Jack Recider
๐ค SpeakerAppearances Over Time
Podcast Appearances
And just think about how much you share about yourself on a personal level when you have a new love interest. A scammer could easily write all that down and figure out your vulnerabilities and play on that if they're really good. But I still think one way to sniff out these scammers is just to pick up the phone and call them.
I'm betting that a lot of these scammers are just guys posing as women, you know? So how do they sound on the phone? Even if they grab someone else to just pose as them and get on the phone, that person isn't going to know your whole chat history and won't be able to carry on a conversation in any way that makes sense. Or even more, let's do a video call and see what you really look like.
I'm betting that a lot of these scammers are just guys posing as women, you know? So how do they sound on the phone? Even if they grab someone else to just pose as them and get on the phone, that person isn't going to know your whole chat history and won't be able to carry on a conversation in any way that makes sense. Or even more, let's do a video call and see what you really look like.
And so just keep that in your head, that it's probably a red flag. If your love interest refuses to answer the call or get on video chat with you.
And so just keep that in your head, that it's probably a red flag. If your love interest refuses to answer the call or get on video chat with you.
Yeah, dang, I didn't even think of that. So I've done video interviews with people a lot, you know, but I use a Snapchat filter on my video to obscure my face. In real time, on a live video call, my face gets distorted. And yeah, you could absolutely just use a filter to change your face to be a pretty lady, even though you're just some dude who doesn't even speak English.
Yeah, dang, I didn't even think of that. So I've done video interviews with people a lot, you know, but I use a Snapchat filter on my video to obscure my face. In real time, on a live video call, my face gets distorted. And yeah, you could absolutely just use a filter to change your face to be a pretty lady, even though you're just some dude who doesn't even speak English.
We're going to take a quick ad break here, but stay with us because when we come back, we're going to talk about Black Axe. And you're not going to want to miss this. This episode is sponsored by Arctic Wolf. Arctic Wolf, an industry leader in managed security operations, surveyed a thousand security and IT professionals across the globe to better understand them.
We're going to take a quick ad break here, but stay with us because when we come back, we're going to talk about Black Axe. And you're not going to want to miss this. This episode is sponsored by Arctic Wolf. Arctic Wolf, an industry leader in managed security operations, surveyed a thousand security and IT professionals across the globe to better understand them.
What are their top priorities, current challenges and future concerns? This survey revealed some startling findings, and you can discover them all in the State of Cybersecurity 2024 Trends Report. Learn why the number of insider threats spikes severely, what lessons can be learned from the year over year change, and how many organizations disclose a breach.
What are their top priorities, current challenges and future concerns? This survey revealed some startling findings, and you can discover them all in the State of Cybersecurity 2024 Trends Report. Learn why the number of insider threats spikes severely, what lessons can be learned from the year over year change, and how many organizations disclose a breach.
and what cyber attacks struck 70% of organizations. Download the State of Cybersecurity 2024 Trends Report today at arcticwolf.com forward slash darknet. That's arcticwolf.com forward slash darknet. Okay, so I'm looking you up online. You're known as that BEC guy. What's BEC?
and what cyber attacks struck 70% of organizations. Download the State of Cybersecurity 2024 Trends Report today at arcticwolf.com forward slash darknet. That's arcticwolf.com forward slash darknet. Okay, so I'm looking you up online. You're known as that BEC guy. What's BEC?
BEC, we break down the term business email compromise, right? So the compromise part makes me think somebody has taken over my Office 365 email server and is in my emails. They've compromised my emails. But that's not what you say is BEC.
BEC, we break down the term business email compromise, right? So the compromise part makes me think somebody has taken over my Office 365 email server and is in my emails. They've compromised my emails. But that's not what you say is BEC.
When you tell me that story, I just think that's a phishing. I don't call phishing BEC. I just call it phishing.
When you tell me that story, I just think that's a phishing. I don't call phishing BEC. I just call it phishing.
Is BEC always money-related or is it sometimes, no, we're just going to phish them so that we can get our malware on to steal their intellectual property?
Is BEC always money-related or is it sometimes, no, we're just going to phish them so that we can get our malware on to steal their intellectual property?
So if we're going to classify something, because let's say we get phished, somebody sends us a phish, we click the link, we installed malware, you'd say, oh yeah, that wasn't BEC. But if it was, okay, we got phished, it would send money to this, and I sent the money, you'd say, oh yeah, that was BEC. Yep. Okay. So if you're going to classify as BEC, it's likely going to be financial related.