Logo
    Search

    Podcast Summary

    • Escrow and Trust: Safeguarding Financial Transactions and RelationshipsTrustworthy intermediaries and cautiousness are essential for secure financial transactions and online relationships, protecting against scammers and potential financial losses.

      Escrow and trusting third parties are crucial in financial transactions. The story about the house purchase highlights the importance of escrow in ensuring a smooth and secure exchange. However, it also reminds us of the risks involved when scammers manipulate the system, leading to potential financial losses and legal battles. The second story about romance scams further underscores the need for caution when engaging in online relationships and financial transactions. The "pig butchering" term used by scammers exemplifies their strategy of luring victims in with false promises, extracting as much money as possible, and then abruptly disappearing. These stories serve as reminders to exercise caution, do thorough research, and rely on trustworthy intermediaries to protect our financial interests.

    • Beware of Scammers: Tactics and Tricks in Crypto InvestmentsStay cautious and skeptical, even when presented with convincing information, particularly in financial matters like crypto investments. Always verify, research, and double-check, to avoid falling prey to fraudsters.

      Scammers often prey on vulnerable individuals during difficult times, such as break-ups. They gain their trust by showing interest and offering financial opportunities, like crypto investments. In this particular case, the scam seemed legitimate due to the clever use of a fake browser within a reputable crypto platform. The victim, who happened to be knowledgeable about cryptocurrencies, did his research and found the presented information convincing. However, it was all a well-disguised fraud, with the scammers tricking him into sending his crypto to their wallet. The lesson here is to be cautious and skeptical, even when something appears genuine, especially when it involves money and investments.

    • Manipulative Tactics of Scammers Exploiting Emotions and VulnerabilitiesBe cautious of promises of high returns or time-sensitive opportunities, and never invest all savings or take loans without thorough research. Support and educate victims to overcome shame and social stigmas.

      Scammers prey on people's emotions and vulnerabilities to manipulate them into giving away their money. They use tactics such as promising high returns, creating time-sensitive opportunities, and instilling fear of losing money. Victims may even resort to taking loans or investing all their savings in hopes of financial freedom. However, once scammers have collected the money, they disappear, leaving the victims devastated. In some cases, victims may try to turn the tables by using the scammers' own tactics against them, but success is not guaranteed. It is crucial to educate and support victims, as they often feel shame and hesitate to come forward due to social stigmas.

    • Protecting Yourself from Love Scammers: Understanding Their TacticsScammers target vulnerable individuals seeking love and companionship, manipulating their emotions and trust. By recognizing patterns and tactics, we can safeguard against devastating financial losses and emotional damage.

      Scammers often prey on vulnerable individuals who are seeking love and companionship. These victims may be in a vulnerable state due to various factors such as loneliness, abusive relationships, or financial instability. The scammers manipulate their emotions and trust, promising investment opportunities or romantic relationships. As a result, victims can suffer not only financial losses but also severe emotional damage. The impact of these scams can be devastating, causing individuals to lose their life savings, homes, businesses, and even leading to suicidal thoughts. It is crucial to be aware of the patterns and tactics used by scammers in order to protect oneself and others from falling into their traps, especially when vulnerable.

    • Manipulating Emotions and Exploiting Trust: The Tactics of ScammersScammers use emotional manipulation and diverse skill sets to gain trust and exploit individuals, highlighting the need for heightened awareness and caution in protecting personal assets and understanding the manipulation of emotions.

      Scammers and thieves have developed sophisticated skills in manipulating emotions and exploiting trust. They understand how to hijack victims' consciousness and perception of reality, pulling them away from friends and family and gaining their trust. Emotional manipulation is a key tool they use to keep victims engrossed and willing to do their bidding. Additionally, scammers possess a diverse range of skills depending on their geographical location. Some are skilled in setting up websites and working with cryptocurrencies, while others excel in money laundering and navigating check systems. What is concerning is that these threats are not limited to big corporations or distant entities; they directly target individuals and their personal assets. This calls for heightened awareness and caution, as well as a deeper understanding of how our emotions can be manipulated. Furthermore, we should consider the inherent trust placed on large social media platforms, as scammers often exploit this trust for their malicious activities.

