Eddie Miro brings years of social engineering experience to bear on an educational and entertaining program around all things social engineering.
…
continue reading
From SocialEngineer Podcasts
Get ready for a deep dive into what cybersecurity professionals often refer to as the "8th Layer" of security: HUMANS. Welcome to 8th Layer Insights (8Li). This podcast is a multidisciplinary exploration into how the complexities of human nature affect security and risk. Author, security researcher, and behavior science enthusiast Perry Carpenter taps experts for their insights and illumination. Topics include cybersecurity, psychology, behavior science, communication, leadership, and more.
…
continue reading
10 Minutes could save your wallet! In Scams, Hacks, and Frauds, we delve into true crime stories involving real scams, hacks, and frauds. Each episode seeks to uncover the methods behind scams and provide listeners with essential tips to protect themselves and their loved ones from falling victim to fraud.
…
continue reading
Musing On Society, Technology, and Cybersecurity | Hosted by Marco Ciappelli Letās face it: the future is now. We live in a hybrid analog-digital society, and itās time to stop ignoring the profound impact technology has on our lives. The line between the physical and virtual worlds? Itās no longer real ā just a figment of our imagination. Weāre constantly juggling convenience, privacy, freedom, security, and even the future of humanity in a precarious balancing act. Thereās no better place ...
…
continue reading
Cypher Tech Hacks is an electrifying deep dive into the world of cyber scams and digital deceptions, where host Alex Cipher unpacks intricate hacking techniques into simple, step-by-step explanations. Each episode dissects legendary cyber exploits and high-tech frauds, making complex digital heists accessible and engaging for tech enthusiasts. Beyond the captivating tales, the podcast empowers listeners with practical insights and preventive measures to fortify their digital defenses.
…
continue reading
Thought leaders and experts Max Aulakh (Ignyte) and Joel Yonts (Secure Robotics) cover subjects such as the development of AI, cyber security and the how the future looks in terms of cyber risk.
…
continue reading
When the threats are real and the stakes are high ā what actually works? Right now, as you're reading this, someone's watching your family, your business rivals are digging through your digital history, and a disgruntled employee knows exactly where your vulnerabilities are. While you're focused on your day job, they're building a plan. This podcast exists because ignoring threats doesn't make them disappear. I'm Philip Grindell ā former Scotland Yard detective, behavioural threat specialist ...
…
continue reading
The Social-Engineer Podcast is about humans. Understanding how we interact, communicate and relay information can help us protect, mitigate and understand social engineering attacks
…
continue reading

1
Ep. 321 - Security Awareness Series - Trust But Verify Even Under Abnormal Circumstances: A Red Team Story with Chris and Faith
29:29
29:29
Play later
Play later
Lists
Like
Liked
29:29Today on the Social-Engineer Podcast: The Security Awareness Series, Chris is joined by Faith Kent. Together, they delve into the critical role of effective communication, the art of role adaptation, and the psychological dynamics in crisis situations. The conversation highlights the importance of proactive preparedness and fostering trust within tā¦
…
continue reading

1
We Have All the Information, So Why Do We Know Less? | Analog Minds in a Digital World: Part 1 | Musing On Society And Technology Newsletter | Article Written By Marco Ciappelli
9:45
9:45
Play later
Play later
Lists
Like
Liked
9:45āø» Podcast: Redefining Society and Technology https://redefiningsocietyandtechnologypodcast.com _____ Newsletter: Musing On Society And Technology https://www.linkedin.com/newsletters/musing-on-society-technology-7079849705156870144/ _____ Watch on Youtube: https://youtu.be/nFn6CcXKMM0 _____ My Website: https://www.marcociappelli.com _______________ā¦
…
continue reading

1
Scan or Scam? - Is that QR code setting you up to get scammed? (Scams, Hacks and Frauds)
9:17
9:17
Play later
Play later
Lists
Like
Liked
9:17This week on Scams, Hacks, and Frauds, we dive into the alarming rise of QR code scams that are turning a once-innovative technology into a tool for fraud. Remember when QR codes were heralded as the future of convenience? Unfortunately, they have now become a gateway for scammers to exploit unsuspecting victims. Join us as we recount the cautionarā¦
…
continue reading

