logo
episode-header-image
Jun 2021
43m 15s

Hacking Humans

iHeartPodcasts
About this episode

The days of robbing banks at gunpoint are gone. It's much more profitable to hijack networks. To better protect themselves companies hire people to test their security, but no firewall is going to stop a social engineer. Especially not one like Chris Hadnagy.

Learn more about your ad-choices at https://www.iheartpodcastnetwork.com

See omnystudio.com/listener for privacy information.

Up next
Sep 2022
House Hacking
Even if you think you can't afford it, there are ways to buy a home and leverage it as an investment. Real Estate prodigy Skylar Brillante drops by to drop some knowledge on me. He explains how investors do things, how to buy a house and what your options are if you already own a ... Show More
20m 36s
May 2022
A Stroke of Insight
A DNA test sends me down the rabbit hole of ancestry until I’m stuck with a dilemma that could change my life. I don’t remember my grandparents. When their stories were told it meant nothing to me. A DNA test inspires me to discover my ancestry for myself until a sudden event cha ... Show More
31m 41s
Apr 2022
Part 1: The Polgar Sisters
Can prodigies be created with early specialization? Laszlo Polgar was an educational psychologist who believed they could. He experimented with his own children and the results were fascinating. This is Part 1 of a re-release of the first 3 Prodigy episodes. They are meant to be ... Show More
33m 50s
Recommended Episodes
Jan 2022
How Can You Get Paid to Break Into Stuff?
Crime doesn't pay -- but penetration testing does. Learn why companies pay hackers to break into their networks and offices in this episode of BrainStuff, based on this article: https://computer.howstuffworks.com/hack-networks-security-news.htm Learn more about your ad-choices at ... Show More
7m 23s
Nov 2020
The psychology of hacking
Another day, another breach. Organisations are still being hacked by malicious counterparts everyday, and the reason they're always a step ahead is not only gender diversity but a skills diversity as well - meanwhile we're still relying on our IT departments to handle cyber breac ... Show More
23m 59s
Jul 2020
69: Human Hacker
We all know that computers and networks are vulnerable to hacking and malicious actors, but what about us, the humans who interface with these devices? Con games, scams, and strategic deception are far older than computers, and in the modern era, these techniques can make humans ... Show More
1h 4m
Jul 2021
Hacking humans: social engineering and the power of influence
Chris Hadnagy’s job involves breaking into banks. But he’s not after money, gold or jewels. He’s searching for weaknesses – in systems, in security, and in people.  And he doesn’t use weapons or threats of violence to get past guards and into vaults. He uses a smile - and a few t ... Show More
29m 8s
Mar 2022
Hacking humans: social engineering and the power of influence
Chris Hadnagy’s job involves breaking into banks. But he’s not after money, gold or jewels. He’s searching for weaknesses – in systems, in security, and in people.  And he doesn’t use weapons or threats of violence to get past guards and into vaults. He uses a smile - and a few t ... Show More
29m 6s
Jul 2016
Why Shouldn't I Rob A Bank?
Robbing a bank is a dumb idea. And not just because it's illegal. Learn more about your ad-choices at https://www.iheartpodcastnetwork.comSee omnystudio.com/listener for privacy information. 
5m 3s
Jun 2019
From the Vault: Neurosecurity: Dawn of the Brain Hackers
While hackers and malware can certainly cause a great deal of damage and misery, these dangers can’t hurt us physically, right? In this episode of the Stuff to Blow Your Mind podcast, Robert and Joe are sorry to say you’re wrong -- and as more biotechnology and brain-computer int ... Show More
1h 18m
Sep 2022
How To Protect Yourself From Social Engineering Hacks
Hacks are increasing but the hackers are not necessarily getting more sophisticated. What do Twitter, Twilio, and Uber all have in common? They were all hacked by, in part, a conversation. In all three cases, the hack was helped along by social engineering. Someone contacted an e ... Show More
29m 32s
Mar 2018
Hack Attack
A mysterious computer crash pushes a thriving manufacturing company to the brink of collapse, jeopardizing the jobs of hundreds of employees. There is no apparent cause and no obvious clues. Forensic investigators must determine if the crash was the result of a computer defect, h ... Show More
21m 21s
Nov 2019
Kevin Mitnick - The World's Most Famous Hacker | Mystery and Murder: Analysis by Dr. Phil
Cybersecurity expert and “the world’s most famous hacker” Kevin Mitnick demonstrates some methods hackers use to access sensitive information, and gives valuable tips to keep yourself safe in the cyberworld. Dr. Phil says, "This is a time that it is really important because we're ... Show More
1h 3m