Logo
    Search

    #97 What Kind Of Idiot Gets Phished?

    enMay 18, 2017

    Podcast Summary

    • Even tech-savvy individuals can fall for phishing attacksStay aware of phishing attempts and be cautious with unsolicited emails or messages, as even the most tech-savvy individuals can be vulnerable.

      Phishing is a serious threat to even the smartest and most tech-savvy individuals, as shown in the Reply All podcast. The hosts, who initially dismissed phishing as something only "dummies" would fall for, were surprised to discover that even they could be vulnerable. They brought in a computer hacking expert to conduct a phishing test on the entire Reply All team, including Alex Bloomberg, and found that several people fell for the test. Previously, high-profile hacks, such as those targeting the French President's campaign and John Podesta, also started with phishing attacks. The hosts realized that their initial dismissive attitude towards phishing was misguided, and that everyone should take it seriously. They emphasized the importance of being aware of phishing attempts and being cautious when receiving unsolicited emails or messages. Additionally, it's crucial to have the permission and support of superiors before conducting such tests to ensure transparency and trust within an organization.

    • Phishing Test Results in Email Account TakeoverPhishing emails can appear to be from trusted sources, leading to account takeovers and potential harm. Be vigilant and verify authenticity before acting.

      Email phishing attacks can be extremely convincing and even target individuals within an organization. During a phishing test conducted by Daniel, he was able to gain control of someone's email account within hours. The test involved impersonating colleagues and sending fraudulent emails to them, leading to a high level of paranoia and confusion. In the case of their executive producer, Tim, he received an email with an audio file attachment that appeared to be from a trusted source. Tim fell for the phishing attempt and entered his email password, unknowingly giving Daniel access to his account. This incident highlights the importance of being vigilant against phishing attacks and the potential harm they can cause, even within a trusted team or organization. It's essential to be aware of the signs of phishing emails and to verify the authenticity of any suspicious messages before taking any action.

    • Email scams can disguise themselves as legitimate emailsBe wary of emails asking for sensitive info or requiring clicks, even if they seem to be from trusted sources. Share potential scams with your team to prevent further damage.

      Email scams can be convincingly disguised, even to the point of mimicking a company's domain name and email address. In this case, a scammer named Daniel sent fake emails, appearing to be from a colleague, using the domain "gimletrmedia.com" which closely resembled the legitimate "gimletmedia.com." The emails were designed to trick recipients into revealing sensitive information, such as usernames and passwords, by directing them to fake login pages. Even if the recipient doesn't fall for the scam, the scammer can still learn valuable information about their target. For instance, they can track the type of device and operating system used to access the fake login page. This information can help the scammer refine their tactics and increase the chances of success in future attempts. Another important lesson is that when you suspect an email is a scam, it's crucial to share the information with your team or organization. This can help prevent others from falling victim to the same scam and potentially limit the damage caused by the scammer. In summary, email scams can be sophisticated and deceptive, making it essential to be vigilant and cautious when handling emails, especially those that ask for sensitive information or require you to click on links. Sharing information about potential scams with your team can also help protect your organization from cyber threats.

    • Phishing scams can trick even the vigilantBe aware of phishing attempts, even from trusted sources, and report any suspicious emails to the team.

      Even with precautions like two-step verification in place, individuals can still fall victim to phishing scams. During a team experiment on phishing attempts, Alex received an email disguised as an Uber update from what appeared to be Gimlet Media. Despite being in the same room as Sruthi when she received the email, Alex did not recognize it as a phishing attempt and alerted her, potentially putting her at risk. This incident highlights the importance of being vigilant and aware of the subtle signs of phishing emails, even when they come from seemingly trusted sources. Additionally, it's crucial to remember that phishing attempts can target multiple individuals at once, and even if some fall for it, others should remain on guard and report any suspicious emails to the team.

    • Google Drive phishing attack fools even tech-savvy individualsBe cautious and verify authenticity of links or requests before entering sensitive info. No one is immune to phishing attacks.