1
Ep. 320 - Human Element Series - Using Gestures To Enhanced Communications with Lauren Gawne
33:03
33:03
Play later
Play later
Lists
Like
Liked
33:03Today we are joined by Lauren Gawne. Lauren is a Senior Lecturer in linguistics at La Trobe University. Her work focuses on understanding how people use gestures and grammar, with a particular focus on cross-cultural gesture use. Lauren also does research on emoji, scicomm and the grammar of Tibetan languages in Nepal. [Sept 8, 2025] 00:00 - Intro ā¦
…
continue reading
Some cons donāt succeed because of the smooth-talking seller. Instead, they succeed because of the crowd. Enter The Shill -- a hidden accomplice pretending to be just another customer, audience member, or lucky passerby. They're in the crowd, acting as a 'normal' audience member... all with the goal of bringing validation to the con-artist's claimsā¦
…
continue reading

1
Tech Entrepreneur and Author's AI Prediction - The Last Book Written by a Human Interview | A Conversation with Jeff Burningham | Redefining Society And Technology Podcast With Marco Ciappelli
36:23
36:23
Play later
Play later
Lists
Like
Liked
36:23āø» Podcast: Redefining Society and Technology https://redefiningsocietyandtechnologypodcast.com ______Title: Tech Entrepreneur and Author's AI Prediction - The Last Book Written by a Human Interview | A Conversation with Jeff Burningham | Redefining Society And Technology Podcast With Marco Ciappelli ______Guest: Jeff Burningham Tech Entrepreneur. Iā¦
…
continue reading

1
Ep. 319 - The Doctor Is In Series - Can You Trust Your Gut? - All About Intuition
27:05
27:05
Play later
Play later
Lists
Like
Liked
27:05Welcome to the Social-Engineer Podcast: The Doctor Is In Series ā where we will discuss understandings and developments in the field of psychology. In todayās episode, Chris and Abbie delve into the fascinating world of intuition and gut feelings. They explore whether these instincts are rooted in biology or shaped by past experiences and discuss tā¦
…
continue reading

1
Love and Fraud: The Heartbreak of Romance Scams
9:15
9:15
Play later
Play later
Lists
Like
Liked
9:15This week on Scams, Hacks, and Frauds, we uncover the heart-wrenching reality of romance scams, where love can lead to devastating financial loss. Join us as we share the true story of Alison Peters, a British grandmother who fell victim to a fraudulent relationship, losing a staggering Ā£120,000 to a man she believed was her soulmate. Alison's jourā¦
…
continue reading

1
The First Smartphone Was a Transistor Radio ā How a Tiny Device Rewired Youth Culture and Predicted Our Digital Future | Musing On Society And Technology Newsletter | Article Written By Marco Ciappelli ...
14:02
14:02
Play later
Play later
Lists
Like
Liked
14:02āø» Podcast: Redefining Society and Technology https://redefiningsocietyandtechnologypodcast.com _____ Newsletter: Musing On Society And Technology https://www.linkedin.com/newsletters/musing-on-society-technology-7079849705156870144/ _____ Watch on Youtube: https://youtu.be/OYBjDHKhZOM _____ My Website: https://www.marcociappelli.com _______________ā¦
…
continue reading

1
Labor Laundering: How Threat Actors Infiltrate Remote Work with Wade Wells
33:48
33:48
Play later
Play later
Lists
Like
Liked
33:48In Episode 8 of Simply Social Engineering, Eddie Miro talks with Wade Wells about the growing threat of ālabor launderingā ā where North Korean IT workers and other threat actors infiltrate remote jobs to funnel money, gain access, and bypass sanctions. Tune in to hear how these operations are carried out, the social engineering tactics used to gaiā¦
…
continue reading

