68312-a50b-11ea-9279-f7b553dfe590/image/Hacking-Humans-iTunes-art-1400x1400.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Joe describes one of history's great con artists, Victor Lustig, who sold the Eiffel Tower. Twice. Dave shares a story from a listener involving a UPS tracking number scam. The catch of the day involves am attempted romance scam on the XBOX platform. Dave interviews Sherri Davidoff, CEO of LMG Security and is the hacker named "Alien" in Jeremy Smith's book, "Breaking and Entering." She has her own book coming out this summer,  "Data Breaches: Crisis and Opportunity."
 
Links to this week's stories:
http://mentalfloss.com/article/12809/smooth-operator-how-victor-lustig-sold-eiffel-tower
https://community.ebay.com/t5/Archive-Shipping-Returns/Seller-Scam-UPS-Tracking-Shows-Delivered/td-p/26206551
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Joe describes one of history's great con artists, Victor Lustig, who sold the Eiffel Tower. Twice. Dave shares a story from a listener involving a UPS tracking number scam. The catch of the day involves am attempted romance scam on the XBOX platform. Dave interviews Sherri Davidoff, CEO of LMG Security and is the hacker named "Alien" in Jeremy Smith's book, "Breaking and Entering." She has her own book coming out this summer, <a href="https://www.amazon.com/dp/0134506782/ref=cm_sw_em_r_mt_dp_U_hEN9CbYBY59FR"> "Data Breaches: Crisis and Opportunity."</a></p><p> </p><p>Links to this week's stories:</p><p><a href="http://mentalfloss.com/article/12809/smooth-operator-how-victor-lustig-sold-eiffel-tower">http://mentalfloss.com/article/12809/smooth-operator-how-victor-lustig-sold-eiffel-tower</a></p><p><a href="https://community.ebay.com/t5/Archive-Shipping-Returns/Seller-Scam-UPS-Tracking-Shows-Delivered/td-p/26206551">https://community.ebay.com/t5/Archive-Shipping-Returns/Seller-Scam-UPS-Tracking-Shows-Delivered/td-p/26206551</a></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>1928</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c5af20f4e404445d929fdd55a786bb7c]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW3541785934.mp3?updated=1633707559" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Be willing to admit you don't know everything.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/51/notes</link>
      <description>Dave reviews Google's recent security report on basic account hygiene. Joe describes passive social engineering, including USB charging stations at airports. The catch of the day exposes a trunk box scam involving ill-gotten war profits. Carole Theriault speaks with the head of a group that call themselves Scam Survivors.
Links to stories:
https://security.googleblog.com/2019/05/new-research-how-effective-is-basic.html
https://www.forbes.com/sites/suzannerowankelleher/2019/05/21/why-you-should-never-use-airport-usb-charging-stations/#4116498a5955
https://scamsurvivors.com/
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 30 May 2019 05:00:00 -0000</pubDate>
      <itunes:title>Be willing to admit you don't know everything.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>51</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/8e0633a0-a50b-11ea-9279-238d73e26480/image/Hacking-Humans-iTunes-art-1400x1400.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Dave reviews Google's recent security report on basic account hygiene. Joe describes passive social engineering, including USB charging stations at airports. The catch of the day exposes a trunk box scam involving ill-gotten war profits. Carole Theriault speaks with the head of a group that call themselves Scam Survivors.
Links to stories:
https://security.googleblog.com/2019/05/new-research-how-effective-is-basic.html
https://www.forbes.com/sites/suzannerowankelleher/2019/05/21/why-you-should-never-use-airport-usb-charging-stations/#4116498a5955
https://scamsurvivors.com/
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Dave reviews Google's recent security report on basic account hygiene. Joe describes passive social engineering, including USB charging stations at airports. The catch of the day exposes a trunk box scam involving ill-gotten war profits. Carole Theriault speaks with the head of a group that call themselves Scam Survivors.</p><p>Links to stories:</p><p><a href="https://security.googleblog.com/2019/05/new-research-how-effective-is-basic.html">https://security.googleblog.com/2019/05/new-research-how-effective-is-basic.html</a></p><p><a href="https://www.forbes.com/sites/suzannerowankelleher/2019/05/21/why-you-should-never-use-airport-usb-charging-stations/#4116498a5955">https://www.forbes.com/sites/suzannerowankelleher/2019/05/21/why-you-should-never-use-airport-usb-charging-stations/#4116498a5955</a></p><p><a href="https://scamsurvivors.com/">https://scamsurvivors.com/</a></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>2094</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[ee88418c274f48bf8b0519b85156c211]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW9660758692.mp3?updated=1633715453" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>People aren't perfectly rational.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/50/notes</link>
      <description>A listener writes in with the results of his phishing attempt on his wife. Joe describes research from F-Secure on the most dangerous email attachment types. Dave shares the story of scammers impersonating local hospitals to scare a response from their victims. Our catch of the day involves a LinkedIn scam impersonating a fighter pilot.
Joe interviews Elissa Redmiles, an incoming assistant professor of computer science at Princeton University. She studies behavioral modeling to understand why people behave the way they do online.
Links to stories from today's show:
 https://labsblog.f-secure.com/2019/05/08/spam-trends-top-attachments-and-campaigns/
 https://www.nbc15.com/content/news/Text-message-scam-impersonates-local-hospitals-509615981.html
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 23 May 2019 05:00:00 -0000</pubDate>
      <itunes:title>People aren't perfectly rational.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>50</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/8e219dfc-a50b-11ea-9279-b77e7b77a1b7/image/Hacking-Humans-iTunes-art-1400x1400.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A listener writes in with the results of his phishing attempt on his wife. Joe describes research from F-Secure on the most dangerous email attachment types. Dave shares the story of scammers impersonating local hospitals to scare a response from their victims. Our catch of the day involves a LinkedIn scam impersonating a fighter pilot.
Joe interviews Elissa Redmiles, an incoming assistant professor of computer science at Princeton University. She studies behavioral modeling to understand why people behave the way they do online.
Links to stories from today's show:
 https://labsblog.f-secure.com/2019/05/08/spam-trends-top-attachments-and-campaigns/
 https://www.nbc15.com/content/news/Text-message-scam-impersonates-local-hospitals-509615981.html
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A listener writes in with the results of his phishing attempt on his wife. Joe describes research from F-Secure on the most dangerous email attachment types. Dave shares the story of scammers impersonating local hospitals to scare a response from their victims. Our catch of the day involves a LinkedIn scam impersonating a fighter pilot.</p><p>Joe interviews Elissa Redmiles, an incoming assistant professor of computer science at Princeton University. She studies behavioral modeling to understand why people behave the way they do online.</p><p>Links to stories from today's show:</p><p><a href="https://labsblog.f-secure.com/2019/05/08/spam-trends-top-attachments-and-campaigns/"> https://labsblog.f-secure.com/2019/05/08/spam-trends-top-attachments-and-campaigns/</a></p><p><a href="https://www.nbc15.com/content/news/Text-message-scam-impersonates-local-hospitals-509615981.html"> https://www.nbc15.com/content/news/Text-message-scam-impersonates-local-hospitals-509615981.html</a></p><p>Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on<a href="https://twitter.com/HackingHumansCW"> Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>1827</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[5a5d0bea260f40f3b77a66f5fafea24d]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW4781228444.mp3?updated=1633715387" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Live at KB4CON 2019.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/49/notes</link>
      <description>It's a special edition of the Hacking Humans show recorded live at the KB4CON conference in Orlando, FL. Join Joe, Dave and their special guests Stu Sjouwerman, KnowBe4's CEO, and Kevin Mitnick, world-famous hacker and KnowBe4's chief hacking officer, as they discuss malicious scams making the rounds and how to protect yourself and your organization against them. 
Dave describes a late-night phone call scam, Joe explains a Social Security scheme, Stu shares deadly catch of the day, and Kevin shares stories from his own hacking experience, and takes questions from the audience.
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 16 May 2019 05:00:00 -0000</pubDate>
      <itunes:title>Live at KB4CON 2019.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>49</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/8e3807e0-a50b-11ea-9279-bfa5b34a51cd/image/Hacking-Humans-iTunes-art-1400x1400.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>It's a special edition of the Hacking Humans show recorded live at the KB4CON conference in Orlando, FL. Join Joe, Dave and their special guests Stu Sjouwerman, KnowBe4's CEO, and Kevin Mitnick, world-famous hacker and KnowBe4's chief hacking officer, as they discuss malicious scams making the rounds and how to protect yourself and your organization against them. 
Dave describes a late-night phone call scam, Joe explains a Social Security scheme, Stu shares deadly catch of the day, and Kevin shares stories from his own hacking experience, and takes questions from the audience.
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>It's a special edition of the Hacking Humans show recorded live at the KB4CON conference in Orlando, FL. Join Joe, Dave and their special guests Stu Sjouwerman, KnowBe4's CEO, and Kevin Mitnick, world-famous hacker and KnowBe4's chief hacking officer, as they discuss malicious scams making the rounds and how to protect yourself and your organization against them. </p><p>Dave describes a late-night phone call scam, Joe explains a Social Security scheme, Stu shares deadly catch of the day, and Kevin shares stories from his own hacking experience, and takes questions from the audience.</p><p>Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on<a href="https://twitter.com/HackingHumansCW"> Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>2771</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c57d8335e77445f5b7220a7080890df9]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW1619209115.mp3?updated=1633715316" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>A data-driven approach to trust.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/48/notes</link>
      <description>Joe describes a church scammed out of millions of dollars. Dave shares good news about a group of scammers being apprehended and arrested. The catch of the day involves a Vietnamese investment offer that's almost too good to pass up on. Dave speaks with Dr. Richard Ford from Forcepoint about the models of trust.
Links to stories in today's show:
 https://www.grahamcluley.com/hackers-steal-1-75-million-from-catholic-church-in-ohio/
 https://www.justice.gov/usao-sdny/pr/nine-defendants-arrested-new-york-florida-and-texas-multimillion-dollar-wire-fraud
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 09 May 2019 05:00:00 -0000</pubDate>
      <itunes:title>A data-driven approach to trust.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>48</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/8e482f80-a50b-11ea-9279-b322fda14c3f/image/Hacking-Humans-iTunes-art-1400x1400.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Joe describes a church scammed out of millions of dollars. Dave shares good news about a group of scammers being apprehended and arrested. The catch of the day involves a Vietnamese investment offer that's almost too good to pass up on. Dave speaks with Dr. Richard Ford from Forcepoint about the models of trust.
Links to stories in today's show:
 https://www.grahamcluley.com/hackers-steal-1-75-million-from-catholic-church-in-ohio/
 https://www.justice.gov/usao-sdny/pr/nine-defendants-arrested-new-york-florida-and-texas-multimillion-dollar-wire-fraud
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Joe describes a church scammed out of millions of dollars. Dave shares good news about a group of scammers being apprehended and arrested. The catch of the day involves a Vietnamese investment offer that's almost too good to pass up on. Dave speaks with Dr. Richard Ford from Forcepoint about the models of trust.</p><p>Links to stories in today's show:</p><p><a href="https://www.grahamcluley.com/hackers-steal-1-75-million-from-catholic-church-in-ohio/"> https://www.grahamcluley.com/hackers-steal-1-75-million-from-catholic-church-in-ohio/</a></p><p><a href="https://www.justice.gov/usao-sdny/pr/nine-defendants-arrested-new-york-florida-and-texas-multimillion-dollar-wire-fraud"> https://www.justice.gov/usao-sdny/pr/nine-defendants-arrested-new-york-florida-and-texas-multimillion-dollar-wire-fraud</a></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on<a href="https://twitter.com/HackingHumansCW"> Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>1849</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b359325164364326aed7fde561aac9e4]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW6223447932.mp3?updated=1633715225" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Twitter bots amplifying divisive messages.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/47/notes</link>
      <description>Followup from listeners on Google search result scams. Dave describes the city of Ottawa sending $100K to a fraudster. Joe shares results from the FBI's Internet Crime Report. The catch of the day involves a dating site and an offer to be someone's "sugar daddy." Our guest is Andy Patel from F-Secure, describing how Twitter bots are amplifying divisive messages.
Links to storys:
 https://www.cbc.ca/news/canada/ottawa/city-treasurer-sent-100k-to-fraudster-1.5088744
 https://threatpost.com/fbi-bec-scam-losses-double/144038/
 https://www.ic3.gov/media/annualreport/2018_IC3Report.pdf
 https://labsblog.f-secure.com/2019/04/03/discovering-hidden-twitter-amplification/
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 02 May 2019 05:00:00 -0000</pubDate>
      <itunes:title>Twitter bots amplifying divisive messages.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>47</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/8e653ef4-a50b-11ea-9279-ebf2c6ddc73b/image/Hacking-Humans-iTunes-art-1400x1400.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Followup from listeners on Google search result scams. Dave describes the city of Ottawa sending $100K to a fraudster. Joe shares results from the FBI's Internet Crime Report. The catch of the day involves a dating site and an offer to be someone's "sugar daddy." Our guest is Andy Patel from F-Secure, describing how Twitter bots are amplifying divisive messages.
Links to storys:
 https://www.cbc.ca/news/canada/ottawa/city-treasurer-sent-100k-to-fraudster-1.5088744
 https://threatpost.com/fbi-bec-scam-losses-double/144038/
 https://www.ic3.gov/media/annualreport/2018_IC3Report.pdf
 https://labsblog.f-secure.com/2019/04/03/discovering-hidden-twitter-amplification/
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Followup from listeners on Google search result scams. Dave describes the city of Ottawa sending $100K to a fraudster. Joe shares results from the FBI's Internet Crime Report. The catch of the day involves a dating site and an offer to be someone's "sugar daddy." Our guest is Andy Patel from F-Secure, describing how Twitter bots are amplifying divisive messages.</p><p>Links to storys:</p><p><a href="https://www.cbc.ca/news/canada/ottawa/city-treasurer-sent-100k-to-fraudster-1.5088744"> https://www.cbc.ca/news/canada/ottawa/city-treasurer-sent-100k-to-fraudster-1.5088744</a></p><p><a href="https://threatpost.com/fbi-bec-scam-losses-double/144038/"> https://threatpost.com/fbi-bec-scam-losses-double/144038/</a></p><p><a href="https://www.ic3.gov/media/annualreport/2018_IC3Report.pdf"> https://www.ic3.gov/media/annualreport/2018_IC3Report.pdf</a></p><p><a href="https://labsblog.f-secure.com/2019/04/03/discovering-hidden-twitter-amplification/"> https://labsblog.f-secure.com/2019/04/03/discovering-hidden-twitter-amplification/</a></p><p>Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on<a href="https://twitter.com/HackingHumansCW"> Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>1693</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c200a4d1d8d34f4c807e0c9e8d028b3e]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW8169398817.mp3?updated=1633715185" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Let's play, "Covered by cyber insurance — true or false?"</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/46/notes</link>
      <description>Dave and Joe answer a listener question about a mysterious Netflix account. Dave describes a service for Airbnb scammers. Joe explains a particularly "nasty" Instagram scam. Carole Theriault interviews cyber insurance expert Martin Overton from OMG Cyber. 
Links to stories:
 https://www.bleepingcomputer.com/news/security/the-nasty-list-phishing-scam-is-sweeping-through-instagram/ 
 https://krebsonsecurity.com/2019/04/land-lordz-service-powers-airbnb-scams/
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 25 Apr 2019 05:00:00 -0000</pubDate>
      <itunes:title>Let's play, "Covered by cyber insurance — true or false?"</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>46</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/8f75b5b2-a50b-11ea-9279-2bce81afebce/image/Hacking-Humans-iTunes-art-1400x1400.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Dave and Joe answer a listener question about a mysterious Netflix account. Dave describes a service for Airbnb scammers. Joe explains a particularly "nasty" Instagram scam. Carole Theriault interviews cyber insurance expert Martin Overton from OMG Cyber. 
Links to stories:
 https://www.bleepingcomputer.com/news/security/the-nasty-list-phishing-scam-is-sweeping-through-instagram/ 
 https://krebsonsecurity.com/2019/04/land-lordz-service-powers-airbnb-scams/
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Dave and Joe answer a listener question about a mysterious Netflix account. Dave describes a service for Airbnb scammers. Joe explains a particularly "nasty" Instagram scam. Carole Theriault interviews cyber insurance expert Martin Overton from OMG Cyber. </p><p>Links to stories:</p><p><a href="https://www.bleepingcomputer.com/news/security/the-nasty-list-phishing-scam-is-sweeping-through-instagram/"> https://www.bleepingcomputer.com/news/security/the-nasty-list-phishing-scam-is-sweeping-through-instagram/</a> </p><p><a href="https://krebsonsecurity.com/2019/04/land-lordz-service-powers-airbnb-scams/"> https://krebsonsecurity.com/2019/04/land-lordz-service-powers-airbnb-scams/</a></p><p>Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on<a href="https://twitter.com/HackingHumansCW"> Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>2094</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[0327436bdf8a465fbee61a00b360a4ab]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW9258911854.mp3?updated=1633715134" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>I have been practicing honesty and truthfulness my whole life.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/45/notes</link>
      <description>Followup from an Australian listener. Dave shares a Paypal scam leveraging Google ads. Joe describes TechCrunch reporting on a spam service that was left out in the open. The catch of the day promises a lifetime supply of gold. Dave interviews Asaf Cidon from Barracuda Networks 
https://techcrunch.com/2019/04/02/inside-a-spam-operation/
https://www.barracuda.com/spear-phishing-report
 Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 18 Apr 2019 05:00:00 -0000</pubDate>
      <itunes:title>I have been practicing honesty and truthfulness my whole life.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>45</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/8f89721e-a50b-11ea-9279-bbb5d1f5df3e/image/Hacking-Humans-iTunes-art-1400x1400.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Followup from an Australian listener. Dave shares a Paypal scam leveraging Google ads. Joe describes TechCrunch reporting on a spam service that was left out in the open. The catch of the day promises a lifetime supply of gold. Dave interviews Asaf Cidon from Barracuda Networks 
https://techcrunch.com/2019/04/02/inside-a-spam-operation/
https://www.barracuda.com/spear-phishing-report
 Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Followup from an Australian listener. Dave shares a Paypal scam leveraging Google ads. Joe describes TechCrunch reporting on a spam service that was left out in the open. The catch of the day promises a lifetime supply of gold. Dave interviews Asaf Cidon from Barracuda Networks </p><p><a href="https://techcrunch.com/2019/04/02/inside-a-spam-operation/">https://techcrunch.com/2019/04/02/inside-a-spam-operation/</a></p><p><a href="https://www.barracuda.com/spear-phishing-report">https://www.barracuda.com/spear-phishing-report</a></p><p> Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on<a href="https://twitter.com/HackingHumansCW"> Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>1858</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[1badbad9adf14b4789d23d31db392777]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW8231425556.mp3?updated=1633714993" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Scammers have no ethics whatsoever.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/44/notes</link>
      <description>Joe describes a study of people's perceptions when presented with a magic trick. Dave shares the story of fake boyfriend app. Our catch of the day involves the promise of millions from a bank in Africa. Dave interviews Chris Parker from WhatIsMyIPaddress.com.
Links to stories:
 http://nautil.us/issue/70/variables/a-magician-explains-why-we-see-whats-not-there
 https://youtu.be/vJG698U2Mvo
https://www.pedestrian.tv/tech/fake-boyfriend-app/
https://whatismyipaddress.com/
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 11 Apr 2019 05:00:00 -0000</pubDate>
      <itunes:title>Scammers have no ethics whatsoever.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>44</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/8fa416e6-a50b-11ea-9279-5bc7ecca3360/image/Hacking-Humans-iTunes-art-1400x1400.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Joe describes a study of people's perceptions when presented with a magic trick. Dave shares the story of fake boyfriend app. Our catch of the day involves the promise of millions from a bank in Africa. Dave interviews Chris Parker from WhatIsMyIPaddress.com.
Links to stories:
 http://nautil.us/issue/70/variables/a-magician-explains-why-we-see-whats-not-there
 https://youtu.be/vJG698U2Mvo
https://www.pedestrian.tv/tech/fake-boyfriend-app/
https://whatismyipaddress.com/
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Joe describes a study of people's perceptions when presented with a magic trick. Dave shares the story of fake boyfriend app. Our catch of the day involves the promise of millions from a bank in Africa. Dave interviews Chris Parker from WhatIsMyIPaddress.com.</p><p>Links to stories:</p><p><a href="http://nautil.us/issue/70/variables/a-magician-explains-why-we-see-whats-not-there"> http://nautil.us/issue/70/variables/a-magician-explains-why-we-see-whats-not-there</a></p><p><a href="http://nautil.us/issue/70/variables/a-magician-explains-why-we-see-whats-not-there"> https://youtu.be/vJG698U2Mvo</a></p><p><a href="https://www.pedestrian.tv/tech/fake-boyfriend-app/">https://www.pedestrian.tv/tech/fake-boyfriend-app/</a></p><p><a href="https://whatismyipaddress.com/">https://whatismyipaddress.com/</a></p><p>Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on<a href="https://twitter.com/HackingHumansCW"> Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>1849</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[2d414dc80dc040a6992c03b76c71efee]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW5994546183.mp3?updated=1633714903" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Girl Scouts empowering cyber security leaders.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/43/notes</link>
      <description>Dave describes a survey of call center security methods. Joe explains a spam campaign raising the specter of a flu pandemic to scare people into enabling macros in an Office document. The catch of the day highlights a Facebook scammer promising a prize-winning windfall. Carole Theriault returns with a story about special badges Girls Scouts can earn for cyber security. 
Links to stories:

 https://marketing.trustid.com/acton/attachment/32513/f-0039/1/-/-/-/-/TRUSTID_2018_State_of_Call_Center_Authentication_Survey.pdf
 https://www.bleepingcomputer.com/news/security/fake-cdc-emails-warning-of-flu-pandemic-push-ransomware/
 http://blog.girlscouts.org/2018/07/girl-scouts-introduces-30-new-badges-to.html
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 04 Apr 2019 05:00:00 -0000</pubDate>
      <itunes:title>Girl Scouts empowering cyber security leaders.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>43</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/8fc27ab4-a50b-11ea-9279-139cfd1e0dcf/image/Hacking-Humans-iTunes-art-1400x1400.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Dave describes a survey of call center security methods. Joe explains a spam campaign raising the specter of a flu pandemic to scare people into enabling macros in an Office document. The catch of the day highlights a Facebook scammer promising a prize-winning windfall. Carole Theriault returns with a story about special badges Girls Scouts can earn for cyber security. 
Links to stories:

 https://marketing.trustid.com/acton/attachment/32513/f-0039/1/-/-/-/-/TRUSTID_2018_State_of_Call_Center_Authentication_Survey.pdf
 https://www.bleepingcomputer.com/news/security/fake-cdc-emails-warning-of-flu-pandemic-push-ransomware/
 http://blog.girlscouts.org/2018/07/girl-scouts-introduces-30-new-badges-to.html
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Dave describes a survey of call center security methods. Joe explains a spam campaign raising the specter of a flu pandemic to scare people into enabling macros in an Office document. The catch of the day highlights a Facebook scammer promising a prize-winning windfall. Carole Theriault returns with a story about special badges Girls Scouts can earn for cyber security. </p><p>Links to stories:</p><p><br></p><p><a href="https://marketing.trustid.com/acton/attachment/32513/f-0039/1/-/-/-/-/TRUSTID_2018_State_of_Call_Center_Authentication_Survey.pdf"> https://marketing.trustid.com/acton/attachment/32513/f-0039/1/-/-/-/-/TRUSTID_2018_State_of_Call_Center_Authentication_Survey.pdf</a></p><p><a href="https://www.bleepingcomputer.com/news/security/fake-cdc-emails-warning-of-flu-pandemic-push-ransomware/"> https://www.bleepingcomputer.com/news/security/fake-cdc-emails-warning-of-flu-pandemic-push-ransomware/</a></p><p><a href="http://blog.girlscouts.org/2018/07/girl-scouts-introduces-30-new-badges-to.html"> http://blog.girlscouts.org/2018/07/girl-scouts-introduces-30-new-badges-to.html</a></p><p>Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on<a href="https://twitter.com/HackingHumansCW"> Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>1985</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[593ff273ea9447e1b38c3e2916ff806b]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW1446256924.mp3?updated=1633714857" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Pick a persona to match the goal.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/42/notes</link>
      <description>Followup on remotely previewing websites. Joe has the story of scammer bilking Facebook and Google out of millions. Dave reviews best practices for deleting data on devices you dispose of. The catch of the day is an offer of criminal partnering with the CIA. Our guest is Jeremy N. Smith, author of the book Breaking and Entering - the extraordinary story of a hacker called Alien.
Links from today's stories:
https://urlscan.io/
 https://www.theregister.co.uk/2019/03/21/facebook_google_scam/
 https://blog.rapid7.com/2019/03/19/buy-one-device-get-data-free-private-information-remains-on-donated-devices/
https://www.amazon.com/dp/B0789KP775
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 28 Mar 2019 05:00:00 -0000</pubDate>
      <itunes:title>Pick a persona to match the goal.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>42</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/8ff0a34e-a50b-11ea-9279-63434b58a613/image/Hacking-Humans-iTunes-art-1400x1400.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Followup on remotely previewing websites. Joe has the story of scammer bilking Facebook and Google out of millions. Dave reviews best practices for deleting data on devices you dispose of. The catch of the day is an offer of criminal partnering with the CIA. Our guest is Jeremy N. Smith, author of the book Breaking and Entering - the extraordinary story of a hacker called Alien.
Links from today's stories:
https://urlscan.io/
 https://www.theregister.co.uk/2019/03/21/facebook_google_scam/
 https://blog.rapid7.com/2019/03/19/buy-one-device-get-data-free-private-information-remains-on-donated-devices/
https://www.amazon.com/dp/B0789KP775
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Followup on remotely previewing websites. Joe has the story of scammer bilking Facebook and Google out of millions. Dave reviews best practices for deleting data on devices you dispose of. The catch of the day is an offer of criminal partnering with the CIA. Our guest is Jeremy N. Smith, author of the book <em>Breaking and Entering - the extraordinary story of a hacker called Alien</em>.</p><p>Links from today's stories:</p><p><a href="https://urlscan.io/">https://urlscan.io/</a></p><p><a href="https://www.theregister.co.uk/2019/03/21/facebook_google_scam/"> https://www.theregister.co.uk/2019/03/21/facebook_google_scam/</a></p><p><a href="https://blog.rapid7.com/2019/03/19/buy-one-device-get-data-free-private-information-remains-on-donated-devices/"> https://blog.rapid7.com/2019/03/19/buy-one-device-get-data-free-private-information-remains-on-donated-devices/</a></p><p><a href="https://www.amazon.com/dp/B0789KP775">https://www.amazon.com/dp/B0789KP775</a></p><p>Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on<a href="https://twitter.com/HackingHumansCW"> Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>1822</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[f998764a6dc142febc1995a95b35afee]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW7519687992.mp3?updated=1633714800" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Kids are a great target.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/41/notes</link>
      <description>A listener recommends an online tool for safely previewing web sites. Dave shares research on what time of the work week is best for scams. Joe explains credential stuffing. Our guest is Frances Dewing, the CEO and co-founder of Rubica. They recently published a report on how crooks are accessing parents’ mobile devices via apps their kids load.
 