    • Beware of Scammers on Facebook: A Growing ThreatBe cautious of online relationships and verify identities through phone calls or video chats to avoid falling victim to scams on Facebook. Stay skeptical and watch out for red flags.

      Scammers are increasingly using trusted platforms like Facebook to target victims. Cyber crimes and fraud originating from Facebook make up a significant portion, with eight out of ten cases being linked to the platform. This means that victims may unknowingly trust these platforms and fall prey to scams. The level of fear and vulnerability increases as scammers can now invade victims' personal space, interacting with them through texting, phone calls, and video chats. It's important to be cautious and skeptical, especially when engaging in online relationships. Initiating phone calls or video chats can help identify red flags, as scammers may refuse or find ways to bypass these forms of communication. Additionally, scammers can use deepfake technology or other tactics to deceive victims. BEC, short for business email compromise, refers to a different type of scam involving email compromise.

    • The rise of Business E-mail Compromise (BEC) and its evolving tacticsBEC scams are financially-driven attacks that target businesses using credential phishing and password harvesting. Awareness and cybersecurity measures are crucial in protecting against such threats.

      Business e-mail compromise (BEC) has been a significant cybercrime for several years, with financial losses making it the number-one crime from 2015 to 2021. Although the common perception of BEC often revolves around phishing emails requesting urgent wire transfers, it goes beyond that. While phishing is an overarching term for e-mail-based threats, BEC specifically encompasses financially-related scams targeting businesses. What's interesting is that BEC doesn't typically involve malware or software installation. Instead, it often relies on credential phishing and e-mail password harvesting. Furthermore, there is a correlation between the scammers behind BEC and the Nigerian prince scams. These scammers have evolved and become more sophisticated over time, targeting businesses with potential large sums instead of individual victims. The continuous success of BEC highlights the importance of awareness and cybersecurity measures to protect against such threats.

    • The Growing Threat of Sophisticated Phishing ScamsStay alert and cautious when dealing with emails, especially those asking for sensitive information or financial transactions. Implement strong filters and algorithms to detect suspicious emails.

      Phishing scams are becoming increasingly sophisticated and targeted. Scammers go to great lengths to gather information about companies and individuals in order to create convincing emails or invoices. They may pose as trusted contacts, such as the CEO or CTO, or use domains that are very similar to legitimate ones. Additionally, scammers may also try to trick companies into sending gift cards as rewards for a successful year. This highlights the importance of email providers and system admins implementing strong filters and using algorithms like the Levenshtein Distance to detect suspicious emails. It is also crucial for users to be vigilant and cautious when dealing with emails, especially those that request sensitive information or financial transactions.

    • Understanding the Threat of BEC Attacks and the Involvement of Black AxeBEC attacks pose a significant cybersecurity threat, with groups like Black Axe employing manipulation tactics. Effective security measures and a comprehensive approach are necessary to combat these attacks.

      Business email compromise (BEC) attacks are a major cybersecurity threat, and many of these attacks are orchestrated by groups like Black Axe, a Nigerian confraternity. These groups employ manipulation tactics rather than traditional malware or malicious content to exploit human vulnerabilities. Despite efforts by email gateways to protect against these attacks, many still manage to bypass these defenses. It is essential for individuals and organizations to be aware of the risks associated with BEC attacks and to implement strong security measures. Additionally, it is crucial to understand the interconnectedness between cybercrime and street gangs, as seen in the case of Black Axe, highlighting the need for a comprehensive approach to combating cyber threats.

    • The Dark Side of Online Scams: Unveiling the Influence of Voodoo and Human SacrificeDelving into the spiritual world of scammers reveals a chilling aspect to their crimes, shedding light on their extreme actions and emphasizing the need to understand their motivations to combat their far-reaching impact.