1
From Broadcasting to AI Agents: Mark Smith on Technology's 100-Year Evolution at IBC 2025 Amsterdam | On Location Event Coverage Podcast With Sean Martin & Marco Ciappelli
24:05
24:05
Play later
Play later
Lists
Like
Liked
24:05I had one of those conversations that reminded me why I'm so passionate about exploring the intersection of technology and society. Speaking with Mark Smith, a board member at IBC and co-lead of their accelerator program, I found myself transported back to my roots in communication and media studies, but with eyes wide open to what's coming next. Mā¦
…
continue reading

1
Ep. 318 - The 4th Monday Series - Finding Stable Employment in a Crazy Economy with Bobby Knost
29:10
29:10
Play later
Play later
Lists
Like
Liked
29:10Welcome to the Social-Engineer Podcast: The 4th Monday Series with Chris Hadnagy and Mike Holfeld. Chris and Mike will be covering cutting edge global news to help people remain safe, secure and knowledgeable in a world where it is hard to know what is real and what is fake news. Today Chris and Mike are joined by Bobby Knost. Bobby is a proud membā¦
…
continue reading

1
Teaser | Why Electric Vehicles Need an Apollo Program: The Renewable Energy Infrastructure Reality We're Ignoring | A Conversation with Mats Larsson | Redefining Society And Technology Podcast With Marco ...
3:09
3:09
Play later
Play later
Lists
Like
Liked
3:09āø» Podcast: Redefining Society and Technology https://redefiningsocietyandtechnologypodcast.com ______Title: Why Electric Vehicles Need an Apollo Program: The Reneweable Energy Infrastructure Reality We're Ignoring | A Conversation with Mats Larsson | Redefining Society And Technology Podcast With Marco Ciappelli ______Guest: Mats Larsson New book: ā¦
…
continue reading

1
Do Encryption backdoors benefit Hackers and Scammers? Governments Vs Privacy.
10:16
10:16
Play later
Play later
Lists
Like
Liked
10:16In this week's episode of Scams, Hacks, and Frauds, we explore the nuanced relationship between encryption backdoors and the activities of hackers and scammers. With the rise of end-to-end encryption, user privacy is at the forefront of technology discussions. However, governments are increasingly pushing for access to encrypted data, raising conceā¦
…
continue reading

1
Why Electric Vehicles Need an Apollo Program: The Renewable Energy Infrastructure Reality We're Ignoring | A Conversation with Mats Larsson | Redefining Society And Technology Podcast With Marco Ciappelli ...
43:01
43:01
Play later
Play later
Lists
Like
Liked
43:01āø» Podcast: Redefining Society and Technology https://redefiningsocietyandtechnologypodcast.com ______Title: Why Electric Vehicles Need an Apollo Program: The Reneweable Energy Infrastructure Reality We're Ignoring | A Conversation with Mats Larsson | Redefining Society And Technology Podcast With Marco Ciappelli ______Guest: Mats Larsson New book: ā¦
…
continue reading

1
Navigating AI and Human Security: A Chat with ChatGPT
26:18
26:18
Play later
Play later
Lists
Like
Liked
26:18In Episode 7 of Simply Social Engineering, Eddie Miro talks with ChatGPT, an AI language model. They explore the human element in AI, social engineering tactics, the psychology of influence, and practical ways to defend against emerging threats like deepfakes and AI-powered phishing. They also discuss non-judgmental validation, identity verificatioā¦
…
continue reading

1
The Narrative Attack Paradox: When Cybersecurity Lost the Ability to Detect Its Own Deception and the Humanity We Risk When Truth Becomes Optional | Reflections from Black Hat USA 2025 on the Marketing ...
13:30
13:30
Play later
Play later
Lists
Like
Liked
13:30āø» Podcast: Redefining Society and Technology https://redefiningsocietyandtechnologypodcast.com _____________________________ This Episodeās Sponsors BlackCloak provides concierge cybersecurity protection to corporate executives and high-net-worth individuals to protect against hacking, reputational loss, financial loss, and the impacts of a corporaā¦
…
continue reading