Links to stories mentioned in today's show:
 https://screenshot.guru/
 https://www.aarp.org/money/scams-fraud/info-2019/phone-scams-peak-time.html
 https://www.digitalnewsasia.com/insights/how-lose-money-credential-stocking-stuffers
 https://rubica.com/wp-content/uploads/2019/02/Rubica-Report-Cyber-Crime-Privacy-Risks-in-Free-Mobile-Kids-Apps.pdf
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 21 Mar 2019 05:00:00 -0000</pubDate>
      <itunes:title>Kids are a great target.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>41</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/90012b42-a50b-11ea-9279-eb0500320a49/image/Hacking-Humans-iTunes-art-1400x1400.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A listener recommends an online tool for safely previewing web sites. Dave shares research on what time of the work week is best for scams. Joe explains credential stuffing. Our guest is Frances Dewing, the CEO and co-founder of Rubica. They recently published a report on how crooks are accessing parents’ mobile devices via apps their kids load.
 
Links to stories mentioned in today's show:
 https://screenshot.guru/
 https://www.aarp.org/money/scams-fraud/info-2019/phone-scams-peak-time.html
 https://www.digitalnewsasia.com/insights/how-lose-money-credential-stocking-stuffers
 https://rubica.com/wp-content/uploads/2019/02/Rubica-Report-Cyber-Crime-Privacy-Risks-in-Free-Mobile-Kids-Apps.pdf
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A listener recommends an online tool for safely previewing web sites. Dave shares research on what time of the work week is best for scams. Joe explains credential stuffing. Our guest is Frances Dewing, the CEO and co-founder of Rubica. They recently published a report on how crooks are accessing parents’ mobile devices via apps their kids load.</p><p> </p><p>Links to stories mentioned in today's show:</p><p><a href="https://www.amazon.com/Stalling-Time-Life-Hostage-Negotiator/dp/1400067251"> https://screenshot.guru/</a></p><p><a href="https://www.aarp.org/money/scams-fraud/info-2019/phone-scams-peak-time.html"> https://www.aarp.org/money/scams-fraud/info-2019/phone-scams-peak-time.html</a></p><p><a href="https://www.digitalnewsasia.com/insights/how-lose-money-credential-stocking-stuffers"> https://www.digitalnewsasia.com/insights/how-lose-money-credential-stocking-stuffers</a></p><p><a href="https://rubica.com/wp-content/uploads/2019/02/Rubica-Report-Cyber-Crime-Privacy-Risks-in-Free-Mobile-Kids-Apps.pdf"> https://rubica.com/wp-content/uploads/2019/02/Rubica-Report-Cyber-Crime-Privacy-Risks-in-Free-Mobile-Kids-Apps.pdf</a></p><p>Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on<a href="https://twitter.com/HackingHumansCW"> Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>2123</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[28e758b813d0437c8202084e2a651e0e]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW7564686148.mp3?updated=1633714716" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>When we rush we make bad decisions.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/40/notes</link>
      <description>Joe tracks the surprising number of malicious links hosted on legit websites and why it's dangerous. Dave describes an extortion scheme targeting podcasters. Our catch of the day involves a lonely Russian woman promoting a dating site. Dave interviews Gary Noesner, author of Stalling for Time: My Life as an FBI Hostage Negotiator.
Links to stories mentioned in today's show:
https://www-cdn.webroot.com/9315/5113/6179/2019_Webroot_Threat_Report_US_Online.pdf
https://rebelbasemedia.io/podcast-review-extortion/
 https://www.amazon.com/Stalling-Time-Life-Hostage-Negotiator/dp/1400067251
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter. </description>
      <pubDate>Thu, 14 Mar 2019 05:00:00 -0000</pubDate>
      <itunes:title>When we rush we make bad decisions.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>40</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/9022d648-a50b-11ea-9279-17abf5ed969b/image/Hacking-Humans-iTunes-art-1400x1400.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Joe tracks the surprising number of malicious links hosted on legit websites and why it's dangerous. Dave describes an extortion scheme targeting podcasters. Our catch of the day involves a lonely Russian woman promoting a dating site. Dave interviews Gary Noesner, author of Stalling for Time: My Life as an FBI Hostage Negotiator.
Links to stories mentioned in today's show:
https://www-cdn.webroot.com/9315/5113/6179/2019_Webroot_Threat_Report_US_Online.pdf
https://rebelbasemedia.io/podcast-review-extortion/
 https://www.amazon.com/Stalling-Time-Life-Hostage-Negotiator/dp/1400067251
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter. </itunes:summary>
      <content:encoded>
        <![CDATA[<p>Joe tracks the surprising number of malicious links hosted on legit websites and why it's dangerous. Dave describes an extortion scheme targeting podcasters. Our catch of the day involves a lonely Russian woman promoting a dating site. Dave interviews Gary Noesner, author of <em>Stalling for Time: My Life as an FBI Hostage Negotiator</em>.</p><p>Links to stories mentioned in today's show:</p><p>https://www-cdn.webroot.com/9315/5113/6179/2019_Webroot_Threat_Report_US_Online.pdf</p><p><a href="https://rebelbasemedia.io/podcast-review-extortion/">https://rebelbasemedia.io/podcast-review-extortion/</a></p><p><a href="https://www.amazon.com/Stalling-Time-Life-Hostage-Negotiator/dp/1400067251"> https://www.amazon.com/Stalling-Time-Life-Hostage-Negotiator/dp/1400067251</a></p><p>Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on<a href="https://twitter.com/HackingHumansCW"> Twitter</a>. </p>]]>
      </content:encoded>
      <itunes:duration>1744</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[e02cb0c4eea342ad9b4b7d12cffb5c1b]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW9847063305.mp3?updated=1633714658" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Don't assume younger people get it.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/39/notes</link>
      <description>Followup on last week's TLD discussion. Dave shares a sextortion scam with a tragic ending. Joe highlights conveyance scams that rely on certain days of the week. Our catch of the day features a wealthy Londoner hoping to pass on her fortune. Guest Dale Zabriskie from Proofpoint has results from their State of the Phish report.

Links to stories:
 https://www.dailymail.co.uk/news/article-6744421/Army-veteran-PTSD-committed-suicide-targeted-prison-inmates-sextortion-scam.html
 https://www.todaysconveyancer.co.uk/main-news/law-firms-wising-up-conveyancing-scams/
 https://static.googleusercontent.com/media/research.google.com/en//pubs/archive/45597.pdf
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 07 Mar 2019 06:00:00 -0000</pubDate>
      <itunes:title>Don't assume younger people get it.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>39</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/903c189c-a50b-11ea-9279-e7babcb170ce/image/Hacking-Humans-iTunes-art-1400x1400.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Followup on last week's TLD discussion. Dave shares a sextortion scam with a tragic ending. Joe highlights conveyance scams that rely on certain days of the week. Our catch of the day features a wealthy Londoner hoping to pass on her fortune. Guest Dale Zabriskie from Proofpoint has results from their State of the Phish report.