      The world of online scams, particularly those perpetrated by groups like the Black Axe, is not just about money and deception. It involves a deeply entrenched culture of voodoo, hexing, and charms that influences the mindset and actions of scammers. They believe that sacrificing animals or even humans can enhance their scamming abilities and bring luck. This spiritual aspect is often overlooked by many, but it reveals a fascinating and disturbing dimension to the scams. It also explains why some scammers are willing to go to extreme lengths, even sacrificing lives, in their pursuit of success. Understanding this cultural influence is crucial in comprehending the motivations and methods of these fraudsters and in tackling the far-reaching consequences of their actions.

    • The Scattered Canary Cyber-Fraud Group: A $100 Billion Theft and Its Impact on the US Treasury and American CitizensThe massive theft by the Scattered Canary cyber-fraud group exposes the vulnerability of government systems and the urgent need for stronger measures to safeguard taxpayer funds from fraud.

      The Scattered Canary cyber-fraud group, primarily from Nigeria, engaged in business e-mail compromise and unemployment fraud, stealing billions of dollars from the US government. The confirmed amount stolen is $100 billion, with a possible additional $400 billion in question. This massive loss not only affects the US Treasury, but also impacts American citizens' pockets, as the money comes from taxpayer funds. The scale of this theft is astonishing, nearly doubling the entire GDP of Nigeria and accounting for about 3% of the total pandemic relief funds. It highlights the ongoing problem of fraud and the need for stronger measures to protect government systems and funds.

    • Government Negligence: $1 Trillion Stolen from $5 Trillion COVID-19 Aid, Lack of Safeguards ExposedThe US government's failure to protect COVID-19 aid funds allowed fraudsters to steal $1 trillion, emphasizing the need for improved security measures and accountability to prevent further losses.

      The US government failed to protect the $5 trillion meant to aid Americans during the pandemic, resulting in approximately $1 trillion being stolen. The lack of checks and safeguards allowed fraudsters to take advantage of the situation. This massive loss of money is unacceptable and highlights a concerning problem within the government. It is disheartening to witness such negligence and the absence of measures to prevent fraud. The government should have learned from past experiences, such as the Nigerian prince scams, and implemented necessary security audits and precautions. The defeat felt by the Secret Service agent in charge of investigating this case reflects the magnitude of the problem. Admitting the problem and taking the necessary actions to fix it is crucial, or else the cycle of losing vast amounts of money will continue without resolution.

    Recent Episodes from Darknet Diaries

    146: ANOM

    146: ANOM

    In this episode, Joseph Cox (https://x.com/josephfcox) tells us the story of anom. A secure phone made by criminals, for criminals.

    This story comes from part of Joseph’s book “Dark Wire” which you should definitely read. Get yours here https://www.hachettebookgroup.com/titles/joseph-cox/dark-wire/9781541702691.

    Darknet Diaries
    en-usJune 04, 2024

    145: Shannen

    145: Shannen
    Shannen Rossmiller wanted to fight terrorism. So she went online and did. Read more about her from her book “The Unexpected Patriot: How an Ordinary American Mother Is Bringing Terrorists to Justice”. An affiliate link to the book on Amazon is here: https://amzn.to/3yaf5sI. Thanks to Spycast for allowing usage of the audio interview with Shannen. Sponsors Support for this show comes from Varonis. Do you wonder what your company’s ransomware blast radius is? Varonis does a free cyber resilience assessment that tells you how many important files a compromised user could steal, whether anything would beep if they did, and a whole lot more. They actually do all the work – show you where your data is too open, if anyone is using it, and what you can lock down before attackers get inside. They also can detect behavior that looks like ransomware and stop it automatically. To learn more visit www.varonis.com/darknet. Support for this show comes from Axonius. The Axonius solution correlates asset data from your existing IT and security solutions to provide an always up-to-date inventory of all devices, users, cloud instances, and SaaS apps, so you can easily identify coverage gaps and automate response actions. Axonius gives IT and security teams the confidence to control complexity by mitigating threats, navigating risk, decreasing incidents, and informing business-level strategy — all while eliminating manual, repetitive tasks. Visit axonius.com/darknet to learn more and try it free. Support for this show comes from ThreatLocker®. ThreatLocker® is a Zero Trust Endpoint Protection Platform that strengthens your infrastructure from the ground up. With ThreatLocker® Allowlisting and Ringfencing™, you gain a more secure approach to blocking exploits of known and unknown vulnerabilities. ThreatLocker® provides Zero Trust control at the kernel level that enables you to allow everything you need and block everything else, including ransomware! Learn more at www.threatlocker.com. Learn more about your ad choices. Visit podcastchoices.com/adchoices

