Hacking the human mind: The rise of social engineering security threat

Big Data and AI Toronto
13 Feb 202225:01

Summary

TLDRIn this session of 'Big Data in AI Toronto,' hosts discuss the alarming rise of social engineering attacks, a prevalent cybersecurity threat. They delve into the impact of the COVID-19 pandemic on cybercrime, highlighting a temporary decrease due to heightened organizational vigilance. The conversation covers various social engineering tactics, including phishing, spear phishing, and smishing, emphasizing the importance of public awareness to safeguard against such threats. The hosts also underscore the role of AI in detecting and combating these attacks, while urging individuals to be vigilant about their online activities and to educate themselves on privacy and cybersecurity.

Takeaways

  • 😀 Social engineering attacks have increased during the COVID-19 pandemic, as traditional hacking became more difficult due to heightened security measures.
  • 🔐 Social engineering is the manipulation of people to give up confidential information, such as passwords or financial details, through deceit.
  • 📧 Phishing is a common form of social engineering attack that can appear as emails from trusted sources, aiming to trick recipients into providing sensitive information.
  • 🎯 Spearfishing is a targeted form of phishing where attackers use specific information about an individual to make the attack seem more legitimate and urgent.
  • 📞 Vishing, or voice phishing, uses phone calls to deceive individuals, often impersonating authorities or institutions to extract information.
  • 📱 Smishing is the practice of sending text messages to trick recipients into revealing personal information, often using urgent or emotional appeals.
  • 💻 Mining social media involves collecting personal information from social profiles to create a false sense of familiarity and trust.
  • 🕵️‍♂️ Man-in-the-middle attacks intercept communications between two parties to steal information, often occurring on public Wi-Fi networks.
  • 💡 Awareness and education are crucial in defending against social engineering attacks, as they help individuals recognize and avoid falling for such scams.
  • 🛡️ AI can assist in detecting various forms of social engineering, including deepfake videos, phishing emails, and malware downloads, by analyzing patterns and anomalies.
  • 📚 Resources such as books and documentaries can provide valuable insights into the nature of social engineering and how to protect against it.

Q & A

  • What is the main topic of discussion in the 'Big Data in AI Toronto' session?

    -The main topic of discussion is 'Hacking the Human Mind: The Rise of Social Engineering Security Threat'.

  • Who is Mr. Jim Peggy AMSAS and what is his background?

    -Mr. Jim Peggy AMSAS is an author, writer, podcaster, and business partner of the speaker for the past five years. His work was initially in digital marketing and social media, but he has since become involved in AI and cybersecurity.

  • What was the unexpected trend in cyber attacks during the early months of 2020?

    -The unexpected trend was that cyber attacks and data breaches became less frequent during the early months of 2020, possibly due to organizations being on high alert for signs of cyber attacks.

  • What is social engineering and how does it relate to cybersecurity threats?

    -Social engineering is the art of manipulating people to give up confidential information about themselves. It is a cybersecurity threat because it targets individuals to trick them into revealing sensitive information like passwords or bank details.

  • What are some examples of social engineering attacks mentioned in the script?

    -Examples include phishing emails, spear phishing, vishing (voice phishing), smishing (SMS phishing), mining social media for information, and man-in-the-middle attacks.

  • Why did the number of security incidents in the finance sector increase by 300 percent in 2014?

    -The increase was likely due to the rise of social engineering attacks targeting employees in the financial services sector, who have access to sensitive financial data.

  • What is the average cost to companies for each social engineering attack incident?

    -The average cost to companies for each social engineering attack incident is more than $25,000.

  • Why do only a quarter of companies have ongoing training to prevent social engineering attacks?

    -The script does not provide a specific reason, but it implies that companies may not be allocating enough budget or prioritizing employee training to prevent these attacks.

  • How can AI help in detecting and preventing social engineering attacks?

    -AI can help by detecting deep fake videos, fake reviews, back doors, man-in-the-middle attacks, malware downloads, and phishing and spearphishing emails.

  • What is the importance of creating strong passwords according to the script?

    -Creating strong passwords is important to protect personal accounts from being hacked. It is recommended to avoid common passwords and to use a password manager to store complex passwords.

  • What are some of the signs that an email or message might be a social engineering attack?

    -Signs include requests for personal information, urgent action, secrecy, and approaching from a position of authority or offering something of value.

Outlines

00:00

😀 Introduction to Cybersecurity and Social Engineering

The video script begins with a warm welcome to the 'Big Data in AI Toronto' session, focusing on the prevalent issue of cybersecurity, particularly social engineering threats. The speaker introduces Mr. Jim Peggy, a business partner, author, writer, and podcaster who has transitioned from digital marketing to AI and cybersecurity. They discuss the surprising decrease in cyber attacks during the early months of the COVID-19 pandemic, attributing this to heightened organizational vigilance. The conversation shifts to social engineering, defined as the manipulation of people to reveal sensitive information, which can range from passwords to bank details. Examples of social engineering attacks are provided, such as distressing calls for help that exploit empathy to gain personal information. The paragraph concludes with an overview of the three main tactics used in social engineering: in-person, over the phone, and digitally, all of which leverage emotional triggers to deceive individuals.

