CommunityNews

CommunityNews

I Was Scammed Out of $130,000 — And Google Helped It Happen

On June 19th, my life changed with a phone call.

Read in full here:

Most Liked

apsori

apsori

I am always skeptical of phone calls if it is an unknown number.

Eiji

Eiji

Heh, I never pick up a call from an unknown number and I tend to require scheduling a call unless there is something very important that happen suddenly. If someone is interested they could verify themselves by sending a text message from verified source about a missed phone call. :telephone_receiver:

I have different phone number for a bank accounts, for work contacts and for any other thing and finally I don’t share a phone number with other people than family and people I have signed an agreement and I’m doing it so only if there is a need for it and not by default. I’m rather avoiding all jobs that require phone number and I’m especially avoiding everyone who thinks that can talk with me any time (like if I would work for them) without scheduling a call as they are so important, because they want to give me some offer. :briefcase:

All the time I was thinking such a 0 trust methods are absolutely basic for security reasons and all people in IT should know about. However the more I hear about people the less hope I have for humanity. We really don’t need anything need to make us hurt. :sweat_smile:

Also it’s important to mention that nobody should blame the victim - I wrote about it like for me it was always an obvious thing to do so. I believe that anyone should consider avoiding damage rather than learn how to control it. Such topics are important to remind that attackers are smart. We should not underestimate them. It can happen for everyone. :thinking:

I recommend to talk with communication security expert. In said “5 min” and with 2 untouched phones on a table a good security expert may demonstrate a fake conversation with message deleting from phone. You can not only loose money, but also your family and that’s because of some messages and you had never seen. That’s really eye-opening. The internet and mobile technologies are based on army’s infrastructure and therefore are insecure by default as there a central point is always expected as a source of trust. :light_bulb:

gfqdjb

gfqdjb

Wow, that’s awful. These people are always coming up with new ways to get around security. Just last week I noticed a new trick to bypass Gmail’s spam filter. They spoofed my address and sent an email to a fake account (my_username@google.com). Since the delivery failed, I got the bounce-back notification and ended up seeing the spam message inside it.

Where Next?

Popular General Dev topics Top

First poster: joeb
The File System Access API with Origin Private File System. WebKit supports new API that makes it possible for web apps to create, open,...
New
First poster: dimitarvp
A career ending mistake — Bitfield Consulting. As software engineers, we’re constantly making detailed, elaborate plans for computers to...
New
CommunityNews
Docker on MacOS is slow and how to fix it. Thanks to the DALL·E 2, we finally have a very nice graphic representation of the feelings of...
New
First poster: bot
GitHub - lucidrains/PaLM-rlhf-pytorch: Implementation of RLHF (Reinforcement Learning with Human Feedback) on top of the PaLM architectur...
New
First poster: bot
Raspberry Pi security alarm — the basics. In November last year — I started building a DIY security alarm system, using a Raspberry Pi a...
New
First poster: bot
Declarative GNOME configuration with NixOS. I adore tinkering with my machine, trying new tools, extensions, themes, and ideas. When I w...
New
First poster: joeb
GitHub - crablang/crab: A community fork of a language named after a plant fungus. All of the memory-safe features you love, now with 100...
New
First poster: dyowee
A Go package for building Progressive Web Apps. A package for building progressive web apps (PWA) with the Go programming language (Gola...
New
First poster: fullstackplus
Why Python is terrible… Nice language, but unsuitable for most professional purposes
New
First poster: AstonJ
Jan | Rethink the Computer. Jan turns your computer into an AI machine by running LLMs locally on your computer. It’s a privacy-focus, l...
New

Other popular topics Top

Devtalk
Reading something? Working on something? Planning something? Changing jobs even!? If you’re up for sharing, please let us know what you’...
1052 22283 402
New
New
PragmaticBookshelf
Machine learning can be intimidating, with its reliance on math and algorithms that most programmers don't encounter in their regular wor...
New
New
PragmaticBookshelf
Author Spotlight Jamis Buck @jamis This month, we have the pleasure of spotlighting author Jamis Buck, who has written Mazes for Prog...
New
PragmaticBookshelf
Author Spotlight Mike Riley @mriley This month, we turn the spotlight on Mike Riley, author of Portable Python Projects. Mike’s book ...
New
New
PragmaticBookshelf
Develop, deploy, and debug BEAM applications using BEAMOps: a new paradigm that focuses on scalability, fault tolerance, and owning each ...
New
CommunityNews
A Brief Review of the Minisforum V3 AMD Tablet. Update: I have created an awesome-minisforum-v3 GitHub repository to list information fo...
New
PragmaticBookshelf
Use advanced functional programming principles, practical Domain-Driven Design techniques, and production-ready Elixir code to build scal...
New