Text
“ Do you have paper applications available?”
Hacking Humans: The Cyber Wire – The knowledge / intention behavior gap. https://podcasts.apple.com/us/podcast/the-knowledge-intention-behavior-gap/id1391915810?i=1000442123929
Summary: On this episode of hacking humans the discussion is about a company’s HR department being impersonated. Someone has taken information from the company’s website and utilizes it to post fake job openings on Indeed, ZipRecruiter and LinkedIn. People that apply for these positions are interviewed online using a video chat system google hangouts. Then once the person is hired, they are asked to provide a check for payroll purposes. Finally, the HR impersonators write checks in the person’s name and cash them. The actual company had no knowledge of this happening until the fake future employees contacted them.
Informed Thoughts: I am deeply saddened by this episode because it is a great example of the tangible and intangible loss the fraud victims face. Basically, these scammers are going to great lengths to commit check fraud crimes. I am not sure how a person can recover from something like this they quit their old jobs to start a new job that does not exist, and large amounts of money have been cashed out in their names. The rational choice theory of criminology suggests that people make choice depending on the cost and the benefits. This means that people will weigh out their options before deciding. If the cost is more than the benefit than there is the likelihood that they did not make the decision. On the contrary, if the benefits are higher than the cost, they will make those decisions. In this case, the HR impersonators see committing this check fraud beneficial because how they do it, and as of right now probably does not see how the consequences will be once they get caught. Scammers and hackers are in the lead because they are finding creative ways to commit these crimes.
7 notes
·
View notes
Text
UPS you cannot be trusted!
Hacking Humans: The Cyber Wire- The best way to the break-in is to walk through the front door. - https://podcasts.apple.com/us/podcast/the-best-way-to-break-in-is-to-walk-through-the-front-door/id1391915810?i=1000440729814
Summary: This episode dives into a UPS tracking number scam that one of their viewers sent in. A hacker has found a creative way to hack into a bank credit transaction dispute process to win the disputes before the money is returned to the owner. The hacker will sell something online and someone will buy it. First, the person buys the product then, they mail out it to someone that lives in your area and receive a valid tracking number. Next, they use this tracking number to provide to any bank that is trying to dispute a transaction. Finally, once a transaction dispute is emerging, the vendor (the hacker) can provide the bank with the tracking number. The bank then verifies with UPS or whatever the carrier and can verify it is valid they close out the dispute. It is important to note that, the banks have policies in place that if the tracking number is valid and has confirmed that it has been delivered, they close out the dispute and there is a likelihood that you will not be able to get your money back. In addition, UPS does not give out mailing addresses to anyone other than the actual person who lives at the address, which makes it harder to know if it was delivered to the correct address.
Informed Thoughts: Hackers and scammers are changing in the game. At this point, my feelings are starting to be fretful of ordering online. Hackers are taking hacking to the next level but hacking into the bank credit dispute process. There are somethings I would like to mention. First, we all need to be careful with online shopping because everything that is posted online is not the real deal. I suggest sticking to online shopping sites such as Amazon, Fashion Nova, etc, just do not buy from any site, remember that it is quality over quantity. Second, if you are going to order from a website that you haven’t used before please do your research. As your friends, if they have ever heard of the site and look at reviews on YouTube. If no one on YouTube has purchased from that site, it is probably a scam so stay away. Third, banks should reevaluate how much information they provide to people about their transaction dispute process. It is mind-boggling that the hackers were able to find that loophole. Last, even though, technology was one of the greatest things be created it also becoming a threat to us. How will be safe from cybercrimes, scammers, hackers, and the dark side of technology that we all love so much?
0 notes
Text
Google we love you!
Hacking Humans: The Cyber wire – Be willing to admit you don’t know everything. - https://podcasts.apple.com/us/podcast/be-willing-to-admit-you-dont-know-everything/id1391915810?i=1000440121022
Summary: This episode Dave from cyber wire discuss the reviews of Google account hygiene security report. Account hygiene is when the user goes through a series of the verification process to ensure the authenticity of the account users. Google found that multistep verification is effective in stopping phishing attacks. The multi-step verification included an SMS step that sends a link to your phone that prompts you with the next verifications steps. Results concluded that 38% of the users did not remember the second email they provided and 34% of the people did not have their phones readily available. Googles multistep verification that includes the SMS recovery is highly effective and efficient.
