What Kind of Idiot Gets Phished? by Reply All from Gimlet Media

Possibly related…

  1. Stuff You Should Know

    Social Security Numbers: Less Boring than You’d Think — Do you know that up until July 2011 an ambitious hacker with a good software program could deduce your social security number based on your date and place of birth? In this episode, the boys examine some of the lesser-known details of the Social Security system in the U.S.

    —Huffduffed by TrentVich

  2. Mac Power Users #10 - Mac Security | 5by5

    This episode includes a survey of security issues for Mac owners. Subjects include virus and trojans, phishing and web security, and physical security and insurance. Links of Interest: Norton Anti-Virus for Mac McAfee VirusScan for Mac Virus Barrier ClamX PGP Encryption TrueCrypt Open DNS OS X Filevault MacSparky Secure Disk Image Screencast #2 George […]

    —Huffduffed by danieljackson

  3. Why People Still Fall for Phishing Scams

    Thanks to LastPass for partnering with us on this video! Click here to try LastPass for free: https://adfarm.mediaplex.com/ad/ck/29817-241683-63016-1 (And yes, we get the irony of us asking you to use a long tracking link to get there. But it helps us.)

    Write phish, lament phish, read phish, sent phish. Rogue phish, gent phish, only with consent phish. ————————————————————————————————- Reference Material What Is Phishing? http://phishing.org/what-is-phishing (Dashlane) Jason’s phishing stats https://blog.dashlane.com/phishing-statistics/ (Reddit) That phishing thread https://reddit.com/r/personalfinance/comments/7z3at6/i_thought_i_was_paranoid_but_i_got_phished_read/ (Modern Rogue) 7 Free Internet Tools No Modern Rogue Should Be Without http://themodernrogue.com/articles/2018/3/11/7-free-internet-tools-no-modern-rogue-should-be-without (PhishLabs) A Quarter of Phishing Attacks are Now Hosted on HTTPS Domains: Why? https://info.phishlabs.com/blog/quarter-phishing-attacks-hosted-https-domains (Wired) Phishing schemes are using encrypted sites to seem legit https://wired.com/story/phishing-schemes-use-encrypted-sites-to-seem-legit/ ————————————————————————————————- Patreon & Discord: http://patreon.com/modernrogue MR Articles: http://…

    Original video: https://www.youtube.com/watch?v=LtSA-nUSLuM
    Downloaded by http://huffduff-video.snarfed.org/ on Mon, 22 Oct 2018 18:50:22 GMT Available for 30 days after download

    Tagged with entertainment

    —Huffduffed by adorablerobot

  4. Cybersecurity On Call: The Importance of DevSecOps with Alan Shimel

    Countless software applications are hacked daily. Whether it’s a social engineering attack where the hacker covertly tricks an individual, a broad blast phishing attack, or a brute force attack where the hacker goes straight after vulnerabilities in an application. These attacks that target these types of vulnerabilities are more formally called “zero-day” attacks.

    Original video: https://soundcloud.com/cloudera/cybersecurity-on-call-the-importance-of-devsecops-with-alan-shimel
    Downloaded by http://huffduff-video.snarfed.org/ on Wed, 13 Dec 2017 14:56:47 GMT Available for 30 days after download

    —Huffduffed by mhkid

  5. Physical Pen-testing with Jek Hyde | Vince in the Bay

    Guest Jek Hyde of Sincerely Security with prosthetic "baby bump." My guest this episode is "Jek" a social engineer/pen-tester who recently live tweeted a real world penetration test in which her team successfully breached a client’s corporate offices and networks. We talk about how she got into social engineering and information security. It was fun…


    —Huffduffed by moritzf

  6. Social Engineering

    Emmanuel Goldstein and friends —

    Since 1994, we’ve had a lot of fun with this panel, where we not only share stories of some of our most memorable social engineering adventures of years past, but we try and create some new memories live on stage over a good old-fashioned telephone line. For those not familiar, social engineering is the art of getting information out of people, information that you usually have absolutely no business possessing. The ability to gain a stranger’s trust, knowing what to ask for, and (perhaps most importantly) how to deal with failing miserably are all vital skills in the pursuit of unauthorized information. This panel is open to suggestion on targets to try, as well as open to new panelists who want to share their stories and skills. Leave your info at the information desk. (Be sure to include your Social Security number and mother’s maiden name.)

    Original video: http://livestream.com/internetsociety/hopeconf/videos/130745403
    Downloaded by http://huffduff-video.snarfed.org/ on Wed, 10 Aug 2016 04:54:12 GMT Available for 30 days after download

    —Huffduffed by volt4ire