Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated:
1
00:00:01,140 --> 00:00:08,060
Since we are talking about social engineering and specialties proofing and we saw how email can be spoofed
2
00:00:08,070 --> 00:00:11,840
phone call can be spooled estimates can be spoofed.
3
00:00:11,850 --> 00:00:23,730
Same concept actually we already explained how to prevent or how to be more careful when it comes to
4
00:00:23,730 --> 00:00:24,270
email.
5
00:00:24,270 --> 00:00:27,890
Same concept apply when it comes to phone call.
6
00:00:28,200 --> 00:00:32,190
So we saw in the previous examples that we can spoof a phone call.
7
00:00:32,190 --> 00:00:35,400
What do you think is the right action to be taken.
8
00:00:35,400 --> 00:00:37,980
You received a call from your bank.
9
00:00:38,880 --> 00:00:42,380
Assume that you know this is a call that you received.
10
00:00:42,710 --> 00:00:43,130
OK.
11
00:00:43,320 --> 00:00:50,480
So you received the call from your bank and he's asking you for verifying the information.
12
00:00:50,490 --> 00:00:52,690
What do you think the right action to be done.
13
00:00:52,710 --> 00:00:57,620
Can you trust that because the phone came from the bank that said I should call them back.
14
00:00:57,780 --> 00:01:02,120
I'm sorry I should give them as the information needed.
15
00:01:02,130 --> 00:01:04,890
We saw that is very very easy to fix the phone number.
16
00:01:04,890 --> 00:01:06,920
So what should be the right action.
17
00:01:07,530 --> 00:01:14,000
Yes same concept or same technique like the previous one which is called back technique.
18
00:01:14,000 --> 00:01:18,690
Actually this is the name of technique that is followed by some organization whenever they receive a
19
00:01:18,690 --> 00:01:24,930
call they will disconnect and call back the same number because it has the same weakness like email
20
00:01:25,770 --> 00:01:29,520
who ever used such application or such a website.
21
00:01:29,550 --> 00:01:32,350
You can only call but you cannot receive calls.
22
00:01:32,580 --> 00:01:37,710
And according to that so if you disconnect the calls that you receive and try to call them back you
23
00:01:37,710 --> 00:01:42,450
will call the right bank or the right person.
24
00:01:42,450 --> 00:01:52,990
So the callback technique is the same idea of the e-mail that you should reply back to verify if is
25
00:01:53,030 --> 00:01:54,710
read e-mail or not.
26
00:01:55,080 --> 00:01:57,830
And same concept for us and us as well.
27
00:01:58,500 --> 00:02:03,450
And you should be suspicious because as I was saying whoever called here will never ask you to call
28
00:02:03,450 --> 00:02:10,530
you back to call him back or if he's sending an EMS as he will no request to call him back.
29
00:02:10,530 --> 00:02:15,000
He will just request to do something click on the link download the file.
30
00:02:15,300 --> 00:02:23,670
So for spoofing we cannot prevent that from our cell phone but we can be more careful with these calls
31
00:02:23,670 --> 00:02:25,600
that we are receiving.
32
00:02:25,860 --> 00:02:31,710
And a few weeks back one of my friends received a call and it was from a number actually outside the
33
00:02:31,710 --> 00:02:38,940
country and whoever called him tried to spend a long time talking to him that we are a company and we're
34
00:02:38,940 --> 00:02:49,620
providing job offers with good position and so on and he was trying just to gain time until he was able
35
00:02:49,620 --> 00:02:58,990
to download and get access to his mobile and he was able to download a lot of files from his mobile.
36
00:02:59,070 --> 00:03:02,760
And later on he started blackmailing him.
37
00:03:02,760 --> 00:03:05,570
So you need to be careful.
38
00:03:05,640 --> 00:03:08,700
The device the cell phone or by phone.
39
00:03:08,700 --> 00:03:12,570
It's a weakness because we depend on it too much.
40
00:03:12,570 --> 00:03:18,210
If you left your home and didn't take your immobile was you you you you will feel that you are losing
41
00:03:18,210 --> 00:03:18,710
something.
42
00:03:18,960 --> 00:03:21,710
And some people may get back to home to get some of that.
43
00:03:21,720 --> 00:03:25,960
So any anything that you depend on it that much become a weakness.
44
00:03:26,490 --> 00:03:30,160
So spoofing call and spoofing is a mess.
45
00:03:30,180 --> 00:03:36,360
This is a trend is the next generation of spoofing e-mail.
46
00:03:36,380 --> 00:03:43,170
A lot of people are waiting of e-mail but now people depend more on this kind of spoofing.
4725
Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.