    144: Rachel

    144: Rachel
    Rachel Tobac is a social engineer. In this episode we hear how she got started doing this and a few stories of how she hacked people and places using her voice and charm. Learn more about Rachel by following her on Twitter https://twitter.com/RachelTobac or by visiting https://www.socialproofsecurity.com/ Daniel Miessler also chimes in to talk about AI. Find out more about him at https://danielmiessler.com/. Sponsors Support for this show comes from Varonis. Do you wonder what your company’s ransomware blast radius is? Varonis does a free cyber resilience assessment that tells you how many important files a compromised user could steal, whether anything would beep if they did, and a whole lot more. They actually do all the work – show you where your data is too open, if anyone is using it, and what you can lock down before attackers get inside. They also can detect behavior that looks like ransomware and stop it automatically. To learn more visit www.varonis.com/darknet. Support for this show comes from Axonius. The Axonius solution correlates asset data from your existing IT and security solutions to provide an always up-to-date inventory of all devices, users, cloud instances, and SaaS apps, so you can easily identify coverage gaps and automate response actions. Axonius gives IT and security teams the confidence to control complexity by mitigating threats, navigating risk, decreasing incidents, and informing business-level strategy — all while eliminating manual, repetitive tasks. Visit axonius.com/darknet to learn more and try it free. Support for this show comes from ThreatLocker®. ThreatLocker® is a Zero Trust Endpoint Protection Platform that strengthens your infrastructure from the ground up. With ThreatLocker® Allowlisting and Ringfencing™, you gain a more secure approach to blocking exploits of known and unknown vulnerabilities. ThreatLocker® provides Zero Trust control at the kernel level that enables you to allow everything you need and block everything else, including ransomware! Learn more at www.threatlocker.com. Learn more about your ad choices. Visit podcastchoices.com/adchoices

    143: Jim Hates Scams

    143: Jim Hates Scams
    Jim Browning has dedicated himself to combatting scammers, taking a proactive stance by infiltrating their computer systems. Through his efforts, he not only disrupts these fraudulent operations but also shares his findings publicly on YouTube, shedding light on the intricacies of scam networks. His work uncovers a myriad of intriguing insights into the digital underworld, which he articulately discusses, offering viewers a behind-the-scenes look at his methods for fighting back against scammers. Jim’s YouTube channel: https://www.youtube.com/c/JimBrowning Sponsors Support for this episode comes from NetSuite. NetSuite gives you visibility and control of your financials, planning, budgeting, and of course - inventory - so you can manage risk, get reliable forecasts, and improve margins. NetSuite helps you identify rising costs, automate your manual business processes, and see where to save money. KNOW your numbers. KNOW your business. And get to KNOW how NetSuite can be the source of truth for your entire company. Visit www.netsuite.com/darknet to learn more. This episode is sponsored by Intruder. Growing attack surfaces, dynamic cloud environments, and the constant stream of new vulnerabilities stressing you out? Intruder is here to help you cut through the chaos of vulnerability management with ease. Join the thousands of companies who are using Intruder to find and fix what matters most. Sign up to Intruder today and get 20% off your first 3 months. Visit intruder.io/darknet. This show is sponsored by Shopify. Shopify is the best place to go to start or grow your online retail business. And running a growing business means getting the insights you need wherever you are. With Shopify’s single dashboard, you can manage orders, shipping, and payments from anywhere. Sign up for a one-dollar-per-month trial period at https://shopify.com/darknet. Learn more about your ad choices. Visit podcastchoices.com/adchoices