05:01

📞 The Rise of Social Engineering Attacks Amid COVID-19

This paragraph delves deeper into the types of social engineering attacks, including phishing, spear phishing, vishing, smishing, and mining social media profiles. The speaker provides examples of each, such as emails pretending to be from banks or PayPal to trick individuals into revealing financial information. The paragraph highlights the increase in phone calls from fraudulent sources like the CRA during the COVID-19 pandemic, which prey on people's fears and trust. It emphasizes the importance of awareness and the role of personal connections in identifying and avoiding these scams. The discussion also touches on the impact of misinformation and privacy breaches in the digital age, referencing the speaker's podcast where these topics are frequently addressed.

10:03

📈 The Impact of Social Engineering on Financial Services

The speaker discusses the significant impact of social engineering attacks on the financial sector, noting that over a third of phishing attacks target financial services users. The paragraph reveals that security incidents in finance have surged by 300% compared to other industries, underscoring the vulnerability of financial data. It also mentions that 48% of companies suffer costs exceeding $25,000 per social engineering incident, yet only a quarter of these companies invest in ongoing training to prevent such attacks. The speaker criticizes this lack of investment in employee training as a missed opportunity to prevent financial losses. The paragraph concludes with a reference to recent Facebook scandals, highlighting the tech giant's disregard for customer privacy and security, and the importance of personal data protection.

15:05

🛡️ Strategies for Protecting Against Social Engineering Attacks

This paragraph outlines strategies for individuals to protect themselves from social engineering attacks. It emphasizes the importance of creating strong, unique passwords and avoiding the use of common or easily guessable combinations. The speaker suggests using a physical book to store passwords securely, a method that, while old-fashioned, is highly effective. The paragraph also advises viewers to be cautious of emails and text messages, to scrutinize the source for authenticity, and to be wary of urgent requests or poor spelling and grammar, which can be indicators of phishing attempts. The importance of skepticism when asked to provide personal information is stressed, along with the need to verify the legitimacy of any communication before responding.

20:06

🤖 AI's Role in Combating Social Engineering Attacks

The final paragraph discusses the role of AI in detecting and preventing social engineering attacks. AI technologies are highlighted for their ability to identify deepfake videos, fake reviews, backdoors, man-in-the-middle attacks, and malware downloads. Antivirus software that leverages AI to detect phishing and spearphishing emails is mentioned as a valuable tool in the fight against these threats. The speaker encourages investment in AI research to further enhance these protective capabilities. The paragraph concludes with a personal account from Jim, who shares his experience learning about cybersecurity and the importance of continuous learning and awareness. He emphasizes the accessibility of information through books and documentaries, urging viewers to educate themselves about the risks and to be vigilant, especially when using public Wi-Fi.

Mindmap

Keywords

💡Cybersecurity

Cybersecurity refers to the practice of protecting internet-connected systems, including hardware, software, and data, from various threats. In the video's context, cybersecurity is crucial due to the rise of social engineering attacks, which manipulate individuals into revealing sensitive information. The script mentions how organizations were on high alert for cyber attacks during the COVID-19 pandemic, highlighting the importance of cybersecurity measures.

💡Social Engineering

Social engineering is the art of manipulating individuals to divulge confidential information or perform actions that compromise their security. The video discusses this concept extensively, explaining how criminals use social engineering to trick people into giving away passwords, bank information, and other sensitive data. Examples from the script include fake emails and phone calls that appear to come from trusted sources but are designed to deceive.

💡Phishing

Phishing is a type of social engineering attack where the attacker sends seemingly legitimate emails to trick recipients into providing sensitive information or clicking on malicious links. The script describes phishing as a common method used by cybercriminals, often disguised as emails from banks or financial institutions, to exploit the trust users place in these entities.

💡Spearfishing

Spearfishing is a targeted form of phishing where the attacker collects information about the target to make the attack more personalized and convincing. The script uses the term to illustrate how attackers might use leaked information to craft emails that appear to be from a known entity, increasing the likelihood of the target falling for the scam.

💡Vishing

Vishing, a portmanteau of 'voice' and 'phishing,' refers to phone-based social engineering attacks. The script mentions vishing as a dangerous method because the personal interaction can create a sense of trust, making it easier for the victim to be manipulated into revealing sensitive information.

💡Smishing

Smishing is the practice of sending text messages to trick recipients into revealing personal information or clicking on harmful links. The script describes smishing as a widespread tactic, with examples including messages that claim to be from authorities or relatives in distress, aiming to exploit the recipient's emotions.

