Podcasts about Social engineering

  • 746PODCASTS
  • 1,883EPISODES
  • 57mAVG DURATION
  • 5WEEKLY NEW EPISODES
  • Jun 8, 2023LATEST

POPULARITY

20152016201720182019202020212022

Categories



Best podcasts about Social engineering

Show all podcasts related to social engineering

Latest podcast episodes about Social engineering

Putting the AP in hAPpy
Episode 241: 2 Types of Non-IRS Compliance Fines in the Vendor Process And How To Avoid

Putting the AP in hAPpy

Play Episode Listen Later Jun 8, 2023 21:29


Afraid of the IRS penalties and interest for no filing, late filing or corrections for reportable vendors?  That's nothing compared to the fines for two other organizations that can also hit your company with compliance fines.  What are they?Keep Listening. Check out my website www.debrarrichardson.com if you need help implementing authentication techniques, internal controls, and best practices to prevent fraudulent payments, regulatory fines or bad vendor data. Check out my new Vendor Process Training Center for 149+ hours of weekly live and on-demand training for the Vendor team.  Subscribe today to be entered in the subscriber-only monthly drawing to win a free Putting the AP in hAPpy Coffee Mug.  Links mentioned in the podcast:   OFAC:  Office of Foreign Assets Control (OFAC)OFAC:  Penalty ChartOFAC:  FAQ > If There is a MatchNacha:  Nacha OrgVendor Validation Reference List with Resources Links: www.debrarrichardson.com/vendor-validation-download (Get 25% Discount on the Global Vendor Registration Numbers)Vendor Master File Clean-Up:  https://www.debrarrichardson.com/cleanupYouTube Channel:  https://www.youtube.com/channel/UCqeoffeQu3pSXMV8fUIGNiw More Podcasts/Blogs/Webinars www.debrarrichardson.comMore ideas?  Email me at debra@debrarrichardson.com Music Credit:  www.purple-planet.com

Putting the AP in hAPpy
Episode 240: 7 Reasons Why Paper Checks Are Still Used for B2B Payments in the US

Putting the AP in hAPpy

Play Episode Listen Later Jun 1, 2023 23:15


Our Non-US counterparts still look at US businesses and wonder why we still write paper checks. It's no secret that checks cost more to produce than say, ACH payments.  So why are US companies still writing paper checks?Keep listening. Check out my website www.debrarrichardson.com if you need help implementing authentication techniques, internal controls, and best practices to prevent fraudulent payments, regulatory fines or bad vendor data. Check out my new Vendor Process Training Center for 149+ hours of weekly live and on-demand training for the Vendor team.  Subscribe today to be entered in the subscriber-only monthly drawing to win a free Putting the AP in hAPpy Coffee Mug.  Links mentioned in the podcast:    Vendor Validation Reference List with Resources Links: www.debrarrichardson.com/vendor-validation-download (Get 25% Discount on the Global Vendor Registration Numbers)Vendor Master File Clean-Up:  https://www.debrarrichardson.com/cleanupYouTube Channel:  https://www.youtube.com/channel/UCqeoffeQu3pSXMV8fUIGNiw More Podcasts/Blogs/Webinars www.debrarrichardson.comMore ideas?  Email me at debra@debrarrichardson.com Music Credit:  www.purple-planet.com

Putting the AP in hAPpy
Episode 239: 3 Things I Learned From Practitioners About Avoiding Fraudulent Payments

Putting the AP in hAPpy

Play Episode Listen Later May 25, 2023 13:12


I love going to and speaking at Accounts Payable in-person conferences, I educate many – but I also learn a lot.  Today I have 3 tips I learned from practitioners to avoid making a fraudulent payment.   Keep listening.Check out my website www.debrarrichardson.com if you need help implementing authentication techniques, internal controls, and best practices to prevent fraudulent payments, regulatory fines or bad vendor data. Check out my new Vendor Process Training Center for 149+ hours of weekly live and on-demand training for the Vendor team. Subscribe today to be entered in the subscriber-only monthly drawing to win a free Putting the AP in hAPpy Coffee Mug.  Links mentioned in the podcast:    Vendor Validation Reference List with Resources Links: www.debrarrichardson.com/vendor-validation-download (Get 25% Discount on the Global Vendor Registration Numbers)Vendor Master File Clean-Up:  https://www.debrarrichardson.com/cleanupYouTube Channel:  https://www.youtube.com/channel/UCqeoffeQu3pSXMV8fUIGNiw More Podcasts/Blogs/Webinars www.debrarrichardson.comMore ideas?  Email me at debra@debrarrichardson.com Music Credit:  www.purple-planet.com 

The Social-Engineer Podcast
Ep. 212 - The SE ETC Series -SE Book Club - Human Hacking with Patrick and Chris

The Social-Engineer Podcast

Play Episode Listen Later May 22, 2023 50:49


Welcome to the Social-Engineer Podcast: The SE Etc. Series. This series will be hosted by Chris Hadnagy, CEO of Social-Engineer LLC, and The Innocent Lives Foundation, as well as Social-Engineer.Org and The Institute for Social Engineering. Chris will be joined by his co-host Patrick Laverty as they discuss topics pertaining to the world of Social Engineering. [May 22, 2023]   00:00 - Intro 00:18 - Patrick Laverty Intro 00:58 - Intro Links -          Social-Engineer.com - http://www.social-engineer.com/ -          Managed Voice Phishing - https://www.social-engineer.com/services/vishing-service/ -          Managed Email Phishing - https://www.social-engineer.com/services/se-phishing-service/ -          Adversarial Simulations - https://www.social-engineer.com/services/social-engineering-penetration-test/ -          Social-Engineer channel on SLACK - https://social-engineering-hq.slack.com/ssb -          CLUTCH - http://www.pro-rock.com/ -          innocentlivesfoundation.org - http://www.innocentlivesfoundation.org/ 08:58 - Todays Topic: Human Hacking Book Discussion 13:52 - From "Tech" to "Storytelling" 18:51 - Experience Not Required 22:02 - The Importance of Knowing Yourself 25:43 - A Foundation in Communication 29:04 - Principles of Influence 31:32 - Leveling the Playing Field 35:35 - Elicitation Breakdown 40:22 - Understanding the Baseline 44:31 - Dress for the Job (You're Pretending to Have) 48:00 - The Forgotten Resources 49:39 - Wrap Up & Outro -          www.social-engineer.com -          www.innocentlivesfoundation.org   Find us online -          Chris Hadnagy -          Twitter: @humanhacker -          LinkedIn: linkedin.com/in/christopherhadnagy -          Patrick Laverty -          Twitter: @plaverty9 -          LinkedIn: linkedin.com/in/plaverty9

Duh Heads
Ep. 46 - Mr. Beast EXPOSED: THE ANTI-CHRIST?! #DISNEY #AMAZON Social Engineering! TRANS?! Hasan Piker, Neekolul, Chris Tyson INTERVIEW! Sam Hyde! $10k GIVEAWAY!

Duh Heads

Play Episode Listen Later May 18, 2023 61:16


Patreon -- https://www.patreon.com/DuhHeads@duhheads @izzyngriffin @pre_l0rd Jimmy Donaldson (born May 7, 1998), better known as MrBeast, is an American YouTuber and philanthropist. He is credited with pioneering a genre of YouTube videos that centers on expensive stunts.[5] With over 150 million subscribers as of May 2023,[6] his main YouTube channel ranks as the fourth-most-subscribed on the platform, with many[7][8] considering it to be the most-subscribed channel whose owner is an individual.[note 2]Donaldson grew up in a middle-class household in Greenville, North Carolina.[9][10] He began posting videos to YouTube in early 2012 at the age of 13[11] under the handle MrBeast6000. His early content ranged from Let's Plays to "videos estimating the wealth of other YouTubers."[12] He went viral in 2017 after his "counting to 100,000" video earned tens of thousands of views in just a few days, and he has become increasingly popular ever since, with most of his videos gaining tens of millions of views.[12] Over time, his style of content diversified to include challenge and donation videos that reward thousands of dollars, videos with arduous tasks or survival challenges, and original vlogs.[13] Once his channel took off, Donaldson hired some of his childhood friends to co-run the brand. As of 2022, the MrBeast team is made up of 30 people, including Donaldson himself.[14] Other than MrBeast, Donaldson runs the YouTube channels Beast Reacts, MrBeast Gaming, MrBeast 2 (formerly MrBeast Shorts),[15] and the philanthropy channel Beast Philanthropy.[16][17] He formerly ran MrBeast 3 (initially MrBeast 2), which is now inactive.[18][19] He was one of the 10 highest-paid YouTubers of 2020.[20]Donaldson is the founder of MrBeast Burger and Feastables, and a co-creator of Team Trees, a fundraiser for the Arbor Day Foundation that has raised over $23 million,[21][22] and 

Putting the AP in hAPpy
Episode 238: I Asked ChatGPT for Types of Business Email Compromise – One Was A Surprise!

