Files
Lee Hanken 7c8efd2228 Initial commit: HPR Knowledge Base MCP Server
- MCP server with stdio transport for local use
- Search episodes, transcripts, hosts, and series
- 4,511 episodes with metadata and transcripts
- Data loader with in-memory JSON storage

🤖 Generated with [Claude Code](https://claude.com/claude-code)

Co-Authored-By: Claude <noreply@anthropic.com>
2025-10-26 10:54:13 +00:00

88 lines
7.0 KiB
Plaintext

Episode: 3368
Title: HPR3368: Infosec Podcasts Part 4 - Social Engineering Podcasts
Source: https://hub.hackerpublicradio.org/ccdn.php?filename=/eps/hpr3368/hpr3368.mp3
Transcribed: 2025-10-24 22:01:21
---
This is Hacker Public Radio Episode 3368 for Wendy, the 30th of June 2021.
Today's show is entitled, Infosic Podcasts Part 4, Social Engineering Podcasts,
and is part of the series podcast recommendations it is hosted by Trey,
and is about seven minutes long, and carries a clean flag.
The summary is, presenting my favorite information security podcasts, which focus on social
engineering. This episode of HPR is brought to you by Ananasthost.com.
Get 15% discount on all shared hosting with the offer code HPR15, that's HPR15.
Better web hosting that's honest and fair at Ananasthost.com.
Hello, my name is Trey. I'd like to start by giving special thanks to Taj for sharing
audio for podcasting episode 2 equalization Hacker Public Radio Episode 3345.
I will be trying to apply some of his advice in this recording.
In case you have not heard my previous episodes, this introduction may be helpful.
If you have already listened to my previous three episodes, I apologize for this sounding redundant.
Why am I recording this series? As I reviewed the HPR list of recommended topics,
what podcasts you listen to jumped off the screen at me. As I'm passionate about information
security, we desperately need people to fill InfoSec jobs in many different specialties,
including security operations, engineering and architecture, governance, risk and compliance,
application security, security education, and many more. InfoSec is a rapidly changing field,
and it is critical to stay current, so as a result, I listen to tons of InfoSec related podcasts.
Because there are so many podcasts to list, I have broken them down into six different episodes
based on the topics. Part 1 was news and current events, that was Episode 3324.
Part 2 was general information security podcasts, that was Episode 3334.
Part 3 was career and personal development podcasts, that was Episode 3344.
You're listening to Part 4, social engineering podcasts, Part 5 will combine hacks and attacks,
technical information and learning podcasts, and InfoSec community social history podcasts.
Then we'll wrap it up with Part 6, information security leadership podcasts.
So Part 4, I'm talking about social engineering, and I want to note that
social engineering has a special place in my heart. In a previous life,
I developed and ran the security awareness program for a large organization.
I based the program on many of the threats we experienced on a daily basis,
and the challenges users encountered and sometimes fell for. As a result, much of the material
addressed detecting and reporting social engineering attacks.
The first podcast I'd like to share with you is the Hacking Humans Podcast.
It's hosted by Dave Bittner and Joe Carrigan, and it's sponsored by a company called No Before.
This is a weekly podcast where they discuss social engineering.
They have a lot of interesting guests, they share different social engineering attacks,
and you may even get to hear Dave Bittner do a voice impersonation or two.
It's a really amazing podcast, it's not overly technical,
it's great to share with your family and friends, anyone who you think might be susceptible to
being scammed. You can find the podcast by googling Hacking Humans Podcast, or you can click the
link in the show notes. The next podcast I'd like to share is the social
engineer podcast. This is hosted by Chris Hednaggy, and is part of the social-engineer.org
organization. This was a monthly podcast, but they've recently increased in frequency. They're
doing more of these podcasts, and it's just amazing content. The social engineer podcast
provides a deep dive into the science, psychology, and application of social engineering.
Chris also runs the social engineering village at Defcon. I met him for the very first time
back at Defcon 24, and I watched an amazement his talk there during that particular Defcon,
and then watched as he ran the social engineering village and had people that were there trying to
wish that's voice-fishing, trying to solicit information from organizations over the telephone
to gain certain flags. It was the SECTF, the social engineering capture of the flag competition.
It was lots of fun, but Chris is just an amazing person, a font of knowledge. He's written two books
that I strongly recommend. Social engineering, the art of human hacking, and his most recent books,
book, human hacking, wind friends, influence people, and leave them better off for having met you.
And that's really one of the themes of his whole organization is even though they're trying to get
people to do things that they know they shouldn't do in order to educate them, they want to leave
them better off for having met them. They don't agree with any of the fear tactics that a lot of
other organizations have or that a lot of criminals use, they are very positive. I also want to
recommend that Chris has founded an organization that allows them to apply their social engineering
skills in a very positive way, and that is the Innocent Lives Foundation. With Innocent Lives
Foundation, they're able to partner with law enforcement to help to use OSINT techniques
to find people that have committed crimes or are committing crimes and help to bring them to
justice. You can find the social engineer podcast by googling social engineer podcast,
or by clicking on the link in the show notes. The final recommendation I have for today
is the Privacy Security and OSINT show by Michael Bazel. This is a weekly show, and Michael Bazel
is also just an incredible individual. He has written two books that are currently
active in print. The open source intelligence techniques episode or the eighth edition was just
released of the open source intelligence techniques books book and extreme privacy. Both of these
books give you really good information, but his podcast provides ideas on how you can become digitally
invisible, how to stay secure from cyber threats, how to make yourself a better online investigator,
lots of really good information about open source intelligence, privacy and security.
You can find the Privacy Security and OSINT show by googling Privacy Security and OSINT podcast,
or by clicking on the link in the show notes. This was a short episode today, but I hope you enjoyed
it, and I welcome any comments you want to leave, and have a great day.
Monday through Friday. Today's show, like all our shows, was contributed by an HBR listener
like yourself. If you ever thought of recording a podcast, then click on our contributing to find
out how easy it really is. Heckup Public Radio was founded by the Digital Dog Pound and the
Infonomicon Computer Club, and it's part of the binary revolution at binrev.com. If you
have comments on today's show, please email the host directly, leave a comment on the website
or record a follow-up episode yourself. Unless otherwise status, today's show is released on the
Creative Commons, App Tribution, Share a Life, 3.0 license.