💡Mining

In the context of the video, mining refers to the unauthorized collection of personal information from social media profiles. Attackers use this data to craft targeted attacks, as mentioned in the script, by pretending to know the victim based on the information they have gathered.

💡Man-in-the-Middle Attack

A man-in-the-middle attack is a type of cyber attack where the attacker intercepts communication between two parties to eavesdrop, steal data, or impersonate one of the parties. The script discusses this as a risk when using public Wi-Fi networks, where attackers can potentially see everything done on a user's device.

💡Deepfakes

Deepfakes are AI-generated synthetic media in which a person's likeness is superimposed onto another's, creating fake but realistic videos or images. The script mentions AI's ability to detect deepfakes, which are a growing concern due to their potential use in social engineering and misinformation campaigns.

💡Awareness

Awareness, in the context of the video, refers to the individual's understanding and recognition of cybersecurity threats and social engineering tactics. The script emphasizes the importance of being aware of these risks and taking steps to protect oneself, such as being cautious with emails and public Wi-Fi.

💡AI in Cybersecurity

The script discusses the role of artificial intelligence in enhancing cybersecurity measures, such as detecting phishing emails, malware, and deepfakes. AI is presented as a powerful tool that can help identify and prevent social engineering attacks more effectively than human efforts alone.

Highlights

Cybersecurity has become a significant challenge due to the rise of social engineering threats.

During the early stages of the COVID-19 pandemic, cyber attacks initially decreased as organizations were on high alert.

Social engineering is identified as the art of manipulating people to give up confidential information.

Examples of social engineering include fake emails, distressed calls for help, and exploiting emotions to gain trust.

There are three main tactics used in social engineering: in-person manipulation, phone calls, and digital communication.

Phishing, spear phishing, vishing, smishing, and mining are various forms of social engineering attacks.

Phishing emails often pretend to be from financial institutions to trick recipients into providing sensitive information.

Spear phishing is a targeted form of phishing that uses leaked personal information to deceive the victim.

Vishing, or voice phishing, uses phone calls to create a sense of urgency or authority to manipulate the victim.

Smishing is the practice of sending deceptive text messages or SMS to trick recipients.

Mining on social media involves collecting personal information from profiles to impersonate the victim's acquaintances.

Man-in-the-middle attacks occur when hackers intercept communications in public Wi-Fi networks to steal information.

AI can assist in detecting deep fake videos, fake reviews, malware downloads, and phishing emails.

Awareness and education are crucial in preventing social engineering attacks, including creating strong passwords.

The importance of not using the same password across different platforms to avoid security breaches.

Being cautious of emails and text messages, especially those that request urgent action or contain spelling errors.

Scammers often request personal information, insist on secrecy, and create a sense of urgency to manipulate victims.

The impact of social engineering on the financial sector, with a significant increase in security incidents.

Only a quarter of companies are actively training their employees to prevent social engineering attacks.

The importance of being one's own guardian in protecting personal information and being cautious online.

