This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
The ability to ask any question on just about any topic and have a very intelligent answer given has cybersecurity experts wondering if the infosec community is using it and, if so, for what; and, if so, how is it working for writing scripts and code or imitating phishing emails, for instance. The script to do that was written by ChatGPT.
Given the interest after my pointing out a couple of little differences in the US compared to the rest of the world last week, after the usual tech and infosec intro this week I decided to focus a big whack of this week's video on what some of differences look like. So yeah, business as usual on the internet!
Robotic process automation, vaccine scams, and key takeaways from the latest Security Awareness Report - catch up on all of the week's infosec news with the Friday Five!
The post Phishing, Scam, & Marketing Emails: What’s the Difference? The post Phishing, Scam, & Marketing Emails: What’s the Difference? In order to defend against the different tactics cybercriminals are leveraging online, a variety of essential security measures are necessary–one of the most important being general awareness.
Of course, he took the bait: pic.twitter.com/epM9YTSz1L — Troy Hunt (@troyhunt) November 6, 2021 It's like dealing with scam phone calls: if you want to see where they lead, you need to play the game and not come on too strong too early. Onto the "scammer" comment and it raises an interesting question: is this a scam?
A phone scam targeting psychologists reveals that even professionals can become victims, stolen multi-million-dollar NFT’s results in a “all my apes gone” plea for help, and details on a skimmer supply chain attack on more than 100 real estate websites. ** Links mentioned on the show ** The Phone Scam That Targets Psychologists [link] Thieves […].
The EARN IT Act is back for a second time which would pave the way for a new massive government surveillance system in the US, romance scams are on the rise so don’t fall for love in all the wrong places, and details about a new ransomware attack that wants you to like and subscribe, […].
Next, we dive into the world of airline reservation scams, exposing how […] The post Meta’s Threads and Your Privacy, Airline Reservation Scams, IDOR Srikes Back appeared first on Shared Security Podcast. The post Meta’s Threads and Your Privacy, Airline Reservation Scams, IDOR Srikes Back appeared first on Security Boulevard.
Whether it’s helping hospitals avoid becoming the next ransomware victim or kneecapping new COVID-19-themed scam websites, these nascent partnerships may well end up saving lives. At least three major industry groups are working to counter the latest cyber threats and scams.
The post Graphics Card Web Tracking, Fake Job Ad Scams, Hacker Takes Down North Korea’s Internet appeared first on The Shared Security Show. The post Graphics Card Web Tracking, Fake Job Ad Scams, Hacker Takes Down North Korea’s Internet appeared first on Security Boulevard.
It’s difficult not to hum a tune whenever the phrase “accepted the risk” comes up if you’ve ever seen this excellent infosec industry parody. According to the FBI, BEC scams are the most costly form of cybercrime today. First American is not out of the regulatory woods yet from this enormous data leak.
Not just infosec headlines or tech headlines, but the headlines of major consumer media the likes my mum and dad would read. In the case of Ashley Madison, there was a huge amount of blackmail: Amazing that 3 years on we're still seeing Ashley Madison blackmail scams.
In episode 346, we discuss new AI-driven voicemail scams that sound convincingly real and how to identify them. Join […] The post The Rise of AI Voicemail Scams, Political Donation Privacy Concerns appeared first on Shared Security Podcast.
Plus, we shed light on the alarming rise of Bitcoin ATM scams exploiting older adults, providing essential tips to protect your loved ones from these devious schemes. Tune in for unique insights […] The post Shocking SQL Injection in TSA App, Bitcoin ATM Scams Targeting Seniors appeared first on Shared Security Podcast.
This month we discuss Business Email Compromise (BEC) scams. What are they, how to identify them, and why BEC scams have created over $1.8 The post Business Email Compromise Scams appeared first on The Shared Security Show. The post Business Email Compromise Scams appeared first on The Shared Security Show.
Infosec’s Choose Your Own Adventure training game “Deep Space Danger” tests employees on their knowledge of social engineering. One of our jobs is to make sure the brand stays true to its zeitgeist, its character, and [Infosec] really had it down right from the beginning.”. What do you do?
SolarWinds CISO, Classiscam Scam-as-a-Service appeared first on Shared Security Podcast. The post SEC vs. SolarWinds CISO, Classiscam Scam-as-a-Service appeared first on Security Boulevard.
I seem to be doing most of that activity now on Mastodon , which appears to have absorbed most of the infosec refugees from Twitter, and in any case is proving to be a far more useful, civil and constructive place to post such things. com, which was fed by pig butchering scams.
In the ‘Aware Much’ segment, the […] The post Ticketmaster Data Breach and Rising Work from Home Scams appeared first on Shared Security Podcast. The post Ticketmaster Data Breach and Rising Work from Home Scams appeared first on Security Boulevard. Additionally, they discuss Live Nation’s ongoing monopoly investigation.
I was reminded of this by Phil Cracknell who posted on linkedin that in his opinion the Kevin Costner, Whitney Houston classic, Bodyguard was the best infosec movie. When in haste we often make mistakes, fall for scams, or execute commands in production without checking them. Don’t believe me? Well read on.
is causing cyber legislation delays, fake browser updates are scamming users with malware, and another cybercrime site was taken down this past week. Catch up on all the latest InfoSec updates in this week’s Friday Five! Trouble in D.C.