Putting the AP in hAPpy

Play Episode Listen Later May 18, 2023 17:18


When prompted, ChatGPT gave me 5 types of business email compromise!  Four of the types, no problem – but one was one I hadn't thought about but is definitely fraudulent! If you want to hear the five types and how to combat each…. Keep listening. Check out my website www.debrarrichardson.com if you need help implementing authentication techniques, internal controls, and best practices to prevent fraudulent payments, regulatory fines or bad vendor data. Check out my new Vendor Process Training Center for 149+ hours of weekly live and on-demand training for the Vendor team.  Subscribe today to be entered in the subscriber-only monthly drawing to win a free Putting the AP in hAPpy Coffee Mug.  Links mentioned in the podcast:    Vendor Master File Tip of the Week:  Easy Precaution From the Secret Service to Protect Your EmailsVendor Master File Tip of the Week:  Don't Collect Vendor Banking From An InvoiceVendor Validation Reference List with Resources Links: www.debrarrichardson.com/vendor-validation-download (Get 25% Discount on the Global Vendor Registration Numbers)Vendor Master File Clean-Up:  https://www.debrarrichardson.com/cleanupYouTube Channel:  https://www.youtube.com/channel/UCqeoffeQu3pSXMV8fUIGNiw More Podcasts/Blogs/Webinars www.debrarrichardson.comMore ideas?  Email me at debra@debrarrichardson.com Music Credit:  www.purple-planet.com

Dangerous INFO podcast with Jesse Jaymz
93 "Technocracy Rising" ft. Patrick Wood, war against humanity, social engineering

Dangerous INFO podcast with Jesse Jaymz

Play Episode Listen Later May 16, 2023 164:16


Patrick Wood is a leading and critical expert on Sustainable Development, Green Economy, Agenda 21, 2030 Agenda and historic Technocracy.He is the author of Technocracy Rising: The Trojan Horse of Global Transformation (2015) and co-author of Trilaterals Over Washington, Volumes I and II (1978-1980) with the late Antony C. Sutton.Wood remains a leading expert on the elitist Trilateral Commission, their policies and achievements in creating their self-proclaimed “New International Economic Order” which is the essence of Sustainable Development on a global scale.An economist by education, a financial analyst and writer by profession and an American Constitutionalist by choice, Wood maintains a Biblical world view and has deep historical insights into the modern attacks on sovereignty, property rights and personal freedom. Such attacks are epitomized by the implementation of U.N. policies such as Agenda 21, Sustainable Development, Smart Growth and in education, the widespread adoption of Common Core State Standards.Wood is a frequent speaker and guest on radio shows around the nation. His current research builds on Trilateral Commission hegemony, focusing on Technocracy, Transhumanism and Scientism, and how these are transforming global economics, politics and religion.Patrick's website https://www.technocracy.news/Citizens For Free Speech https://www.citizensforfreespeech.org/SUPPORT THE SHOWSuper Chat Tips https://bit.ly/42W7iZHBuzzsprout https://bit.ly/3m50hFTSubscribeStar http://bit.ly/42Y0qM8Paypal http://bit.ly/3Gv3ZjpPatreon http://bit.ly/3G37AVxHow to grow lots of food in a grid-down situation.This is for people who want the fastest and easiest ways to produce healthy and delicious meat, eggs, and vegetables. Because you know that growing your own food is like printing your own money. Register for FREE full access to the webinar: http://dangerousoffgrid.comAFFILIATESAmerican Coins and JewelryWaterford, MichiganMatt (248) 978-7686CONNECT WITH USChatroom http://bit.ly/42OayqyEmail the show http://dangerousinfopodcast@protonmail.comJoin mailing list http://bit.ly/3Kku5YtSOCIALSInstagram https://www.instagram.com/jessejaymz1/Twitter https://twitter.com/jaymz_jesseGab https://gab.com/JessejaymzTruth Social https://truthsocial.com/@jessejaymzWATCH LIVETwitch https://www.twitch.tv/dangerousinfopodcastRumble https://rumble.com/c/DangerousInfoPodcastPilled https://pilled.net/profile/144176CloutHub https://clouthub.com/DangerousINFOpodcastTwitter https://twitter.com/jaymz_jesseDLive https://dlive.tv/DangerSMART is the acronym that was created by technocrats that have setup the "internet of things" that will eventually enslave humanity to their needs. Support the show

The Social-Engineer Podcast
Ep. 211 - Security Awareness Series - From Phreaker to InfoSec Pro with John Young

The Social-Engineer Podcast

Play Episode Listen Later May 15, 2023 47:13


Today on the Social-Engineer Podcast: The Security Awareness Series, Ryan and I are joined by John Young. Like many security experts, John started out on the wrong side of the law by manipulating the AT&T phone system as a teenage phone phreak in New York City before he was scared straight by the FBI. His career started four decades ago in 1982, and by 1987 Young became the network director at McDonnell Douglas's $41.8 billion C-17 program. He eventually retired from IBM after a 30-year career in the corporate cyberwar trenches to launch his own company, CyberDef.   Regarded as one of America's top corporate cybersecurity experts and thought leaders, Young's published dozens of articles, appeared on countless podcasts, and is designing a video course for people based on his book so that they can thrive in cybersecurity.   [May 15, 2023]   00:00 - Intro 00:53 - Intro Links: -          Social-Engineer.com - http://www.social-engineer.com/ -          Managed Voice Phishing - https://www.social-engineer.com/services/vishing-service/ -          Managed Email Phishing - https://www.social-engineer.com/services/se-phishing-service/ -          Adversarial Simulations - https://www.social-engineer.com/services/social-engineering-penetration-test/ -          Social-Engineer channel on SLACK - https://social-engineering-hq.slack.com/ssb -          CLUTCH - http://www.pro-rock.com/ -          innocentlivesfoundation.org - http://www.innocentlivesfoundation.org/                                                04:51 - John Young Intro 06:41 - Scared Straight 15:38 - Imposter Syndrome 16:53 - Don't Quit Your Day Job! 22:54 - Integration is Key 28:05 - The Effect of AI on Cyber Security 32:32 - Tips to Stay Ahead 38:17 - Policies, Processes and Procedures 38:37 - Book Recommendations: -          Don't Hack! – John Young 43:22 - Find John Young Online -          LinkedIn: linkedin.com/in/john-young-4aa083151/ -          Website: https://cyberdef.tv 43:55 - Learn to Thrive 46:42 - Wrap Up & Outro -          www.social-engineer.com -          www.innocentlivesfoundation.org

Craig Peterson's Tech Talk
Social Engineering Attacks: Don't Let Cybercriminals Trick You into Revealing Sensitive Information