Links to stories:
 https://www.dailymail.co.uk/news/article-6744421/Army-veteran-PTSD-committed-suicide-targeted-prison-inmates-sextortion-scam.html
 https://www.todaysconveyancer.co.uk/main-news/law-firms-wising-up-conveyancing-scams/
 https://static.googleusercontent.com/media/research.google.com/en//pubs/archive/45597.pdf
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Followup on last week's TLD discussion. Dave shares a sextortion scam with a tragic ending. Joe highlights conveyance scams that rely on certain days of the week. Our catch of the day features a wealthy Londoner hoping to pass on her fortune. Guest Dale Zabriskie from Proofpoint has results from their State of the Phish report.</p><p><br></p><p>Links to stories:</p><p><a href="https://www.dailymail.co.uk/news/article-6744421/Army-veteran-PTSD-committed-suicide-targeted-prison-inmates-sextortion-scam.html"> <em>https://www.dailymail.co.uk/news/article-6744421/Army-veteran-PTSD-committed-suicide-targeted-prison-inmates-sextortion-scam.html</em></a></p><p><a href="https://www.todaysconveyancer.co.uk/main-news/law-firms-wising-up-conveyancing-scams/"> https://www.todaysconveyancer.co.uk/main-news/law-firms-wising-up-conveyancing-scams/</a></p><p><a href="https://static.googleusercontent.com/media/research.google.com/en//pubs/archive/45597.pdf"> https://static.googleusercontent.com/media/research.google.com/en//pubs/archive/45597.pdf</a></p><p>Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on<a href="https://twitter.com/HackingHumansCW"> Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>1725</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[1447240f356e454992c93748f72fa842]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW7752566150.mp3?updated=1633714603" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Delivering yourself to a kidnapper.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/38/notes</link>
      <description>Joe describes fraudsters taking advantage of top-level domain name confusion. Dave explains how a Google Nest security system shipped with an undocumented microphones. Our catch of the day involves a postcard missed package campaign. Our guest is Matt Devost from OODA LLC describing their work protecting high-net-worth individuals.
Links to today's stories:
https://rebootcamp.militarytimes.com/news/your-air-force/2019/02/13/watch-out-for-fake-dod-websites-like-this/
 https://nakedsecurity.sophos.com/2019/02/21/sorry-we-didnt-mean-to-keep-that-secret-microphone-a-secret-says-google/
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 28 Feb 2019 06:00:00 -0000</pubDate>
      <itunes:title>Delivering yourself to a kidnapper.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>38</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/90510856-a50b-11ea-9279-dbe105faf73a/image/Hacking-Humans-iTunes-art-1400x1400.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Joe describes fraudsters taking advantage of top-level domain name confusion. Dave explains how a Google Nest security system shipped with an undocumented microphones. Our catch of the day involves a postcard missed package campaign. Our guest is Matt Devost from OODA LLC describing their work protecting high-net-worth individuals.
Links to today's stories:
https://rebootcamp.militarytimes.com/news/your-air-force/2019/02/13/watch-out-for-fake-dod-websites-like-this/
 https://nakedsecurity.sophos.com/2019/02/21/sorry-we-didnt-mean-to-keep-that-secret-microphone-a-secret-says-google/
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Joe describes fraudsters taking advantage of top-level domain name confusion. Dave explains how a Google Nest security system shipped with an undocumented microphones. Our catch of the day involves a postcard missed package campaign. Our guest is Matt Devost from OODA LLC describing their work protecting high-net-worth individuals.</p><p><strong>Links to today's stories:</strong></p><p><strong>https://rebootcamp.militarytimes.com/news/your-air-force/2019/02/13/watch-out-for-fake-dod-websites-like-this/</strong></p><p><a href="https://nakedsecurity.sophos.com/2019/02/21/sorry-we-didnt-mean-to-keep-that-secret-microphone-a-secret-says-google/"><strong> https://nakedsecurity.sophos.com/2019/02/21/sorry-we-didnt-mean-to-keep-that-secret-microphone-a-secret-says-google/</strong></a></p><p>Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on<a href="https://twitter.com/HackingHumansCW"> Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>1859</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[5b8836f7c265474d8c343ebdc5bf4f4b]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW2461241781.mp3?updated=1633714554" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Stop and think before you click that link.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/37/notes</link>
      <description>We've got followup from a listener on cognitive dissonance and behavioral science. Dave shares a listener story about a University Dean's List scam. Joe shares statistics from a government agency phishing test. Our catch of the day involves funds from the FBI, the IMF, and yes, Nigeria. Dave interviews Crane Hassold from Agari with phishing trends they've been tracking, plus his experiences as a former FBI agent.
Links to stories in today's show:
https://fcw.com/articles/2019/02/11/cyber-phishing-oig-fhfa.aspx
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter. </description>
      <pubDate>Thu, 21 Feb 2019 06:00:00 -0000</pubDate>
      <itunes:title>Stop and think before you click that link.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>37</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/9061f24c-a50b-11ea-9279-f3b792465d55/image/Hacking-Humans-iTunes-art-1400x1400.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>We've got followup from a listener on cognitive dissonance and behavioral science. Dave shares a listener story about a University Dean's List scam. Joe shares statistics from a government agency phishing test. Our catch of the day involves funds from the FBI, the IMF, and yes, Nigeria. Dave interviews Crane Hassold from Agari with phishing trends they've been tracking, plus his experiences as a former FBI agent.
Links to stories in today's show:
https://fcw.com/articles/2019/02/11/cyber-phishing-oig-fhfa.aspx
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter. </itunes:summary>
      <content:encoded>
        <![CDATA[<p>We've got followup from a listener on cognitive dissonance and behavioral science. Dave shares a listener story about a University Dean's List scam. Joe shares statistics from a government agency phishing test. Our catch of the day involves funds from the FBI, the IMF, and yes, Nigeria. Dave interviews Crane Hassold from Agari with phishing trends they've been tracking, plus his experiences as a former FBI agent.</p><p>Links to stories in today's show:</p><p>https://fcw.com/articles/2019/02/11/cyber-phishing-oig-fhfa.aspx</p><p>Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on<a href="https://twitter.com/HackingHumansCW"> Twitter</a>. </p>]]>
      </content:encoded>
      <itunes:duration>1733</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[52c161ec85cb4d499d2054c5f2e48010]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW9695214430.mp3?updated=1633714460" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The trauma is multifactored.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/36/notes</link>
      <description>On this Valentines Day edition of Hacking Humans, Joe and Dave examine romance scams, including the sad tale of woman bilked out of hundreds of thousands of dollars. There's a silly, non-murdering catch of the day, and Dave interviews Max Kilger from UTSA on the six motivations of bad actors.
Links to today's stories:
 https://www.bbb.org/article/news-releases/17057-online-romance-scams-a-bbb-study-on-how-scammers-use-impersonation-blackmail-and-trickery-to-steal-from-unsuspecting-daters
 https://www.aarp.org/money/scams-fraud/info-2015/online-dating-scam.html
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 14 Feb 2019 06:00:00 -0000</pubDate>
      <itunes:title>The trauma is multifactored.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>36</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/90837f8e-a50b-11ea-9279-272818f04f6d/image/Hacking-Humans-iTunes-art-1400x1400.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>On this Valentines Day edition of Hacking Humans, Joe and Dave examine romance scams, including the sad tale of woman bilked out of hundreds of thousands of dollars. There's a silly, non-murdering catch of the day, and Dave interviews Max Kilger from UTSA on the six motivations of bad actors.
Links to today's stories:
 https://www.bbb.org/article/news-releases/17057-online-romance-scams-a-bbb-study-on-how-scammers-use-impersonation-blackmail-and-trickery-to-steal-from-unsuspecting-daters
 https://www.aarp.org/money/scams-fraud/info-2015/online-dating-scam.html
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>On this Valentines Day edition of Hacking Humans, Joe and Dave examine romance scams, including the sad tale of woman bilked out of hundreds of thousands of dollars. There's a silly, non-murdering catch of the day, and Dave interviews Max Kilger from UTSA on the six motivations of bad actors.</p><p>Links to today's stories:</p><p><a href="https://www.bbb.org/article/news-releases/17057-online-romance-scams-a-bbb-study-on-how-scammers-use-impersonation-blackmail-and-trickery-to-steal-from-unsuspecting-daters"> https://www.bbb.org/article/news-releases/17057-online-romance-scams-a-bbb-study-on-how-scammers-use-impersonation-blackmail-and-trickery-to-steal-from-unsuspecting-daters</a></p><p><a href="https://www.aarp.org/money/scams-fraud/info-2015/online-dating-scam.html"> https://www.aarp.org/money/scams-fraud/info-2015/online-dating-scam.html</a></p><p>Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on<a href="https://twitter.com/HackingHumansCW"> Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>1846</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[56932a3d2dc343d3aca130562a52561f]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW3606724994.mp3?updated=1633714372" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Make it seem like the real answer is impossible to know.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/35/notes</link>
      <description>Dave shares a bank spoofing scam with a reminder to mind those links, especially on mobile devices. Joe describes a case of someone turning the tables on a Twitter scammer. Our catch of the day involves a clumsy claim of physical harm. Dave interviews author Dave Levitan about his book Not a Scientist: How politicians mistake, misrepresent and utterly mangle science.
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 07 Feb 2019 06:00:00 -0000</pubDate>
      <itunes:title>Make it seem like the real answer is impossible to know.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>35</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/909a5a74-a50b-11ea-9279-ff7f6e991452/image/Hacking-Humans-iTunes-art-1400x1400.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Dave shares a bank spoofing scam with a reminder to mind those links, especially on mobile devices. Joe describes a case of someone turning the tables on a Twitter scammer. Our catch of the day involves a clumsy claim of physical harm. Dave interviews author Dave Levitan about his book Not a Scientist: How politicians mistake, misrepresent and utterly mangle science.
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Dave shares a bank spoofing scam with a reminder to mind those links, especially on mobile devices. Joe describes a case of someone turning the tables on a Twitter scammer. Our catch of the day involves a clumsy claim of physical harm. Dave interviews author Dave Levitan about his book Not a Scientist: How politicians mistake, misrepresent and utterly mangle science.</p><p>Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on<a href="https://twitter.com/HackingHumansCW"> Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>1813</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[9c30747320574471ae4c17249d59754f]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW8413777373.mp3?updated=1633714319" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The excitement of tricking someone wears off quickly.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/34/notes</link>
      <description>We've got followup on bank scams and ransomware. Joe describes a highly sophisticated multinational business scam. Dave shares a story about private school parents falling for a Bitcoin discount scam. Our guest is Jordan Harbinger, host of The Jordan Harbinger Show, with insights on influence and social engineering. 
Links to this week's stories:
https://www.cpomagazine.com/cyber-security/cyber-fraud-by-chinese-hackers-makes-headlines-in-india/
https://www.bbc.com/news/uk-england-tyne-46920810
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 31 Jan 2019 06:00:00 -0000</pubDate>
      <itunes:title>The excitement of tricking someone wears off quickly.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>34</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/90ade198-a50b-11ea-9279-fb7856993867/image/Hacking-Humans-iTunes-art-1400x1400.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>We've got followup on bank scams and ransomware. Joe describes a highly sophisticated multinational business scam. Dave shares a story about private school parents falling for a Bitcoin discount scam. Our guest is Jordan Harbinger, host of The Jordan Harbinger Show, with insights on influence and social engineering. 
Links to this week's stories:
https://www.cpomagazine.com/cyber-security/cyber-fraud-by-chinese-hackers-makes-headlines-in-india/
https://www.bbc.com/news/uk-england-tyne-46920810
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>We've got followup on bank scams and ransomware. Joe describes a highly sophisticated multinational business scam. Dave shares a story about private school parents falling for a Bitcoin discount scam. Our guest is Jordan Harbinger, host of <a href="https://www.jordanharbinger.com/">The Jordan Harbinger Show</a>, with insights on influence and social engineering. </p><p>Links to this week's stories:</p><p>https://www.cpomagazine.com/cyber-security/cyber-fraud-by-chinese-hackers-makes-headlines-in-india/</p><p><a href="https://www.bbc.com/news/uk-england-tyne-46920810">https://www.bbc.com/news/uk-england-tyne-46920810</a></p><p>Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on<a href="https://twitter.com/HackingHumansCW"> Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>1837</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[1910ce99840c42dc97ebcf2aac3fa1ea]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW6079354830.mp3?updated=1633714246" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Opening your eyes to the reality in which we live.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/33/notes</link>
      <description>Dave reviews tips on protecting yourself from ransomware. Joe describes a clever way to trick people into enabling macros. An attempt at celebrity friendship is our catch of the day. Carole Theriault returns and speaks with Dr. Jessica Barker from Cygenta about effective training techniques.

Links to stories mentioned:
 https://www.csoonline.com/article/3331981/ransomware/how-to-protect-backups-from-ransomware.html
 https://myonlinesecurity.co.uk/agent-tesla-reborn-via-fake-order/
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter. </description>
      <pubDate>Thu, 24 Jan 2019 06:00:00 -0000</pubDate>
      <itunes:title>Opening your eyes to the reality in which we live.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>33</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/90cb5462-a50b-11ea-9279-3b1776ccb4c3/image/Hacking-Humans-iTunes-art-1400x1400.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Dave reviews tips on protecting yourself from ransomware. Joe describes a clever way to trick people into enabling macros. An attempt at celebrity friendship is our catch of the day. Carole Theriault returns and speaks with Dr. Jessica Barker from Cygenta about effective training techniques.

Links to stories mentioned:
 https://www.csoonline.com/article/3331981/ransomware/how-to-protect-backups-from-ransomware.html
 https://myonlinesecurity.co.uk/agent-tesla-reborn-via-fake-order/
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter. </itunes:summary>
      <content:encoded>
        <![CDATA[<p>Dave reviews tips on protecting yourself from ransomware. Joe describes a clever way to trick people into enabling macros. An attempt at celebrity friendship is our catch of the day. Carole Theriault returns and speaks with Dr. Jessica Barker from Cygenta about effective training techniques.</p><p><br></p><p>Links to stories mentioned:</p><p><a href="https://www.csoonline.com/article/3331981/ransomware/how-to-protect-backups-from-ransomware.html"> https://www.csoonline.com/article/3331981/ransomware/how-to-protect-backups-from-ransomware.html</a></p><p><a href="https://myonlinesecurity.co.uk/agent-tesla-reborn-via-fake-order/"> https://myonlinesecurity.co.uk/agent-tesla-reborn-via-fake-order/</a></p><p>Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on<a href="https://twitter.com/HackingHumansCW"> Twitter</a>. </p>]]>
      </content:encoded>
      <itunes:duration>1995</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[f9bd5251e3be40159fcffafefb02109e]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW3794768685.mp3?updated=1633714181" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Prisoners have nothing but time.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/32/notes</link>
      <description>Joe shares the tale of a prisoner running a variety of romance scams from the inside. Dave outlines direct deposit scams. The catch of the day is a clever variation from (where else?) Nigeria. Our guest is Sam Small from ZeroFox.
Links to stories:
 https://hubpages.com/politics/The-Games-That-Inmates-Play
 https://ogletree.com/shared-content/content/blog/2018/january/diverting-employees-payroll-direct-deposits-the-latest-wave-of-phishing-scams
https://www.kansas.com/news/local/crime/article223873805.html
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 17 Jan 2019 06:00:00 -0000</pubDate>
      <itunes:title>Prisoners have nothing but time.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>32</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/90e2b9cc-a50b-11ea-9279-77d87d60eb0c/image/Hacking-Humans-iTunes-art-1400x1400.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Joe shares the tale of a prisoner running a variety of romance scams from the inside. Dave outlines direct deposit scams. The catch of the day is a clever variation from (where else?) Nigeria. Our guest is Sam Small from ZeroFox.
Links to stories:
 https://hubpages.com/politics/The-Games-That-Inmates-Play
 https://ogletree.com/shared-content/content/blog/2018/january/diverting-employees-payroll-direct-deposits-the-latest-wave-of-phishing-scams
https://www.kansas.com/news/local/crime/article223873805.html
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Joe shares the tale of a prisoner running a variety of romance scams from the inside. Dave outlines direct deposit scams. The catch of the day is a clever variation from (where else?) Nigeria. Our guest is Sam Small from ZeroFox.</p><p>Links to stories:</p><p><a href="https://hubpages.com/politics/The-Games-That-Inmates-Play"> https://hubpages.com/politics/The-Games-That-Inmates-Play</a></p><p><a href="https://ogletree.com/shared-content/content/blog/2018/january/diverting-employees-payroll-direct-deposits-the-latest-wave-of-phishing-scams"> https://ogletree.com/shared-content/content/blog/2018/january/diverting-employees-payroll-direct-deposits-the-latest-wave-of-phishing-scams</a></p><p><a href="https://www.kansas.com/news/local/crime/article223873805.html">https://www.kansas.com/news/local/crime/article223873805.html</a></p><p>Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on<a href="https://twitter.com/HackingHumansCW"> Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>1865</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[70fcd09e107b4187bf6c38064e909636]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW2437124023.mp3?updated=1633714120" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Trained humans are your strongest link.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/31/notes</link>
      <description>Dave warns of scammers gaining access to homes by pretending to be workers from the local utility company. Joe shares a story of a sophisticated bank transfer scam in the UK. Our catch of the day outlines an attempted email scam targeting an architectural firm. Carole Theriault is back with the second part of her interview with the pen tester who goes by the name freaky clown.
Links to today's stories:
 https://www.wxyz.com/news/michigan-energy-company-warns-of-increase-in-imposters-trying-to-enter-homes
 https://inews.co.uk/inews-lifestyle/money/lost-19960-life-savings-phone-scam-natwest
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 10 Jan 2019 06:00:00 -0000</pubDate>
      <itunes:title>Trained humans are your strongest link.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>31</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/90f50e7e-a50b-11ea-9279-d37e08724ff7/image/Hacking-Humans-iTunes-art-1400x1400.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Dave warns of scammers gaining access to homes by pretending to be workers from the local utility company. Joe shares a story of a sophisticated bank transfer scam in the UK. Our catch of the day outlines an attempted email scam targeting an architectural firm. Carole Theriault is back with the second part of her interview with the pen tester who goes by the name freaky clown.
Links to today's stories:
 https://www.wxyz.com/news/michigan-energy-company-warns-of-increase-in-imposters-trying-to-enter-homes
 https://inews.co.uk/inews-lifestyle/money/lost-19960-life-savings-phone-scam-natwest
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Dave warns of scammers gaining access to homes by pretending to be workers from the local utility company. Joe shares a story of a sophisticated bank transfer scam in the UK. Our catch of the day outlines an attempted email scam targeting an architectural firm. Carole Theriault is back with the second part of her interview with the pen tester who goes by the name freaky clown.</p><p>Links to today's stories:</p><p><a href="https://www.wxyz.com/news/michigan-energy-company-warns-of-increase-in-imposters-trying-to-enter-homes"> https://www.wxyz.com/news/michigan-energy-company-warns-of-increase-in-imposters-trying-to-enter-homes</a></p><p><a href="https://inews.co.uk/inews-lifestyle/money/lost-19960-life-savings-phone-scam-natwest"> https://inews.co.uk/inews-lifestyle/money/lost-19960-life-savings-phone-scam-natwest</a></p><p>Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on<a href="https://twitter.com/HackingHumansCW"> Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>2087</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[aed6686e35bd4366a1160125d6198d80]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW3429215725.mp3?updated=1633714060" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>At some point you're probably going to have to do some running.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/30/notes</link>
      <description>Joe describes a reply-all scenario gone wrong. Dave explains the criminal use of steganography in memes as a command and control technique. Our catch-of-the-day features alluring photos texted to an unimpressed listener. Carole Theriault interviews physical pen tester Freaky Clown.
 