Informed thoughts: As a Google user myself, there have been times where I signed in to my email on different devices and I was prompted to verify that I was the primary account holder. Another cool thing that Google does, is sent out an email to you, that your email has been accessed by a different device. So, Google multi-step verification does work, and I concur. Google cares about its users and tries to take the security of its users seriously. As a Google user, I am appreciative for the extra effort they put in to keep me safe. In addition, sometimes in the emails that they send out, they include the location that your account was accessed. This means that Google has memorized the location and device that you frequently use your account and if they sense a change their security system picks up on and ask you to verify, which is very cool and helpful to users to fight phishing and fraud attacks.
5 notes
·
View notes
Text
Are you rational?
Hacking Humans: The Cyber wire – People aren’t perfectly rational - https://podcasts.apple.com/us/podcast/people-arent-perfectly-rational/id1391915810?i=1000439118732
Summary: This episode discusses the different attachments that are associated with phishing. Phishing is an attempt to gain sensitive information from computers. Since 2018 they noticed a trend that IOS image file is becoming a leading factor in phishing techniques and opening the IOS files can expose your device to malicious malware that can obtain your sensitive and personal information. Also, they mentioned text messages being sent out impersonating hospitals to get people to click links to install malware on your devices. The text message would say something along the lines of “ This Plantsville Hospital Messaging your relatives are with us now you should call us ASAP”. The red flags of the text messages included the usage of broken English, not stating which relative is in the hospital, and the link had a “.fund” domain which hospitals do not typically use.
Informed thoughts: Phishing is something we all should watch out for because as we all know as technology advances so do the techniques bad guys use to commit crimes. In my opinion, people are becoming crueler by the minute because it takes a cruel person to send a text stating that your loved one is in the hospital. Not even thinks quickly notice red flags especially during the time of panic. I can agree that it’s a clever idea to that is but it's still mean. I typical receives text messages from companies I have never heard of offering me a job and in the text, a message will be a link for me to click. I am going to say that it could be the same scam happening just different people doing it. All in all, some type of training should be done to help people understanding what phishing is and how to fight.
16 notes
·
View notes
Text
Darknet Diaries
Darknet Diaries: Episode 39. – Alarm Lamp Scooter –
On this episode, they spoke about a young college student named Daniel that took on the challenge to destroy a hard drive. The goal of this challenge was to completely make a hard drive disappear without evidence of it ever existing. They also introduced an idea, that was new to me “bitcoin”. I googled bitcoin because I was not aware of what that was.
(My thoughts on bitcoins: not interested). Google said bitcoin is a digital currency that can be transferred from peer-to-person without a physical bank. So, Daniel tried different ways to destroy the hard drive, but they did not work. So, he decided to use thermite (a powdery substance of aluminum and iron oxide that is usually used for welding and incendiary bombs). He read somewhere online about someone using thermite to do this same thing and he wanted to follow their steps into doing so. Daniel orders personal protective equipment and purchased thermite. He also read up on some things in his chemistry book to see different type reactions certain things had to make sure he was safe of course. When the thermite arrived so did campus police because they were informed that someone (Daniel) purchased thermite. They wanted to see why he ordered the thermite (I am assuming it’s because thermite is also used in making bombs).
1 note
·
View note
Text
Cybercrime?
Cybercrime is a crime that is committed using technology. Some crimes include cyberstalking, cyberbullying, fraud, identity theft, etc. This semester I am taking a course that is dedicated to teaching me about the different types of cyber crimes and which I will share with you guys hence, the name of my blog “ Darkside of the Internet”. Technology has indeed made life easier, however, as we know the world is about balance there’s good and there’s bad. The internet is an amazing source used to stay connected with family, friends, find jobs, and go to school. Of course, there are some people that use the internet to engage in illegal activities and commit crimes like some mentioned above.
Stay tuned as I post twice a week analyzing current issues related to cybercrime and the content I learn from the class.
Until next time,
Cybercrimechix
0 notes
Photo
The ghost of the dark side of the internet.
0 notes
Text
Dark Side of the Internet: Cybercrimes
Welcome to my page!
Here I will discuss different types of cybercrimes.
Information from podcasts, journal articles etc.
1 note
·
View note