1
Online ID Checks: Safety or Scam and Hack Magnet?
10:38
10:38
Play later
Play later
Lists
Like
Liked
10:38In this episode of Scams, Hacks, and Frauds, we explore the new internet age verification laws and their implications for online safety and potential scams. With the UK's Online Safety Act 2023 now in effect and similar legal rules in Australia (Online Safety Amendment (Social Media Minimum Age) Bill 2024) the USA (including the alarming decision bā¦
…
continue reading

1
Ep. 317 - Security Awareness Series - Are You Ready For A Breach? with Jowan and Chris
23:10
23:10
Play later
Play later
Lists
Like
Liked
23:10Today on the Social-Engineer Podcast: The Security Awareness Series, Chris is joined by Jowan Joseph. Chris and Jowan discuss the importance of effective communication, role adaptation, and the psychological aspects of crisis situations. The discussion emphasizes the need for proactive preparedness and building trust within teams to navigate challeā¦
…
continue reading
In Episode 6 of Simply Social Engineering, Eddie Miro talks with Dorota Kozlowskaāpenetration tester, social engineer, content creator, and keynote speaker. They discuss the differences between team and solo work, tips for public speaking, essential hacking tools, and the underrated value of effective note-taking. Tune in for this insightful episodā¦
…
continue reading
Welcome to Deceptive Minds - An audio newsletter about how we are fooled, how we fool ourselves, and what we can do about it. This one is all about "The Long Con." When the lie moves in next door. Not every con kicks down the door. Some knock politely, charm their way inside, and stay for dinner. In this issue , we explore the anatomy of the long cā¦
…
continue reading

1
Behind the keyboard - Espionage and Identity Theft
10:40
10:40
Play later
Play later
Lists
Like
Liked
10:40This week on Scams, Hacks, and Frauds, we delve into the chilling world of cyber espionage, where unsuspecting companies become pawns in a dangerous game orchestrated by North Korean operatives. Join us as we unravel the harrowing tale of Christina Chapman, a woman who found herself entangled in an illegal operation that exploited her desperation tā¦
…
continue reading

1
Ep. 316 - Human Element Series - Do It Scared, But Do It Anyway with Shang Saavedra
27:32
27:32
Play later
Play later
Lists
Like
Liked
27:32Today we are joined by Shang Saavedra, the Founder and CEO of Save My Cents, an influential personal-finance website and social-media platform. Saavedra teaches readers the key habits and behaviors needed to become less fearful of money and live life with joy. Saavedra was named one of the "25 Most Influential New Voices of Money" by TIME/NextAdvisā¦
…
continue reading

1
The Agentic AI Myth in Cybersecurity and the Humanity We Risk When We Stop Deciding for Ourselves | Reflections from Black Hat USA 2025 on the Latest Tech Salvation Narrative | A Musing On Society & Technology ...
17:03
17:03
Play later
Play later
Lists
Like
Liked
17:03āø» Podcast: Redefining Society and Technology https://redefiningsocietyandtechnologypodcast.com _____________________________ This Episodeās Sponsors BlackCloak provides concierge cybersecurity protection to corporate executives and high-net-worth individuals to protect against hacking, reputational loss, financial loss, and the impacts of a corporaā¦
…
continue reading

1
What Keeps a CISO up at Night With Glen Sorensen
32:00
32:00
Play later
Play later
Lists
Like
Liked
32:00In Episode 5 of Simply Social Engineering, Eddie Miro talks with Glen Sorensen, a vCISO and managing director, about security culture, practical defenses, and the real-world challenges SMBs face in combating social engineering. Connect with Glen: https://www.linkedin.com/in/glen-sorensen/ https://bytewise.podbean.com/ ========================= Connā¦
…
continue reading
This week on Scams, Hacks, and Frauds, we take a pause from our true crime stories and instead take a deep dive into the true crime world of Virtual Private Networks (VPNs) to separate fact from fiction in the realm of online security. Are VPNs truly essential in protecting yourself from hacks and fraud, or are they just another marketing gimmick? ā¦
…
continue reading