Links to stories mentioned in this week's show:
 https://blog.trendmicro.com/trendlabs-security-intelligence/cybercriminals-use-malicious-memes-that-communicate-with-malware/
https://www.cygenta.co.uk/
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter</description>
      <pubDate>Thu, 03 Jan 2019 06:00:00 -0000</pubDate>
      <itunes:title>At some point you're probably going to have to do some running.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>30</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/912be778-a50b-11ea-9279-e334bc86a673/image/Hacking-Humans-iTunes-art-1400x1400.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Joe describes a reply-all scenario gone wrong. Dave explains the criminal use of steganography in memes as a command and control technique. Our catch-of-the-day features alluring photos texted to an unimpressed listener. Carole Theriault interviews physical pen tester Freaky Clown.
 
Links to stories mentioned in this week's show:
 https://blog.trendmicro.com/trendlabs-security-intelligence/cybercriminals-use-malicious-memes-that-communicate-with-malware/
https://www.cygenta.co.uk/
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Joe describes a reply-all scenario gone wrong. Dave explains the criminal use of steganography in memes as a command and control technique. Our catch-of-the-day features alluring photos texted to an unimpressed listener. Carole Theriault interviews physical pen tester Freaky Clown.</p><p> </p><p>Links to stories mentioned in this week's show:</p><p><a href="https://blog.trendmicro.com/trendlabs-security-intelligence/cybercriminals-use-malicious-memes-that-communicate-with-malware/"> https://blog.trendmicro.com/trendlabs-security-intelligence/cybercriminals-use-malicious-memes-that-communicate-with-malware/</a></p><p><a href="https://www.cygenta.co.uk/">https://www.cygenta.co.uk/</a></p><p>Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on<a href="https://twitter.com/HackingHumansCW"> Twitter</a></p>]]>
      </content:encoded>
      <itunes:duration>1923</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[91637a328edc47cabbdcc50f99e26278]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW6214999758.mp3?updated=1633714008" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Truth emerges from the clash of ideas.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/29/notes</link>
      <description>We follow up on critical feedback of last week's show. Dave describes how online extortionists have pivoted from sex to explosives. We've got an auto-responding catch of the day from one of Joe's colleagues. Guest is Sean Brooks, Director of the Citizen Clinic and a Research Fellow at the Center for Long-Term Cybersecurity at UC Berkeley. He shares their research into online attacks of politically vulnerable organizations.
From our EV certs follow-up:
 https://www.troyhunt.com/extended-validation-certificates-are-dead/
 https://casecurity.org/2018/12/06/ca-security-council-casc-2019-predictions-the-good-the-bad-and-the-ugly/
Bomb threat catch of the day:
https://www.zdnet.com/article/extortion-emails-carrying-bomb-threats-cause-panic-across-the-us/
Sean Brooks interview:
Report: http://cltc.berkeley.edu/defendingpvos/
Clinic: http://cltc.berkeley.edu/citizen-clinic/
 Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 20 Dec 2018 06:00:00 -0000</pubDate>
      <itunes:title>Truth emerges from the clash of ideas.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>29</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/914bdf92-a50b-11ea-9279-f7492f8931f4/image/Hacking-Humans-iTunes-art-1400x1400.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>We follow up on critical feedback of last week's show. Dave describes how online extortionists have pivoted from sex to explosives. We've got an auto-responding catch of the day from one of Joe's colleagues. Guest is Sean Brooks, Director of the Citizen Clinic and a Research Fellow at the Center for Long-Term Cybersecurity at UC Berkeley. He shares their research into online attacks of politically vulnerable organizations.
From our EV certs follow-up:
 https://www.troyhunt.com/extended-validation-certificates-are-dead/
 https://casecurity.org/2018/12/06/ca-security-council-casc-2019-predictions-the-good-the-bad-and-the-ugly/
Bomb threat catch of the day:
https://www.zdnet.com/article/extortion-emails-carrying-bomb-threats-cause-panic-across-the-us/
Sean Brooks interview:
Report: http://cltc.berkeley.edu/defendingpvos/
Clinic: http://cltc.berkeley.edu/citizen-clinic/
 Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>We follow up on critical feedback of last week's show. Dave describes how online extortionists have pivoted from sex to explosives. We've got an auto-responding catch of the day from one of Joe's colleagues. Guest is Sean Brooks, Director of the Citizen Clinic and a Research Fellow at the Center for Long-Term Cybersecurity at UC Berkeley. He shares their research into online attacks of politically vulnerable organizations.</p><p>From our EV certs follow-up:</p><p><a href="https://www.troyhunt.com/extended-validation-certificates-are-dead/"> https://www.troyhunt.com/extended-validation-certificates-are-dead/</a></p><p><a href="https://casecurity.org/2018/12/06/ca-security-council-casc-2019-predictions-the-good-the-bad-and-the-ugly/"> https://casecurity.org/2018/12/06/ca-security-council-casc-2019-predictions-the-good-the-bad-and-the-ugly/</a></p><p>Bomb threat catch of the day:</p><p>https://www.zdnet.com/article/extortion-emails-carrying-bomb-threats-cause-panic-across-the-us/</p><p>Sean Brooks interview:</p><p>Report: http://cltc.berkeley.edu/defendingpvos/</p><p>Clinic: <a href="http://cltc.berkeley.edu/citizen-clinic/">http://cltc.berkeley.edu/citizen-clinic/</a></p><p> Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>1864</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b5c75a8b780d4ad8ab3ed3ce64de5849]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW3124465987.mp3?updated=1633713944" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>A pesky problem that doesn't go away.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/28/notes</link>
      <description>Joe describes a Nigerian gang called London Blue that focuses on business email compromise. Dave shares surprising Cyber Monday phishing statistics. Guest Chris Bailey from Entrust Datacard teaches us how to detect lookalike sites online and better protect ourselves from fraud.
Links to today's stories:
 https://www.agari.com/insights/whitepapers/london-blue-report/
 https://www.zscaler.com/blogs/research/cyber-monday-biggest-day-cyberattacks-not-long-shot
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 13 Dec 2018 06:00:00 -0000</pubDate>
      <itunes:title>A pesky problem that doesn't go away.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>28</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/9168e0e2-a50b-11ea-9279-bb0dedaf5d09/image/Hacking-Humans-iTunes-art-1400x1400.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Joe describes a Nigerian gang called London Blue that focuses on business email compromise. Dave shares surprising Cyber Monday phishing statistics. Guest Chris Bailey from Entrust Datacard teaches us how to detect lookalike sites online and better protect ourselves from fraud.
Links to today's stories:
 https://www.agari.com/insights/whitepapers/london-blue-report/
 https://www.zscaler.com/blogs/research/cyber-monday-biggest-day-cyberattacks-not-long-shot
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Joe describes a Nigerian gang called London Blue that focuses on business email compromise. Dave shares surprising Cyber Monday phishing statistics. Guest Chris Bailey from Entrust Datacard teaches us how to detect lookalike sites online and better protect ourselves from fraud.</p><p>Links to today's stories:</p><p><a href="https://www.agari.com/insights/whitepapers/london-blue-report/"> https://www.agari.com/insights/whitepapers/london-blue-report/</a></p><p><a href="https://www.zscaler.com/blogs/research/cyber-monday-biggest-day-cyberattacks-not-long-shot"> <strong>https://www.zscaler.com/blogs/research/cyber-monday-biggest-day-cyberattacks-not-long-shot</strong></a></p><p>Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on<a href="https://twitter.com/HackingHumansCW"> Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>1503</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[adad43b1504549eb954d4c45d3fafed5]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW3427670475.mp3?updated=1633713883" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Bringing trust to a trustless world.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/27/notes</link>
      <description>Listener follow-up on a URL issue. Dave describes an elderly couple scammed out of savings. Joe wonders if it's wise to unsubscribe. Guest Andre McGregor from TLDR Capital describes his work as a former FBI agent, and his experience consulting on Mr. Robot.
Bank account transfer scam:
https://abc11.com/troubleshooter-durham-couple-loses-$8900-in-computer-virus-scam/4782799/
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 06 Dec 2018 06:00:00 -0000</pubDate>
      <itunes:title>Bringing trust to a trustless world.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>27</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/91844116-a50b-11ea-9279-7b67b6e8bccb/image/Hacking-Humans-iTunes-art-1400x1400.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Listener follow-up on a URL issue. Dave describes an elderly couple scammed out of savings. Joe wonders if it's wise to unsubscribe. Guest Andre McGregor from TLDR Capital describes his work as a former FBI agent, and his experience consulting on Mr. Robot.
Bank account transfer scam:
https://abc11.com/troubleshooter-durham-couple-loses-$8900-in-computer-virus-scam/4782799/
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Listener follow-up on a URL issue. Dave describes an elderly couple scammed out of savings. Joe wonders if it's wise to unsubscribe. Guest Andre McGregor from TLDR Capital describes his work as a former FBI agent, and his experience consulting on Mr. Robot.</p><p>Bank account transfer scam:</p><p>https://abc11.com/troubleshooter-durham-couple-loses-$8900-in-computer-virus-scam/4782799/</p><p>Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on<a href="https://twitter.com/HackingHumansCW"> Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>1853</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[d1bf80ddf64e47a6a41bfbcf9b5b69a9]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW2826394338.mp3?updated=1633713770" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Be very aware of your desire to be right.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/26/notes</link>
      <description>Joe explains URLs and DNS. Dave has tips to prevent holiday skimming. A bogus bank barrister is the catch of the day. Writer Ben Yagoda explains cognitive biases.
Links:
Wikipedia page on URLs -
https://en.wikipedia.org/wiki/URL
Tips to prevent skimming - 
 https://www.social-engineer.org/newsletter/social-engineer-newsletter-vol-07-issue-96/ 
Ben Yagoda's article from the Atlantic -
 https://www.theatlantic.com/magazine/archive/2018/09/cognitive-bias/565775/
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 29 Nov 2018 06:00:00 -0000</pubDate>
      <itunes:title>Be very aware of your desire to be right.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>26</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/9198b6f0-a50b-11ea-9279-3f417ffe5815/image/Hacking-Humans-iTunes-art-1400x1400.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Joe explains URLs and DNS. Dave has tips to prevent holiday skimming. A bogus bank barrister is the catch of the day. Writer Ben Yagoda explains cognitive biases.
Links:
Wikipedia page on URLs -
https://en.wikipedia.org/wiki/URL
Tips to prevent skimming - 
 https://www.social-engineer.org/newsletter/social-engineer-newsletter-vol-07-issue-96/ 
Ben Yagoda's article from the Atlantic -
 https://www.theatlantic.com/magazine/archive/2018/09/cognitive-bias/565775/
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Joe explains URLs and DNS. Dave has tips to prevent holiday skimming. A bogus bank barrister is the catch of the day. Writer Ben Yagoda explains cognitive biases.</p><p>Links:</p><p>Wikipedia page on URLs -</p><p><a href="https://en.wikipedia.org/wiki/URL">https://en.wikipedia.org/wiki/URL</a></p><p>Tips to prevent skimming - </p><p><a href="https://www.social-engineer.org/newsletter/social-engineer-newsletter-vol-07-issue-96/"> https://www.social-engineer.org/newsletter/social-engineer-newsletter-vol-07-issue-96/</a> </p><p>Ben Yagoda's article from the Atlantic -</p><p><a href="https://www.theatlantic.com/magazine/archive/2018/09/cognitive-bias/565775/"> https://www.theatlantic.com/magazine/archive/2018/09/cognitive-bias/565775/</a></p><p>Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on<a href="https://twitter.com/HackingHumansCW"> Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>2030</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[453952c681814902aada6df042a262d8]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW9038188329.mp3?updated=1633713682" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>CEOs can be the weakest link.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/25/notes</link>
      <description>Listener feedback on the "Can you hear me?" scam. Dave shares an ongoing Elon Musk Bitcoin giveaway scam. Joe describes the malicious use of a compromised DHL email address. This week's catch of the day comes from down under. (Apologies to the fine citizens of Australia.) Carole Theriault returns with an interview with MimeCast's Matthew Gardiner. 
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.
 </description>
      <pubDate>Thu, 15 Nov 2018 06:00:00 -0000</pubDate>
      <itunes:title>CEOs can be the weakest link.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>25</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/91b457d4-a50b-11ea-9279-c3d8dbbcdbe6/image/Hacking-Humans-iTunes-art-1400x1400.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Listener feedback on the "Can you hear me?" scam. Dave shares an ongoing Elon Musk Bitcoin giveaway scam. Joe describes the malicious use of a compromised DHL email address. This week's catch of the day comes from down under. (Apologies to the fine citizens of Australia.) Carole Theriault returns with an interview with MimeCast's Matthew Gardiner. 
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.
 </itunes:summary>
      <content:encoded>
        <![CDATA[<p>Listener feedback on the "Can you hear me?" scam. Dave shares an ongoing Elon Musk Bitcoin giveaway scam. Joe describes the malicious use of a compromised DHL email address. This week's catch of the day comes from down under. (Apologies to the fine citizens of Australia.) Carole Theriault returns with an interview with MimeCast's Matthew Gardiner. </p><p>Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on<a href="https://twitter.com/HackingHumansCW"> Twitter</a>.</p><p> </p>]]>
      </content:encoded>
      <itunes:duration>2166</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[2c34afcc024d4c39a7f165b0e572d008]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW9418069906.mp3?updated=1633707723" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Human sources are essential.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/24/notes</link>
      <description>Joe gathers open source information online. Dave wonders if a tow truck driver got the better of him. A listener shares a possible custom app scam. Former FBI agent Dennis Franks shares his experience developing human intelligence sources.

Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter. </description>
      <pubDate>Thu, 08 Nov 2018 06:00:00 -0000</pubDate>
      <itunes:title>Human sources are essential.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>24</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/91cb3b2a-a50b-11ea-9279-db7f27b6f326/image/Hacking-Humans-iTunes-art-1400x1400.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Joe gathers open source information online. Dave wonders if a tow truck driver got the better of him. A listener shares a possible custom app scam. Former FBI agent Dennis Franks shares his experience developing human intelligence sources.

Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter. </itunes:summary>
      <content:encoded>
        <![CDATA[<p>Joe gathers open source information online. Dave wonders if a tow truck driver got the better of him. A listener shares a possible custom app scam. Former FBI agent Dennis Franks shares his experience developing human intelligence sources.</p><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on<a href="https://twitter.com/HackingHumansCW"> Twitter</a>. </p>]]>
      </content:encoded>
      <itunes:duration>1808</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[1d405e614a2444d09441f492999ffe78]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW3379033011.mp3?updated=1633707686" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Scams are fraud and fraud is crime.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/23/notes</link>
      <description>We get listener followup on the church pastor scam. Dave explores a phony investment web site. Joe explains phishing, spear phishing and whaling. Fake federal agents are featured in our catch of the day. Carole Theriault interviews Max Bruce from Action Fraud UK.

Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 01 Nov 2018 05:00:00 -0000</pubDate>
      <itunes:title>Scams are fraud and fraud is crime.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>23</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/91df6884-a50b-11ea-9279-b7f8669a70ab/image/Hacking-Humans-iTunes-art-1400x1400.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>We get listener followup on the church pastor scam. Dave explores a phony investment web site. Joe explains phishing, spear phishing and whaling. Fake federal agents are featured in our catch of the day. Carole Theriault interviews Max Bruce from Action Fraud UK.

Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>We get listener followup on the church pastor scam. Dave explores a phony investment web site. Joe explains phishing, spear phishing and whaling. Fake federal agents are featured in our catch of the day. Carole Theriault interviews Max Bruce from Action Fraud UK.</p><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on<a href="https://twitter.com/HackingHumansCW"> Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>1858</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[281d6d8d9a9f463a8427b3144a1a1276]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW7534608206.mp3?updated=1633707645" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Fear, flattery, greed and timing.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/22/notes</link>
      <description>We get followup feedback on gift cards. Joe describes a banking payment scam on a Canadian university. Dave reveals some sneaky apps. A reader shares a story worth its weight in gold. Jenny Radcliffe from Human Factor Security shares her insights on social engineering. 
Links to stories in this episode:
https://www.thestar.com/edmonton/2018/10/09/how-a-fraudster-got-12-million-out-of-a-canadian-university-they-just-asked-for-it.html
 https://www.forbes.com/sites/johnkoetsier/2018/10/04/app-scams-cheap-utility-apps-are-stealing-260-2500-or-even-4700-each-year-per-user/#9de2b67162ac

Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 25 Oct 2018 05:00:00 -0000</pubDate>
      <itunes:title>Fear, flattery, greed and timing.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>22</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/91f2a796-a50b-11ea-9279-c345fa86cdc3/image/Hacking-Humans-iTunes-art-1400x1400.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>We get followup feedback on gift cards. Joe describes a banking payment scam on a Canadian university. Dave reveals some sneaky apps. A reader shares a story worth its weight in gold. Jenny Radcliffe from Human Factor Security shares her insights on social engineering. 
Links to stories in this episode:
https://www.thestar.com/edmonton/2018/10/09/how-a-fraudster-got-12-million-out-of-a-canadian-university-they-just-asked-for-it.html
 https://www.forbes.com/sites/johnkoetsier/2018/10/04/app-scams-cheap-utility-apps-are-stealing-260-2500-or-even-4700-each-year-per-user/#9de2b67162ac

Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>We get followup feedback on gift cards. Joe describes a banking payment scam on a Canadian university. Dave reveals some sneaky apps. A reader shares a story worth its weight in gold. Jenny Radcliffe from Human Factor Security shares her insights on social engineering. </p><p>Links to stories in this episode:</p><p>https://www.thestar.com/edmonton/2018/10/09/how-a-fraudster-got-12-million-out-of-a-canadian-university-they-just-asked-for-it.html</p><p><a href="https://www.forbes.com/sites/johnkoetsier/2018/10/04/app-scams-cheap-utility-apps-are-stealing-260-2500-or-even-4700-each-year-per-user/#9de2b67162ac"> https://www.forbes.com/sites/johnkoetsier/2018/10/04/app-scams-cheap-utility-apps-are-stealing-260-2500-or-even-4700-each-year-per-user/#9de2b67162ac</a></p><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on<a href="https://twitter.com/HackingHumansCW"> Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>1859</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[2ac778671a964b0bb23a5b9bef07d03f]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW4702322837.mp3?updated=1633707598" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Waste my time and I'll waste yours back.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/21/notes</link>
      <description>Dave reveals a stealthy trademark scam. Joe describes the invocation of a judge's name to lure a victim. A listener shares a business scam from India. Joe interviews "Shannon," a listener who enjoys wasting phone scammer's time.

Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 18 Oct 2018 05:00:00 -0000</pubDate>
      <itunes:title>Waste my time and I'll waste yours back.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>21</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/920d3d36-a50b-11ea-9279-bb3dac3bc97e/image/Hacking-Humans-iTunes-art-1400x1400.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Dave reveals a stealthy trademark scam. Joe describes the invocation of a judge's name to lure a victim. A listener shares a business scam from India. Joe interviews "Shannon," a listener who enjoys wasting phone scammer's time.

Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Dave reveals a stealthy trademark scam. Joe describes the invocation of a judge's name to lure a victim. A listener shares a business scam from India. Joe interviews "Shannon," a listener who enjoys wasting phone scammer's time.</p><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on<a href="https://twitter.com/HackingHumansCW"> Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>1829</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b8d17e856f274ec5841600ec02beaf1d]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW9349829883.mp3?updated=1633707487" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Information is the life blood of social engineering.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/20/notes</link>
      <description>Joe ponders how a phone number is obtained. Dave's friend avoids a Google gift card scam. Christopher Hadnagy returns with an update to his book, The Science of Social Engineering.

Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 11 Oct 2018 05:00:00 -0000</pubDate>
      <itunes:title>Information is the life blood of social engineering.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>20</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/92236a84-a50b-11ea-9279-f7187c64c774/image/Hacking-Humans-iTunes-art-1400x1400.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Joe ponders how a phone number is obtained. Dave's friend avoids a Google gift card scam. Christopher Hadnagy returns with an update to his book, The Science of Social Engineering.

Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Joe ponders how a phone number is obtained. Dave's friend avoids a Google gift card scam. Christopher Hadnagy returns with an update to his book, The Science of Social Engineering.</p><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on<a href="https://twitter.com/HackingHumansCW"> Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>1870</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[f2765f9703a143beaa616c35a0cbdb12]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW2973700646.mp3?updated=1633707410" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Easier to trick than to hack.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/19/notes</link>
      <description>Dave dodges a local theater scam. Joe shares survey results from Black Hat attendees. A listener's calendar pops up alluring invitations. Carole Theriault interviews Sophos Naked Security writer Mark Stockley about password shortcomings. 

Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 04 Oct 2018 05:00:00 -0000</pubDate>
      <itunes:title>Easier to trick than to hack.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>19</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/923ea204-a50b-11ea-9279-6304c02b3d29/image/Hacking-Humans-iTunes-art-1400x1400.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Dave dodges a local theater scam. Joe shares survey results from Black Hat attendees. A listener's calendar pops up alluring invitations. Carole Theriault interviews Sophos Naked Security writer Mark Stockley about password shortcomings. 

Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Dave dodges a local theater scam. Joe shares survey results from Black Hat attendees. A listener's calendar pops up alluring invitations. Carole Theriault interviews Sophos Naked Security writer Mark Stockley about password shortcomings. </p><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on<a href="https://twitter.com/HackingHumansCW"> Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>2155</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[20218c2a4d9a4d4f917829b7ab193854]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW2216648356.mp3?updated=1633707372" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Kidnappers, robots and deep fakes.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/18/notes</link>
      <description>Joe shares a kidnapping scam targeting foreign students. Dave describes social engineering involving robots. Our guest is Robert Anderson from the Chertoff Group, discussing Deep Fake technology and how it erodes trust.
Links to stories mentioned in this week's show:
https://searchsecurity.techtarget.com/news/252448458/Robot-social-engineering-works-because-people-personify-robots
 
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 27 Sep 2018 05:00:00 -0000</pubDate>
      <itunes:title>Kidnappers, robots and deep fakes.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>18</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/92581d60-a50b-11ea-9279-f7fe3808b422/image/Hacking-Humans-iTunes-art-1400x1400.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Joe shares a kidnapping scam targeting foreign students. Dave describes social engineering involving robots. Our guest is Robert Anderson from the Chertoff Group, discussing Deep Fake technology and how it erodes trust.
Links to stories mentioned in this week's show:
https://searchsecurity.techtarget.com/news/252448458/Robot-social-engineering-works-because-people-personify-robots
 
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Joe shares a kidnapping scam targeting foreign students. Dave describes social engineering involving robots. Our guest is Robert Anderson from the Chertoff Group, discussing Deep Fake technology and how it erodes trust.</p><p>Links to stories mentioned in this week's show:</p><p>https://searchsecurity.techtarget.com/news/252448458/Robot-social-engineering-works-because-people-personify-robots</p><p> </p><p>Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on<a href="https://twitter.com/HackingHumansCW"> Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>1682</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[4b21aaa8b2db43e1a51e428ecd3265d0]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW6590252066.mp3?updated=1633707316" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Stringing along a scammer.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/17/notes</link>
      <description>Dave warns of scammers taking advantage of hurricane Florence, both on the phone and in person. Joe shares a scheme targeting the kindness of local churchgoers. A cosmic variation on the Nigerian email scam. Joe interviews his Johns Hopkins University colleague Chris Venghaus, who leads a tech support scammer on a wild goose chase.
Links to stories mentioned in this week's show:
https://www.13newsnow.com/video/weather/hurricanes/hurricane-florence/hurricane-scammers-target-hampton-roads/291-8250736
 
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 20 Sep 2018 05:00:00 -0000</pubDate>
      <itunes:title>Stringing along a scammer.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>17</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/92673b24-a50b-11ea-9279-23161309d0b5/image/Hacking-Humans-iTunes-art-1400x1400.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Dave warns of scammers taking advantage of hurricane Florence, both on the phone and in person. Joe shares a scheme targeting the kindness of local churchgoers. A cosmic variation on the Nigerian email scam. Joe interviews his Johns Hopkins University colleague Chris Venghaus, who leads a tech support scammer on a wild goose chase.
Links to stories mentioned in this week's show:
https://www.13newsnow.com/video/weather/hurricanes/hurricane-florence/hurricane-scammers-target-hampton-roads/291-8250736
 
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Dave warns of scammers taking advantage of hurricane Florence, both on the phone and in person. Joe shares a scheme targeting the kindness of local churchgoers. A cosmic variation on the Nigerian email scam. Joe interviews his Johns Hopkins University colleague Chris Venghaus, who leads a tech support scammer on a wild goose chase.</p><p>Links to stories mentioned in this week's show:</p><p>https://www.13newsnow.com/video/weather/hurricanes/hurricane-florence/hurricane-scammers-target-hampton-roads/291-8250736</p><p> </p><p>Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on<a href="https://twitter.com/HackingHumansCW"> Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>1775</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c123f2c7fe9e46369f1ed6038621d23a]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW1838532639.mp3?updated=1633707221" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Influence versus manipulation.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/16/notes</link>
      <description>Joe describes a law firm impersonating a rival to funnel business away from them. Dave has a story of pontiff impersonation. Our guest is Joe Gray from Advanced Persistent Security. 
Links to stories mentioned in this week's show:
https://www.theregister.co.uk/2018/08/27/lawyers_impersonating_rivals/
 https://www.ccn.com/pope-francis-latest-target-of-twitter-crypto-scam/
 
