CommunityNews

CommunityNews

I Was Scammed Out of $130,000 — And Google Helped It Happen

On June 19th, my life changed with a phone call.

Read in full here:

Most Liked

apsori

apsori

I am always skeptical of phone calls if it is an unknown number.

Eiji

Eiji

Heh, I never pick up a call from an unknown number and I tend to require scheduling a call unless there is something very important that happen suddenly. If someone is interested they could verify themselves by sending a text message from verified source about a missed phone call. :telephone_receiver:

I have different phone number for a bank accounts, for work contacts and for any other thing and finally I don’t share a phone number with other people than family and people I have signed an agreement and I’m doing it so only if there is a need for it and not by default. I’m rather avoiding all jobs that require phone number and I’m especially avoiding everyone who thinks that can talk with me any time (like if I would work for them) without scheduling a call as they are so important, because they want to give me some offer. :briefcase:

All the time I was thinking such a 0 trust methods are absolutely basic for security reasons and all people in IT should know about. However the more I hear about people the less hope I have for humanity. We really don’t need anything need to make us hurt. :sweat_smile:

Also it’s important to mention that nobody should blame the victim - I wrote about it like for me it was always an obvious thing to do so. I believe that anyone should consider avoiding damage rather than learn how to control it. Such topics are important to remind that attackers are smart. We should not underestimate them. It can happen for everyone. :thinking:

I recommend to talk with communication security expert. In said “5 min” and with 2 untouched phones on a table a good security expert may demonstrate a fake conversation with message deleting from phone. You can not only loose money, but also your family and that’s because of some messages and you had never seen. That’s really eye-opening. The internet and mobile technologies are based on army’s infrastructure and therefore are insecure by default as there a central point is always expected as a source of trust. :light_bulb:

gfqdjb

gfqdjb

Wow, that’s awful. These people are always coming up with new ways to get around security. Just last week I noticed a new trick to bypass Gmail’s spam filter. They spoofed my address and sent an email to a fake account (my_username@google.com). Since the delivery failed, I got the bounce-back notification and ended up seeing the spam message inside it.

Where Next?

Popular General Dev topics Top

First poster: bot
Neovim nightly, v0.5.0 and v0.4.4 has been released. Link: Release Nvim development (prerelease) build · neovim/neovim · GitHub Link:...
New
First poster: joeb
The File System Access API with Origin Private File System. WebKit supports new API that makes it possible for web apps to create, open,...
New
First poster: dimitarvp
A career ending mistake — Bitfield Consulting. As software engineers, we’re constantly making detailed, elaborate plans for computers to...
New
First poster: bot
The overengineered Solution to my Pigeon Problem. TL;DR: I built a wifi-equipped water gun to shoot the pigeons on my balcony, controlle...
New
First poster: bot
API Gateway Trends behind Features: Apache APISIX 3.0 vs. Kong 3.0 - API7.ai. By comparing the open-source API Gateway Apache APISIX and...
New
First poster: gulshan212
Why Python keeps growing, explained | The GitHub Blog. A deep dive into why more people are using Python than ever, its key use cases, a...
New
First poster: bot
[js/web] WebGPU backend via JSEP by fs-eire · Pull Request #14579 · microsoft/onnxruntime. Description This change introduced the follo...
New
First poster: bot
Declarative GNOME configuration with NixOS. I adore tinkering with my machine, trying new tools, extensions, themes, and ideas. When I w...
New
First poster: AstonJ
Jan | Rethink the Computer. Jan turns your computer into an AI machine by running LLMs locally on your computer. It’s a privacy-focus, l...
New
New

Other popular topics Top

AstonJ
What chair do you have while working… and why? Is there a ‘best’ type of chair or working position for developers?
New
siddhant3030
I’m thinking of buying a monitor that I can rotate to use as a vertical monitor? Also, I want to know if someone is using it for program...
New
AstonJ
We have a thread about the keyboards we have, but what about nice keyboards we come across that we want? If you have seen any that look n...
New
rustkas
Intensively researching Erlang books and additional resources on it, I have found that the topic of using Regular Expressions is either c...
New
foxtrottwist
A few weeks ago I started using Warp a terminal written in rust. Though in it’s current state of development there are a few caveats (tab...
New
PragmaticBookshelf
Author Spotlight Mike Riley @mriley This month, we turn the spotlight on Mike Riley, author of Portable Python Projects. Mike’s book ...
New
AstonJ
If you want a quick and easy way to block any website on your Mac using Little Snitch simply… File > New Rule: And select Deny, O...
New
CommunityNews
A Brief Review of the Minisforum V3 AMD Tablet. Update: I have created an awesome-minisforum-v3 GitHub repository to list information fo...
New
AstonJ
If you’re getting errors like this: psql: error: connection to server on socket “/tmp/.s.PGSQL.5432” failed: No such file or directory ...
New
PragmaticBookshelf
Explore the power of Ash Framework by modeling and building the domain for a real-world web application. Rebecca Le @sevenseacat and ...
New