Transcripts

play00:00

hello again and welcome to big data in

play00:03

ai toronto um so

play00:06

this session again is we were talking

play00:08

about

play00:09

um

play00:10

a cyber security issue that we're all

play00:12

facing today uh nowadays it's a big

play00:15

challenge and for that i am also talking

play00:18

today uh with mr jim peggy amsas he is

play00:21

uh an author

play00:23

uh um

play00:25

writer and also a podcaster he is also

play00:27

my business partner for like the past

play00:29

five years

play00:30

uh his work was in digital marketing and

play00:34

social media

play00:35

and since he became my partner he's got

play00:38

himself somehow involved into ai and

play00:41

cyber security so uh jim welcome

play00:44

uh this is your first time in um

play00:47

uh big data on ai toronto

play00:50

yes it is thank you for

play00:53

watching some insights on this topic

play00:56

yeah so the topic today we're talking

play00:58

about is hacking the human mind the rise

play01:01

of social engineering security threat so

play01:04

let's dive in so that's me

play01:06

and my uh jim we're a couple of handsome

play01:09

dude we're gonna talk about this topic

play01:11

today

play01:12

but now let's talk about a very

play01:14

important

play01:15

thing that started happening so

play01:18

you know that during covert everybody

play01:19

said that the the hacking or the data

play01:22

leaks are going to rise up but what

play01:24

happened in the beginning of kobe like

play01:26

let's say like the first three months uh

play01:29

in in 2020

play01:30

um the thing in is

play01:33

that the the hacks and the cyber attacks

play01:35

became less as you can see here because

play01:39

and this is what what uh you know the

play01:40

databases dropped significantly in the

play01:43

2020 quarter because according to mr

play01:45

miss eva vasquez which is the president

play01:47

and ceo of the identity

play01:48

uh of this resource center in united

play01:51

states that organization are have become

play01:53

on high alert looking for signs of cyber

play01:56

attacks so it became more complicated

play01:59

for attackers to come and physically uh

play02:02

you know to

play02:04

do that hacking or or cause the data

play02:07

leaks physically from the servers so

play02:09

they have to look into other options and

play02:12

one of those options was social

play02:14

engineering because social engineering

play02:15

is the art of manipulating people so

play02:18

they give up information or confidential

play02:19

information about themselves that type

play02:21

of information that criminals are

play02:23

seeking i can vary but when individuals

play02:25

are targeted by the criminals they're

play02:27

usually trying to trick them into giving

play02:29

them more like something like password

play02:31

bank information social insurance number

play02:33

uh computer security uh uh

play02:36

information that they can install

play02:38

malware or other stuff so they come and

play02:41

gain their trust somehow uh to give them

play02:44

very personal information that they can

play02:45

use against them and what does a social

play02:48

engineering attack looks like it could

play02:50

be it looks like an email from a friend

play02:52

or an email from another trusted source

play02:55

or distressed call for help like someone

play02:57

sends you like oh my mother is dying uh

play03:01

my father is

play03:02

lost my father last year my mother's

play03:04

dying i need some help and so you give

play03:05

them some information or your credit

play03:07

card number or something like that in

play03:10

you know in a like a

play03:12

you're trying to help but that's what

play03:14

they're gonna use against you so many

play03:17

people do not know

play03:18

that this was an actual social

play03:20

engineering exam so there are three

play03:22

types of tactics that these guys are

play03:24

used in person and this is one of the

play03:26

most dangerous because

play03:27

the personal chemistry in people can

play03:30

create a trust easily with people that

play03:32

are not trustworthy

play03:34

through phone you know somebody calls

play03:36

you and tells you i'm from the cra or

play03:38

i'm from this bank or whatever and then

play03:40

the digital which is like kind of like

play03:42

email

play03:43

or or a

play03:45

text message or something like that and

play03:47

both of those oh sorry three of those uh

play03:51

you like

play03:52

they they use they use your emotions

play03:56

to to to

play03:57

to come and

play03:59

either makes me fear something or you

play04:02

know like feel sorry for someone so that

play04:04

they could become something remember

play04:06

and that's what i wanted to talk to you

play04:07

about a little bit uh jim when we talked

play04:10

about when did kovitz started and we

play04:12

were talking too much on the phone at

play04:13

the time and it was a big bit of a rise

play04:17

of those phone calls from the cra i was

play04:19

like oh you're in a big trouble you can

play04:21

come here and you have to pay for the

play04:24

cra or you're going to be in big trouble

play04:26

or the uh the help from the government

play04:29