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 13 Sep 2018 10:00:00 -0000</pubDate>
      <itunes:title>Influence versus manipulation.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>16</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/927b5b04-a50b-11ea-9279-c3c609a76223/image/Hacking-Humans-iTunes-art-1400x1400.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Joe describes a law firm impersonating a rival to funnel business away from them. Dave has a story of pontiff impersonation. Our guest is Joe Gray from Advanced Persistent Security. 
Links to stories mentioned in this week's show:
https://www.theregister.co.uk/2018/08/27/lawyers_impersonating_rivals/
 https://www.ccn.com/pope-francis-latest-target-of-twitter-crypto-scam/
 
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Joe describes a law firm impersonating a rival to funnel business away from them. Dave has a story of pontiff impersonation. Our guest is Joe Gray from Advanced Persistent Security. </p><p>Links to stories mentioned in this week's show:</p><p>https://www.theregister.co.uk/2018/08/27/lawyers_impersonating_rivals/</p><p><a href="https://www.ccn.com/pope-francis-latest-target-of-twitter-crypto-scam/"> https://www.ccn.com/pope-francis-latest-target-of-twitter-crypto-scam/</a></p><p> </p><p>Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on<a href="https://twitter.com/HackingHumansCW"> Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>1853</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[e4f6bd53b68b43a79a3dd59e1a7ad5d2]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW2117068014.mp3?updated=1633707178" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Real estate transactions in the crosshairs.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/15/notes</link>
      <description>Dave gets scammed on an exit ramp. Joe describes real estate transaction scams. Is LinkedIn moonlighting in Himalayan tourism? Guest Asaf Cidon from Barracuda Networks shares social engineering trends his team is tracking.
Links to stories mentioned in this week's show:
 http://www.baltimoresun.com/news/maryland/crime/bs-md-ramp-scam-20161018-story.html
https://www.cyberradio.com/2018/08/threat-actors-targeting-homebuyers-with-phishing-attacks/
 
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 06 Sep 2018 10:00:00 -0000</pubDate>
      <itunes:title>Real estate transactions in the crosshairs.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>15</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/92913208-a50b-11ea-9279-ebaac21be173/image/Hacking-Humans-iTunes-art-1400x1400.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Dave gets scammed on an exit ramp. Joe describes real estate transaction scams. Is LinkedIn moonlighting in Himalayan tourism? Guest Asaf Cidon from Barracuda Networks shares social engineering trends his team is tracking.
Links to stories mentioned in this week's show:
 http://www.baltimoresun.com/news/maryland/crime/bs-md-ramp-scam-20161018-story.html
https://www.cyberradio.com/2018/08/threat-actors-targeting-homebuyers-with-phishing-attacks/
 
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Dave gets scammed on an exit ramp. Joe describes real estate transaction scams. Is LinkedIn moonlighting in Himalayan tourism? Guest Asaf Cidon from Barracuda Networks shares social engineering trends his team is tracking.</p><p>Links to stories mentioned in this week's show:</p><p><a href="http://www.baltimoresun.com/news/maryland/crime/bs-md-ramp-scam-20161018-story.html"> http://www.baltimoresun.com/news/maryland/crime/bs-md-ramp-scam-20161018-story.html</a></p><p>https://www.cyberradio.com/2018/08/threat-actors-targeting-homebuyers-with-phishing-attacks/</p><p> </p><p>Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on<a href="https://twitter.com/HackingHumansCW"> Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>1835</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[041ffebf8c334a29a9ac12736ebc6df6]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW1819382117.mp3?updated=1633706718" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Red teaming starts with research.</title>
      <link>https://have%20a%20catch%20of%20the%20day%20you%27d%20like%20to%20share/?%20Email%20it%20to%20us%20at%20hackinghumans@thecyberwire.com%20or%20hit%20us%20up%20on%20Twitter.%20%20thecyberwire.com/podcasts/hacking-humans/14/notes</link>
      <description>Joe describes an Office 365 phishing campaign. Dave warns of dangerous USB cables. A listener shares a fax from the UK. Joe interviews security consultant and pen tester Justin White.
Links to stories mentioned in this week's show:
https://www.helpnetsecurity.com/2018/08/15/office-365-phishing-sharepoint/
https://srlabs.de/bites/usb-peripherals-turn/
 https://www.bleepingcomputer.com/news/security/usbharpoon-is-a-badusb-attack-with-a-twist/
 
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 30 Aug 2018 10:00:00 -0000</pubDate>
      <itunes:title>Red teaming starts with research.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>14</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/92b91b9c-a50b-11ea-9279-ff0aff583bea/image/Hacking-Humans-iTunes-art-1400x1400.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Joe describes an Office 365 phishing campaign. Dave warns of dangerous USB cables. A listener shares a fax from the UK. Joe interviews security consultant and pen tester Justin White.
Links to stories mentioned in this week's show:
https://www.helpnetsecurity.com/2018/08/15/office-365-phishing-sharepoint/
https://srlabs.de/bites/usb-peripherals-turn/
 https://www.bleepingcomputer.com/news/security/usbharpoon-is-a-badusb-attack-with-a-twist/
 
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Joe describes an Office 365 phishing campaign. Dave warns of dangerous USB cables. A listener shares a fax from the UK. Joe interviews security consultant and pen tester Justin White.</p><p>Links to stories mentioned in this week's show:</p><p>https://www.helpnetsecurity.com/2018/08/15/office-365-phishing-sharepoint/</p><p><a href="https://srlabs.de/bites/usb-peripherals-turn/">https://srlabs.de/bites/usb-peripherals-turn/</a></p><p><a href="https://www.bleepingcomputer.com/news/security/usbharpoon-is-a-badusb-attack-with-a-twist/"> https://www.bleepingcomputer.com/news/security/usbharpoon-is-a-badusb-attack-with-a-twist/</a></p><p> </p><p>Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on<a href="https://twitter.com/HackingHumansCW"> Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>1805</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[edb2c48a53c8404babeb1d65f80d2df5]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW3263365586.mp3?updated=1633706666" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Telling the truth in a dishonest way.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/13/notes</link>
      <description>Dave looks at Hollywood script pitch event scams. Joe describes a romance scam murder scheme. Spontaneously combusting ATM cards. Guest Jayson E. Street from SphereNY describes his security awareness engagements.
Links to stories mentioned in this week's show:
https://www.hollywoodreporter.com/news/why-are-wannabe-screenwriters-getting-scammed-1130919
https://nakedsecurity.sophos.com/2018/08/17/romance-scam-victim-allegedly-plotted-to-kill-her-mother-for-cash/
 
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 23 Aug 2018 10:00:00 -0000</pubDate>
      <itunes:title>Telling the truth in a dishonest way.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>13</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/92caad44-a50b-11ea-9279-f3d18c992d06/image/Hacking-Humans-iTunes-art-1400x1400.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Dave looks at Hollywood script pitch event scams. Joe describes a romance scam murder scheme. Spontaneously combusting ATM cards. Guest Jayson E. Street from SphereNY describes his security awareness engagements.
Links to stories mentioned in this week's show:
https://www.hollywoodreporter.com/news/why-are-wannabe-screenwriters-getting-scammed-1130919
https://nakedsecurity.sophos.com/2018/08/17/romance-scam-victim-allegedly-plotted-to-kill-her-mother-for-cash/
 
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Dave looks at Hollywood script pitch event scams. Joe describes a romance scam murder scheme. Spontaneously combusting ATM cards. Guest Jayson E. Street from SphereNY describes his security awareness engagements.</p><p>Links to stories mentioned in this week's show:</p><p>https://www.hollywoodreporter.com/news/why-are-wannabe-screenwriters-getting-scammed-1130919</p><p>https://nakedsecurity.sophos.com/2018/08/17/romance-scam-victim-allegedly-plotted-to-kill-her-mother-for-cash/</p><p> </p><p>Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on<a href="https://twitter.com/HackingHumansCW"> Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>1836</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[2f8a5d59b4b74e2d923e7fd8a14f7b57]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW1212479774.mp3?updated=1633706611" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Sometimes less is more.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/12/notes</link>
      <description>Joe shares the story of a retiree scammed by a clever scheme. Dave describes a tech-support scam with a Russian twist. Our Catch of the Day features an adorable puppy. Guest Michael Murray from Lookout explains mobile device vulnerabilities.
Links to stories mentioned in this week's show:
https://www.scamwatch.gov.au/get-help/real-life-stories/investment-scam-how-steve-lost-200-000-to-an-investment-scam
https://www.grahamcluley.com/phone-scam-exploits-russian-hacking-fears/
 
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 16 Aug 2018 10:00:00 -0000</pubDate>
      <itunes:title>Sometimes less is more.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>12</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/92e26b8c-a50b-11ea-9279-e36cf2446e7a/image/Hacking-Humans-iTunes-art-1400x1400.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Joe shares the story of a retiree scammed by a clever scheme. Dave describes a tech-support scam with a Russian twist. Our Catch of the Day features an adorable puppy. Guest Michael Murray from Lookout explains mobile device vulnerabilities.
Links to stories mentioned in this week's show:
https://www.scamwatch.gov.au/get-help/real-life-stories/investment-scam-how-steve-lost-200-000-to-an-investment-scam
https://www.grahamcluley.com/phone-scam-exploits-russian-hacking-fears/
 
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Joe shares the story of a retiree scammed by a clever scheme. Dave describes a tech-support scam with a Russian twist. Our Catch of the Day features an adorable puppy. Guest Michael Murray from Lookout explains mobile device vulnerabilities.</p><p>Links to stories mentioned in this week's show:</p><p>https://www.scamwatch.gov.au/get-help/real-life-stories/investment-scam-how-steve-lost-200-000-to-an-investment-scam</p><p>https://www.grahamcluley.com/phone-scam-exploits-russian-hacking-fears/</p><p> </p><p>Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on<a href="https://twitter.com/HackingHumansCW"> Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>2165</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[e38958bc26fe4ab38c6a1a55735362de]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW6744647273.mp3?updated=1633706565" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Focus, technology, and training fight phishing.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/11/notes</link>
      <description>Dave describes a phishing attempt to infiltrate U.S. election systems. Joe shares a story of government agencies receiving malicious CDs in the mail. University employees are lured by greed. And David Baggett from Inky joins us to describe phishing techniques they are seeing and offers ways to best protect yourself and your organization.
Links to stories mentioned in this week's show:
 https://theintercept.com/2018/06/01/election-hacking-voting-systems-email/
 https://krebsonsecurity.com/2018/07/state-govts-warned-of-malware-laden-cd-sent-via-snail-mail-from-china/
 http://hci2018.bcs.org/prelim_proceedings/papers/Work-in-Progress%20Track/BHCI-2018_paper_95.pdf

Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 09 Aug 2018 10:00:00 -0000</pubDate>
      <itunes:title>Focus, technology, and training fight phishing.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>11</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/92fcc7fc-a50b-11ea-9279-6789b2bdaa4d/image/Hacking-Humans-iTunes-art-1400x1400.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Dave describes a phishing attempt to infiltrate U.S. election systems. Joe shares a story of government agencies receiving malicious CDs in the mail. University employees are lured by greed. And David Baggett from Inky joins us to describe phishing techniques they are seeing and offers ways to best protect yourself and your organization.
Links to stories mentioned in this week's show:
 https://theintercept.com/2018/06/01/election-hacking-voting-systems-email/
 https://krebsonsecurity.com/2018/07/state-govts-warned-of-malware-laden-cd-sent-via-snail-mail-from-china/
 http://hci2018.bcs.org/prelim_proceedings/papers/Work-in-Progress%20Track/BHCI-2018_paper_95.pdf

Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Dave describes a phishing attempt to infiltrate U.S. election systems. Joe shares a story of government agencies receiving malicious CDs in the mail. University employees are lured by greed. And David Baggett from Inky joins us to describe phishing techniques they are seeing and offers ways to best protect yourself and your organization.</p><p>Links to stories mentioned in this week's show:</p><p><a href="https://theintercept.com/2018/06/01/election-hacking-voting-systems-email/"> https://theintercept.com/2018/06/01/election-hacking-voting-systems-email/</a></p><p><a href="https://krebsonsecurity.com/2018/07/state-govts-warned-of-malware-laden-cd-sent-via-snail-mail-from-china/"> https://krebsonsecurity.com/2018/07/state-govts-warned-of-malware-laden-cd-sent-via-snail-mail-from-china/</a></p><p><a href="http://hci2018.bcs.org/prelim_proceedings/papers/Work-in-Progress%20Track/BHCI-2018_paper_95.pdf"> http://hci2018.bcs.org/prelim_proceedings/papers/Work-in-Progress%20Track/BHCI-2018_paper_95.pdf</a></p><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on<a href="https://twitter.com/HackingHumansCW"> Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>1755</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[19f79aafe518442885f94dbf6e2f765d]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW5609405672.mp3?updated=1633706521" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Luring unsuspecting money mules.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/10/notes</link>
      <description>Joe describes clever gift card scams. Dave follows up on last week's proposal to waste phone scammer's time. A more plausible phishing scheme comes through. Guest David Shear from Flashpoint describes methods scammers use to lure people into being money mules.
Links:
https://securelist.com/giftcard-generators/86522/
https://jollyrogertelephone.com/
 