1
Ep. 315 - The Doctor Is In Series - Love at First Sight, Is it Possible?
33:54
33:54
Play later
Play later
Lists
Like
Liked
33:54Welcome to the Social-Engineer Podcast: The Doctor Is In Series ā where we will discuss understandings and developments in the field of psychology. In todayās episode, Chris and Abbie explore the complexities of attraction and the concept of love at first sight. They discuss the biochemical responses associated with attraction, the importance of unā¦
…
continue reading

1
Cognitive Heist series #4: The Ghost - Panic, Urgency, and the Speed of Deception
12:09
12:09
Play later
Play later
Lists
Like
Liked
12:09š» New Deceptive Minds issue: Cognitive Heist series issue #4 -- The Ghost The ghost doesnāt break in. It doesnāt even exist. It just panics you into acting-- fast, unthinking, exposed. This issue explores one of the most dangerous tools in a scammerās toolkit: urgency. We unpack: š§ The psychology of panic and why urgency shuts down critical thinkinā¦
…
continue reading

1
Creative Storytelling in the Age of AI: When Machines Learn to Dream and the Last Stand of Human Creativity | A Conversation with Maury Rogow | Redefining Society And Technology Podcast With Marco Ciappelli ...
48:05
48:05
Play later
Play later
Lists
Like
Liked
48:05āø» Podcast: Redefining Society and Technology https://redefiningsocietyandtechnologypodcast.com Title: Creative Storytelling in the Age of AI: When Machines Learn to Dream and the Last Stand of Human Creativity Guest: Maury Rogow CEO, Rip Media Group | I grow businesses with Ai + video storytelling. Honored to have 70k+ professionals & 800+ brands gā¦
…
continue reading

1
I Bowl and I Break Things: SE Lessons from InfoSecPat
36:38
36:38
Play later
Play later
Lists
Like
Liked
36:38In Episode 4 of Simply Social Engineering, Eddie Miro sits down with InfoSec Patāpentester, content creator, and relentless community builder. Eddie and Pat discuss the real-world tactics of social engineering during red team engagements: how to practice SE, get past gatekeepers, and stay calm when things donāt go as planned. Then Pat shares field ā¦
…
continue reading

1
Romance Scam Victim in foriegn prison - Police won't look for the scammer.
10:33
10:33
Play later
Play later
Lists
Like
Liked
10:33A grandmother's life takes a harrowing turn as she finds herself imprisoned in a foreign country due to an elaborate international scam. In this gripping episode, we explore the tragic story of Donna Nelson, a victim caught in a web of deceit that led to her arrest for drug trafficking in Japan. Despite her efforts to protect herself, a single missā¦
…
continue reading

1
Ep. 314 - The 4th Monday Series - What Can You Do If Your Accounts Are Hacked? with Congressman Darren Soto
31:27
31:27
Play later
Play later
Lists
Like
Liked
31:27Welcome to the Social-Engineer Podcast: The 4th Monday Series with Chris Hadnagy and Mike Holfeld. Chris and Mike will be covering cutting edge global news to help people remain safe, secure and knowledgeable in a world where it is hard to know what is real and what is fake news. Today Chris and Mike are joined by Congressman Darren Soto. Darren Soā¦
…
continue reading

1
Cognitive Heists series #3: The Call Is Coming from Inside Your Mind
12:12
12:12
Play later
Play later
Lists
Like
Liked
12:12š The Call Is Coming from Inside Your Mind Welcome to #3 of the "Cognitive Heists" series. The Voice in Your Head -- Authority, Audio Deepfakes, and the Power of a Familiar Voice In 2019, a UK energy firm received a call. The voice on the other end sounded exactly like the CEO of their German parent company. The request? Transfer ā¬220,000 immediateā¦
…
continue reading

1
How to Hack Global Activism with Tech, Music, and Purpose: A Conversation with Michael Sheldrick, Co-Founder of Global Citizen and Author of the book: āFrom Ideas to Impactā | Redefining Society And Technology ...
49:05
49:05
Play later
Play later
Lists
Like
Liked
49:05āø» Podcast: Redefining Society and Technology https://redefiningsocietyandtechnologypodcast.com Title: How to hack Global Activism with Tech, Music, and Purpose: A Conversation with Michael Sheldrick, Co-Founder of Global Citizen and Author of āFrom Ideas to Impactā Guest: Michael Sheldrick Co-Founder, Global Citizen | Author of āFrom Ideas to Impacā¦
…
continue reading