Craig Peterson's Tech Talk

Play Episode Listen Later May 12, 2023 87:32


Are you aware of the invisible threat of social engineering that can compromise your personal and professional security? Cybercriminals are using cunning manipulations to exploit human vulnerabilities and gain access to sensitive information. But don't worry; there are practical ways to protect yourself from these attacks. We have published a must-read article that provides invaluable insights and guidance on how to avoid social engineering attacks. From phishing scams to physical impersonation, the article delves into the inner workings of these attacks and offers concrete strategies to fortify your defenses. In this article, you will learn the steps to recognize that you are a potential target, be cautious of unsolicited emails and phone calls, and use multifactor authentication as an extra layer of protection. Additionally, you'll learn how to prevent breaches by not clicking on links in emails. If you want to stay ahead of the curve and protect yourself from the ever-evolving tactics of cybercriminals, this informative article is a must-read. Don't wait till it's too late! Take charge of your personal and professional security. Click on the link and read the article now! The Hidden Dangers of Social Engineering: Tips to Outsmart Cybercriminals   Craig is also heard on the following: With Jim Polito at 0836 Tuesdays WTAG AM 580 - FM 94.9  Talk 1200 News Radio 920 & 104.7 FM WHJJ NewsRadio 560 WHYN WXTK Craigs Show Airs 0600 Saturday and Sunday With  Jeff Katz 1630 - Tuesdays WRVA 96.1 FM, 1140 AM   WGAN  Matt Gagnon 0730 Wednesdays Craigs Show Airs 1700 Saturday  WGIR 610 & News Radio 96.7 Chris Ryan 0730 Mondays  Craigs Show Airs 1130 Saturday  On the Internet: Tune-In (WGAN) Radio.com (WRVA) iHeartRadio (WGIR, WTAG, and other stations)  

Putting the AP in hAPpy
Episode 237: 3 Tips to Manage Your Inbox When Collecting Vendor Supporting Documents by Email

Putting the AP in hAPpy

Play Episode Listen Later May 11, 2023 20:51


Are you still collecting vendor supporting documents by email? Don't worry you are not alone, but this process does carry its share of organizing issues and fraud risks, so here are 3 tips that can help mitigate that fraud risk and organize your inbox and responses. Stay until the end to hear where you can get 17 more tips for free!Keep listening.Check out my website www.debrarrichardson.com if you need help implementing authentication techniques, internal controls, and best practices to prevent fraudulent payments, regulatory fines or bad vendor data. Check out my new Vendor Process Training Center for 149+ hours of weekly live and on-demand training for the Vendor team. Subscribe today to be entered in the subscriber-only monthly drawing to win a free Putting the AP in hAPpy Coffee Mug.  Links mentioned in the podcast:    May 2023:  LinkedIn NewsletterFree Webinar:  20 Tips in 20 Minutes: Managing Your Inbox When Collecting Vendor Supporting Documents by Email.Vendor Validation Reference List with Resources Links: www.debrarrichardson.com/vendor-validation-download (Get 25% Discount on the Global Vendor Registration Numbers)Vendor Master File Clean-Up:  https://www.debrarrichardson.com/cleanupYouTube Channel:  https://www.youtube.com/channel/UCqeoffeQu3pSXMV8fUIGNiw More Podcasts/Blogs/Webinars www.debrarrichardson.comMore ideas?  Email me at debra@debrarrichardson.com Music Credit:  www.purple-planet.com

The CyberWire
Ransomware and social engineering trends. Expired certificate addressed. Ransomware groups target schools. Cyber updates in the hybrid war.

The CyberWire

Play Episode Listen Later May 11, 2023 24:44


A Ransomware report highlights targeting and classification. Phishing remains a major threat. Cisco addresses an expired certificate issue. LockBit and Medusa hit school districts with ransomware. US and Canadian cyber units wrap up a hunt-forward mission in Latvia. Ben Yelin on NYPD surveillance. Our CyberWire producer Liz Irvin interviews Damien Lewke, a graduate student at MIT. And an unknown threat actor is collecting against both Russia and Ukraine. For links to all of today's stories check out our CyberWire daily news briefing: https://thecyberwire.com/newsletters/daily-briefing/12/90 Selected reading. GRIT Ransomware Report: April 2023 (GuidePoint Security) DNSFilter State of Internet Security - Q1 2023 (DNSFilter) Identify vEdge Certificate Expired on May 9th 2023 (Cisco) The State of Ransomware Attacks in Education 2023: Trends and Solutions (Veriti) US Cyber Command 'Hunts Forward' in Latvia (Voice of America) US cyber team unearths malware during ‘hunt-forward' mission in Latvia (C4ISRNET) Uncovering RedStinger - Undetected APT cyber operations in Eastern Europe since 2020 (Malwarebytes) Bad magic: new APT found in the area of Russo-Ukrainian conflict (Kaspersky)

ITSPmagazine | Technology. Cybersecurity. Society
Beyond the Code: The Human Side of Cybersecurity and Social Engineering | A Conversation with Aunshul Rege | Redefining CyberSecurity Podcast With Sean Martin

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later May 10, 2023 44:51


Guest: Aunshul Rege, Director at The CARE Lab at Temple University [@TU_CARE]On Linkedin | https://www.linkedin.com/in/aunshul-rege-26526b59/On Twitter | https://twitter.com/Prof_Rege____________________________Host: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber]On ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/sean-martin____________________________This Episode's SponsorsPentera | https://itspm.ag/penteri67aCrowdSec | https://itspm.ag/crowdsec-b1vp___________________________Episode NotesWelcome to a riveting new episode of the Redefining Cybersecurity Podcast, hosted by Sean Martin! Today, we're diving into the fascinating world of social engineering and the crucial role of education in understanding cybersecurity. Join us in this engaging conversation with Aunshul Rege from Temple University, who does amazing work in helping students comprehend the importance of cybersecurity and how social engineering plays a vital part in it.Imagine a world where computer science students and liberal arts students come together to tackle cybersecurity challenges from different angles. Aunshul Rege is an associate professor at the Department of Criminal Justice at Temple University, who has a unique journey starting as a software engineer and eventually realizing that computer science wasn't enough to answer the who, why, and how of cyber attacks. Her passion for understanding human behavior, sociology, and cybersecurity led her to explore the liberal arts side of cybersecurity.In this episode, Aunshul talks about her innovative teaching methods, where she pushes her students to collaborate across disciplines and explore the importance of social engineering in cyber attacks. From shoulder surfing activities to discussing ethics and multidisciplinary teamwork, her students learn to appreciate the different skill sets and perspectives they bring to the table.But it's not just about the technical aspect of cybersecurity. Aunshul's approach to teaching focuses on building students' understanding of human behavior and psychology in cyber attacks, emphasizing the value of social engineering in both the attack and defense aspects of cybersecurity.As you listen to this fascinating conversation, you'll discover the powerful impact of merging computer science and liberal arts perspectives, the importance of ethics in cybersecurity, and how Aunshul's unique teaching methods help students appreciate their role in the ever-evolving world of cybersecurity.So, get ready to be inspired by Aunshul's story and her innovative approach to cybersecurity education. You won't want to miss this captivating episode that challenges our understanding of cybersecurity and the critical role of social engineering in it. And don't forget to share this episode, subscribe to the podcast, and join us for more insightful conversations on Redefining Cybersecurity.____________________________Watch this and other videos on ITSPmagazine's YouTube ChannelRedefining CyberSecurity Podcast with Sean Martin, CISSP playlist

The SysAdmin DOJO Podcast
EP04: The Modern Take on Social Engineering in Email

The SysAdmin DOJO Podcast

Play Episode Listen Later May 9, 2023 21:04


In this episode, we delve into the world of social engineering, phishing, and spam campaigns, exploring modern techniques threat actors are using to trick users into divulging sensitive information through email. Security Evangelist Andy and guest expert Umut Alemdar, head of the Security Lab here at Hornetsecurity, explain how phishing remains the top method of attack for many cybercriminals due to its cost-effectiveness and ability to exploit human vulnerability.  Attackers use excellent context and timing to create convincing email messages that trick even the most savvy users into divulging sensitive information. Despite the prevalence of anti-spam solutions, phishing continues to rise as attackers adapt and evolve their techniques.  Tune in to gain a better understanding of social engineering and how to protect your organization in the modern age.  Timestamps: 1:47 – Social engineering, phishing, and spam campaigns: still a problem in the modern era  6:30 – Why is phishing so effective, even today?  11:43 – What other types of attacks does phishing enable for end users?  16:48 – How does the industry ultimately solve the problem of phishing? Episode resources:  Cyber Security Report 2023         Security Awareness Services    Google and Facebook Accounts Payable Fraud    Find Andy on LinkedIn , Twitter , Mastodon  Find Umut on LinkedIn     