uh i think uh serb

play04:31

and and and that stuff

play04:33

do you remember we were talking about

play04:34

that right

play04:35

yeah actually happened to me uh a few i

play04:38

got through those calls as well and sort

play04:39

of some of my friends yes they

play04:42

definitely uh increased there was a lot

play04:43

of uh

play04:44

i got cra call a couple of years ago

play04:46

actually uh even before uh

play04:48

covet but yes they seem to have

play04:51

come back again in 2020 so

play04:54

that

play04:54

is and i can say myself and other people

play04:57

did get those calls yeah and you

play04:59

remember just calling me about one call

play05:01

that was like really like a legit call

play05:03

and you just you didn't do anything but

play05:05

you called me it's like can you tell me

play05:07

what is it about and i told you this is

play05:09

definitely a prank call remember that

play05:11

one yeah i remember remember

play05:13

yeah so i mean like

play05:16

it's i mean i probably you got lucky

play05:18

because you know someone like me but a

play05:20

lot of people do not have that someone

play05:24

so

play05:25

i believe like what we talk about is the

play05:27

awareness is very it's very important

play05:29

and what is what we talked about in our

play05:30

podcast is he remembers that one many

play05:33

times

play05:34

yeah we've talked about uh

play05:37

this misinformation and and privacy in

play05:40

the 21st century so yes we've talked

play05:42

about these topics

play05:43

yeah so uh again

play05:46

uh the touch of social engineering

play05:48

attacks come

play05:49

in in things like we call them uh

play05:51

fishing there's called spear fishing

play05:54

there's wishing smishing and mining

play05:57

social media i'm just gonna go through

play05:58

them uh and we're gonna talk about some

play06:01

examples because like phishing is like

play06:03

an email that sends you and give you

play06:05

some information about yourself and they

play06:07

ask you for for something and most of

play06:09

these as you can see from here are about

play06:11

financial services come from something

play06:13

that that pretends it's from your bank

play06:15

or from paypal or from anything that you

play06:18

use your credit card or something

play06:20

uh to purchase and they and they give

play06:22

you some information so that they give

play06:24

them more now spearfishing is also

play06:27

fishing but it's more targeted they

play06:29

they might give you they might hacked

play06:31

into some leaked information from

play06:33

somewhere and they would send you

play06:35

information that oh you have done this

play06:37

purchase on that time with with this

play06:40

last four numbers of your credit card

play06:42

and that's something that they stole

play06:44

from somewhere you know and that that

play06:47

that's like spearfishing because it's

play06:48

targeted to you and has very information

play06:50

and so you just start doubting yourself

play06:53

or giving them trust that they they

play06:55

don't deserve there's also something

play06:58

called wishing with his voice fishing

play07:00

it's like through phone calls this is

play07:02

also very

play07:04

um um you know very dangerous because if

play07:07

specifically if the the one in um on the

play07:10

other side is not a

play07:11

bot or a robot call it's a human a human

play07:15

voice might also create that trust or

play07:17

that fake trust so that you will be more

play07:21

inclined to believe them and trust them

play07:23

there's also smishing which is like

play07:25

phishing through text messages or sms

play07:28

that when they send you all of that also

play07:30

sometimes from the cra or sometimes oh

play07:32

some relative to you

play07:34

from you some of your relatives died in

play07:36

africa and they have like this million

play07:39

of millions of inheritance and we need

play07:41

some to give you some act to get some

play07:43

action from you so that you will get all

play07:45

of those money

play07:46

a lot of this happened like all the time

play07:49

but during cover it was like so big

play07:51

there's also mining social media which

play07:53

is like they go to your social profile

play07:55

they collect a lot of information that

play07:57

you don't know you were giving for free

play07:59

and they pretend they know you

play08:01

by

play08:02

by by collecting all of this social

play08:05

information about you there's also man

play08:07

in the middle attack which is like they

play08:09

hack into your computer while you're

play08:11

working on it specifically when you are

play08:13

on a public that you are in the library

play08:15

or in a coffee shop or something and

play08:17

they can see everything you do on your

play08:20

uh um what you call it on your uh

play08:23

laptop or your phone even the credit

play08:26

card numbers that you get and all of

play08:28

that

play08:29

is is it does happen all the time

play08:32

now

play08:32

you know there's also mine in the

play08:34

browser attack which is not they don't

play08:36

hack your machine but they have the

play08:37

browser but the same thing so i don't

play08:40

know you remember we also talked about

play08:43