    142: Axact

    142: Axact
    Axact sells fake diplomas and degrees. What could go wrong with this business plan? Sponsors Support for this episode comes from NetSuite. NetSuite gives you visibility and control of your financials, planning, budgeting, and of course - inventory - so you can manage risk, get reliable forecasts, and improve margins. NetSuite helps you identify rising costs, automate your manual business processes, and see where to save money. KNOW your numbers. KNOW your business. And get to KNOW how NetSuite can be the source of truth for your entire company. Visit www.netsuite.com/darknet to learn more. Support for this show comes from ThreatLocker®. ThreatLocker® is a Zero Trust Endpoint Protection Platform that strengthens your infrastructure from the ground up. With ThreatLocker® Allowlisting and Ringfencing™, you gain a more secure approach to blocking exploits of known and unknown vulnerabilities. ThreatLocker® provides Zero Trust control at the kernel level that enables you to allow everything you need and block everything else, including ransomware! Learn more at www.threatlocker.com. This show is sponsored by Shopify. Shopify is the best place to go to start or grow your online retail business. And running a growing business means getting the insights you need wherever you are. With Shopify’s single dashboard, you can manage orders, shipping, and payments from anywhere. Sign up for a one-dollar-per-month trial period at https://shopify.com/darknet. Learn more about your ad choices. Visit podcastchoices.com/adchoices

    141: The Pig Butcher

    141: The Pig Butcher
    The #1 crime which results in the biggest financial loss is BEC fraud. The #2 crime is pig butchering. Ronnie Tokazowski https://twitter.com/iHeartMalware walks us through this wild world. Sponsors Support for this episode comes from NetSuite. NetSuite gives you visibility and control of your financials, planning, budgeting, and of course - inventory - so you can manage risk, get reliable forecasts, and improve margins. NetSuite helps you identify rising costs, automate your manual business processes, and see where to save money. KNOW your numbers. KNOW your business. And get to KNOW how NetSuite can be the source of truth for your entire company. Visit www.netsuite.com/darknet to learn more. Support for this show comes from Drata. Drata streamlines your SOC 2, ISO 27001, PCI DSS, HIPAA, GDPR & many other compliance frameworks, and provides 24-hour continuous control monitoring so you focus on scaling securely. Listeners of Darknet Diaries can get 10% off Drata and waived implementation fees at drata.com/darknetdiaries. This show is sponsored by Shopify. Shopify is the best place to go to start or grow your online retail business. And running a growing business means getting the insights you need wherever you are. With Shopify’s single dashboard, you can manage orders, shipping, and payments from anywhere. Sign up for a one-dollar-per-month trial period at https://shopify.com/darknet. Learn more about your ad choices. Visit podcastchoices.com/adchoices

