Very informative video:-) almost I watched all your videos but again watching whenever I think of Somme cybersecurity topics to know ! Your work is much appreciated! This is the real security awareness training!You are a great teacher❤😊
As a security engineer myself, this is SO true that the end user is the weakest link in the security chain. I was recently called by a company staff member who stated our CIO is OS and lost his password and needs it reset. Red flag to me. I called the CIO and he stated the issue is not his password but he could not access our network via the VPN from his location. I simply helped the CIO to use another VPN destination and this worked for him. The staff member who asked for the password reset was sacked last week.
9:20 I agree that fear is by far the most effective method for bad actors to coerce, or even simply convince somebody to act against their instincts or better judgment; especially when it’s ramped up with a sense of urgency, like you mentioned. The target is most vulnerable if the bad actor is able to find their biggest vulnerabilities. That with a sense of urgency combined will give attacker the highest likelihood of success. Yes, it’s cruel, but it would be naïve to think the fallout from these attacks really Waze on bad actors conscience.
This reminds me of an email I got recently on my college email. I noticed it told me I has 24 hours to reset my password or my account would be “locked” and I honestly almost believed them, but it was phrased in such a threatening way, as to inspire a sense of urgency in me, so I didnt take it seriously. I ended up copying and pasting the email into google, and found out it was some scam email
[2:30] How would the attacker know the victim wants a laptop or in the process of getting a new laptop? [4:00] Any downside of using Quad9? If no downside seems like it should be added by default
thank you very much, this has been useful. Everything makes sense, how they dig up information, save to a database, add your phone number and pass it around, then they try to use social engineering skills to dig up more information from you and steal your data or finance.
Lol im so stupid. I already knew this was a sales tactic. I should have know you were trying to give me a sense of urgency so i would make bad decisions. Thats why you kept trying to make me feel like i was running out of time. Oh this is Getting real interesting
1st scenario:How you got organisation domain name in from 2nd: how the attacker in the first place without access to computer of victim got to know their is malware on system, isn't it silly how he got scammed. I don't think this example is right.
The attacker doesn’t need to put malware on the victim’s system. They just need to convince the victim that it’s there and then to download the Trojan, which they say will fix the problem. This scenario plays out every day. I have two family members who have encountered it. Thankfully, they knew enough not to fall prey, but that’s only because they have me preaching this sort of stuff to them all the time.
@@girl4632 You would be surprised how often people are scared about being told Malware is on their system. Malware is evolving and the common end user may not even know what it looks like, they'd rather refer to someone who's more 'experienced'. And that's where the manipulation takes place.
Ha! I’m still waiting for my first payment, if that’s the case😂 But seriously, the bad guys already know this stuff. I’m just trying to level the playing field by telling it to the good guys as well
Is he writing backwards? In order for him to be writing like that and facing us while still having it be legible by the audience he would have to be writing backwards. Both the the word and the letters themselves would have to be reversed.
I have better solutions because i think from average consumers point of view, its going to be absolutely non hackable i studied machines their language and hackers braggacio ego to hack into anything
I had to look that up; I think you are referring to R. Cialdini, author of "Psychology of Persuasion". And yes, that's consistent with Jeff's point in the video about social engineering.
Interesting how you made this video. Are you standing infront of a glas screen and writing? First I thought you are writing backwards for us to be able to read. but it does not make sense. So I guess you write normal and then just flipping the video so we can read it?
Nobody is really gonna talk about how he wrote everything mirrored? That's kinda impressive ngl. :D
I was asking myself the same thing!
Or maybe he mirrored the video :/
if you take a look at his watch, you will see that it's mirrored
Just practice, I can very slowly write upside-down
yeah thats what i was gonna say
Very informative video:-) almost I watched all your videos but again watching whenever I think of Somme cybersecurity topics to know ! Your work is much appreciated! This is the real security awareness training!You are a great teacher❤😊
Thank you for watching and for the words of support!
As a security engineer myself, this is SO true that the end user is the weakest link in the security chain. I was recently called by a company staff member who stated our CIO is OS and lost his password and needs it reset. Red flag to me. I called the CIO and he stated the issue is not his password but he could not access our network via the VPN from his location. I simply helped the CIO to use another VPN destination and this worked for him. The staff member who asked for the password reset was sacked last week.
Your CIO is Operating system? What does that mean?
Great story!
Over seas.
Could you help me get my money back from a scammer, or help me get his info so I can give it to the police? He scammed me on discord using PayPal
Or just tell me where to go to figure it out myself
This Professor simply has the best CS content on You Tube! Thanks!
You are very kind to say so!
9:20 I agree that fear is by far the most effective method for bad actors to coerce, or even simply convince somebody to act against their instincts or better judgment; especially when it’s ramped up with a sense of urgency, like you mentioned. The target is most vulnerable if the bad actor is able to find their biggest vulnerabilities. That with a sense of urgency combined will give attacker the highest likelihood of success. Yes, it’s cruel, but it would be naïve to think the fallout from these attacks really Waze on bad actors conscience.
