Cybersecurity Podcasts
  • All Technology
  • AI
  • Autonomy
  • B2B Growth
  • Big Data
  • BioTech
  • ClimateTech
  • Consumer Tech
  • Crypto
  • Cybersecurity
  • DevOps
  • Digital Marketing
  • Ecommerce
  • EdTech
  • Enterprise
  • FinTech
  • GovTech
  • Hardware
  • HealthTech
  • HRTech
  • LegalTech
  • Nanotech
  • PropTech
  • Quantum
  • Robotics
  • SaaS
  • SpaceTech
AllNewsDealsSocialBlogsVideosPodcastsDigests

Cybersecurity Pulse

EMAIL DIGESTS

Daily

Every morning

Weekly

Sunday recap

NewsDealsSocialBlogsVideosPodcasts
CybersecurityPodcastsThe Voice on the Other End.
The Voice on the Other End.
Cybersecurity

Hacking Humans

The Voice on the Other End.

Hacking Humans
•February 19, 2026•45 min
0
Hacking Humans•Feb 19, 2026

Why It Matters

Understanding these evolving scams is crucial for anyone handling digital payments or caring for older adults, as the tactics blend technical phishing with emotional manipulation. The episode’s timely focus on elder fraud and romance scams highlights a growing threat landscape, prompting listeners to adopt stronger vigilance and protective measures.

Key Takeaways

  • •Law‑enforcement impersonation scams trigger physiological stress responses
  • •Verify caller identity before sharing personal or financial information
  • •Apple Pay phishing combines fake emails with voice‑call credential theft
  • •Australian police site offers comprehensive guide to spotting romance scams

Pulse Analysis

In this episode the hosts dissect a classic law‑enforcement impersonation call, where a scammer claimed to be a sheriff’s sergeant demanding payment for a missed jury‑duty summons. Even seasoned security professionals felt a spike in adrenaline, underscoring how authority cues can override rational judgment. The conversation stresses the necessity of zero‑trust verification—asking for names, badge numbers, and independently confirming contact details before disclosing any personal data. This real‑world example illustrates why organizations must train employees to pause, document, and validate every unsolicited request.

The show then shifts to a sophisticated Apple Pay phishing campaign that blends convincing Apple‑branded emails with live voice impersonation. Victims receive a blocked‑transaction notice and are urged to call a spoofed support line, where attackers harvest Apple ID credentials and verification codes. Listeners learn to spot tell‑tale signs: non‑Apple sender domains, urgent language, and the request for a phone call—behaviors Apple explicitly advises against. By applying layered defenses—email filtering, MFA, and user education—businesses can blunt this hybrid social‑engineering vector before financial loss occurs.

Finally, the hosts highlight two broader fraud trends: romance‑scam education from the Australian Federal Police and a DOJ case where a bank analyst siphoned millions from elderly victims. The Australian resource maps the typical scam lifecycle—contact, trust‑building, crisis, money request—providing actionable steps like reverse‑image searches and video verification. Meanwhile, the DOJ prosecution of a quantitative analyst who exploited his internal access to steal from nonagenarians demonstrates how insider threats intersect with traditional social engineering. Together, these stories reinforce the imperative for continuous awareness, robust verification protocols, and a culture that questions authority at every level.

Episode Description

This week, hosts ⁠⁠Maria Varmazis⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ (also host of the ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠T-Minus⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ Space Daily show),⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Dave Bittner⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ and ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Joe Carrigan⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ are discussing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. We have some follow up where Joe shares a scam call he received. Dave’s got the story on a sophisticated phishing campaign targeting Apple Pay users through fake emails and voice calls impersonating customer support, as well as Australia’s ClickFit initiative warning that romance scammers are exploiting trust online for emotional and financial gain. Joe’s story is about a former Ohio bank employee who used his insider access to steal identities and siphon roughly $2 million from elderly customers, ultimately leading to his arrest in Chicago and federal conviction. Maria’s story is about a daughter who discovers her 84-year-old mother has been financially exploited by trusted professionals and even family members, underscoring how elder fraud often comes from familiar faces. It highlights the rapid rise in elder financial abuse and the urgent need for families to step in early—before cognitive decline makes the losses irreversible. Our catch of the day come's from the "Australian Government" on a tax document being floated around.

Resources and links to stories:

Apple Pay Users Targeted by Sophisticated Phishing Scam Leveraging Voice and Email

ClickFit: Romance scams

Former Bank Employee Found Guilty of Targeting Elderly Victims in Identity Theft and Fraud Scheme

Ohio bank’s anti-fraud agent stole $2M from elderly customers: DOJ

⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Have a Catch of the Day you'd like to share? Email it to us at ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠hackinghumans@n2k.com⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠.

Show Notes

0

Comments

Want to join the conversation?

Loading comments...