    139: D3f4ult

    139: D3f4ult
    This is the story of D3f4ult (twitter.com/_d3f4ult) from CWA. He was a hacktivist, upset with the state of the way things were, and wanted to make some changes. Changes were made. Sponsors Support for this show comes from Axonius. The Axonius solution correlates asset data from your existing IT and security solutions to provide an always up-to-date inventory of all devices, users, cloud instances, and SaaS apps, so you can easily identify coverage gaps and automate response actions. Axonius gives IT and security teams the confidence to control complexity by mitigating threats, navigating risk, decreasing incidents, and informing business-level strategy — all while eliminating manual, repetitive tasks. Visit axonius.com/darknet to learn more and try it free. Support for this show comes from Thinkst Canary. Their canaries attract malicious actors in your network and then send you an alert if someone tries to access them. Great early warning system for knowing when someone is snooping around where they shouldn’t be. Check them out at https://canary.tools. Support for this show comes from Quorum Cyber. Their mantra is: “We help good people win.” If you’re looking for a partner to help you reduce risk and defend against the threats that are targeting your business — and especially if you are interested in Microsoft Security — reach out to Quorum Cyber at www.quorumcyber.com/darknet-diaries. Sources https://www.vice.com/en/article/z3ekk5/kane-gamble-cracka-back-online-after-a-two-year-internet-ban https://www.wired.com/2015/10/hacker-who-broke-into-cia-director-john-brennan-email-tells-how-he-did-it/ https://www.hackread.com/fbi-server-hacked-miami-police-data-leaked/ https://archive.ph/Si79V#selection-66795.5-66795.6 https://wikileaks.org/cia-emails/John-Brennan-Draft-SF86/page-7.html Learn more about your ad choices. Visit podcastchoices.com/adchoices

    138: The Mimics of Punjab

    138: The Mimics of Punjab
    This episode is about scammers in the Punjab region. Tarun (twitter.com/taruns21) comes on the show to tell us a story of what happened to him. Naomi Brockwell (twitter.com/naomibrockwell) makes an appearance to speak about digital privacy. To learn more about protecting your digital privacy, watch Naomi’s YouTube channel https://www.youtube.com/@NaomiBrockwellTV. And check out the books Extreme Privacy (https://amzn.to/3L3ffp9) and Beginner’s Introduction to Privacy (https://amzn.to/3EjuSoY). Sponsors Support for this show comes from Axonius. The Axonius solution correlates asset data from your existing IT and security solutions to provide an always up-to-date inventory of all devices, users, cloud instances, and SaaS apps, so you can easily identify coverage gaps and automate response actions. Axonius gives IT and security teams the confidence to control complexity by mitigating threats, navigating risk, decreasing incidents, and informing business-level strategy — all while eliminating manual, repetitive tasks. Visit axonius.com/darknet to learn more and try it free. Support for this show comes from SpyCloud. It’s good practice to see what data is getting passed around out there regarding you, your employees, your customers, and your business. The dark web is a place where this data is traded and shared. SpyCloud will help you find what out there about you and give you a report so you can be aware. Then they’ll continuously monitor the dark web for any new exposures you should be aware of. To learn more visit spycloud.com/darknetdiaries. Support for this show comes from ThreatLocker. ThreatLocker has built-in endpoint security solutions that strengthen your infrastructure from the ground up with a zero trust posture. ThreatLocker’s Allowlisting gives you a more secure approach to blocking exploits of known and unknown vulnerabilities. ThreatLocker provides zero trust control at the kernel level. Learn more at www.threatlocker.com. Learn more about your ad choices. Visit podcastchoices.com/adchoices

    137: Predator

    137: Predator
    A new type of mercenary spyware came on the radar called Predator. It’ll infect a mobile phone, and then suck up all the data from it. Contacts, text messages, location, and more. This malware is being sold to intelligence agencies around the world. In this episode we hear from Crofton Black at Lighthouse Reports who spent 6 months with a team of journalists researching this story which was published here: https://www.lighthousereports.com/investigation/flight-of-the-predator/. We also hear from Bill Marczak and John Scott-Railton from Citizen Lab. If you want to hear about other mercenary spyware, check out episodes 99 and 100, about NSO group and Pegasus. To hear another episode about Greece check out episode 64 called Athens Shadow Games. Sponsors Support for this show comes from Axonius. The Axonius solution correlates asset data from your existing IT and security solutions to provide an always up-to-date inventory of all devices, users, cloud instances, and SaaS apps, so you can easily identify coverage gaps and automate response actions. Axonius gives IT and security teams the confidence to control complexity by mitigating threats, navigating risk, decreasing incidents, and informing business-level strategy — all while eliminating manual, repetitive tasks. Visit axonius.com/darknet to learn more and try it free. Support for this show comes from Varonis. Do you wonder what your company’s ransomware blast radius is? Varonis does a free cyber resilience assessment that tells you how many important files a compromised user could steal, whether anything would beep if they did, and a whole lot more. They actually do all the work – show you where your data is too open, if anyone is using it, and what you can lock down before attackers get inside. They also can detect behavior that looks like ransomware and stop it automatically. To learn more visit www.varonis.com/darknet. Support for this show comes from Akamai Connected Cloud (formerly Linode). Akamai Connected Cloud supplies you with virtual servers. Visit linode.com/darknet and get a special offer. Learn more about your ad choices. Visit podcastchoices.com/adchoices