DR J’S
Episode 2: A feat of (social) engineering

DR J’S

Play Episode Listen Later May 9, 2023 23:22


The American freeway is born in a time of intense optimism around the promise of the automobile. President Eisenhower sees the country's dilapidated road network as a barrier to economic growth and national defense. Jacob Dekema, the father of San Diego's freeway network, sees freeways as lifesavers. How did our optimism blind us to the freeway's dark side? Magic Highway USA: https://www.youtube.com/watch?v=Vo4-rYNGEwE&

The Social-Engineer Podcast
Ep. 210 - Human Element Series - Data Driven Psychology and User Experience with Tommy Honton

The Social-Engineer Podcast

Play Episode Listen Later May 8, 2023 43:56


Today we are joined by Tommy Honton. Tommy is a writer and experienced designer specializing in the intersection of interactivity and narrative. He has produced work around the world for audiences of all sizes and regularly lectures about design. He is also the co-creator of the award-winning escape room Stash House. [May 8, 2023]   00:00 – Intro 00:22 – Intro Links -          Social-Engineer.com - http://www.social-engineer.com/ -          Managed Voice Phishing - https://www.social-engineer.com/services/vishing-service/ -          Managed Email Phishing - https://www.social-engineer.com/services/se-phishing-service/ -          Adversarial Simulations - https://www.social-engineer.com/services/social-engineering-penetration-test/ -          Social-Engineer channel on SLACK - https://social-engineering-hq.slack.com/ssb -          CLUTCH - http://www.pro-rock.com/ -          innocentlivesfoundation.org - http://www.innocentlivesfoundation.org/                                                03:40 - Tommy Honton Intro                                                       04:25 - How did Escape Rooms become your career?                                       06:19 - The Hero of Your Journey                                                              08:42 - Crafting a Non-Linear Narrative                                                  15:47 - Go with the Flow                                                               19:33 - More than Words                                                             24:45 - I'm Not Just the President...                                                         29:06 - Some Stranger Things                                                      34:34 - The Florida Market and Beyond                                                  36:22 - Who would you consider your greatest mentors? -          Marty Parker -          Sean Stewart 39:00 - Book Recommendations -          Sex at Dawn - Christopher Ryan & Cacilda Jethá -          Sapiens - Yuval Noah Harari -          Blood, Seat, and Pixels - Jason Schreier -          Press Reset - Jason Schreier                         40:56 - MORTY: The Escape Room App -          Site: Morty                                                         42:41 - Find Tommy online -          Website: tommyhonton.com 43:25 - Guest Wrap Up & Outro -          www.social-engineer.com -          www.innocentlivesfoundation.org

Mike Drop
Ret. Green Beret Storyteller Scott Mann - Part 2 | Mike Ritland Podcast Episode 135

Mike Drop

Play Episode Listen Later May 7, 2023 82:56


On Episode 134, Scott Mann talked about his humble beginnings - enlisting in the Army, working his way up to Special Ops, and discovering some of the most untold parts of the world in a way only a good soldier can. But Scott's leadership, and the struggles that came with it, were only small part of that story. In Part 2, Scott digs into the challenges that come with leading, and the often absurd political machinations that come with it, before diving into the aptly named Operation Pineapple Express, reviewing his charitable works, and explaining just how he managed to get on a stage in his acclaimed play 'Last Out: Elegy of a Green Beret.' ----------Chapters:00:00 - Intro01:17 - Running the Ops Center17:29 - Navigating Leadership Waters23:13 - Challenging Calls40:56 - Regretful Ops46:07 - Retiring on My Terms58:16 - Gender, Vaccines, & Social Engineering in the Military01:02:50 - Different Ways in Ukraine01:11:26 - Veteran Entrepreneurs01:15:21 - Last Out: Elegy of a Green Beret01:19:01 - Operation Pineapple Express----------Support Scott Mann: Website - https://scottmann.comPlay - Last Out: Elegy of a Green Beret - https://lastoutplay.comBook - Operation Pineapple Express - https://operationpineappleexpress.comPodcast - The Rooftop Podcast - https://spoti.fi/3FIz3vsYouTube - https://bit.ly/3lsoR3vInstagram - https://www.instagram.com/scottmannauthorFacebook: https://www.facebook.com/ScottMannAuthor----------Sponsors: BUBS Naturals The BUBS namesake derives from Glen ‘BUB' Doherty, who was heroically killed in Benghazi, Libya in 2012. In addition to remembering Glen for the patriot he is, the BUBS ethos centers around the passionate and adventure seeking life that Glen lived. BUBS Naturals products are rooted in sustainably sourced ingredients and controlled consistency to provide our customers with the highest quality Collagen Protein & MCT Oil Powder that help you feel amazing and live a fuller life.Our mission is simple. FEEL GREAT. DO GOOD. 10% always goes back to charity, helping military men and women transition back into civilian life. Go to bubsnaturals.com and use code MIKEDROP for 20% off your order. ----------MUD/WTRGo to mudwtr.com/mike to support the show and use code MIKEMUD for 15% off----------Black BuffaloGo to blackbuffalo.com/discount/MIKEDROP and use promo code Mike Drop at checkout for 15% off your first order!----------Fueled by TeamDog | www.mikeritlandco.com | @Teamdog.petALL THINGS MIKE RITLAND:SHOP for Fueled By Team Dog Performance Dog Food, Treats, Apparel, Accessories, and Protection dogs - MikeRitlandCo.com - https://www.MikeRitlandCo.com Team Dog Online dog training - TeamDog.pet - https://www.TeamDog.pet

Putting the AP in hAPpy
Episode 236: No Cost Fraud Prevention - 4 Reports To Pull From Your Accounting System/ERP

Putting the AP in hAPpy

Play Episode Listen Later May 4, 2023 25:56


Listen for 4 types of reports from your Accounting System or ERP that can help in the war against internal and external fraud.  Yes I said war….Keep listening.Check out my website www.debrarrichardson.com if you need help implementing authentication techniques, internal controls, and best practices to prevent fraudulent payments, regulatory fines or bad vendor data. Check out my new Vendor Process Training Center for 149+ hours of weekly live and on-demand training for the Vendor team. Subscribe today to be entered in the subscriber-only monthly drawing to win a free Putting the AP in hAPpy Coffee Mug.  Links mentioned in the podcast:    On-Demand Webinar:  8 Steps to Clean Your Vendor Master FileVendor Validation Reference List with Resources Links: www.debrarrichardson.com/vendor-validation-download (Get 25% Discount on the Global Vendor Registration Numbers)Vendor Master File Clean-Up:  https://www.debrarrichardson.com/cleanupYouTube Channel:  https://www.youtube.com/channel/UCqeoffeQu3pSXMV8fUIGNiw More Podcasts/Blogs/Webinars www.debrarrichardson.comMore ideas?  Email me at debra@debrarrichardson.com Music Credit:  www.purple-planet.com

The Social-Engineer Podcast
Ep. 209 - The Doctor Is In Series - The TRUTH Behind Conspiracy Theories

