GÉANT CSM23 - Cybercrime for Newbies - 1: How much can Granny Smith find out about you?
Summary
TLDRIn her engaging debut video, retired Philomena Smith introduces viewers to the world of cybercrime as a new hobby. With a mix of humor and insight, she illustrates how easy it is to gather personal information from social media, using an example of a seemingly innocuous university employee, John Wright. By demonstrating how to find his email addresses and personal details through online research, she reveals the vulnerabilities of everyday individuals in the digital age. Philomena's approach combines entertainment with a cautionary tale, highlighting the risks of oversharing online while enticing viewers to learn more about the subject in her upcoming videos.
Takeaways
- 😀 Philomena Smith introduces herself and her new hobby: cybercrime.
- 😀 Cybercrime can be a lucrative way to supplement retirement income.
- 😀 Many people underestimate their risk of being targeted for cybercrime.
- 😀 The first video focuses on research and information gathering for potential targets.
- 😀 Philomena suggests using social media to find personal details about targets.
- 😀 Geotagged locations can provide valuable insights into a person's habits and schedule.
- 😀 Finding specific individuals, such as professionals in higher education, can be strategic.
- 😀 Search engines can uncover professional details, including work and personal email addresses.
- 😀 Personal information shared online can aid cybercriminals in planning their actions.
- 😀 Philomena teases future videos that will reveal more about the methods of cybercrime.
Q & A
What is Philomena Smith's new hobby?
-Philomena Smith's new hobby is cybercrime, which she describes as fun and a way to complement her pension.
Why does Philomena believe many people think they could never be a target of cybercrime?
-She suggests that many people have a false sense of security regarding their online safety, believing they aren't vulnerable to attacks.
What does Philomena mean by 'clever research and gathering information'?
-She refers to the process of collecting personal information about potential victims through online sources, which can be exploited in cybercrime.
What kind of target does Philomena suggest choosing for cybercrime?
-She suggests targeting individuals who are wealthy, such as professionals in higher education.
How does Philomena begin her search for a potential victim?
-She starts her search on social media, focusing on the geotag location of a famous university to identify promising targets.
What specific information does Philomena find about John Wright?
-She discovers that he has two children, a dog, and that he travels to Italy every July, which helps her understand his schedule.
What tools does Philomena use to gather information about her target?
-She uses a search engine to find John Wright's profile, including his work email address and details from his professional network.
How does Philomena assess the amount of personal information available online?
-She notes that individuals often reveal a lot of personal details online, which aids cybercriminals in planning their attacks.
What does Philomena imply about the ease of committing cybercrime?
-She suggests that with the right information, it's relatively simple for cybercrime enthusiasts to exploit individuals.
What can viewers expect from Philomena's next video?
-She teases that her next video will explain how to utilize the gathered information for committing cybercrime.
Outlines
Cette section est réservée aux utilisateurs payants. Améliorez votre compte pour accéder à cette section.
Améliorer maintenantMindmap
Cette section est réservée aux utilisateurs payants. Améliorez votre compte pour accéder à cette section.
Améliorer maintenantKeywords
Cette section est réservée aux utilisateurs payants. Améliorez votre compte pour accéder à cette section.
Améliorer maintenantHighlights
Cette section est réservée aux utilisateurs payants. Améliorez votre compte pour accéder à cette section.
Améliorer maintenantTranscripts
Cette section est réservée aux utilisateurs payants. Améliorez votre compte pour accéder à cette section.
Améliorer maintenantVoir Plus de Vidéos Connexes
How to Stalk People Effectively and Legally Through OSINT
How to not sell your soul to the internet: a tutorial
GÉANT CSM23 - Cybercrime for Newbies - 2: Would you have recognised Granny Smith's fake message?
Keeping Kids Safe on the Internet
If You’ve Clicked on a P*RN Video… YOU’VE BEEN HACKED
Phishing Explained In 6 Minutes | What Is A Phishing Attack? | Phishing Attack | Simplilearn
5.0 / 5 (0 votes)