    Related Episodes

    How Merchants Can Strike the Delicate Balance Between Fraud Prevention and Customer Experience

    How Merchants Can Strike the Delicate Balance Between Fraud Prevention and Customer Experience

    Fraud prevention is vital for protecting businesses from escalating costs. But an effective fraud strategy can do much more than that – contrary to common perceptions, fraud management drives better conversion rates and maximize revenue. Fraud and Payments strategies working in coordination and complementary to each other, build a clearer picture of customer behaviors and preferences.

    Tech-Infused Social Engineering - A conversation with Frank McKenna, Chief Fraud Strategist, PointPredictive

    Tech-Infused Social Engineering - A conversation with Frank McKenna, Chief Fraud Strategist, PointPredictive

    In episode 13 of Scam Rangers podcast, we chat with Frank McKenna, a fraud and scam fighter with 30 years of experience. We discuss the use of technology in combination with social engineering tactics to execute online scams, including bots, voice imitation, and deep fakes. Frank emphasizes the need for proactive measures to stop fraudulent transactions, and the importance of being passionate about fraud-fighting. The episode offers valuable insights and advice for both fraud fighters and non-fraud fighters, highlighting the importance of staying informed and vigilant to protect ourselves and our finances from scams.

    Frank on Fraud: https://frankonfraud.com

    ScamRanger: hrrps://scamranger.ai

    This podcast is hosted by Ayelet Biger-Levin https://www.linkedin.com/in/ayelet-biger-levin/  who spent the last 15 years building technology to help financial institutions authenticate their customers and identify fraud. She believes that when it comes to scams, the story starts well before the transaction. She has created this podcast to talk about the human side of scams, and to learn from people who have decided to dedicate their lives to speaking up on behalf of scam victims and who take action to solve this problem. Be sure to follow her on LinkedIn and reach out to learn about her additional activities in this space. 



    Ageless Money Scams We Still See in 2023

    Ageless Money Scams We Still See in 2023
    From pyramid schemes to phishing emails, marketing ploys are more sophisticated than ever. Listen in as George and Rachel discuss some of the oldest scams known to man, what they look and sound like today, and how to avoid the “snake oil’ salesmen of 2023 (lookin’ at you, TikTok influencers). In this episode: ·      Crazy “exclusive” deals that need more investigation before you buy ·      Why “too good to be true” really is (probably) too good to be true ·      The mocktail that tastes like “Christmas in a cup”   Helpful Resources:   ·     Start making memories. Go NOW and get Telestrations at Walmart or wherever you buy board games. ·     Booking a flight with Going is the best and simplest way to pay less and travel more. Sign up for free today at going.com/smartmoney. ·     Get your finances organized, make a plan, build your confidence, and kick money stress out of your life for good with the EveryDollar budgeting app. Go to www.everydollar.com/smartmoney to get started today. Use code SMARTMONEY to get a free two-week trial and $15 off your premium membership to EveryDollar. ·  Pre-order George's new book, Breaking Free From Broke, today! ·     Do you have a Guilty as Charged question for Rachel and George? Send a DM to @rachelcruze or @georgekamel on Instagram! Be sure to type “GUILTY?” at the top of your message so we don’t miss it. ·     Learn more about your ad choices: https://www.megaphone.fm/adchoices ·      Ramsey Solutions Privacy Policy: https://www.ramseysolutions.com/company/policies/privacy-policy   This Week’s Happy Hour Special: Apple Butter Mocktail Find the original recipe here. Ingredients: ·     1 ounce apple juice ·     2 tablespoons of apple butter ·     Dash of non-alcoholic orange bitters ·     Juice of 1/2 lemon ·     Ginger beer ·     Coarse cinnamon sugar and simple syrup, for rimming ·     Thinly sliced apples and a cinnamon stick, to garnish   Instructions: Pour some simple syrup on a plate and some coarse cinnamon sugar on another. Then, dip the rim of your cocktail glass into the syrup and then into the sugar, twisting to coat, before adding ice cubes to the glass. Combine the apple juice, apple butter, lemon juice and bitters in a cocktail shaker and give it a dry shake (in other words, a shake without ice). Shake vigorously until properly combined then strain the mixture into your prepared cocktail glass. Top up with ginger beer and garnish with a cinnamon stick and apple slice on the rim to serve.