The Social-Engineer Podcast

Play Episode Listen Later May 1, 2023 42:46


Welcome to the Social-Engineer Podcast: The Doctor Is In Series – where we will discuss understandings and developments in the field of psychology.   In today's episode, Chris and Abbie are discussing: Conspiracy theories. They will talk about what makes a Conspiracy Theory and why we believe them. [May 1, 2023]   00:00 - Intro 00:17 - Dr. Abbie Maroño Intro 00:59 - Intro Links -          Social-Engineer.com - http://www.social-engineer.com/ -          Managed Voice Phishing - https://www.social-engineer.com/services/vishing-service/ -          Managed Email Phishing - https://www.social-engineer.com/services/se-phishing-service/ -          Adversarial Simulations - https://www.social-engineer.com/services/social-engineering-penetration-test/ -          Social-Engineer channel on SLACK - https://social-engineering-hq.slack.com/ssb -          CLUTCH - http://www.pro-rock.com/ -          innocentlivesfoundation.org - http://www.innocentlivesfoundation.org/                                                04:45 - The Topic of the Day: The TRUTH Behind Conspiracy Theories 05:54 - What is a Conspiracy Theory? 07:39 - What's the harm? 10:20 - WHY??? 11:17 - Pattern Seekers 13:15 - Cognitive Closure 17:04 - The Role of Critical Thinking 19:18 - An Existential Element 20:41 - Don't Forget the Lizards! 22:35 - What about Bigfoot? 24:30 - Escapism 30:15 - Reading the Emotions 32:29 - Social Motive 33:31 - Emotions vs Critical Thinking 36:42 - Prove Me Wrong! 39:09 - The Takeaway: Empathy 40:57 - Wrap Up & Outro -          www.social-engineer.com -          www.innocentlivesfoundation.org   Find us online: -          Twitter: https://twitter.com/abbiejmarono -          LinkedIn: linkedin.com/in/dr-abbie-maroño-phd-35ab2611a -          Twitter: https://twitter.com/humanhacker -          LinkedIn: linkedin.com/in/christopherhadnagy   References: Abalakina-Paap, M., Stephan, W. G., Craig, T., & Gregory, L. (1999). Beliefs in conspiracies. Political Psychology, 20, 637–647. Adams, G., O'Brien, L. T., & Nelson, J. C. (2006). Perceptions of racism in Hurricane Katrina: A liberation psychology analysis. Analyses of Social Issues and Public Policy, 6, 215–235. Bilewicz, M., Winiewski, M., Kofta, M., & Wójcik, A. (2013). Harmful ideas: The structure and consequences of antiSemitic beliefs in Poland. Political Psychology, 34, 821–839. Bost, P. R., & Prunier, S. G. (2013). Rationality in conspiracy beliefs: The role of perceived motive. Psychological Reports, 113, 118–128 Crocker, J., Luhtanen, R., Broadnax, S., & Blaine, B. E. (1999). Belief in U.S. government conspiracies against Blacks among Black and White college students: Powerlessness or system blame? Personality and Social Psychology Bulletin, 25, 941–953. Dieguez, S., Wagner-Egger, P., & Gauvrit, N. (2015). Nothing happens by accident, or does it? A low prior for randomness does not explain belief in conspiracy theories. Psychological Science, 26, 1762–1770. Dieguez, S., Wagner-Egger, P., & Gauvrit, N. (2015). Nothing happens by accident, or does it? A low prior for randomness does not explain belief in conspiracy theories. Psychological Science, 26(11), 1762–1770. https://doi. org/10.1177/0956797615598740 DiFonzo, N., Bordia, P., & Rosnow, R. L. (1994). Reining in rumors. Organizational Dynamics, 23(1), 47–62. https://doi. org/10.1016/0090-2616(94)90087-6 Douglas, K. M., & Leite, A. C. (2017). Suspicion in the workplace: Organizational conspiracy theories and workrelated outcomes. British Journal of Psychology, 108, 486–506. Douglas, K. M., & Sutton, R. M. (2008). The hidden impact of conspiracy theories: Perceived and actual impact of theories surrounding the death of Princess Diana. Journal of Social Psychology, 148, 210–221. Douglas, K. M., Sutton, R. M., & Cichocka, A. (2017). The psychology of conspiracy theories. Current directions in psychological science, 26(6), 538-542. Douglas, K. M., Sutton, R. M., Callan, M. J., Dawtry, R. J., & Harvey, A. J. (2016). Someone is pulling the strings: Hypersensitive agency detection and belief in conspiracy theories. Thinking & Reasoning, 22, 57–77. Douglas, K. M., Uscinski, J. E., Sutton, R. M., Cichocka, A., Nefes, T., Ang, C. S., & Deravi, F. (2019). Understanding conspiracy theories. Political psychology, 40, 3-35. Keeley, B. L. (1999). Of conspiracy theories. The journal of Philosophy, 96(3), 109-126. Kim, M., & Cao, X. (2016). The impact of exposure to media messages promoting government conspiracy theories on distrust in the government: Evidence from a two-stage randomized experiment. International Journal of Communication, 10(2016), 3808–3827. Retrieved from http://ijoc.org/index.php/ijoc/article/view/5127 Klein, C., Clutton, P., & Dunn, A. G. (2018). Pathways to conspiracy: The social and linguistic precursors of involvement in Reddit's conspiracy theory forum. Retrieved frompsyarxiv.com/8vesf Nefes, T. S. (2017). The impacts of the Turkish Government's “interest rate lobby” theory about the Gezi Park Protests. Social Movement Studies, 16(5), 610–622. https://doi.org/10.1080/14742837.2017.1319269 Nera, K., Pantazi, M., & Klein, O. (2018). “These are just stories, Mulder”: Exposure to conspiracist fiction does not produce narrative persuasion. Frontiers in Psychology, 9, https://doi.org/10.3389/fpsyg.2018.00684 Swift, A. (2013). Majority in U.S. still believe JFK killed in a conspiracy. Retrieved from http://www.gallup.com/ poll/165893/majority-believe-jfk-killed-conspiracy.aspx Tetlock, P. E. (2002). Social-functionalist frameworks for judgment and choice: The intuitive politician, theologian, and prosecutor. Psychological Review, 109, 451–472. Uscinski, J. E., & Parent, J. M. (2014). American conspiracy theories. New York, NY: Oxford University Press. Uscinski, J. E., Klofstad, C., & Atkinson, M. D. (2016). What drives conspiratorial beliefs? The role of informational cues and predispositions. Political Research Quarterly, 69, 57–71. van Prooijen, J.-W., & Acker, M. (2015). The influence of control on belief in conspiracy theories: Conceptual and applied extensions. Applied Cognitive Psychology, 29, 753–761. van Prooijen, J.-W., & Jostmann, N. B. (2013). Belief in conspiracy theories: The influence of uncertainty and perceived morality. European Journal of Social Psychology, 43, 109–115. Whitson, J. A., & Galinsky, A. D. (2008). Lacking control increases illusory pattern perception. Science, 322, 115–117.

Putting the AP in hAPpy
Episode 235: 5 Tips From The United States Postal Inspection Service That Your Team Can Use To Combat Fraud

Putting the AP in hAPpy

Play Episode Listen Later Apr 27, 2023 24:43


The United States Postal Inspection Service? They're real?  Yes, it is and here are 5 tips that you can use to combat fraud at your company.Keep listening.Check out my website www.debrarrichardson.com if you need help implementing authentication techniques, internal controls, and best practices to prevent fraudulent payments, regulatory fines or bad vendor data. Check out my new Vendor Process Training Center for 149+ hours of weekly live and on-demand training for the Vendor team. Subscribe today to be entered in the subscriber-only monthly drawing to win a free Putting the AP in hAPpy Coffee Mug.  Links mentioned in the podcast:   United States Postal Inspection Service (USPIS):  Main PageSubscribe to Scam ArticlesForward Suspicious TextsVendor Process Training Center:  Vendor Process Training PassFrauds And New Scam Alerts + How To Prevent ThemVendor Process ReDesign – Plug Up the Gaps In Your Vendor Setup & Maintenance ProcessVendor Validation Reference List with Resources Links: www.debrarrichardson.com/vendor-validation-download (Get 25% Discount on the Global Vendor Registration Numbers)Vendor Master File Clean-Up:  https://www.debrarrichardson.com/cleanupYouTube Channel:  https://www.youtube.com/channel/UCqeoffeQu3pSXMV8fUIGNiw More Podcasts/Blogs/Webinars www.debrarrichardson.comMore ideas?  Email me at debra@debrarrichardson.com Music Credit:  www.purple-planet.com

AUDIT 15 FUN
Episode 87 - Social Engineering - Chris Hadnagy

AUDIT 15 FUN

Play Episode Listen Later Apr 25, 2023 10:40


What is social engineering? How is it affecting businesses nowadays? What is the most effective way to prevent it? These were some of the questions Chris Hadnagy, Social Engineering expert discussed in the latest episode of the AUDIT 15 FUN podcast.

