CommunityNews

CommunityNews

I Was Scammed Out of $130,000 — And Google Helped It Happen

On June 19th, my life changed with a phone call.

Read in full here:

Most Liked

apsori

apsori

I am always skeptical of phone calls if it is an unknown number.

Eiji

Eiji

Heh, I never pick up a call from an unknown number and I tend to require scheduling a call unless there is something very important that happen suddenly. If someone is interested they could verify themselves by sending a text message from verified source about a missed phone call. :telephone_receiver:

I have different phone number for a bank accounts, for work contacts and for any other thing and finally I don’t share a phone number with other people than family and people I have signed an agreement and I’m doing it so only if there is a need for it and not by default. I’m rather avoiding all jobs that require phone number and I’m especially avoiding everyone who thinks that can talk with me any time (like if I would work for them) without scheduling a call as they are so important, because they want to give me some offer. :briefcase:

All the time I was thinking such a 0 trust methods are absolutely basic for security reasons and all people in IT should know about. However the more I hear about people the less hope I have for humanity. We really don’t need anything need to make us hurt. :sweat_smile:

Also it’s important to mention that nobody should blame the victim - I wrote about it like for me it was always an obvious thing to do so. I believe that anyone should consider avoiding damage rather than learn how to control it. Such topics are important to remind that attackers are smart. We should not underestimate them. It can happen for everyone. :thinking:

I recommend to talk with communication security expert. In said “5 min” and with 2 untouched phones on a table a good security expert may demonstrate a fake conversation with message deleting from phone. You can not only loose money, but also your family and that’s because of some messages and you had never seen. That’s really eye-opening. The internet and mobile technologies are based on army’s infrastructure and therefore are insecure by default as there a central point is always expected as a source of trust. :light_bulb:

gfqdjb

gfqdjb

Wow, that’s awful. These people are always coming up with new ways to get around security. Just last week I noticed a new trick to bypass Gmail’s spam filter. They spoofed my address and sent an email to a fake account (my_username@google.com). Since the delivery failed, I got the bounce-back notification and ended up seeing the spam message inside it.

Where Next?

Popular General Dev topics Top

First poster: bot
SPWN is a programming language that compiles to Geometry Dash levels. What that means is that you can create levels by using not only the...
New
New
First poster: bot
It has some interesting features: It’s entirely wireless (the left half speaks Bluetooth to the right half, and the right half speaks B...
New
First poster: dyowee
Everyone seems to be striving for ‘clean’ code at the moment. You can’t read a blog post without the author telling you how clean their a...
New
CommunityNews
GitHub - livekit/livekit: Scalable, high-performance WebRTC SFU. SDKs in JavaScript, React, React Native, Flutter, Swift, Kotlin, Unity/C...
New
First poster: gulshan212
Why Python keeps growing, explained | The GitHub Blog. A deep dive into why more people are using Python than ever, its key use cases, a...
New
CommunityNews
Apple Patents Suggest Future AirPods Could Monitor Biosignals & Brain Activity - AppleMagazine. The US Patent & Trademark Office...
New
New
CommunityNews
GitHub - ItzCrazyKns/Perplexica: Perplexica is an AI-powered search engine. It is an Open source alternative to Perplexity AI. Perplexic...
New
First poster: AstonJ
On the benefits of learning in public. Learning in public helps me grow as an engineer and seems to benefit others too. Here’s why I sho...
New

Other popular topics Top

PragmaticBookshelf
Brace yourself for a fun challenge: build a photorealistic 3D renderer from scratch! In just a couple of weeks, build a ray tracer that r...
New
AstonJ
Curious to know which languages and frameworks you’re all thinking about learning next :upside_down_face: Perhaps if there’s enough peop...
New
AstonJ
You might be thinking we should just ask who’s not using VSCode :joy: however there are some new additions in the space that might give V...
New
AstonJ
We have a thread about the keyboards we have, but what about nice keyboards we come across that we want? If you have seen any that look n...
New
dimitarvp
Small essay with thoughts on macOS vs. Linux: I know @Exadra37 is just waiting around the corner to scream at me “I TOLD YOU SO!!!” but I...
New
rustkas
Intensively researching Erlang books and additional resources on it, I have found that the topic of using Regular Expressions is either c...
New
husaindevelop
Inside our android webview app, we are trying to paste the copied content from another app eg (notes) using navigator.clipboard.readtext ...
New
First poster: AstonJ
Jan | Rethink the Computer. Jan turns your computer into an AI machine by running LLMs locally on your computer. It’s a privacy-focus, l...
New
RobertRichards
Hair Salon Games for Girls Fun Girls Hair Saloon game is mainly developed for kids. This game allows users to select virtual avatars to ...
New
CommunityNews
Open-source implementation of the classic GTA engine now running directly in your browser. Experience the reVC technology demo on DOS.Zon...
New