CommunityNews

CommunityNews

I Was Scammed Out of $130,000 — And Google Helped It Happen

On June 19th, my life changed with a phone call.

Read in full here:

Most Liked

apsori

apsori

I am always skeptical of phone calls if it is an unknown number.

Eiji

Eiji

Heh, I never pick up a call from an unknown number and I tend to require scheduling a call unless there is something very important that happen suddenly. If someone is interested they could verify themselves by sending a text message from verified source about a missed phone call. :telephone_receiver:

I have different phone number for a bank accounts, for work contacts and for any other thing and finally I don’t share a phone number with other people than family and people I have signed an agreement and I’m doing it so only if there is a need for it and not by default. I’m rather avoiding all jobs that require phone number and I’m especially avoiding everyone who thinks that can talk with me any time (like if I would work for them) without scheduling a call as they are so important, because they want to give me some offer. :briefcase:

All the time I was thinking such a 0 trust methods are absolutely basic for security reasons and all people in IT should know about. However the more I hear about people the less hope I have for humanity. We really don’t need anything need to make us hurt. :sweat_smile:

Also it’s important to mention that nobody should blame the victim - I wrote about it like for me it was always an obvious thing to do so. I believe that anyone should consider avoiding damage rather than learn how to control it. Such topics are important to remind that attackers are smart. We should not underestimate them. It can happen for everyone. :thinking:

I recommend to talk with communication security expert. In said “5 min” and with 2 untouched phones on a table a good security expert may demonstrate a fake conversation with message deleting from phone. You can not only loose money, but also your family and that’s because of some messages and you had never seen. That’s really eye-opening. The internet and mobile technologies are based on army’s infrastructure and therefore are insecure by default as there a central point is always expected as a source of trust. :light_bulb:

gfqdjb

gfqdjb

Wow, that’s awful. These people are always coming up with new ways to get around security. Just last week I noticed a new trick to bypass Gmail’s spam filter. They spoofed my address and sent an email to a fake account (my_username@google.com). Since the delivery failed, I got the bounce-back notification and ended up seeing the spam message inside it.

Where Next?

Popular General Dev topics Top

First poster: iPaul
TOKYO (Kyodo) – Japan’s government plans to encourage firms to let their employees choose to work four days a week instead of five, aimin...
New
First poster: AstonJ
We engineered a wearable microphone jammer that is capable of disabling microphones in its user’s surroundings, including hidden micropho...
New
First poster: bot
MEMORANDUM FOR SENIOR PENTAGON LEADERSHIP COMMANDANT OF THE COAST GUARD COMMANDERS OF THE COMBATANT COMMANDS DEFENSE AGENCY AND DOD FIEL...
New
First poster: dimitarvp
A career ending mistake — Bitfield Consulting. As software engineers, we’re constantly making detailed, elaborate plans for computers to...
New
OvermindDL1
Yet another rust-made text editor, though I’m really liking the looks of how this one works!
New
CommunityNews
GitHub - livekit/livekit: Scalable, high-performance WebRTC SFU. SDKs in JavaScript, React, React Native, Flutter, Swift, Kotlin, Unity/C...
New
New
First poster: alvinkatojr
Over the last decade, we’ve seen great advancements in distributed systems, but the way we program them has seen few fundamental improvem...
New
First poster: AstonJ
Truly independent web browser. Contribute to LadybirdBrowser/ladybird development by creating an account on GitHub.
New
First poster: andrea
Most of what modern software engineers do involves APIs: public interfaces for communicating with a program, like this one from Twilio. I...
New

Other popular topics Top

PragmaticBookshelf
Learn from the award-winning programming series that inspired the Elixir language, and go on a step-by-step journey through the most impo...
New
AstonJ
Curious to know which languages and frameworks you’re all thinking about learning next :upside_down_face: Perhaps if there’s enough peop...
New
Rainer
My first contact with Erlang was about 2 years ago when I used RabbitMQ, which is written in Erlang, for my job. This made me curious and...
New
dimitarvp
Small essay with thoughts on macOS vs. Linux: I know @Exadra37 is just waiting around the corner to scream at me “I TOLD YOU SO!!!” but I...
New
AstonJ
In case anyone else is wondering why Ruby 3 doesn’t show when you do asdf list-all ruby :man_facepalming: do this first: asdf plugin-upd...
New
PragmaticBookshelf
Learn different ways of writing concurrent code in Elixir and increase your application's performance, without sacrificing scalability or...
New
AstonJ
If you get Can't find emacs in your PATH when trying to install Doom Emacs on your Mac you… just… need to install Emacs first! :lol: bre...
New
PragmaticBookshelf
Build efficient applications that exploit the unique benefits of a pure functional language, learning from an engineer who uses Haskell t...
New
PragmaticBookshelf
Fight complexity and reclaim the original spirit of agility by learning to simplify how you develop software. The result: a more humane a...
New
Fl4m3Ph03n1x
Background Lately I am in a quest to find a good quality TTS ai generation tool to run locally in order to create audio for some videos I...
New