- MCP server with stdio transport for local use - Search episodes, transcripts, hosts, and series - 4,511 episodes with metadata and transcripts - Data loader with in-memory JSON storage 🤖 Generated with [Claude Code](https://claude.com/claude-code) Co-Authored-By: Claude <noreply@anthropic.com>
88 lines
7.0 KiB
Plaintext
88 lines
7.0 KiB
Plaintext
Episode: 3368
|
|
Title: HPR3368: Infosec Podcasts Part 4 - Social Engineering Podcasts
|
|
Source: https://hub.hackerpublicradio.org/ccdn.php?filename=/eps/hpr3368/hpr3368.mp3
|
|
Transcribed: 2025-10-24 22:01:21
|
|
|
|
---
|
|
|
|
This is Hacker Public Radio Episode 3368 for Wendy, the 30th of June 2021.
|
|
Today's show is entitled, Infosic Podcasts Part 4, Social Engineering Podcasts,
|
|
and is part of the series podcast recommendations it is hosted by Trey,
|
|
and is about seven minutes long, and carries a clean flag.
|
|
The summary is, presenting my favorite information security podcasts, which focus on social
|
|
engineering. This episode of HPR is brought to you by Ananasthost.com.
|
|
Get 15% discount on all shared hosting with the offer code HPR15, that's HPR15.
|
|
Better web hosting that's honest and fair at Ananasthost.com.
|
|
Hello, my name is Trey. I'd like to start by giving special thanks to Taj for sharing
|
|
audio for podcasting episode 2 equalization Hacker Public Radio Episode 3345.
|
|
I will be trying to apply some of his advice in this recording.
|
|
In case you have not heard my previous episodes, this introduction may be helpful.
|
|
If you have already listened to my previous three episodes, I apologize for this sounding redundant.
|
|
Why am I recording this series? As I reviewed the HPR list of recommended topics,
|
|
what podcasts you listen to jumped off the screen at me. As I'm passionate about information
|
|
security, we desperately need people to fill InfoSec jobs in many different specialties,
|
|
including security operations, engineering and architecture, governance, risk and compliance,
|
|
application security, security education, and many more. InfoSec is a rapidly changing field,
|
|
and it is critical to stay current, so as a result, I listen to tons of InfoSec related podcasts.
|
|
Because there are so many podcasts to list, I have broken them down into six different episodes
|
|
based on the topics. Part 1 was news and current events, that was Episode 3324.
|
|
Part 2 was general information security podcasts, that was Episode 3334.
|
|
Part 3 was career and personal development podcasts, that was Episode 3344.
|
|
You're listening to Part 4, social engineering podcasts, Part 5 will combine hacks and attacks,
|
|
technical information and learning podcasts, and InfoSec community social history podcasts.
|
|
Then we'll wrap it up with Part 6, information security leadership podcasts.
|
|
So Part 4, I'm talking about social engineering, and I want to note that
|
|
social engineering has a special place in my heart. In a previous life,
|
|
I developed and ran the security awareness program for a large organization.
|
|
I based the program on many of the threats we experienced on a daily basis,
|
|
and the challenges users encountered and sometimes fell for. As a result, much of the material
|
|
addressed detecting and reporting social engineering attacks.
|
|
The first podcast I'd like to share with you is the Hacking Humans Podcast.
|
|
It's hosted by Dave Bittner and Joe Carrigan, and it's sponsored by a company called No Before.
|
|
This is a weekly podcast where they discuss social engineering.
|
|
They have a lot of interesting guests, they share different social engineering attacks,
|
|
and you may even get to hear Dave Bittner do a voice impersonation or two.
|
|
It's a really amazing podcast, it's not overly technical,
|
|
it's great to share with your family and friends, anyone who you think might be susceptible to
|
|
being scammed. You can find the podcast by googling Hacking Humans Podcast, or you can click the
|
|
link in the show notes. The next podcast I'd like to share is the social
|
|
engineer podcast. This is hosted by Chris Hednaggy, and is part of the social-engineer.org
|
|
organization. This was a monthly podcast, but they've recently increased in frequency. They're
|
|
doing more of these podcasts, and it's just amazing content. The social engineer podcast
|
|
provides a deep dive into the science, psychology, and application of social engineering.
|
|
Chris also runs the social engineering village at Defcon. I met him for the very first time
|
|
back at Defcon 24, and I watched an amazement his talk there during that particular Defcon,
|
|
and then watched as he ran the social engineering village and had people that were there trying to
|
|
wish that's voice-fishing, trying to solicit information from organizations over the telephone
|
|
to gain certain flags. It was the SECTF, the social engineering capture of the flag competition.
|
|
It was lots of fun, but Chris is just an amazing person, a font of knowledge. He's written two books
|
|
that I strongly recommend. Social engineering, the art of human hacking, and his most recent books,
|
|
book, human hacking, wind friends, influence people, and leave them better off for having met you.
|
|
And that's really one of the themes of his whole organization is even though they're trying to get
|
|
people to do things that they know they shouldn't do in order to educate them, they want to leave
|
|
them better off for having met them. They don't agree with any of the fear tactics that a lot of
|
|
other organizations have or that a lot of criminals use, they are very positive. I also want to
|
|
recommend that Chris has founded an organization that allows them to apply their social engineering
|
|
skills in a very positive way, and that is the Innocent Lives Foundation. With Innocent Lives
|
|
Foundation, they're able to partner with law enforcement to help to use OSINT techniques
|
|
to find people that have committed crimes or are committing crimes and help to bring them to
|
|
justice. You can find the social engineer podcast by googling social engineer podcast,
|
|
or by clicking on the link in the show notes. The final recommendation I have for today
|
|
is the Privacy Security and OSINT show by Michael Bazel. This is a weekly show, and Michael Bazel
|
|
is also just an incredible individual. He has written two books that are currently
|
|
active in print. The open source intelligence techniques episode or the eighth edition was just
|
|
released of the open source intelligence techniques books book and extreme privacy. Both of these
|
|
books give you really good information, but his podcast provides ideas on how you can become digitally
|
|
invisible, how to stay secure from cyber threats, how to make yourself a better online investigator,
|
|
lots of really good information about open source intelligence, privacy and security.
|
|
You can find the Privacy Security and OSINT show by googling Privacy Security and OSINT podcast,
|
|
or by clicking on the link in the show notes. This was a short episode today, but I hope you enjoyed
|
|
it, and I welcome any comments you want to leave, and have a great day.
|
|
Monday through Friday. Today's show, like all our shows, was contributed by an HBR listener
|
|
like yourself. If you ever thought of recording a podcast, then click on our contributing to find
|
|
out how easy it really is. Heckup Public Radio was founded by the Digital Dog Pound and the
|
|
Infonomicon Computer Club, and it's part of the binary revolution at binrev.com. If you
|
|
have comments on today's show, please email the host directly, leave a comment on the website
|
|
or record a follow-up episode yourself. Unless otherwise status, today's show is released on the
|
|
Creative Commons, App Tribution, Share a Life, 3.0 license.
|