The Social-Engineer Podcast
Ep. 208 - The SE ETC Series - The SE Framework: Its Origin and How To Use It with Patrick and Chris

The Social-Engineer Podcast

Play Episode Listen Later Apr 24, 2023 46:20


Welcome to the Social-Engineer Podcast: The SE Etc. Series. This series will be hosted by Chris Hadnagy, CEO of Social-Engineer LLC, and The Innocent Lives Foundation, as well as Social-Engineer.Org and The Institute for Social Engineering. Chris will be joined by his co-host Patrick Laverty as they discuss topics pertaining to the world of Social Engineering. [April 24, 2023]   00:00 - Intro 00:25 - Patrick Laverty Intro 00:59 - Intro Links -          Social-Engineer.com - http://www.social-engineer.com/ -          Managed Voice Phishing - https://www.social-engineer.com/services/vishing-service/ -          Managed Email Phishing - https://www.social-engineer.com/services/se-phishing-service/ -          Adversarial Simulations - https://www.social-engineer.com/services/social-engineering-penetration-test/ -          Social-Engineer channel on SLACK - https://social-engineering-hq.slack.com/ssb -          CLUTCH - http://www.pro-rock.com/ -          innocentlivesfoundation.org - http://www.innocentlivesfoundation.org/ 05:34 - Scary Little Human 07:50 - Today's Topic: The SE Framework 09:13 - Origin Story 14:15 - Social Engineering: A Complete Definition 18:03 - A Tool for Communication 19:20 - Influence is NOT Manipulation 24:15 - Code of Ethics 27:38 - Intent is Key 33:36 - Human Buffer Overflow 41:56 - Education for Everyone 43:51 - Updating When Necessary 45:14 - Next Month: Book Club 45:59 - Wrap Up & Outro -          www.social-engineer.com -          www.innocentlivesfoundation.org   Find us online -          Chris Hadnagy -          Twitter: @humanhacker -          LinkedIn: linkedin.com/in/christopherhadnagy -          Patrick Laverty -          Twitter: @plaverty9 LinkedIn: linkedin.com/in/plaverty9

Real Estate Espresso
Social Engineering In Real Estate

Real Estate Espresso

Play Episode Listen Later Apr 24, 2023 5:09


Some days it seems like we live in an upside down world.   Today's show fits in the category of “You can't make this stuff up.” It's just too bizarre for words, and it would be even funny if it were not for the fact that this is real. Charlie Munger, who is Warren Buffet's business partner is famous for saying “show me the incentive and I'll show you the outcome”. The latest bit of insanity coming out of the Biden White House is an idea whereby the government will charge a premium on borrowers with a good credit score in order to make it easier for those with a poor credit score to qualify for a loan. You heard me correctly. This is the equivalent of taking points away from an A student and giving extra marks to a C student, to make things more fair. The details are that a borrower with a credit score of 740 or higher will pay an additional  fee ontheir residential mortgage. ---------------- Host: Victor Menasce email: podcast@victorjm.com

ITSPmagazine | Technology. Cybersecurity. Society
Mastering Cybersecurity Basics and Embracing AI | A Conversation with David Pereira | The Hacker Factory Podcast With Phillip Wylie

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Apr 21, 2023 33:44


Guest: David Pereira, CEO and Founder of SecPro [@SecProInt]On LinkedIn | https://www.linkedin.com/in/davidfpereira/On Twitter | https://twitter.com/davidpereiracibOn YouTube | https://www.youtube.com/@secprointHost: Phillip WylieOn ITSPmagazine  

ITSPmagazine | Technology. Cybersecurity. Society
Ethical Dilemmas in the Age of AI: Balancing AI Advancements and Cybersecurity | ITSPmagazine Event Coverage: RSAC 2023 San Francisco, USA | A Conversation with Justin "Hutch" Hutchens

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Apr 20, 2023 28:04


Guest: Justin "Hutch" Hutchens, Director of Security Research & Development at Set Solutions [@setsolutionsinc] and a cybersecurity instructor for the University of Texas at Austin [@UTAustin]On LinkedIn | https://www.linkedin.com/in/justinhutchens/On Twitter | https://twitter.com/sociosploitOn YouTube | https://www.youtube.com/channel/UCGx0Wq45QB3pKHUzsX8R0Zg____________________________Hosts: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber]On ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/sean-martinMarco Ciappelli, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining Society PodcastOn ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli____________________________This Episode's SponsorsBlackCloak | https://itspm.ag/itspbcwebBrinqa | https://itspm.ag/brinqa-pmdpSandboxAQ | https://itspm.ag/sandboxaq-j2en____________________________Episode NotesIn this captivating episode as part of our RSA Conference Coverage Chats on the Road series, Justin Hutchens, a seasoned expert in information security and AI, and hosts Sean Martin and Marco Ciappelli discuss the potential benefits and risks of integrating artificial intelligence (AI) and natural language processing (NLP) into various aspects of our lives. Justin shares his journey in AI, from attempting to crack financial markets to exploring its potential in social engineering.Hutchens will be delivering a talk at RSA about the weaponization of large language models for fully autonomous social engineering systems and potential mitigation strategies. He will also lead a "birds of a feather" session on the ethics surrounding AI, touching on topics such as societal impacts, mental health, and job displacement.The podcast delves into the perception and limitations of AI, emphasizing that it should be seen as a tool rather than a solution. Hutchens highlights the risks of integrating AI into business processes and shares his thoughts on the importance of human intervention to ensure the accuracy and safety of AI-generated outputs. He also mentions the possible advantages of using AI in security operations and its challenges in operational decision-making.The conversation underscores the need for ongoing discussions covering the importance of ethics in AI, the rapid acceleration of AI development, its potential societal impacts, and understanding the necessity of balancing business objectives with societal concerns. Join this enlightening conversation as the trio discuss the power and responsibility that come with using AI and explore ways to mitigate the risks associated with integrating AI into organizations' workflows.Don't forget to follow all of ITSPmagazine's RSA Conference coverage. Be sure to share and subscribe to Redefining CyberSecurity Podcast to keep up with the latest trends in technology and cybersecurity.____________________________ResourcesSession | Artificial Intelligence: Balancing Rapid Innovation with Ethics: https://www.rsaconference.com/USA/agenda/session/Artificial%20Intelligence%20Balancing%20Rapid%20Innovation%20with%20EthicsSession | CatPhish Automation - The Emerging Use of AI in Social Engineering: https://www.rsaconference.com/USA/agenda/session/CatPhish%20Automation%20-%20The%20Emerging%20Use%20of%20AI%20in%20Social%20EngineeringPrevious RSAC Presentations: https://www.rsaconference.com/experts/Justin%20HutchensLearn more, explore the agenda, and register for RSA Conference: https://itspm.ag/rsa-cordbw____________________________For more RSAC Conference Coverage podcast and video episodes visit: https://www.itspmagazine.com/rsa-conference-usa-2023-rsac-san-francisco-usa-cybersecurity-event-coverageAre you interested in telling your story in connection with RSA Conference by sponsoring our coverage?

Putting the AP in hAPpy
Episode 234: Should You Remove Your Vendor's Banking and Tax ID When You Inactivate Them? + A Need I Don't Have An Answer For

Putting the AP in hAPpy

Play Episode Listen Later Apr 20, 2023 21:33


When you inactivate vendors in your vendor master file, do you also remove the tax id and the vendor's banking?Keep listening.Check out my website www.debrarrichardson.com if you need help implementing authentication techniques, internal controls, and best practices to prevent fraudulent payments, regulatory fines or bad vendor data. Check out my new Vendor Process Training Center for 149+ hours of weekly live and on-demand training for the Vendor team.  Subscribe today to be entered in the subscriber-only monthly drawing to win a free Putting the AP in hAPpy Coffee Mug.  Links mentioned in the podcast:    On-Demand Webinar:  8 Steps to Clean Your Vendor Master FileVendor Banking Form Template w/Built-In Authentication to Prevent Fraud:  Vendor Banking Form TemplateVendor Process ReDesign – Plug Up the Gaps In Your Vendor Setup & Maintenance ProcessVendor Validation Reference List with Resources Links: www.debrarrichardson.com/vendor-validation-download (Get 25% Discount on the Global Vendor Registration Numbers)Vendor Master File Clean-Up:  https://www.debrarrichardson.com/cleanupYouTube Channel:  https://www.youtube.com/channel/UCqeoffeQu3pSXMV8fUIGNiw More Podcasts/Blogs/Webinars www.debrarrichardson.comMore ideas?  Email me at debra@debrarrichardson.com Music Credit:  www.purple-planet.com

