A return to office means a return to email scams.
Hacking Humans28 Heinä 2022

A return to office means a return to email scams.

Romain Basset, Director of Customer Service, at Vade joins Dave to discuss the threat of initial contact spearphishing emails now that many employees are returning to the office. Dave and Joe share some listener follow up from listener Will who writes in about a troubling debate over if it should be "Joe and Dave" or "Dave and Joe." Will shares a website about ablaut reduplication, sharing his thoughts on the matter. Joe shares some good news following a story of a homeless man being robbed of $400,000 after a GoFundMe scam. Joe's story is on a woman who loses almost $150,000 over the phone with someone claiming to be a DEA agent. Dave's story is on a woman who gets scam calls up to 20 times a day. She was diagnosed with cancer in 2021, and can't afford to miss any calls from potential doctors or possible nurses trying to schedule appointments. Our catch of the day comes from listener Alex who writes in sharing how his Apple ID was hacked and locked, although the scammers got one crucial detail wrong, his email. Links to stories: Lincoln woman loses $149,000 in DEA phone scam GoFundMe scam: Kate McClure sentenced to 1 year in federal prison The nonstop scam economy is costing us more than just money Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter

Tämä jakso on lisätty Podme-palveluun avoimen RSS-syötteen kautta eikä se ole Podmen omaa tuotantoa. Siksi jakso saattaa sisältää mainontaa.

Jaksot(772)

OWASP identification and authentication failures (noun) [Word Notes]

OWASP identification and authentication failures (noun) [Word Notes]

Please enjoy this encore of Word Notes. Ineffectual confirmation of a user's identity or authentication in session management. CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/owasp-iden...

20 Touko 20255min

The band is finally back together.

The band is finally back together.

And....we're back! This week, our three hosts Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of the T-Minus Space Daily show) are all back to share the latest in social engineering scams, p...

15 Touko 202543min

Log4j vulnerability (noun) [Word Notes]

Log4j vulnerability (noun) [Word Notes]

Please enjoy this encore of Word Notes. An open source Java-based software tool available from the Apache Software Foundation designed to log security and performance information.  CyberWire Glossa...

13 Touko 20259min

What’s inside the mystery box? Spoiler: It’s a scam!

What’s inside the mystery box? Spoiler: It’s a scam!

As Dave Bittner is at the RSA Conference this week, our hosts ⁠⁠Maria Varmazis and ⁠⁠Joe Carrigan⁠⁠, are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that a...

8 Touko 202546min

OWASP broken access control (noun) [Word Notes]

OWASP broken access control (noun) [Word Notes]

Please enjoy this encore of Word Notes. Software users are allowed access to data or functionality contrary to the defined zero trust policy by bypassing or manipulating the installed security contr...

6 Touko 20257min

The RMM protocol: Remote, risky, and ready to strike. [OMITB]

The RMM protocol: Remote, risky, and ready to strike. [OMITB]

Welcome in! You’ve entered, Only Malware in the Building. Join us each month to sip tea and solve mysteries about today’s most interesting threats. Your host is ⁠Selena Larson⁠, ⁠Proofpoint⁠ intellige...

6 Touko 202539min

The prince, the pretender, and the PSA.

The prince, the pretender, and the PSA.

As Maria is on vacation this week, our hosts ⁠Dave Bittner⁠ and ⁠Joe Carrigan⁠, are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. ...

1 Touko 202528min

OWASP security misconfiguration (noun) [Word Notes]

OWASP security misconfiguration (noun) [Word Notes]

Please enjoy this encore of Word Notes. The state of a web application when it's vulnerable to attack due to an insecure configuration.  CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/...

29 Huhti 20257min

Suosittua kategoriassa Politiikka ja uutiset

uutiscast
aikalisa
politiikan-puskaradio
viisupodi
ootsa-kuullut-tasta-2
rss-ootsa-kuullut-tasta
tervo-halme
rss-podme-livebox
rss-asiastudio
rss-pinnalla
rss-vaalirankkurit-podcast
otetaan-yhdet
the-ulkopolitist
linda-maria
rikosmyytit
rss-kaikki-uusiksi
et-sa-noin-voi-sanoo-esittaa
lotta-paakkunainen
rss-hyvaa-huomenta-bryssel
rss-terevisio