Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo
Artwork

Content provided by Lost In Cyberia. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Lost In Cyberia or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://podcastplayer.com/legal.
Player FM - Podcast App
Go offline with the Player FM app!

Ep. 17 Hacking Humans: What is Social Engineering?

59:56
 
Share
 

Manage episode 502477541 series 3664609
Content provided by Lost In Cyberia. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Lost In Cyberia or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://podcastplayer.com/legal.

Hosts Annie-Mei and Anika unpack social engineering or “human hacking”, with insights from books by Chris Hadnagy and Kevin Mitnick. They break down the attack lifecycle, common tactics (phishing, pretexting, tailgating, quid pro quo), and how AI is supercharging scams, then share practical defences: pause-and-verify, reduce digital footprints, and normalise double-checking at work and home. A clear, actionable guide to spotting and resisting manipulation online and off.

Practical takeaways

  • Pause and verify: If there’s urgency, slow down. Confirm via a second channel (Teams/Slack/phone) using contact details you already trust.
  • Know your own levers: List your motivations and soft spots (travel deals, pets, promotions, family). Expect lures to target them.
  • Harden your photos & profiles: Ask permission before posting others; avoid location tags; check backgrounds for whiteboards, monitors, ID, or addresses.
  • At the door: Challenge tailgating politely; ask for ID and verify with the office before granting access—even to someone in high-vis.
  • At work: Prefer frequent, tailored awareness over once-a-year training; normalise “it’s fine to check with me” in leadership; run realistic simulations.
  • At home: Talk with family and friends about what not to share on your behalf.

Resources for further education:

  • Chris HadnagySocial Engineering: The Science of Human Hacking
  • Kevin MitnickThe Art of Deception; The Art of Invisibility

Send us a text

Find us on Instagram and YouTube @thecybersecuritygals

  continue reading

19 episodes

Artwork
iconShare
 
Manage episode 502477541 series 3664609
Content provided by Lost In Cyberia. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Lost In Cyberia or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://podcastplayer.com/legal.

Hosts Annie-Mei and Anika unpack social engineering or “human hacking”, with insights from books by Chris Hadnagy and Kevin Mitnick. They break down the attack lifecycle, common tactics (phishing, pretexting, tailgating, quid pro quo), and how AI is supercharging scams, then share practical defences: pause-and-verify, reduce digital footprints, and normalise double-checking at work and home. A clear, actionable guide to spotting and resisting manipulation online and off.

Practical takeaways

  • Pause and verify: If there’s urgency, slow down. Confirm via a second channel (Teams/Slack/phone) using contact details you already trust.
  • Know your own levers: List your motivations and soft spots (travel deals, pets, promotions, family). Expect lures to target them.
  • Harden your photos & profiles: Ask permission before posting others; avoid location tags; check backgrounds for whiteboards, monitors, ID, or addresses.
  • At the door: Challenge tailgating politely; ask for ID and verify with the office before granting access—even to someone in high-vis.
  • At work: Prefer frequent, tailored awareness over once-a-year training; normalise “it’s fine to check with me” in leadership; run realistic simulations.
  • At home: Talk with family and friends about what not to share on your behalf.

Resources for further education:

  • Chris HadnagySocial Engineering: The Science of Human Hacking
  • Kevin MitnickThe Art of Deception; The Art of Invisibility

Send us a text

Find us on Instagram and YouTube @thecybersecuritygals

  continue reading

19 episodes

Wszystkie odcinki

×
 
Loading …

Welcome to Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play