This reminds me of an email I got recently on my college email. I noticed it told me I has 24 hours to reset my password or my account would be “locked” and I honestly almost believed them, but it was phrased in such a threatening way, as to inspire a sense of urgency in me, so I didnt take it seriously. I ended up copying and pasting the email into google, and found out it was some scam email
Good for you!
I like this teacher‘s lecture very much.😊
++ good guy
Firewall for the human mind 14:02. I like that👏👏👏👏
I just wish we had one 😂
0:00 to 0:32 this is best line I heard for a while
I’m very glad you liked it!
I think I’m way too impressed with writing words from behind glass. 😂
[2:30] How would the attacker know the victim wants a laptop or in the process of getting a new laptop?
[4:00] Any downside of using Quad9? If no downside seems like it should be added by default
This guy is amazing in teaching stuff!!!
Shakil, you're very kind to say so. Thank you!
This sounds like straight out of a movie
Sometimes the movie plots aren’t even as creative as the real world
Thanks so much
The fact people fall for this is crazy to me.
thank you very much, this has been useful. Everything makes sense, how they dig up information, save to a database, add your phone number and pass it around, then they try to use social engineering skills to dig up more information from you and steal your data or finance.
I *think* the Cyberwire Podcast referenced this video, but i couldnt find the link in its show notes.
Cool! Nice to know that others are spreading the word
It's good to know about this and solutions.
Lol im so stupid. I already knew this was a sales tactic. I should have know you were trying to give me a sense of urgency so i would make bad decisions. Thats why you kept trying to make me feel like i was running out of time. Oh this is Getting real interesting
Ha! I think you’ve fallen into the rabbit hole now … 😂
Thanks for video!
This is why you dont use your phone for everything anymore smh paper trail better than electronic trail with finger printing
Great video! Thanks.
Thanks for saying so!
Thats why i don't like sending Video Interviews
I'm very engaged in this lecture when suddenly it hits me... Is he really writing backwards? Get this man a metal and a beer.
See ibm.biz/write-backwards
Are there any good forums on the Darknet or Clearweb on the subject of social engineering (dark psychology, NLP) etc.?
You don’t have to go to the dark web. There’s plenty of stuff available with a google search
I love the conclusion 😂😂😂
Awesome content
Thank you!
This happened on my mac laptop with the apple login fake site lol
Is it part of a PlayList? I searched this channel and I haven't found it.
I’ll try to post it here but it may get removed …
@@jeffcrume What about place it on the description?
1st scenario:How you got organisation domain name in from
2nd: how the attacker in the first place without access to computer of victim got to know their is malware on system, isn't it silly how he got scammed.
I don't think this example is right.
The attacker doesn’t need to put malware on the victim’s system. They just need to convince the victim that it’s there and then to download the Trojan, which they say will fix the problem. This scenario plays out every day. I have two family members who have encountered it. Thankfully, they knew enough not to fall prey, but that’s only because they have me preaching this sort of stuff to them all the time.
@@jeffcrume but isn't it silly how could anyone telling me I have malware on system and I will believe that person
@@girl4632 You would be surprised how often people are scared about being told Malware is on their system. Malware is evolving and the common end user may not even know what it looks like, they'd rather refer to someone who's more 'experienced'. And that's where the manipulation takes place.
RIGHT!😃🧠👍
How to fix that vulnerability 😂
I’m pretty sure they just learn from you, and take money under the table from someone you know.
Ha! I’m still waiting for my first payment, if that’s the case😂 But seriously, the bad guys already know this stuff. I’m just trying to level the playing field by telling it to the good guys as well
Cyber Terrorism
THEY PUT A MALWARE IN MY BRAIN
Maybe that’s just the malware making you think that … 😂
@@jeffcrume THERES MALEWARE IN MY BRAIN
Is he writing backwards? In order for him to be writing like that and facing us while still having it be legible by the audience he would have to be writing backwards. Both the the word and the letters themselves would have to be reversed.
See ibm.biz/write-backwards
@@IBMTechnology oh yeah after you pointed it out I feel stupid. Lol
this video is flipped horizontally
See ibm.biz/write-backwards
hey I can't get into my Instagram I don't remember my password can you guys help me
Are you still having problems on your account?
I have better solutions because i think from average consumers point of view, its going to be absolutely non hackable i studied machines their language and hackers braggacio ego to hack into anything
Using chaldinis tools for everything on the net huh?
I had to look that up; I think you are referring to R. Cialdini, author of "Psychology of Persuasion". And yes, that's consistent with Jeff's point in the video about social engineering.
Interesting how you made this video. Are you standing infront of a glas screen and writing? First I thought you are writing backwards for us to be able to read. but it does not make sense. So I guess you write normal and then just flipping the video so we can read it?
Yep!