Bringing in the human side of scamming.
Hacking Humans25 Mai 2023

Bringing in the human side of scamming.

Nick Percoco from Kraken sits down to discuss the human factor of crypto scams, including going over common red flags and what to do when a third party is exerting pressure that taps into a human emotions. Listener Sean writes in with some follow up to discuss the increase in AI scams and if people would be more likely to talk about falling for these scams as AI becomes better and better. An anonymous listener also reached out with some follow up regarding there experience with corporate ID theft. Joe's story follows the report on "dark patterns," and what they are. Dave's story is on people who got hired as customer service reps, but instead helped lure in lonely and lovestruck through a network of dating and hookup sites. Our catch of the day comes from listener Gareth who shares his catch of a phishing scheme from the "NSA." Links to stories: Guide to Dark Patterns – Terms and examples from the CCPA and the CPA Bringing Dark Patterns to Light This Is Catfishing on an Industrial Scale Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.

Denne episoden er hentet fra en åpen RSS-feed og er ikke publisert av Podme. Den kan derfor inneholde annonser.

Episoder(772)

backdoor (noun) [Word Notes]

backdoor (noun) [Word Notes]

An undocumented or publicly unknown method to access a computer system undetected or to break a cypher used to encode messages.

30 Mar 20215min

Technology is not designed for older users.

Technology is not designed for older users.

Guest Ming Yang of Orchard joins Dave to talk about ways to help your parents with technology (aka providing tech support for our parents). Dave shares the FBI's advisory warning of an expected increa...

25 Mar 202137min

watering hole attack (noun) {Word Notes]

watering hole attack (noun) {Word Notes]

From the intrusion kill chain model, a technique where the hacker compromises sites commonly visited by members of a targeted community in order to deliver a malicious payload to the intended victim.

23 Mar 20215min

Ideally, look for someone open to deception.

Ideally, look for someone open to deception.

Guest professional magician Brandon Williams talks with Joe about the art of deception. we have some follow-up on a watering hole attack we discussed a few episodes back, Joe's story is about the Atto...

18 Mar 202139min

network telescope (noun) [Word Notes]

network telescope (noun) [Word Notes]

Network observation systems designed to monitor globally unreachable but unused Internet address space or the Deep Web in order to study a wide range of interesting Internet phenomena.

16 Mar 20215min

Insider threats and security concerns for APIs.

Insider threats and security concerns for APIs.

Guest Inon Shkedy, security researcher at Traceable and API project leader at OWASP Foundation, talks with Dave about the risks various types of insider threats pose to APIs, we have some follow-up fr...

11 Mar 202138min

SOC Triad (noun) [Word Notes]

SOC Triad (noun) [Word Notes]

A best practice for framing cyber intelligence critical information requirements that recommends collecting and consolidating data from three specific sources: endpoint, network and log.

9 Mar 20215min

Fraud activity within secure messaging apps in plain sight.

Fraud activity within secure messaging apps in plain sight.

Guest Brittany Allen of Sift joins Dave to talk about a new fraud ring on Telegram where bad actors leverage the app to steal from on-demand food delivery services, Joe's story involves two of the fiv...

4 Mar 202141min

Populært innen Politikk og nyheter

giver-og-gjengen-vg
aftenpodden
forklart
stopp-verden
aftenpodden-usa
popradet
fotballpodden-2
dine-penger-pengeradet
rss-gukild-johaug
lydartikler-fra-aftenposten
det-store-bildet
nokon-ma-ga
hanna-de-heldige
rss-ness
e24-podden
rss-espen-lee-usensurert
aftenbla-bla
grasoner-den-nye-kalde-krigen
rss-utenrikskomiteen-med-bogen-og-grasvik
frokostshowet-pa-p5