Security through data

MAIN

  • Home
  • Alerts
  • Blog
  • Events
  • Incidents
  • Tutorials

FEATURED

  • AI
  • Privacy
  • Cryptocurrency
  • Blockchain
  • IoT
  • Deep Web
  • Threat Actors
  • Social Engineering
  • Phishing
  • Malware
  • E-Commerce
  • Deepfake
  • Quantum Computing

COMPANY

  • About us
  • Advertise
  • Legal & Policy
Cybermaterial
  • CATEGORIES
    • Cyber101
      • Definition
      • Quote
    • Document
      • Cheat Sheet
      • Paper
      • Report
    • Education
      • Certification
      • Course
    • Entertainment
      • Documentary
      • Game
      • Meme
      • Movie
      • TV Show
    • Learning
      • Book
      • Lexicon
      • Podcasts
      • Tutorials
    • Tool
      • Hardware
      • Software
No Result
View All Result
Contact Us
Cybermaterial
  • CATEGORIES
    • Cyber101
      • Definition
      • Quote
    • Document
      • Cheat Sheet
      • Paper
      • Report
    • Education
      • Certification
      • Course
    • Entertainment
      • Documentary
      • Game
      • Meme
      • Movie
      • TV Show
    • Learning
      • Book
      • Lexicon
      • Podcasts
      • Tutorials
    • Tool
      • Hardware
      • Software
No Result
View All Result
Contact Us
Cybermaterial
No Result
View All Result

FBI, This Week: Social Engineering

in Podcasts
2 min read

As part of National Cyber Security Awareness Month, the FBI says one way to stay safe online is to recognize techniques cyber criminals use to prey on their victims.


Audio Transcript

Mollie Halpern: As part of National Cyber Security Awareness Month, the FBI says one way to stay safe online is to recognize techniques cyber criminals use to prey on their victims.

Social engineering—a method used to convince someone to do something for you based on who you claim to be—is one of those techniques.

Supervisory Special Agent Patrick Geahan…

Patrick Geahan: We see this technique everywhere. It is a part of virtually every intrusion or scam that we investigate. We see this through e-mails, instant messages, and we even see it through phone calls.

Halpern: Social engineering is used in technical support scams in which cyber criminals purport to call from a software or computer company and claim they need your password to fix your computer.

Social engineering is also used in calls from criminals claiming to be a representative from your bank so that they can access your account.

Geahan suggests verifying and confirming the source of these types of phone calls.

Geahan: If your bank or anyone else calls you and starts asking sensitive questions, politely hang up. Pick up the phone and call them back through a number you’ve already known and used.

Halpern: With FBI, This Week, I’m Mollie Halpern of the Bureau.

Tags: FBI last weekPodcastSocial Engineering Podcast
3
VIEWS

Other Podcasts

The CyberWire Daily: The WatchDog Monero cryptojacking operation.
Podcasts

The CyberWire Daily: The WatchDog Monero cryptojacking operation.

April 16, 2021

Watch out for the WatchDog Monero cryptojacking operation. The US Justice Department describes North Korea as “a criminal syndicate with...

The Tech Talks Daily: Distributed Denial-of-Service (DDoS) Trends With Netscou‪t‬
Podcasts

The Tech Talks Daily: Distributed Denial-of-Service (DDoS) Trends With Netscou‪t‬

April 15, 2021

Distributed Denial-of-Service (DDoS) attacks are coordinated attempts to disrupt the regular availability and performance of a targeted website or online...

Curious Minds: Stuxnet: Advanced Persistent Threat
Podcasts

Curious Minds: Stuxnet: Advanced Persistent Threat

April 13, 2021

When it was discovered in 2010, Stuxnet was the most complicated and sophisticated malware ever known: an Advanced Persistent Threat (APT).

MORE

Quote

“The enemy knows the system.”

January 8, 2021
Stat

In 2019 Google Showed that its 54-qubit quantum computer could solve a problem that would take impossibly long on a classical computer.

January 8, 2021
Documentary

Documentary: The Social Dilemma (2020)

January 27, 2021
Movie

Johnny Mnemonic (1995)

September 28, 2020
ADVERTISEMENT

Tags

Books Cybersecurity Hackers Malware Memes Movies Quantum Computing Report Software Word of the day

© 2021 | CyberMaterial | All rights reserved.

SECURITY THROUGH DATA

No Result
View All Result
  • Home
  • Alerts
  • Cyber Incidents
  • Blog
  • Events
  • Tutorials
  • Featured
    • AI
    • Privacy
    • Cryptocurrency
    • Blockchain
    • IoT
    • Deep Web
    • Threat Actors
    • Social Engineering
    • Deepfake
    • E-Commerce
    • Malware
    • Phishing
    • Quantum Computing

© 2020 CyberMaterial - Cyber Decoded.

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.