1
How to Be a Social Engineer (Or Just a Better Human)
14:25
14:25
Play later
Play later
Lists
Like
Liked
14:25In Episode 3 of Simply Social Engineering, host Eddie Miro drops the theory and gets tactical. This solo episode is packed with real, actionable advice for improving your social skillsāwhether you're trying to get better at social engineering or just want to connect with people more effectively. No fluff, no gimmicks, just proven principles and fieā¦
…
continue reading

1
Is Booking.com a Booking.scam? Staying safe from Travel Fraud this summer.
9:24
9:24
Play later
Play later
Lists
Like
Liked
9:24In the age of online bookings, planning a trip can be as easy as a few clicks. However, with convenience comes risk, especially when it comes to travel booking scams. In our latest podcast episode, we dive deep into the alarming rise of fraud associated with popular booking platforms like booking.com. Join us as we share the harrowing story of Dr. ā¦
…
continue reading

1
Ep. 313 - Security Awareness Series - The Importance of Securing Virtual Events With Trent Waterhouse
27:56
27:56
Play later
Play later
Lists
Like
Liked
27:56Today on the Social-Engineer Podcast: The Security Awareness Series, Chris is joined by Trent Waterhouse. Trent is the CMO of GlobalMeet, a leading virtual event technology company with a scalable, flexible, and secure hybrid event streaming platform built and supported by experienced event experts. Trent has a proven track record of driving growthā¦
…
continue reading

1
The Hybrid Species ā When Technology Becomes Human, and Humans Become Technology | A Musing On Society & Technology Newsletter Written By Marco Ciappelli | Read by TAPE3
10:53
10:53
Play later
Play later
Lists
Like
Liked
10:53āø» Podcast: Redefining Society and Technology https://redefiningsocietyandtechnologypodcast.com _____________________________ This Episodeās Sponsors BlackCloak provides concierge cybersecurity protection to corporate executives and high-net-worth individuals to protect against hacking, reputational loss, financial loss, and the impacts of a corporaā¦
…
continue reading

1
The Human Side of Technology with Abadesi Osunsade ā From Diversity to AI and Back Again | Guest: Abadesi Osunsade | Redefining Society And Technology Podcast With Marco Ciappelli
31:42
31:42
Play later
Play later
Lists
Like
Liked
31:42āø» Podcast: Redefining Society and Technology https://redefiningsocietyandtechnologypodcast.com Title: The Human Side of Technology with Abadesi Osunsade ā From Diversity to AI and Back Again Guest: Abadesi Osunsade Founder @ Hustle Crew WebSite: https://www.abadesi.com On LinkedIn: https://www.linkedin.com/in/abadesi/ Host: Marco Ciappelli Co-Foundā¦
…
continue reading
Welcome to part 2 of the Cognitive Heist miniseries: The Bait Man šļø He doesnāt pick the lock. šŖ He doesnāt sneak in the back. šŖ He just leaves something shiny on the ground and waits for you to pick it up. Enter "The Bait Man": the scammer who lets your own curiosity or greed do all the work. Part 2 of Cognitive Heist explores: š Why bait-based scā¦
…
continue reading

1
Professional Vishing and Threat Hunting with Edna Jonsson
41:19
41:19
Play later
Play later
Lists
Like
Liked
41:19In this episode of Simply Social Engineering, host Eddie Miro is joined by Edna Jonsson, a cybersecurity engineer who applies social engineering in real-world operations. Edna shares insights from their work in threat hunting and detection engineering, as well as competitive experience as part of the Rizz Kitties team in the Social Engineering Commā¦
…
continue reading