Lastly, Tom and Kevin reflect on reports of AI-powered voice cloning scams targeting […] The post Apple Finally Adopts RCS, AI Powered Scams Targeting the Elderly appeared first on Shared Security Podcast. The post Apple Finally Adopts RCS, AI Powered Scams Targeting the Elderly appeared first on Security Boulevard.
We also dug into a supply chain attack , discussed threats from a ransomware group , and did a deep dive on wallet recovery code scams. There were also fines for cities , and a 101 guide to Smishing. Stay safe, everyone! The post A week in security (April 26 – May 2) appeared first on Malwarebytes Labs.
It requires some baseline industry knowledge, but it’s a great way to stay on top of InfoSec current events. Since 2007 (before podcasting in general had really taken off), Patrick Gray and his co-host Adam Boileau have covered a wide range of InfoSec topics with insight from fellow industry leaders. Malicious Life.
Norton 360, a popular antivirus product, has installed a cryptocurrency mining program on its customers’ computers, some cities in Texas have been hit with a phishing scam designed to get users to pay through fraudulent QR code stickers on public parking meters, and how Facebook is still collecting data about you even if you deactivate […].
With all ransomware attacks, identity theft scams, and countries hacking one another, it's enough to make anyone wonder… How about starting off with a cup of clarity instead? Does waking up each morning to an earful about the latest cyber disasters leave you worried about your personal security? In this blog post, we’ll cover [.]
All this plus how Apple and Facebook fell for a massive email scam. ** […]. This week we battle it out between the two mobile tech giants, Google Android vs Apple iOS, and discuss which one is better for your privacy and cybersecurity. Topics include: app stores and OS updates, ad tracking, and native text messaging.
Impersonation Scams. These range from simple to sophisticated scams to convince you they are genuine, in hopes that you feel comfortable sharing personal or financial information whether on the phone, via email, or text. Although BEC attacks may be targeted at business, they can also be used to scam individual people.
Build security awareness training modules to educate your employees on how to spot phishing emails or business-related scams. I’ve been in infosec for over 30 years and have had the great privilege of evolving and learning as a cybersecurity executive in a space I love.
Next, they discuss the potential risks of QR code scams, detailing a real-life incident where a woman lost a significant amount of money due to a QR code scam. In episode 307, Tom and Scott debunk misinformation circulating about the iOS 17 NameDrop feature by law enforcement and others on social media.
Our speakers discussed a range of hot cyber topics, including business email compromise (BEC) scams, cyber warfare, Zero Trust, burnout, and so much more. Paul Rapier, Vice President of Information Technology for the Detroit Pistons, led a discussion on best practices for InfoSec teams.
They talk about popular channels like Scammer Payback and Kitboga that show these scams in progress. In Episode 313, hosts Tom and Scott discuss the world of scambaiting, discussing what it is, the tactics used, and its effectiveness in stopping scammers.
There’s not many individual scams which can put “18 years and counting” on their resume. Of course, this was tied into a nonsensical scam about recovering lots of lost money should he be brought safely back. “Mark Ruffalo deepfake romance scam” What a sentence. spaaaaaaaaaace. What a world.
An aware employee is less likely to fall for a phishing scam. InfosecInfosec offers more than 700 training resources to help your organization to prepare for phishing and other cyber threats. Infosec provides 1000+ phishing email templates to represent various approaches and tactics used by hackers.
Many wireless phone providers have introduced spam protections to keep their customers from falling victim to vishing scams. You can also register your number on the federal Do Not Call list, but it doesn’t seem to have any actual effect on the number of scam calls received. Vishing Defenses.
This post is about how we did it Finally, not shown in the piece, we spent time helping the targets understand how we found the data and showing them how to secure their online presence Bank scams and how to avoid them, with Alexis Conran We were asked to help make a TV show about the information that people share online being abused by scammers.
Understanding the detection difficulty helps phishing awareness training implementers in two primary ways,” said Jody Jacobs, infosec specialist at NIST, in a session held last Tuesday at the Messaging, Malware and Mobile Anti-Abuse Working Group (M3AAWG)’s 51’s General Meeting.
This is what prompted the FBI to issue a warning about the $43B impact of Business Email Compromise (BEC) scams. Phishing has now become the most popular avenue of attack for hackers because it’s relatively easy to trick people into clicking on malicious links. Cyber Resilience planning puts focus on recovery readiness.
Social engineering, phishing scams, ransomware, DDoS attacks , and software vulnerabilities are just some of the threats facing overloaded security professionals with limited budgets. Bear in mind that SOAR requires a mix of technologies and tools that deliver the capabilities the infosec team requires.
In Episode 356, Tom and Kevin discuss the increasing role of deepfake technology in bypassing biometric checks, accounting for 24 percent of fraud attempts. The show covers identity fraud issues and explores the controversial practices of data brokers selling location data, including tracking US military personnel.
We organize all of the trending information in your field so you don't have to. Join 28,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content