like

play08:43

we're telling people it's it's okay to

play08:46

connect to public wi-fi it's just don't

play08:48

share

play08:49

personal information or financial

play08:51

information they're called public wi-fi

play08:53

for a reason they called public for a

play08:55

reason you know

play08:58

yeah

play08:59

yeah yeah we talked about you know

play09:02

it's something we talked this in the

play09:04

privacy many times and even in person

play09:06

and yeah it's just public for a reason

play09:09

but i but i really believe that uh you

play09:11

know they're

play09:12

people are aware of it but they're just

play09:14

bringing their guard down

play09:15

because they're just going through their

play09:17

day and i think that's important

play09:20

that we keep reminding people through

play09:22

these

play09:23

talks and all that that you have to not

play09:25

abuse that or use it too often

play09:29

yeah and and uh you remember when we

play09:31

when we saw that book that you wanted to

play09:34

surprise me but i bought it before it's

play09:36

the book that's called targeted which

play09:37

talked about this social media hack the

play09:40

big hack of social media the uh uh what

play09:43

we call it on facebook and how cambridge

play09:45

analytica used our information against

play09:48

us

play09:49

in many steps like one of them was was

play09:50

like u.s election and brexit

play09:54

yeah well i guess you're right i did i

play09:56

did eventually read it

play09:58

but at the end of the day what i'd like

play09:59

to get tell people quickly the context

play10:02

is there's a lot not great books target

play10:03

is on there there's one called weapons

play10:05

of math destruction by kathy o'neil and

play10:07

the only reason we're mentioning these

play10:09

these books

play10:10

is for you to to look into them their

play10:13

resources

play10:14

but cambridge analytica did some very

play10:17

uh

play10:19

horrendous

play10:20

greatest things and i'm not going to

play10:22

ruin it for you because i want i'd

play10:23

rather people read the book but

play10:25

i mean it was crazy

play10:27

what they did they swayed elections

play10:29

ladies and gentlemen this way opinion

play10:31

they sway people's minds

play10:34

it was like it was bad but when you read

play10:37

it and and then they met there was a

play10:39

movie movie that came out called the

play10:40

great hack

play10:42

with uh shoes in it but

play10:44

you know these are these are some of the

play10:46

material that's out there available in

play10:48

your local libraries and books so we're

play10:49

just using that as context that's all i

play10:52

just want to make sure we're clear here

play10:54

and and and just i wanted to remember to

play10:56

remind people that 620

play10:59

and 30 something thousand canadians

play11:02

were

play11:03

were in that league and that's one

play11:05

league of many leagues and we've just

play11:08

heard about uh facebook scandal a couple

play11:11

of days ago where we know that they

play11:13

actually don't give a damn about their

play11:16

customers and this is recent this is

play11:18

just last week

play11:19

yeah

play11:20

and and it was like it was like i mean

play11:23

like it was shocking but at the same

play11:24

time it was not that shocking right i

play11:26

was shocking you know i i

play11:28

i fortunately didn't see the whole thing

play11:29

but i i watched it online and it is

play11:32

shocking it is shocking to to see that

play11:34

they're aware of the problem and they're

play11:36

not doing anything about it that's what

play11:38

the shocking part is and they they have

play11:40

hired those people to do those studies

play11:43

and then when they looked at them they

play11:45

just ignored them

play11:47

right i mean this is this is again as

play11:50

you said we're too much trustee we don't

play11:53

give too much trust into those platforms

play11:56

while

play11:58

we saw what is happening but we are we

play12:01

are actually submitting to social

play12:03

engineering while we are totally

play12:07

not aware what it's doing but we're not

play12:09

we here we hear about all of those

play12:11

private subjects like oh we don't have

play12:13

any other option well what you do have

play12:15

often don't share that much online right

play12:19

and

play12:20

we look you know the only thing i like

play12:21

to add hashem i i let me for a few

play12:23

seconds is we do we've done so much more

play12:26

of this

play12:27

uh even before covet hit

play12:30

we've become a sharing society

play12:33

um you know on facebook on twitter it's

play12:36

become something

play12:37

of a complete tsunami

play12:40

of of of sharing it's gotten

play12:43

way out of control

play12:45

yeah

play12:46

so uh

play12:47

continue continuing with with

play12:50

this one

play12:51

because i wanna i wanna

play12:53

talk now in numbers

play12:55

uh the impact about of social

play12:57

engineering attacks and as you can see

play12:59

over the third of phishing attack

play13:00

targets user of financial services which

play13:03

means

play13:04

uh

play13:05

one employee will have power to see our

play13:07

financial data

play13:08