1
The Attack Cycle with James Hamilton Part 2
37:39
37:39
Play later
Play later
Lists
Like
Liked
37:39Send us a text Send us a text In this compelling two-part episode, Philip Grindell welcomes back security expert James Hamilton to explore the "attack cycle" - a proven model used by criminals, terrorists, and assassins to target victims. Following the high-profile New York CEO assassination, Hamilton breaks down the eight critical phases: target sā¦
…
continue reading

1
Sim Swap Fraud: How a Phone Number hacker Scammed $24 Million in a Day
9:23
9:23
Play later
Play later
Lists
Like
Liked
9:23In this gripping episode, Cee unravels the shocking tale of a $24 million heist stemming from a SIM swap fraud that left victim Michael Turpin reeling. As we delve into the events of 2018, we discover how a 15-year-old hacker managed to reset Turpin's Gmail password and access his cryptocurrency logins, leading to an astonishing windfall. Tune in aā¦
…
continue reading

1
Ep. 312 - Human Element Series - Having a Hunger to Serve with Doug Thorpe
33:04
33:04
Play later
Play later
Lists
Like
Liked
33:04Today we are joined by Doug Thorpe. Doug is an experienced leadership coach, business advisor, and speaker who focuses on helping small to mid-size business owners and executives develop their leadership capabilities. With decades of experience in banking, finance, and business management, Thorpe transitioned to coaching and advisory services to heā¦
…
continue reading

1
Cognitive Heists series #1: The Insider -- Trust by Proximity, not Proof
13:08
13:08
Play later
Play later
Lists
Like
Liked
13:08šµļøāāļø New Deceptive Minds mini-series: Behind the Scams (Cognitive Heists) šµļøāāļø They didnāt pick the lock. They didnāt sneak in through the vents. You held the door open for them. This weekās issue kicks off a new 10-part series: Cognitive Heistāa deep dive into the psychological exploits behind the worldās most effective social engineering attackā¦
…
continue reading
In the first episode of Simply Social Engineering, host Eddie Miro shares his wild journey from a rough start in life to a career in cybersecurity. This episode kicks off a new show all about the human side of hacking: how people manipulate, persuade, and influence. Expect fresh takes, real stories, and interviews with social engineers and other shā¦
…
continue reading

1
Scattered Spider Hack Qantas - Can Passwords really keep your account safe?
4:20
4:20
Play later
Play later
Lists
Like
Liked
4:20Cee delves into the recent cyberattack on Australian airline Qantas, attributed to the notorious hacking group Scattered Spider. Cee also provides practical advice on protecting personal information, emphasising the dangers of password reuse and the benefits of using private relay email services and changing your passwords for passkeys. For more inā¦
…
continue reading

1
Ep. 311 - The Doctor Is In Series - The Scientific Keys To Happiness with Dr. Paul Zak
39:29
39:29
Play later
Play later
Lists
Like
Liked
39:29Welcome to the Social-Engineer Podcast: The Doctor Is In Series ā where we will discuss understandings and developments in the field of psychology. In todayās episode, Chris and Abbie are joined by Dr. Paul J Zak. Dr. Zak is in the top 0.3% of most cited scientists. For over two decades Paulās research has extended the boundaries of behavioral neurā¦
…
continue reading

1
The Attack Cycle with James Hamilton Part 1
29:25
29:25
Play later
Play later
Lists
Like
Liked
29:25Send us a text In this compelling two-part episode, Philip Grindell welcomes back security expert James Hamilton to explore the "attack cycle" - a proven model used by criminals, terrorists, and assassins to target victims. Following the high-profile New York CEO assassination, Hamilton breaks down the eight critical phases: target selection, surveā¦
…
continue reading

1
Ghost Broker Fraud - The Car insurance Scam targeting young drivers
7:46
7:46
Play later
Play later
Lists
Like
Liked
7:46Cee investigates the alarming rise of ghost brokers in the UK, a scam that leaves unsuspecting young drivers like 18-year-old Wayne Simpson in dire straits. After a car accident, Wayne discovers that his seemingly legitimate insurance policy is nothing but a facade, putting him at risk of severe legal consequences. Through Wayne's story, we unravelā¦
…
continue reading