Entries by Scott Gombar

Is This Real? Deep Fakes & Impersonations

https://thehumanelementpod.s3.amazonaws.com/ep15.mp3Podcast: Play in new window | DownloadSubscribe: RSSEpisode 15: Is This Real? Deep Fakes & Impersonations   You may have heard the news surrounding the cryptocurrency FTX. It’s not a good situation financially for a lot of people, and there may even be some criminal behavior around it. A few days ago, the founder went […]

The Trouble with Crypto

https://thehumanelementpod.s3.amazonaws.com/ep14.mp3Podcast: Play in new window | DownloadSubscribe: RSSEpisode 14: The Trouble with Crypto Undoubtedly you’ve heard about all the trouble in the cryptocurrency world but that’s not what we are here to talk about. There are numerous scams around cryptocurrency, some we’ve talked about on this podcast including Pig Butchering. This one takes multiple methods […]

There are Bad Guys Among Us

https://thehumanelementpod.s3.amazonaws.com/ep13.mp3Podcast: Play in new window | DownloadSubscribe: RSSEpisode 13: There are Bad Guys Among Us In the last episode, I teased that I would eventually record a podcast about an incident my own child experienced with a stranger in his text messages. Well, here it is. While playing a game on his phone he struck […]

Pig Butchering 101

https://thehumanelementpod.s3.amazonaws.com/ep12.mp3Podcast: Play in new window | DownloadSubscribe: RSSEpisode 12: Pig Butchering 101 I was planning to hold off on this for a little while. Then I started seeing others discussing it on social media. I purposely went along with a romance scam for the purposes of learning what the end goal was to share with […]

It’s Super Easy to Find Your Home Address and Cell Phone Number

https://thehumanelementpod.s3.amazonaws.com/ep11.mp3Podcast: Play in new window | DownloadSubscribe: RSSEp 11: It’s Super Easy to Find Your Home Address and Cell Phone Number In this episode, we talk about just how quickly and easily someone can uncover your personal information such as your home address and cell phone number. This is certainly not newsworthy information as it […]

CISA Outlines Bad Practices Every Organization Should Avoid

https://thehumanelementpod.s3.amazonaws.com/ep10.mp3Podcast: Play in new window | DownloadSubscribe: RSSEp 10: CISA Outlines Bad Practices Every Organization Should Avoid   The RSA Convention 2022 wrapped up in early June. At the convention, the US-CISA outlined 3 bad practices businesses (and people) should avoid to prevent data breaches. The truth is these bad practices continue to be a […]

Facebook Messenger Used to Hack Accounts and Drive Ad Revenue

https://thehumanelementpod.s3.amazonaws.com/ep9.mp3Podcast: Play in new window | DownloadSubscribe: RSSHow many times has a friend of yours posted on Facebook “My account has been hacked, don’t click on any messages from me”? A massive phishing campaign that utilized Facebook messenger was recently uncovered. This campaign served two purposes for the attackers. Serve ads to victims to earn […]

To Trust Google Search Results or Not

https://thehumanelementpod.s3.amazonaws.com/ep8.mp3Podcast: Play in new window | DownloadSubscribe: RSSHave you ever gone to Google to search for Microsoft Office to purchase and returned results that offer the entire Microsoft Office Suite for a one-time purchase of $30? Who could pass up that deal? Well, you should pass on that deal but some will not because it’s […]

A Banner Year for Phishing

https://thehumanelementpod.s3.amazonaws.com/ep7.mp3Podcast: Play in new window | DownloadSubscribe: RSSIt should come as no surprise that phishing attacks continue to increase in number. They’re also becoming more sophisticated utilizing multiple methods of phishing to improve their success rate. But why is phishing used so often? Who is doing the phishing? How do you prevent it? We will […]

MFA and Social Engineering

https://thehumanelementpod.s3.amazonaws.com/ep6.mp3Podcast: Play in new window | DownloadSubscribe: RSSA lot is made of adding MFA/2FA to everything you log in to. And you absolutely should do this. What isn’t discussed enough are ways to circumvent MFA. Most of the methods for bypassing 2FA/MFA are social engineering tactics. What’s even scarier is the methods used to bypass […]