You Will NEVER Stop Scam Textsโ€ฆ Unless

From Trace Dominguez. ( YouTube / Nebula )

Social Engineering is better than hacking. You are the weakest link. || This was supported by Ingenious (a show I hosted and helped make!) :: Watch here: https://fi.edu/youtube or https://beyond.fi.edu
๐Ÿ‘‡ S O U R C E S ๐Ÿ‘‡
Welcome to the description. I’m happy you’re here.

๐Ÿ‘ฉโ€๐Ÿ’ป๐Ÿ‘ฉโ€๐Ÿ’ป๐Ÿ‘ฉโ€๐Ÿ’ป G U E S T ๐Ÿ‘ฉโ€๐Ÿ’ป๐Ÿ‘ฉโ€๐Ÿ’ป๐Ÿ‘ฉโ€๐Ÿ’ป
Follow Rachel Tobac for more tips on #socialengineering, hacking and how to stay safe online:
๐Ÿค:: https://twitter.com/racheltobac
๐ŸŒ:: https://socialproofsecurity.com

โญโญโญ N E B U L A โญโญโญ
There’s a slightly longer version of this video on Nebula! Join our creator-owned streaming service and watch it here (you’ll get a discount if you use this link): https://nebula.tv/tracedominguez?ref=tracedominguez

๐Ÿ’–๐Ÿ’–๐Ÿ’– S U P P O R T ๐Ÿ’–๐Ÿ’–๐Ÿ’–
๐ŸŽจ Directly support on Patreon! Patrons get a few little perks and can join our little Discord.
(โ˜ž๏พŸใƒฎ๏พŸ)โ˜ž http://patreon.com/tracedominguez
*Every new patron causes a litany of excited squeals.*

๐Ÿ”„ SHARE: Shares make a HUGE difference and don’t cost anything~!
(๏พ‰โ—•ใƒฎโ—•)๏พ‰*:ยท๏พŸโœง https://youtu.be/2T51loN1f-M
Share this video on Facebook, Twitter, or with a friend who you think might like it

๐Ÿ“’๐Ÿ“’๐Ÿ“’ C H A P T E R S ๐Ÿ“’๐Ÿ“’๐Ÿ“’
0:00 Why are we getting so many spam texts?
1:55 Where do scam texts come from?
5:08 Types of Spam / Scam texts
8:36 But think of our BRAINS
10:40 Examples of Social Engineering
12:34 What can we do about these hacks / scams / spams?
14:51 How to stop spam texts?
16:14 I got a spam call WHILE RECORDING THIS VIDEO
17:19 Don’t get frustrated or scared. We can do this.
19:27 Let’s talk to my Mom
22:27 Final Thoughts

๐Ÿ“™๐Ÿ“™๐Ÿ“™ B L U R B ๐Ÿ“™๐Ÿ“™๐Ÿ“™
Why are you getting SO MANY #spamtext? How can we stop them?! I get several of these scam texts every week; sometimes multiples per day — and I’m not alone! Where are these coming from? What’s their #scam? Why do they seem to be more frequent now than ever before? I have so many questions, but we have the toolsโ€ฆ we can do this!

I put the different scam / spam messages into four buckets:
โ€ฃ Urgent Problem
โ€ฃ FOMO (Fear of Missing Out)
โ€ฃ Fake Friends / Romance
โ€ฃ Fake Business

Each type of scam involves a different emotional appeal. The scammer wants you to be caught unawares, and to surrender your critical thinking so you give them money, information, or whatever. If you get one of these messages there are different places you can report them:

1) Federal Trade Commission
phone calls, emails, computer support scams, imposter scams, fake checks, demands for you to send money (check, wire transfers, gift cards), student loan or scholarship scams, prize, grants, and sweepstakes offers
http://reportfraud.ftc.gov

2) FBI : Federal Bureau of Investigation
business email compromise, romance scams, election crimes, holiday scams, money mules, skimming, spoofing/phishing, ransomware, skimming, blanket fraud (adoption, elder, consumer, business and investment, health care), etcโ€ฆ
http://tips.fbi.gov

3) Your mobile provider
The big three :: Verizon, AT&T, T-Mobile :: let you copy/forward the message to 7726 (SPAM). Some services (like Google Fi) may only support blocking / reporting using the phone software, but it’s always worth trying to forward no matter what!

๐Ÿงฒ๐Ÿงฒ๐Ÿงฒ F O L L O W ๐Ÿงฒ๐Ÿงฒ๐Ÿงฒ
๐Ÿค:: https://twitter.com/tracedominguez
๐Ÿ“ท:: https://instagram.com/tracedominguez
โฐ:: https://tiktok.com/@mrtraced
๐Ÿ‘ต๐Ÿผ:: https://facebook.com/official.tracedominguez

๐Ÿ“•๐Ÿ“•๐Ÿ“• L E A R N M O R E ๐Ÿ“•๐Ÿ“•๐Ÿ“•
Social engineering is involved in over 90% of all cyber attacks.
https://purplesec.us/learn/why-social-engineering-works/
In fact, many hackers use social engineering before ever trying to hack a single line of code.

That romance scam / fake friend text you received earlier today? That might be from a real person, who was trafficked and is now being forced to befriend hundreds of people in order to earn their freedom.
https://www.vice.com/en/article/n7zb5d/pig-butchering-scam-cambodia-traffickingย 
Note: Responding to them won’t help you, and probably won’t help them either.

Thumb drives might be the most dangerous weak-spot in our national security, why? Because curiosity.
https://www.businessinsider.com/russia-planted-bugged-thumb-drives-to-break-into-us-govt-computers-2017-3ย 
https://www.forbes.com/sites/ygrauer/2015/10/30/usb-drive-malware-security-homeland-security-cybersecurity/?sh=63b1afa82eb8 A 2011 test run by the Department of Homeland Security showed that 60 percent of people who picked up random thumb drives or computer disks they surreptitiously dropped in government building and private contractor parking lots plugged the devices into office computers. If the thumb drive or CD case had an official logo, that figure jumped to 90 percent.

Episode written by Julian Huguet & Trace Dominguez
Produced / Edited by Trace Dominguez
Special thanks to Brock Dominguez & Shannon Morse

Music by Epidemic Sound

Love you, #nerdfam! Stay #curious!