    Prof G Markets: First Time Founders with Ed Elson — ft. Eli Wachs of Footprint

    Prof G Markets: First Time Founders with Ed Elson — ft. Eli Wachs of Footprint
    This week on Prof G Markets, we premier a new segment: Ed interviews founders to gain insight into the startup market and the experience of founding a company, then Scott then shares his thoughts on the given company’s business model and offers advice to the founder. First up in the hot seat: Eli Wachs, founder of data security company Footprint. Follow Eli on Twitter, @EliWachs. Learn more about your ad choices. Visit podcastchoices.com/adchoices

    Ep. 224 - The SE ETC Series - Tips for Having Difficult Conversations with Chris and Patrick

    Ep. 224 - The SE ETC Series - Tips for Having Difficult Conversations with Chris and Patrick

    Welcome to the Social-Engineer Podcast: The SE Etc. Series. This series will be hosted by Chris Hadnagy, CEO of Social-Engineer LLC, and The Innocent Lives Foundation, as well as Social-Engineer.Org and The Institute for Social Engineering. Chris will be joined by his co-host Patrick Laverty as they discuss topics pertaining to the world of Social Engineering. [August 28, 2023]

     

    00:00 - Intro

    00:21 - Patrick Laverty Intro

    00:55 - Intro Links

    -          Social-Engineer.com - http://www.social-engineer.com/

    -          Managed Voice Phishing - https://www.social-engineer.com/services/vishing-service/

    -          Managed Email Phishing - https://www.social-engineer.com/services/se-phishing-service/

    -          Adversarial Simulations - https://www.social-engineer.com/services/social-engineering-penetration-test/

    -          Social-Engineer channel on SLACK - https://social-engineering-hq.slack.com/ssb

    -          CLUTCH - http://www.pro-rock.com/

    -          innocentlivesfoundation.org - http://www.innocentlivesfoundation.org/

    07:20 - Intro Chat

    09:11 - Todays Topic: Tips for Having Difficult Conversations

    10:00 - Outline for Parents

    12:10 - Map Your Terrain

    16:22 - Define Your Goal

    17:40 - Decide on Your Pretext

    20:05 - Imagine Your Rapport Building

    21:50 - Identify Potential Influence Building Techniques

    28:47 - Run a Quick Manipulation Check

    31:31 - Pump Up the Nonverbals

    36:30 - Conduct an Authenticity Check

    39:21 - Prepare for Likely Contingencies

    40:48 - Solidify Gains

    43:40 - Next Month: ???

    44:00 - Wrap Up & Outro

    -          www.social-engineer.com

    -          www.innocentlivesfoundation.org

     

    Find us online

    -          Chris Hadnagy

    -          Twitter: @humanhacker

    -          LinkedIn: linkedin.com/in/christopherhadnagy

    -          Patrick Laverty

    -          Twitter: @plaverty9

    -          LinkedIn: linkedin.com/in/plaverty9