Cybersecurity

How not to become a prize catch from phishing attacks (podcast)

Every day hackers send out emails cleverly disguised, posing as legitimate institutions or individuals to lure recipients into providing sensitive data such as personally identifiable information, financial details, and passwords.

You might be thinking you are too smart to fall for this, but the truth is, these attacks are often so sophisticated they can cause even the most tech-savvy individuals to fall for them, hook, line, and sinker.

In this episode of the Brains Byte Back podcast, we explore how to identify phishing attacks, how they evolve with current affairs and trends, and what to do if you become the victim of an attack.

To do this we are joined by Dan Merino, CEO of Green Dot Security, a cybersecurity company offering services to small and mid-sized businesses.

Listen to this podcast on SpotifyAnchorApple PodcastsBreakerGoogle PodcastsStitcherOvercastListen NotesPodBean, and Radio Public.

Today, you will learn how hackers use themes based on larger events such as COVID-19 or tax season to add a legitimate edge to their phishing attacks, why 2-factor authentication is so important to protect yourself, and why the information you post online could be a goldmine for phishing attacks.

We discuss how humans are often the weakest point for a cyberattack, but can also stand to be the strongest defense when trained well.

We also explore how call centers become the target of hacks, in order to access the information of their clientele, so the attackers can pose as a member of the call center to conduct phishing attacks over the phone using this information.

Sam Brake Guia

Sam is an energetic and passionate writer/presenter, always looking for the next adventure. In August 2016 he donated all of his possessions to charity, quit his job, and left the UK. Since then he has been on the road travelling through North, Central and South America searching for new adventures and amazing stories.

Recent Posts

Brazil’s breastfeeding laws exposed a gap- a biotechnology startup just secured $5.9 million to fill it 

Since the 1980s, when the number of families in Brazil headed by women almost doubled,…

4 hours ago

DARPA ‘Generative Optogenetics (GO)’ seeks to program biology using light, could aid in ‘extended human spaceflight’

Apart from 'extended human spaceflight' for what other purposes could DARPA GO serve? perspective DARPA…

1 day ago

Competing in the post-gatekeeper era: How the DMA is rewiring platforms, security, and market access

The Digital Markets Act (DMA) has joined the General Data Protection Regulation (GDPR) as one…

4 days ago

Horasis India Meeting to Spotlight India’s Global Ascent At Singapore Summit This Month

Amid several years of shifting global dynamics, it’s become increasingly clear that we are entering…

5 days ago

AI scams targeting businesses are surging: Here are the top 3 threats your team is likely to face in 2026 (Brains Byte Back Podcast)

Imagine a company interviewing a candidate for a senior IT role. The résumé checks out,…

5 days ago

AI Won’t Scale in Advertising Until Trust Does: How to Identify AI Tools That Deliver Quality Security and Expertise

At the start of the year, data suggested that only about a third of agencies,…

5 days ago