      Phishing attacks can be extremely sophisticated and convincing, even to tech-savvy individuals. In this case, a scammer was able to create a fake Google Drive login page that tricked someone into entering their username, password, and two-factor authentication code, giving the scammer full access to their Gmail account. This attack was so convincing that even the person who initially fell for it was unsure if they had been phished or not. The scammer also used a server based in New York to make the attack appear more legitimate. This incident serves as a reminder that no one is immune to phishing attacks, and it's important to be cautious and verify the authenticity of any links or requests before entering sensitive information. Additionally, it's important to remember that falling for a phishing attempt does not make one careless or unintelligent, but rather a victim of a well-executed scam.

    • Phishing scams target everyone, not just unsophisticated individualsPhishing scams can trick anyone, including the intelligent and skeptical, highlighting the importance of staying vigilant and aware.

      Phishing scams can target anyone, even those considered smart or knowledgeable. During a discussion, the speaker expressed their failed attempt to convince a colleague, Alex, of the prevalence and danger of phishing scams. The speaker felt guilty for making Alex feel manipulated, despite agreeing intellectually that anyone can fall victim to such scams. To make the experiment more impactful, they considered targeting someone Alex respected and considered smart. However, they were unable to obtain permission or identify someone who used the required email platform for the test. The conversation highlighted the importance of recognizing that phishing scams are not limited to unsophisticated individuals and can target even the most intelligent and skeptical people.

    • Alex, a seasoned journalist, falls for a phishing scamEven experienced individuals can be tricked by phishing scams in under a minute, emphasizing the importance of skepticism and vigilance when receiving unsolicited emails or messages.

      Even a seasoned journalist like Alex, who is known for his skepticism and empathy, can fall victim to a well-crafted phishing scam. The conversation reveals how Daniel successfully phished Alex in just 41 seconds, leaving him feeling humiliated and concerned about potential further attacks. The discussion also highlights Alex's trusting nature and empathetic personality, which made him an ideal target. The incident serves as a reminder that no one is immune to phishing attempts and the importance of being vigilant and skeptical of unsolicited emails or messages, especially those with suspicious attachments or links.

    • Personal experience of receiving a phishing emailBe cautious of emails and links, verify authenticity, have strong passwords, and enable 2-factor authentication to prevent phishing scams.

      Even tech-savvy individuals can fall victim to phishing scams. In the discussed episode of Reply All, host Matt Lieber shared his personal experience of receiving a phishing email disguised as one from his colleague, Alex Coleman. The email contained a PDF file that required Matt to log in to his email account to view. After doing so, he was asked for 2-factor authentication, which he provided, but then had to do it again, leading him to feel uncomfortable and suspicious. He later learned that the file was a phishing attempt to steal his email credentials. This incident serves as a reminder that no one is immune to phishing scams, and it's important to be cautious and verify the authenticity of emails and links before taking any action. Additionally, it's crucial to have strong passwords and enable 2-factor authentication to add an extra layer of security to your accounts.

    • Stay informed and expand perspectives through podcastsPodcasts offer unique and convenient way to learn, meet new people, and expand perspectives. Stay subscribed and tuned in to keep learning and growing.

      Learning from today's discussion is the importance of staying informed and having access to diverse sources of information. We explored how podcasts offer a unique and convenient way to learn about various topics, meet new people, and expand our perspectives. Whether you prefer Apple Podcasts, Spotify, or any other platform, there's a wealth of knowledge and entertainment waiting for you. So, make sure to subscribe to your favorite shows and tune in regularly to keep learning and growing. And don't forget to check out more episodes of our show for more insightful conversations. Thanks for joining us today, and we'll see you next week!