ITSPmagazine | Technology. Cybersecurity. Society
Strategies for Building a Positive Work Environment for Security Teams and CISOs with Dr. Rebecca Wynn | Secure Your Strategy Podcast With Chloé Messdaghi

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Apr 19, 2023 37:14


The Social-Engineer Podcast
Ep. 207 - Security Awareness Series - 2023 State of Vishing Report Discussion

The Social-Engineer Podcast

Play Episode Listen Later Apr 17, 2023 49:46


Today on the Social-Engineer Podcast: The Security Awareness Series, Ryan and I are joined by Dr. Abbie Maroño. Dr. Maroño is now the Director of Education at Social-Engineer, LLC, an active member of internationally recognized research groups, and an expert consultant and advisor.  Today, Chris, Ryan and Abbie will discuss the 2023 State of Vishing Report. [April 17, 2023]   00:00 - Intro 00:23 - Ryan Intro 01:20 - Intro Links: -          Social-Engineer.com - http://www.social-engineer.com/ -          Managed Voice Phishing - https://www.social-engineer.com/services/vishing-service/ -          Managed Email Phishing - https://www.social-engineer.com/services/se-phishing-service/ -          Adversarial Simulations - https://www.social-engineer.com/services/social-engineering-penetration-test/ -          Social-Engineer channel on SLACK - https://social-engineering-hq.slack.com/ssb -          CLUTCH - http://www.pro-rock.com/ -          innocentlivesfoundation.org - http://www.innocentlivesfoundation.org/                                04:42 - Dr. Abbie Maroño Intro 06:55 - Topic of the Day: 2023 State of Vishing Report                                     08:25 - Discussing the Data Set                                                   10:47 - Following the Trends                                                       12:47 - Limitation of Data                                                             13:28 - Negatives in Positives?                                                   15:49 - Vishing: A Definition                                                        18:10 - Understanding Vulnerabilities                                                     19:10 - Got the Time                                                       21:08 - Why Time of Day Matters                                                              26:18 - Make it Personal                                                               28:05 - Ethics are Vital!                                                  31:34 - The Academic Dilemma                                                  35:46 - Know Your Goal                                                 37:04 - Vishing Trends                                                   39:28 - Increased Understanding                                                              41:34 - Creating Vulnerability                                                     45:18 - Hope through Education                                                48:03 - Wrap Up & Outro -          www.social-engineer.com -          www.innocentlivesfoundation.org

BarCode
Freaky Clown with FC

BarCode

Play Episode Listen Later Apr 14, 2023 63:00 Transcription Available


FC has gone through extreme adversity and has come out stronger on the other side.  He grew up in a very negative environment, which unfortunately led to the development of complex PTSD. But from that emerged a unique talent, one that is both a gift and a curse: hypervigilance. He refused to allow his past define him and instead, leveraged the state of increased alertness to fuel his passion for security. FC talks with us about his breakthrough into ethical hacking and physical security assignments, his 100% success rate at breaking into banks and other highly secured government facilities, the reason physical security engagements are NOT helpful to the business, uniting digital/physical/human-factor for optimal security, and the risk of investing in new tech. FC also details some truly insane stories, including the time he kidnapped the guard at a facility protected by ex-military Gurkhas. Finally, he reveals his advice for aspiring hackers and details on his soon to be released book, "How I Rob Banks: And Other Such Places". TIMESTAMPS0:03:49 - The Origin of an Ethical Hacker0:05:49 - Early Computing and Hacking Experiences0:10:04 -The Cursed Gift of Hypervigilance0:13:25 - Social Engineering and Physical Security Assessments0:20:30 - The Inevitability of Security Breaches0:22:38 - The Lack of Focus on Human and Physical Security in Organizations0:24:35 - Challenges of Adopting Cutting Edge Technology0:26:53 - The Impact of AI on Ethical Hacking0:34:16 - Methods of Social Engineering0:36:29 - Identifying Entry Points and Planning an Attack0:42:07 - Security Breach Simulation at a Data Center protected by Ex-Military Gurkhas0:44:31 - Advice for Aspiring Security Professionals0:48:46 - Cybersecurity Education and CertificationsSYMLINKSLinkedInTwitterCygentaHacktheboxTryhackmePentest AcademyBook: Breaking into Information Security: Learning the Ropes 101Book: How I Rob Banks: And Other Such PlacesDRINK INSTRUCTIONKOMBUCHA MOJITO1 Cup Kombucha1 TBSP Honey8-10 Mint Leaves1/2 Lime (Juiced)Club SodaMuddle 8-10 mint leaves and 1/2 a lime, juiced. Add 1 tbsp of honey and 1 cup of kombucha. Pour mixture into a highball glass. Top with club soda and stir gently.EPISODE SPONSORN/ACONNECT WITH USBecome a SponsorSupport us on PatreonFollow us on LinkedInTweet us at @BarCodeSecurityEmail us at info@barcodesecurity.com

ITSPmagazine | Technology. Cybersecurity. Society
Unlocking Cybersecurity Success | A Conversation with Michael Farnum | The Hacker Factory Podcast With Phillip Wylie

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Apr 14, 2023 35:53


Putting the AP in hAPpy
Episode 233: Mitigate the Risk When Using Internal Employees to Collect Vendor Information

Putting the AP in hAPpy

Play Episode Listen Later Apr 13, 2023 25:59


Do you have internal employees collecting vendor supporting documentation for vendor adds and changes?  What are the risks and how to mitigate them?Keep listening.Check out my website www.debrarrichardson.com if you need help implementing authentication techniques, internal controls, and best practices to prevent fraudulent payments, regulatory fines or bad vendor data. Check out my new Vendor Process Training Center for 149+ hours of weekly live and on-demand training for the Vendor team. Subscribe today to be entered in the subscriber-only monthly drawing to win a free Putting the AP in hAPpy Coffee Mug.  Links mentioned in the podcast:    Vendor Banking Form Template w/Built-In Authentication to Prevent Fraud:  Vendor Banking Form TemplateFree Training Session:  Build An Authentication Matrix So Your Vendor Team And Help Desk Do Not Communicate With A FraudsterVendor Process ReDesign – Plug Up the Gaps In Your Vendor Setup & Maintenance ProcessVendor Validation Reference List with Resources Links: www.debrarrichardson.com/vendor-validation-download (Get 25% Discount on the Global Vendor Registration Numbers)Vendor Master File Clean-Up:  https://www.debrarrichardson.com/cleanupYouTube Channel:  https://www.youtube.com/channel/UCqeoffeQu3pSXMV8fUIGNiw More Podcasts/Blogs/Webinars www.debrarrichardson.comMore ideas?  Email me at debra@debrarrichardson.com Music Credit:  www.purple-planet.com

Paul's Security Weekly TV
Social Engineering & Conquering Impostor Syndrome - Billy Boatright - PSW #780

Paul's Security Weekly TV

Play Episode Listen Later Apr 13, 2023 61:29


Imagine an illness that requires surgery a few times a month and restricts your mobility. What would that do to your career? In our chat with Billy Boatright today, we'll find out how he not only switched careers despite his illness, he found an advantage in his weaknesses: he turned them into effective social engineering skills.   Visit https://www.securityweekly.com/psw for all the latest episodes! Show Notes: https://securityweekly.com/psw780 

The Courtenay Turner Podcast
Tavistock. Psychological Research & Social Engineering - Crypted History Uncrypted