they give their information and all of

play13:11

our financial data is in the in the

play13:12

hands of hackers

play13:14

uh also there's lots of associated with

play13:16

security incidents in the finance sector

play13:18

increased by 24

play13:20

that's only

play13:22

in 2014 you can imagine what is

play13:24

happening right now financial services

play13:26

encounter security incidents 300 percent

play13:29

more frequently than other industries

play13:31

this is our money this is our credit

play13:34

cards these are things that we rely on

play13:36

those entities to protect for us because

play13:39

we cannot keep our money in a shoe box

play13:42

anymore right and and we have we still

play13:45

all have all of that and it's us through

play13:48

giving the information or some people in

play13:50

that industry so 48 of companies

play13:53

that say that social engineering attacks

play13:56

cost them more than 25 000

play14:01

per incident that is not a small number

play14:04

but only as you see here but only a

play14:06

quarter of those companies are ongoing

play14:08

training to prevent social engineering

play14:11

what would you say when you hear that

play14:13

they know that it's cost them but they

play14:14

don't you know they didn't give enough

play14:17

budget to train their employees on that

play14:19

i mean like isn't that like

play14:21

i mean like you could you could spend

play14:23

much less than that on training your

play14:24

employees and preventing all of this

play14:27

you could and this is this is why um you

play14:30

know i think it's important that you're

play14:31

giving this talk and i appreciate you

play14:32

allowing me to be part of it because at

play14:34

the end of the day what even what

play14:36

francis haugen said is that they had the

play14:39

guard rails in place and they didn't use

play14:42

them

play14:43

ladies and gentlemen and this is exactly

play14:45

what

play14:46

i'm talking about they could do but

play14:48

they're not

play14:49

because they're more concerned about

play14:50

their profit than they are about

play14:52

doing the right thing exactly and this

play14:54

is why talks like this are important

play14:56

because now it's on us

play14:58

to be aware and to know what we're doing

play15:02

what we are sharing with those entities

play15:05

so that we don't share much right i mean

play15:08

to protect ourselves it's coming to us

play15:10

to be our own guardians right yes yes

play15:14

yeah and i i believe that the books we

play15:17

talked about there there are a lot of

play15:19

documentaries there i mean that go and

play15:21

watch

play15:22

yeah there's a gold

play15:24

yeah there's a one called coded bias

play15:27

um

play15:28

uh by women and uh the one of the ladies

play15:31

that was in the doc was actually from

play15:32

the university of toronto that she did

play15:34

some work with and kathy o'neil from

play15:36

weapon to math destruction is actually

play15:38

featured in coded bias it's a fantastic

play15:41

film

play15:41

and i know we're talking about these but

play15:43

these are resources i'm going to say it

play15:45

again these are resources we're not just

play15:48

we're not promoting these please don't

play15:49

misunderstand be very clear these are

play15:51

resources for you to do to check them

play15:54

out to see for yourself what's happening

play15:56

exactly and and these are just examples

play15:59

i mean if you don't like what would be

play16:00

saying just go and

play16:02

and watch something like that yes it's

play16:04

what we know but there's a lot out there

play16:07

and these are just examples to go and

play16:09

watch i mean like

play16:11

we also heard about pegasus software

play16:13

which was spying on people and most of

play16:14

it happened because people were just

play16:16

like clicking links on whatsapp

play16:19

that were implanting something on their

play16:22

phones right remember also when you told

play16:24

me about the uh those whatsapp messages

play16:26

that you were getting and the sms which

play16:28

have those links and you say like

play16:31

from banks that you've never even have

play16:34

any account with right yeah i don't have

play16:36

an account anyways i was like

play16:39

even text i was getting texts too yeah

play16:41

text messages whatsapp i mean that that

play16:43

is that is that's going crazy and um

play16:47

you know that's again on us to be our

play16:49

own guardians uh so

play16:52

that was the impact of these attacks now

play16:54

let's talk

play16:55

about how to protect ourselves from

play16:57

these social engineering attacks and by

play17:00

the way

play17:00

it's it's not that difficult i mean we

play17:03

talked about it many times me and gemini

play17:05

create strong passwords

play17:08

can i try him on this one can i jump in

play17:10

on this one

play17:11

so i uh it's gonna be a little comedy

play17:13

corner but my i have a younger brother

play17:15

and he he has um warped me on this and i

play17:19

think hashem knows this his his

play17:20

passwords are like 15 letters long

play17:22

ladies and gentlemen

play17:24

15. you know i've i've gone to eight

play17:27

okay

play17:28

15.