    Recent Episodes from Reply All

    Search Engine with PJ Vogt

    Search Engine with PJ Vogt
    PJ Vogt introduces his new show, Search Engine, where he digs into all kinds of questions, big and small. On this episode: why are drug dealers putting fentanyl in everything?  You can find the concluding episode of the story here.  To find more episodes of Search Engine or to submit a question to the show, go here. Learn more about your ad choices. Visit podcastchoices.com/adchoices

    A Message About the Future of the Show

    A Message About the Future of the Show
    Some news: Emmanuel and Alex will be stepping away from making the show. And this iteration of Reply All will be ending in late June. This isn’t a decision that was made by any one person. Reply All has always been a super collaborative project which is what we’ve loved so much about making it. Ultimately, staff who have been working on this show for a long time – in some cases five, six, seven years at this point – are ready to pursue other things. Making this show has been an incredible pleasure. Thank you all so much for listening. We hope you join us for our remaining episodes, including our last one, on June 23rd. Learn more about your ad choices. Visit podcastchoices.com/adchoices

    Related Episodes

    Shafi Goldwasser

    Shafi Goldwasser

    Shafi Goldwasser is an award-winning mathematician and computer scientist and the Director of the Simons Institute for the Theory of Computing at UC Berkeley. Her most notable work is in cryptography and zero knowledge proof. We discuss the promise of cryptography to make our society more secure. 

    Data privacy and you: 

    Cryptography is the field that deals with the privacy and correctness of how our information is used. It makes our data more secure, with a range of tools such as encryption, authentication, and verification. Every time we are online, we need to be vigilant about what private information we share and with whom. We should use the tools of cryptography and be careful about giving permissions for apps to access our data.  

    Algorithmic Fairness and Data Bias: 

    We have an idea that algorithms are fair because they are machine computations. However, algorithms do no account for actual individuals, so the data is trained with existing societal norms, which can perpetuate unfairness. Data can also be poisoned once people figure out what algorithms are used by tweaking the information in order to get the desired outcome. 

    Demand accountability: 

    We must demand that our personal information is only used in ways that can keep our identity private. There are already collaborative platforms using various encryption methods that are effective for governments and companies to use. “If companies get into trouble because of fiascos having to do with private data you don't just blindly continue supporting them.” 

    Find out more:

    Shafi Goldwasser is the Director of the Simons Institute for the Theory of Computing at UC Berkeley, the world’s leading venue for collaborative research in theoretical computer science. She is also the Professor of Electrical Engineering and Computer Science at MIT, and professor of computer science and applied mathematics at the Weizmann Institute of Science in Israel. She is currently working on the project "Splinter: Practical Private Queries on Public Data"

    What You Need to Know about Cybersecurity

    What You Need to Know about Cybersecurity

    Today's special episode features audio from a webinar that we had earlier this year. In the audio you will hear from Jordan and our special guest, CEO of Mapletronics, Wes Hershberger. We and Jordan discuss current cybersecurity threats and how you can begin to protect yourself and your business. 

    Discussion includes: email safety, phishing protection, educating employees, strong password policies, data encryption, geofencing, online shopping safety, and more. 

    CYBERARK - "Spesso i CISO sono visti come dei guastafeste, ma è un errore!"

    CYBERARK - "Spesso i CISO sono visti come dei guastafeste, ma è un errore!"
    CYBERARK - "Spesso i CISO sono visti come dei guastafeste, ma è un errore!"

    Contenuto sponsorizzato

    Massimo Carlotti, pre sale team leader di CyberArk, è di nuovo al microfono per un podcast realizzato con il supporto di Radio IT. Insieme a Igor, parla della "piaga tecnologica" più diffusa durante il lockdown (il phishing), di sicurezza perimetrale e dei suoi limiti, dell'impatto sulle critical app (quelle senza le quali il business dell'azienda di blocca).

    E poi parla dei CISO, i Chief Information Security Officer (o direttori della sicurezza informatica), e di come troppo spesso in azienda il loro compito - fornire informazioni importanti per non avere problemi - sia spesso frainteso, e loro vengano visti come dei guastafeste.

    Un podcast ricco di spunti: buon ascolto!

    Altri contenuti su www.radioit.it

    Season 5 Episode 6 - VA CISO Outlines Cybersecurity Strategy

    Season 5 Episode 6 - VA CISO Outlines Cybersecurity Strategy

    Faced with growing ransomware threats, phishing attempts and more, the Department of Veterans Affairs is reevaluating what it means to be “secure” in a hybrid environment. VA CISO Lynette Sherrill outlines the agency’s cybersecurity strategy and emphasizes the importance of identity management through multi-factor authentication and least privileged access to secure critical IT systems and veteran data.