The Courtenay Turner Podcast

Play Episode Listen Later Apr 12, 2023 172:32


From the 4/5/23 Live Stream. Watch the full video here Join Courtenay & Rachel as they dive into episode 3 of Crypted History Uncrypted. Under the guise of social “science” research, we were brought, social engineering and propaganda. The ladies uncover what at first glance appears to be a field to investigate and heal ailments of the “psyche” aka the soul, and how that became weaponized against the masses and propagandized for war all while being funded by similar entities of todays MIC machine. To join the live conversation, we'll answer questions asked via our live chat link. To join, follow our chat link: https://dono.chat/dono/Courtenay ————————————————— Disclaimer: this is intended to be inspiration & entertainment. We aim to inform, inspire & empower. Guest opinions/ statements are not a reflection of the host or podcast. Please note these are conversational dialogues. All statements and opinions are not necessarily meant to be taken as fact. Please do your own research. Thanks for watching! ————————————————— Join us at Rebels for a C.A.U.S.E - June 3rd & 4th in Nashville, TN - https://www.rebelsforcause.com Follow & Connect with Courtenay: https://www.courtenayturner.com Twitter: https://twitter.com/KineticCourtz TruthSocial: https://truthsocial.com/@CourtenayTurner Instagram: https://instagram.com/kineticcourtz?utm_medium=copy_link Telegram: https://t.me/courtenayturnerpodcastcommunity Read some of her articles: https://www.truthmatters.biz Listen to &/or watch the podcast here! https://linktr.ee/courtenayturner Support my work & Affiliate links: https://www.buymeacoffee.com/courtzt https://zstacklife.com/?ref=COURTENAYTURNER FOX N SONS Coffee: https://www.foxnsons.com Promo Code: CTP The wellness company: https://www.twc.health/?ref=UY6YiLPqkwZzUX Enroll link: https://app.sharehealthcare.com/enroll? Referral code: courtz Www.HolyHydrogen.com Discount code: UPRISING144K LMNT: https://drinklmnt.com/pages/free-gift-with-purchase?rfsn=6999587.ebab27&utm_medium=affiliate&utm_source=courtenayturner&utm_campaign=agwp&utm_content=&utm_term=&rfsn_cn=EXCLUSIVE%20GIFT%20FOR%20COURTENAY%20TURNER%27S%20COMMUNITY Ignite Sales: https://www.universityofreason.com/a/29887/KVR3yvZo Mindset workshop: https://www.universityofreason.com/a/2147526145/KVR3yvZo Critical thinking trivium method: https://www.universityofreason.com/a/2147486641/KVR3yvZo Solutions webinar: https://www.universityofreason.com/a/2147492490/KVR3yvZo Richard's GTW freedom vault: https://www.universityofreason.com/a/2147506649/KVR3yvZo https://www.universityofreason.com/a/29887/KVR3yvZo ©2023 All Rights Reserved Learn more about your ad choices. Visit megaphone.fm/adchoices

Idaho Speaks
Words Apart

Idaho Speaks

Play Episode Listen Later Apr 11, 2023 9:53


We must each do our part to reclaim language from those who would distort the meanings of words in order to bludgeon the rest of us into submission.Would you like to share your thoughts with Ralph?  Please email your comments to hello@idahospeaks.com or post your comments on @IdahoSpeaks on Twitter.Idaho Speaks is a listener supported production.  Please visit idahospeaks.com/support to learn more.Do you have something so say?  Interested in learning more about publishing on the Idaho Speaks Network?  Our nation was built on ideas and your idea could be the next political advancement for Idaho.  Call Ed at (208) 209-7170 or email hello@idahospeaks.com to start the conversation.

Terrain Theory
Courtenay Turner on impossible birth stories, the demonism of COVID, and the plant medicine agenda

Terrain Theory

Play Episode Listen Later Apr 9, 2023 122:40


Courtenay Turner is a public speaker, an athlete, the co-founder of TruthMatters.biz, and the host of the Courtenay Turner Podcast. In this conversation with Courtenay we discuss:Her "impossible" birth storyThe benefits of wet sand and a narrower beamGoing down the vaccine rabbit holeThe demonic nature of COVIDWhy she's skeptical of the big push towards plant medicineand moreYou can learn more about Courtenay at her website or by following her on Instagram.Terrain Theory episodes are not to be taken as medical advice. You are your own primary healthcare provider.If you have a Terrain Transformation story you would like to share, email us at ben@terraintheory.net.Learn more at www.terraintheory.net.Music by Chris Merenda

ITSPmagazine | Technology. Cybersecurity. Society
Mastering Cybersecurity Career Development | A Conversation with Fletus Poston | The Hacker Factory Podcast With Phillip Wylie

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Apr 7, 2023 29:18


Putting the AP in hAPpy
Episode 232: Two Step Process When You've Made a Fraudulent Payment

Putting the AP in hAPpy

Play Episode Listen Later Apr 6, 2023 13:10


A fraudulent payment has been made.  Now what?Keep listening.  Check out my website www.debrarrichardson.com if you need help implementing authentication techniques, internal controls, and best practices to prevent fraudulent payments, regulatory fines, or bad vendor data. Check out my new Vendor Process Training Center for 149+ hours of weekly live and on-demand training for the Vendor team. Subscribe today to be entered in the subscriber-only monthly drawing to win a free Putting the AP in hAPpy Coffee Mug.  Links mentioned in the podcast:   Vendor Process ReDesign – Plug Up the Gaps In Your Vendor Setup & Maintenance ProcessVendor Validation Reference List with Resources Links: www.debrarrichardson.com/vendor-validation-download (Get 25% Discount on the Global Vendor Registration Numbers)Vendor Master File Clean-Up:  https://www.debrarrichardson.com/cleanupYouTube Channel:  https://www.youtube.com/channel/UCqeoffeQu3pSXMV8fUIGNiw More Podcasts/Blogs/Webinars www.debrarrichardson.comMore ideas?  Email me at debra@debrarrichardson.com Music Credit:  www.purple-planet.com

The Daily Transcendence
Astrological Generations, Social Engineering and Morphic Resonance

The Daily Transcendence

Play Episode Listen Later Apr 5, 2023 99:15


In this discussion, we begin to forge together topics like Astrology, Ancestry, and Species with the works of Rupert Sheldrake, Renn Butler, Mattias Desmet, and Vadim Zeland into one cohesive understanding. We use these parallels existing between different philosophies and sciences to bridge the gap between unseen, metaphysical phenomena in the cosmos. How is consciousness being influenced and what causes everything to be interconnected within the matrix we reside in? Support the show and get exclusive content on PatreonSupport this show http://supporter.acast.com/thedailytranscendence. Hosted on Acast. See acast.com/privacy for more information.

ITSPmagazine | Technology. Cybersecurity. Society
Strategies on How to Communicate Better with Tracy Maleeff | Secure Your Strategy Podcast With Chloé Messdaghi

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Apr 4, 2023 33:56


The CyberWire
"Cylance" ransomware (no relation to Cylance). Update on the 3CX incident. The FSB's arrest of Evan Gershkovich. Ukrainian hacktivist social engineering in the hybrid war.

The CyberWire

Play Episode Listen Later Apr 3, 2023 31:30


"Cylance" the ransomware (with no relation to Cylance, the security company). An update on the 3CX incident. The FSB's arrest of a Wall Street Journal reporter. Simone Petrella from N2K Networks unpacks 2023 cybersecurity training trends. Deepen Desai from Zscaler has the latest on cloud security. And Hacktivists claim to have tricked wives of Russian combat pilots into revealing personal information. For links to all of today's stories check out our CyberWire daily news briefing: https://thecyberwire.com/newsletters/daily-briefing/12/63 Selected reading. "Cylance" ransomware (no relation to Cylance). (CyberWire Pro) New Cylance Ransomware Targets Linux and Windows, Warn Researchers (HackRead) New Cylance Ransomware strain emerges, experts speculate about its notorious members (IT PRO)  More evidence links 3CX supply-chain attack to North Korean hacking group (Record) 3CX supply chain attack: the unanswered questions (Computing) 3CX Desktop App Compromised (CVE-2023-29059) (Fortinet Blog)  Evan Gershkovich Loved Russia, the Country That Turned on Him (Wall Street Journal) The Ukrainian hoax that revealed the Russian pilots who bombed Mariupol theatre (The Telegraph) Ukrainian Hacktivists Trick Russian Military Wives for Personal Info (HackRead)

ITSPmagazine | Technology. Cybersecurity. Society
From Developer to Cybersecurity Pro | A Conversation with Greg Porterfield | The Hacker Factory Podcast With Phillip Wylie

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode