Discover this podcast and so much more

Podcasts are free to enjoy without a subscription. We also offer ebooks, audiobooks, and so much more for just $11.99/month.

#ThreatDigest: How to Bait a TOAD: Avoiding and Reporting Phone Threats

#ThreatDigest: How to Bait a TOAD: Avoiding and Reporting Phone Threats

FromProtecting People


#ThreatDigest: How to Bait a TOAD: Avoiding and Reporting Phone Threats

FromProtecting People

ratings:
Length:
20 minutes
Released:
Nov 23, 2021
Format:
Podcast episode

Description

Have you ever been bitten by a TOAD? No, we're not talking about the marsh-dwelling amphibian. We're discussing telephone oriented attack deliveries (TOADs) in which scammers use real phone numbers to gain access to information and accounts.
TOADS represent an atypical — but very poisonous — online threat especially to men in the 20-50 age range. Featuring believable fake invoices and U.S.-based phone numbers, these scammers can hop off with hundreds or thousands of your dollars.
On this episode of Protecting People, hosts Selena Larson and Crista Giering chat with Tim Kromphardt, Email Threat Researcher at Proofpoint, about TOADS, how to avoid them, bait them, or report them.
Join us as we discuss:
The two kinds of TOAD threats
How investigators locate and shut down TOAD scammers
What the scambaiting community does
Where and how to report a TOAD attack  


Resources mentioned:
Caught Beneath the Landline: A 411 on Telephone Oriented Attack Delivery  


For more episodes like this one, subscribe to us on Apple Podcasts, Spotify, and the Proofpoint website, or just search for Protecting People in your favorite podcast player.
Released:
Nov 23, 2021
Format:
Podcast episode

Titles in the series (100)

Today’s cyber attacks target people, not technology. Protecting People is a podcast focused on the human side of cybersecurity. Each episode, you’ll learn how today’s threats really work, who’s being targeted by them, and what you can do to safeguard your people, data and systems.Get real-world insight and learn about the latest trends in social engineering, malware, threat protection, cloud security and more. Protecting People is cybersecurity for the rest of us.