play17:29

and like i told hashem this and he was

play17:31

like and what's your point you know

play17:34

but i high i highly recommend i have a

play17:36

book i have all my passwords please this

play17:39

is the one of the strongest things that

play17:40

i want i really that's why i appreciate

play17:43

hashem allow me this is one thing please

play17:46

no one two three four no

play17:49

q-w-e-r-t-y

play17:50

please use have a book a heart copy book

play17:54

and write all your passwords in there i

play17:55

know it's old school

play17:57

but this is the strongest recommendation

play18:00

we'll have another recommendation

play18:02

besides the physical book but

play18:04

but the idea here is also creating a

play18:06

strong password you know yes i really

play18:08

agree i agree i agree yeah and avoid

play18:11

common obvious password as we just said

play18:14

yes sorry you're you're strong i saw you

play18:16

i stole your thunder sorry yeah no it's

play18:18

fine and this is what this is why i

play18:20

wanted to bring you because you've been

play18:21

with me uh on this route and i remember

play18:24

we talked about passwords and i was the

play18:26

one who told you stop

play18:28

putting those passwords they could be

play18:30

hacked in a heartbeat remember

play18:33

and you know there are always here we

play18:35

can just tell you that there are a lot

play18:36

of people to remember complex uh

play18:39

passwords and create create them like a

play18:41

story method

play18:42

uh or do like acronyms or the loki music

play18:45

where you create a scene based on

play18:47

location you know

play18:49

uh like um

play18:51

i like uh

play18:53

uh what do you call it

play18:55

i scream

play18:56

from uh starbucks on bloor

play18:59

and bloor on dixie for example so these

play19:02

are like some stuff that you can easily

play19:04

remember and you can shift like uh

play19:06

capital letters small letters with with

play19:08

special characters and you can remember

play19:10

it's not it is not that complicated if

play19:13

you thought about it besides don't use

play19:15

the same password everywhere that is

play19:17

that is very important

play19:19

yes i agree

play19:20

yeah so

play19:22

these are also steps to protect yourself

play19:24

from from uh from social engineering

play19:27

it's like when you receive something an

play19:29

email or text message first of all be

play19:31

cautious see what the source is is it is

play19:34

it is it does it look like the source

play19:36

that they send it from or does it look

play19:37

suspicious spilling errors sometimes

play19:39

spilling terrorists

play19:41

is not sometimes spelling errors are not

play19:44

because they have they're stupid or

play19:45

they're doing errors no because they

play19:46

want to get away from detection of the

play19:49

ai detection so that they do those

play19:51

spilling errors so that they will avoid

play19:53

uh detection by ai now

play19:56

anything that asking for an urgent

play19:57

action might be

play19:59

suspicious

play20:00

also links we just talked about the

play20:02

links that they were sent from cra and

play20:05

all of these things through our text

play20:06

messages and all remember that

play20:08

uh check the from address so if it says

play20:11

adobe.com and you just uh have this this

play20:14

adobe logo look at this the the address

play20:17

that comes is it come from something at

play20:20

adobe.com

play20:21

or not and of course if someone asks you

play20:24

for a personal information

play20:26

you should be skeptic without thinking

play20:29

you know

play20:31

uh that's that's you know like i think

play20:33

this is like very very uh basic stuff

play20:36

right and here's the other another stuff

play20:38

to do from that what scammers and social

play20:41

engineers are doing to you they also

play20:43

they always request for something of

play20:45

value of you they also want to keep the

play20:47

matter of secret or privacy like oh you

play20:50

have someone who died from your uh

play20:52

relatives in kenya or whatever so just

play20:55

keep it secret because there's a lot of

play20:56

money in it they need to take you an

play20:58

urgent action like now and just pay us

play21:01

like 150 for the fees and then you will

play21:03

get the millions

play21:05

from your inheritance and they approach

play21:07

you from a position of authority like if

play21:09

you're an executive or a lawyer or a

play21:12

software mechanic or something like that

play21:14

so all of those are signs to look at so

play21:17

that you know that this might be a

play21:20

social engineering attack

play21:22

now um

play21:24

ai how can ai help this ai now can

play21:26

detect deep fake videos we know what

play21:28

deep fakes are it can you take fake

play21:30

reviews it can detect back doors and

play21:33

man-in-the-middle attacks it could

play21:34

detect malware downloads and email and

play21:36

attachment many of the antivirus are

play21:38

using ai for that they can detect

play21:40

phishing and spearfishing emails so ai

play21:44

can help

play21:45

way more than we can and we should also

play21:48

invest in ai researchers into into doing

play21:50

that um that was it i need you jim to

play21:54

tell us like this is how you can

play21:56

communicate with me and jim i need you

play21:57

to have like um

play21:59

we have like about

play22:01

three minutes i want you to just tell

play22:03

tell somebody about the experience

play22:05

of learning that stuff uh through the

play22:07

years

play22:08

you know well at the end of the day um

play22:11

yes you know wasn't a thing that i was

play22:14

interested in

play22:15

now the reason i was is i like to learn

play22:18

and

play22:20

you know the

play22:21

the area for that was becoming prevalent

play22:24

in the media

play22:25

and uh you know i like to you know like

play22:28

i said hashem i've known her for five

play22:30

years but

play22:31

it was on my own terms hisham never said

play22:33

oh you gotta learn no it's just my own

play22:35

terms so

play22:36

uh the one thing i'll be honest with you

play22:38

is the covers of these books are just

play22:39

insane

play22:41

like targeted as like a grenade you know

play22:44

the weapons of mass destruction you know

play22:46

is uh uh you know it's a skull you know

play22:48

it's like

play22:50

it's a it's a skull with uh you know

play22:52

crossbows

play22:53

um but at the end of the day is i think

play22:55

we have to be more aware

play22:57

of what's happening and you know there's

play22:59

great books out there there's

play23:01

documentaries there's solid information

play23:03

out there and it's only a lot to be more

play23:05

aware of myself

play23:06

and uh so that's why for me uh if you're

play23:10

loved to read there's lots of great

play23:12

books you can watch movies uh on you

play23:14

know whatever streaming service you have

play23:16

so um that's what the thing is but it's

play23:18

also to be

play23:20

conscious

play23:21

that the world is changing um you know

play23:22

i've been teaching social media for a

play23:24

long time this added another toolbox for

play23:27

me too for people to understand it

play23:28

better we talked about in our podcast we

play23:31

talked about privacy we talked about

play23:33

crypto we talked about misinformation

play23:36

these topics are still important look

play23:38

what happened with facebook ladies and

play23:39

gentlemen this is very fresh

play23:41

so

play23:42

um that is why uh i've done it and i

play23:46

continue to do it

play23:47

and i think i encourage you that to

play23:49

implore you

play23:50

that um

play23:52

this is information that's out there

play23:53

your local library your local bookstore

play23:55

go and learn more about it because your

play23:58

information at the end of the day your

play23:59

information is your information for a

play24:01

reason

play24:02

i think we have to be that and one more

play24:05

thing that i'd like to really um think

play24:06

is yes

play24:08

be careful using public wi-fi

play24:11

especially it's very important so with

play24:14

that i appreciate thank you michelle for

play24:16

having me on today and just be more

play24:18

aware and composite of when you're using

play24:22

yeah so i guess what jim is trying to

play24:23

say because he doesn't come from a

play24:24

technical background if i can do it you

play24:27

can do it right okay and

play24:30

all right that works yeah awareness is

play24:33

the key it doesn't matter what industry

play24:36

you are in this is a this is a public

play24:37

awareness i believe now everybody has to

play24:39

know it

play24:40

uh so thank you jim for being here and

play24:43

give our audience uh your own

play24:46

personal experience into this thank you

play24:49

everybody for being here you can contact

play24:51

me or jim through our twitter accounts

play24:53

or anything you can find us everywhere

play24:55

and uh

play24:57

this is this is it for this session and

play24:59

we're gonna take your questions

Rate This

5.0 / 5 (0 votes)

Ähnliche Tags
Social EngineeringCyber SecurityHuman HackingData PrivacyOnline SafetyPhishing AttacksAwarenessAI DetectionPassword SecurityCyber Threats
Benötigen Sie eine Zusammenfassung auf Englisch?