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter. </description>
      <pubDate>Thu, 02 Aug 2018 10:00:00 -0000</pubDate>
      <itunes:title>Luring unsuspecting money mules.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>10</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/932f61c6-a50b-11ea-9279-97c6a058dfef/image/Hacking-Humans-iTunes-art-1400x1400.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Joe describes clever gift card scams. Dave follows up on last week's proposal to waste phone scammer's time. A more plausible phishing scheme comes through. Guest David Shear from Flashpoint describes methods scammers use to lure people into being money mules.
Links:
https://securelist.com/giftcard-generators/86522/
https://jollyrogertelephone.com/
 
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter. </itunes:summary>
      <content:encoded>
        <![CDATA[<p>Joe describes clever gift card scams. Dave follows up on last week's proposal to waste phone scammer's time. A more plausible phishing scheme comes through. Guest David Shear from Flashpoint describes methods scammers use to lure people into being money mules.</p><p>Links:</p><p><a href="https://securelist.com/giftcard-generators/86522/">https://securelist.com/giftcard-generators/86522/</a></p><p><a href="https://jollyrogertelephone.com/">https://jollyrogertelephone.com/</a></p><p> </p><p>Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on<a href="https://twitter.com/HackingHumansCW"> Twitter</a>. </p>]]>
      </content:encoded>
      <itunes:duration>1791</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[bd4b29dc5af94750bd1ddf4603ff348d]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW1606476374.mp3?updated=1633706489" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Nothing up my sleeve.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/9/notes</link>
      <description>Dave shares a story of deception right out of Hollywood.
https://www.hollywoodreporter.com/features/hunting-con-queen-hollywood-1125932
Joe proposes changing the financial incentives for scammers.
A porn-shaming catch of the day courtesy of Johannes Ulrich.
An interview with atomic physicist and close-up magician Adam West.

Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter. </description>
      <pubDate>Thu, 26 Jul 2018 10:00:00 -0000</pubDate>
      <itunes:title>Nothing up my sleeve.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>9</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/93577e04-a50b-11ea-9279-b3164d111302/image/Hacking-Humans-iTunes-art-1400x1400.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Dave shares a story of deception right out of Hollywood.
https://www.hollywoodreporter.com/features/hunting-con-queen-hollywood-1125932
Joe proposes changing the financial incentives for scammers.
A porn-shaming catch of the day courtesy of Johannes Ulrich.
An interview with atomic physicist and close-up magician Adam West.

Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter. </itunes:summary>
      <content:encoded>
        <![CDATA[<p>Dave shares a story of deception right out of Hollywood.</p><p>https://www.hollywoodreporter.com/features/hunting-con-queen-hollywood-1125932</p><p>Joe proposes changing the financial incentives for scammers.</p><p>A porn-shaming catch of the day courtesy of Johannes Ulrich.</p><p>An interview with atomic physicist and close-up magician Adam West.</p><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on<a href="https://twitter.com/HackingHumansCW"> Twitter</a>. </p>]]>
      </content:encoded>
      <itunes:duration>1851</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b8429c87665143c3b58812e0126d9d8a]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW8264705217.mp3?updated=1633706394" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Think like an attacker.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/8/notes</link>
      <description>Joe describes a con law enforcement agencies use to lure crooks. Dave shares a tech support scan spreading in chat forums. A listener from Dublin has a fake email from Apple. We welcome Rachel Tobac, CEO of SocialProof Security.

Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 19 Jul 2018 11:00:00 -0000</pubDate>
      <itunes:title>Think like an attacker.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>8</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/936f07ea-a50b-11ea-9279-13a76dedb9fa/image/Hacking-Humans-iTunes-art-1400x1400.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Joe describes a con law enforcement agencies use to lure crooks. Dave shares a tech support scan spreading in chat forums. A listener from Dublin has a fake email from Apple. We welcome Rachel Tobac, CEO of SocialProof Security.

Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Joe describes a con law enforcement agencies use to lure crooks. Dave shares a tech support scan spreading in chat forums. A listener from Dublin has a fake email from Apple. We welcome Rachel Tobac, CEO of SocialProof Security.</p><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on<a href="https://twitter.com/HackingHumansCW"> Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>1805</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[457682584c8146c5b4a3d63277f91003]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW5037494729.mp3?updated=1633706359" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Presidential prank, pensioner pilfered.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/7/notes</link>
      <description>Dave recounts the news that US President Trump likely fell for a prank phone call. Joe outlines the sad story of a woman robbed of her retirement savings. Twitter account recovery scams. Charles Arthur, author of Cyber Wars - Hacks that Shocked the Business World, joins us for an interview. 

Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 12 Jul 2018 11:00:00 -0000</pubDate>
      <itunes:title>Presidential prank, pensioner pilfered.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>7</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/9387ff66-a50b-11ea-9279-b362224e4337/image/Hacking-Humans-iTunes-art-1400x1400.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Dave recounts the news that US President Trump likely fell for a prank phone call. Joe outlines the sad story of a woman robbed of her retirement savings. Twitter account recovery scams. Charles Arthur, author of Cyber Wars - Hacks that Shocked the Business World, joins us for an interview. 

Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Dave recounts the news that US President Trump likely fell for a prank phone call. Joe outlines the sad story of a woman robbed of her retirement savings. Twitter account recovery scams. Charles Arthur, author of Cyber Wars - Hacks that Shocked the Business World, joins us for an interview. </p><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on<a href="https://twitter.com/HackingHumansCW"> Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>1843</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[6173dbcd55634738bf75901877bdd495]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW7093878613.mp3?updated=1633706300" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Phone scams, phantom employees and sitting Ducks.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/6/notes</link>
      <description>Joe warns of a harrowing phone scam technique, Dave reveals an alternate persona, a listener tries to sell a truck, and Carole Theriault from the Smashing Security Podcast interviews Sophos' Paul Ducklin.

Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 05 Jul 2018 11:00:00 -0000</pubDate>
      <itunes:title>Phone scams, phantom employees and sitting Ducks.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>6</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/939b0e58-a50b-11ea-9279-8fe20e695f10/image/Hacking-Humans-iTunes-art-1400x1400.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Joe warns of a harrowing phone scam technique, Dave reveals an alternate persona, a listener tries to sell a truck, and Carole Theriault from the Smashing Security Podcast interviews Sophos' Paul Ducklin.

Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Joe warns of a harrowing phone scam technique, Dave reveals an alternate persona, a listener tries to sell a truck, and Carole Theriault from the Smashing Security Podcast interviews Sophos' Paul Ducklin.</p><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on<a href="https://twitter.com/HackingHumansCW"> Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>1844</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[9fddbf8a673c494392d07d8f4f7e8532]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW7742774335.mp3?updated=1633706254" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Separating fools from money.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/5/notes</link>
      <description>Dave shares a story of airport penetration testing with high degree of yuck-factor. Joe explores research on protecting passwords from social engineering. The catch-of-the-day comes courtesy of Graham Cluley's email spam box. Dave interviews Wired's Security Staff Writer Lily Hay Newman on her  article tracking Nigerian email scammers. 
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</description>
      <pubDate>Thu, 28 Jun 2018 11:00:00 -0000</pubDate>
      <itunes:title>Separating fools from money.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>5</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/93a9833e-a50b-11ea-9279-e74571cfa901/image/Hacking-Humans-iTunes-art-1400x1400.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Dave shares a story of airport penetration testing with high degree of yuck-factor. Joe explores research on protecting passwords from social engineering. The catch-of-the-day comes courtesy of Graham Cluley's email spam box. Dave interviews Wired's Security Staff Writer Lily Hay Newman on her  article tracking Nigerian email scammers. 
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Dave shares a story of airport penetration testing with high degree of yuck-factor. Joe explores research on protecting passwords from social engineering. The catch-of-the-day comes courtesy of Graham Cluley's email spam box. Dave interviews Wired's Security Staff Writer Lily Hay Newman on her <a href="https://www.wired.com/story/nigerian-email-scammers-more-effective-than-ever/"> article tracking Nigerian email scammers. </a></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:duration>1783</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[8f1e04c06ba642e3b5eb8df9832c9797]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW3962371967.mp3?updated=1633706176" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Playing on kindness.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/4/notes</link>
      <description>Joe explains the Ben Franklin effect. Dave describes job applicants tricked unto money laundering. A listener tells a tale of being fooled by an appeal to greed. Joe interviews Stacey Cameron from DirectDefense about her physical penetration testing work.</description>
      <pubDate>Thu, 21 Jun 2018 05:00:00 -0000</pubDate>
      <itunes:title>Playing on kindness.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>4</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Joe explains the Ben Franklin effect. Dave describes job applicants tricked unto money laundering. A listener tells a tale of being fooled by an appeal to greed. Joe interviews Stacey Cameron from DirectDefense about her physical penetration testing work.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Joe explains the Ben Franklin effect. Dave describes job applicants tricked unto money laundering. A listener tells a tale of being fooled by an appeal to greed. Joe interviews Stacey Cameron from DirectDefense about her physical penetration testing work.</p>]]>
      </content:encoded>
      <itunes:duration>1377</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[4e0d20d4-abe5-11ea-b0c8-cf937586d6d3]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW7290102166.mp3?updated=1633706137" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Gaming pro athletes online.</title>
      <link>https://thecyberwire.com/podcasts/career-notes/3/notes</link>
      <description>Joe warns of scammers taking advantage of natural disasters, Dave explores romance scams, and gets a strange voice mail. 
Stephen Frank from the National Hockey League Players Association joins us to share how professional athletes protect themselves from online scams. </description>
      <pubDate>Thu, 14 Jun 2018 05:00:00 -0000</pubDate>
      <itunes:title>Gaming pro athletes online.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>3</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Joe warns of scammers taking advantage of natural disasters, Dave explores romance scams, and gets a strange voice mail. 
Stephen Frank from the National Hockey League Players Association joins us to share how professional athletes protect themselves from online scams. </itunes:summary>
      <content:encoded>
        <![CDATA[<p>Joe warns of scammers taking advantage of natural disasters, Dave explores romance scams, and gets a strange voice mail. </p><p>Stephen Frank from the National Hockey League Players Association joins us to share how professional athletes protect themselves from online scams. </p>]]>
      </content:encoded>
      <itunes:duration>1863</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c2beb1be-abe4-11ea-a5be-8bada1d1c211]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW1137660449.mp3?updated=1633706091" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>A flood of misinformation and fake news.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/2/notes</link>
      <description>In this episode, Joe examines the anatomy of a phishing attack, Dave explores pretexting, and a scammer targets real estate agents. 
Professor Stephen Lewandowsky from the University of Bristol joins us to share his research on misinformation, fake news, and inoculating people against them. </description>
      <pubDate>Thu, 07 Jun 2018 05:00:00 -0000</pubDate>
      <itunes:title>A flood of misinformation and fake news.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>2</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>In this episode, Joe examines the anatomy of a phishing attack, Dave explores pretexting, and a scammer targets real estate agents. 
Professor Stephen Lewandowsky from the University of Bristol joins us to share his research on misinformation, fake news, and inoculating people against them. </itunes:summary>
      <content:encoded>
        <![CDATA[<p>In this episode, Joe examines the anatomy of a phishing attack, Dave explores pretexting, and a scammer targets real estate agents. </p><p>Professor Stephen Lewandowsky from the University of Bristol joins us to share his research on misinformation, fake news, and inoculating people against them. </p>]]>
      </content:encoded>
      <itunes:duration>1861</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[0afb3f84-abe4-11ea-a717-ff9b7fc5e4fd]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW4146223923.mp3?updated=1633703804" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Social Engineering works because we're human.</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/1/notes</link>
      <description>In this premier episode of the Hacking Humans podcast, cohosts Dave Bittner from the CyberWire and Joe Carrigan from the Johns Hopkins University Information Security Institute discuss noteworthy social engineering schemes and ways to detect them. 
Author Christopher Hadnagy discusses his book The Art of Human Hacking. </description>
      <pubDate>Wed, 30 May 2018 05:00:00 -0000</pubDate>
      <itunes:title>Social Engineering works because we're human.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>1</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>In this premier episode of the Hacking Humans podcast, cohosts Dave Bittner from the CyberWire and Joe Carrigan from the Johns Hopkins University Information Security Institute discuss noteworthy social engineering schemes and ways to detect them. 
Author Christopher Hadnagy discusses his book The Art of Human Hacking. </itunes:summary>
      <content:encoded>
        <![CDATA[<p>In this premier episode of the Hacking Humans podcast, cohosts Dave Bittner from <a href="https://thecyberwire.com/">the CyberWire</a> and Joe Carrigan from the <a href="https://isi.jhu.edu/">Johns Hopkins University Information Security Institute</a> discuss noteworthy social engineering schemes and ways to detect them. </p><p>Author Christopher Hadnagy discusses his book The Art of Human Hacking. </p>]]>
      </content:encoded>
      <itunes:duration>1825</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[73ba12bc-abe3-11ea-8086-075f94b0f5d9]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW8810359357.mp3?updated=1633703747" length="0" type="audio/mpeg"/>
    </item>
  </channel>
</rss>
