Social Engineering
Search documents
Emotional Cybersecurity | Sqn Ldr Neeraj Sharma (Retd.) | TEDxMahindraUniversity
TEDx Talks· 2026-03-19 16:08
Good morning everyone. You all look sharp and ready. So let's get started.I will begin by sharing my small morning slip up with you all. Picture this. I was installing an app and the screen was loading and I was running late and there it was a long page of terms and conditions popped up in front of me.Now guess did I read it. No. I just smashed I agree and honestly I have no idea to what all I agreed.Sounds familiar. How many of you have done the same. Raise your hands.Oh, awesome. Now, keep them up in case ...
Zero Crypto at Home: A Security Playbook for 2026
Bankless· 2026-02-25 11:30
We have two security experts on the podcast today in addition to myself. This is Ryan Sean Adams. David can't be with us today.Let me tell you why I'm doing this episode. There's been an increase in physical attacks on crypto investors. It's probably happened over the last year or two in particular.I could share a dozen or more stories. This is causing anxiety in the crypto community. Perhaps as a listener, it's causing you some anxiety as you've seen some of these in the headlines.So, this episode is a way ...
X @Cointelegraph
Cointelegraph· 2026-02-19 09:00
🚨 ALERT: Scammers send tiny transactions from look-alike addresses so they appear in your history, hoping you copy and paste the wrong one later.No private key theft. Just precision social engineering. https://t.co/Ts5B4w61yN ...
How A Crypto Whale Lost $282 MILLION To A Scammer (DON'T Do This)
Coin Bureau· 2026-01-27 14:01
The history books will tell you that to steal a quarter of a billion dollars, you need a team of elite hackers, zeroday exploits, and a breach of a major exchange. They will tell you that if you hold your crypto in a hardware wallet, you're safe, that you are your own bank. But while the world was watching the charts on January 10th, 2026, the real battle was happening on a simple phone call.A crypto veteran, a whale by any definition, lost $282 million in Bitcoin and Litecoin in a matter of minutes. No cod ...
Feds are hunting teenage hackers
Fortune· 2026-01-01 11:27
Core Insights - The article discusses the rise of a criminal organization known as "The Com," which recruits young individuals, primarily teenagers, to conduct ransomware attacks against major corporations, exploiting their technical skills and naivety [3][4][19]. Recruitment and Operations - The Com prioritizes female candidates and offers training for inexperienced individuals, with compensation of $300 per successful call, paid in cryptocurrency [2][19]. - The organization has infiltrated U.S. and UK companies with a combined market cap exceeding $1 trillion, targeting around 120 companies, including well-known brands like Nike and Louis Vuitton [3][4]. Tactics and Techniques - The Com employs sophisticated social engineering tactics, utilizing platforms like LinkedIn and Slack to gather information about employees and corporate structures [7][10]. - Members of the group often mimic legitimate help desk calls to extract sensitive information from employees, exploiting the asymmetry in authentication processes [11][20]. Youth Involvement and Risks - Many of the young recruits are unaware of the severe legal consequences, with some facing federal charges and significant prison sentences for their involvement [4][17]. - The article highlights that the recruitment often begins in gaming communities, where young individuals are groomed for cybercrime [15][23]. Gender Dynamics - The organization has seen an increase in female participation, which is strategically leveraged for social engineering due to societal biases that underestimate women [19][22]. - Despite the growing number of female recruits, the leadership remains predominantly male, and women are often not given opportunities for advancement within the organization [22]. Parental Awareness and Cybersecurity - Parents often remain unaware of their children's involvement in cybercrime until law enforcement intervenes, highlighting a gap in monitoring online behavior [6][26]. - The complexity of online crimes makes it difficult for parents to recognize warning signs, necessitating a more proactive approach to cybersecurity at home [25][26].
X @MetaMask.eth 🦊
MetaMask.eth 🦊· 2025-12-13 21:32
RT Tay 💖 (@tayvano_)🚨 WARNING (AGAIN)DPRK threat actors are still rekting way too many of you via their fake Zoom / fake Teams meets.They're taking over your Telegrams -> using them to rekt all your friends.They've stolen over $300m via this method already.Read this. Stop the cycle. 🙏 https://t.co/tJTo9lkq0v ...
X @Elon Musk
Elon Musk· 2025-11-25 20:57
RT Gad Saad (@GadSaad)This happens because aggressive and violent men are only restrained by other potentially aggressive and violent men. However, the West has engaged in a 50+ years social engineering experiment wherein they have ideologically castrated their men. Hence, only one outcome can take place. This story is a manifestation of that reality.Read The Parasitic Mind & Suicidal Empathy (when it is released). ...
X @Binance
Binance· 2025-11-18 02:00
Think before you clickSimple habits to outsmart social engineers.Read more 👇https://t.co/UgYSe4d2J0 ...
X @CoinDesk
CoinDesk· 2025-10-28 01:00
🚨ALERT: Be aware that there are individuals using the CoinDesk name and posing as staff members in an attempt to carry out social engineering or phishing scams.If you receive a direct message (DM) or email from someone claiming to be from CoinDesk—on Twitter, Telegram, Discord, LinkedIn, Facebook, or any other platform—and you don’t personally know them, please verify their employment by checking our official masthead or LinkedIn page.https://t.co/j8oxGCAOyv ...
Beyond phishing: Cyber threats in the age of AI with Four Flynn (pt. 1)
Google DeepMind· 2025-10-09 18:27
Social engineering, cyberattacks, and the fog of war - all topics covered in this interview with the VP of Security and Privacy at Google DeepMind. Hannah Fry and Four Flynn take us behind the scenes of Operation Aurora, the monumental 2009 attack on Google that forever changed the landscape of cybersecurity. They discuss the defender's dilemma, the constant battle between attackers and defenders in the digital world, and how AI can potentially help mitigate some of the most complex vulnerabilities. As Hann ...