Job seeker beware: Spotting sneaky scammers on job boards.
Listen now
This week we are joined by Maria Varmazis, host of the N2K daily space show, T-Minus. She shares the story on scammers posing as recruiters on LinkedIn to get you to fall for an age old phishing scam. Dave and Joe share some listener follow up, the first being from listener Alex who shared a video on scammers being forced to prove they are not robots. Listener Chloe wrote in with a question, asking about a potential scam she encountered. Joe has a story from the BBC this week regarding a love scam in the Philippines. Finally, Dave shares the story on the FCC approving a voluntary cybersecurity labeling program for wireless IoT products. Our catch of the say comes from Mark, who shares a personal story on a recruiting scam nightmare. Please take a moment to fill out an audience survey! Let us know how we are doing! Links to the stories: Heads Up, Tech Professionals: Protect Yourself From Phishing Scams Presenting as Recruiters Forcing Scammers To Prove They're Not Robots Hundreds rescued from love scam centre in the Philippines FCC adopts voluntary 'Cyber Trust Mark' labeling rule for IoT devices You can hear more from the T-Minus space daily show here. And be sure to join our live webinar: CISOs are the new Architects (of the Workforce) Join N2K’s Simone Petrella and Intuit’s Kim Jones on Wednesday, March 27th for an online discussion about the pivotal role security leaders play in shaping the security workforce landscape, and how we can start showing up for the future of our industry. Learn more and register on the event page. Have a Catch of the Day you'd like to share? Email it to us at [email protected].
More Episodes
This week, we are joined by host of 8th Layer Insights, Perry Carpenter from KnowBe4 and Dr. Jessica Barker from Cygenta to discuss human risk: awareness, behavior and beyond. Joe and Dave share some listener follow up, the first being from Richard, who writes in to share some tips and tricks...
Published 05/23/24
A device connected to a network that accepts communications from other endpoints like laptops, mobile devices, IoT equipment, routers, switches, and any tool on the security stack.
Published 05/21/24
Published 05/21/24