WEBVTT
1
00:00:00.960 --> 00:00:04.559
This program is designed to provide general information with regards
2
00:00:04.599 --> 00:00:07.559
to the subject matters covered. This information is given with
3
00:00:07.599 --> 00:00:11.960
the understanding that neither the hosts, guests, sponsors, or station
4
00:00:12.199 --> 00:00:17.399
are engaged in rendering any specific and personal medical, financial,
5
00:00:17.760 --> 00:00:22.679
legal counseling, professional service, or any advice. You should seek
6
00:00:22.719 --> 00:00:26.800
the services of confident professionals before applying or trying any
7
00:00:26.920 --> 00:00:32.719
suggested ideas. The information contained in this podcast is intended
8
00:00:32.759 --> 00:00:35.960
for informational purposes only and is not a substitute for
9
00:00:36.039 --> 00:00:40.359
individual professional legal advice. The podcast information was carefully compiled
10
00:00:40.399 --> 00:00:44.520
from vetted sources and references. However, Rose Resources outreach to
11
00:00:44.600 --> 00:00:47.560
safeguard the elderly cannot guarantee that you will not fall
12
00:00:47.679 --> 00:00:52.560
victim to a scam. Let's talk about scams. It's the
13
00:00:52.920 --> 00:00:56.520
must listen show for anyone who wants to protect themselves
14
00:00:56.600 --> 00:01:01.200
and their loved ones from scams. Every Tuesday am Pacific
15
00:01:01.280 --> 00:01:05.680
time on K four HD Radio, Joyce Petrowski, founder of Rose,
16
00:01:05.840 --> 00:01:10.680
and her guests will provide valuable insights and practical tips
17
00:01:10.719 --> 00:01:15.040
on how to recognize and protect yourself from scams. And
18
00:01:15.120 --> 00:01:18.560
now here is your host, Joyce Petrowski.
19
00:01:19.439 --> 00:01:22.439
Hi, everyone, welcome back. I'm Joyce Petrowski, founder and board
20
00:01:22.480 --> 00:01:26.359
president of Rose Resources Outreach to safeguard the elderly. You
21
00:01:26.400 --> 00:01:30.040
can find more information on our website at Roseadvocacy dot org.
22
00:01:30.400 --> 00:01:33.040
All of our social media links are listed at the top.
23
00:01:33.400 --> 00:01:35.560
You can go down in to the bottom of the
24
00:01:35.560 --> 00:01:39.640
homepage and find how to sign up for our emailed
25
00:01:39.879 --> 00:01:44.319
newsletter and also our mailed newsletter. We send the mailed
26
00:01:44.319 --> 00:01:47.519
newsletter out at the beginning of every month. The one
27
00:01:47.519 --> 00:01:50.159
for April should be going out in the next couple days,
28
00:01:50.719 --> 00:01:55.280
and the emailed one goes out or in the usually
29
00:01:55.280 --> 00:01:57.879
in this now it's been the second week of the month,
30
00:01:57.920 --> 00:01:59.200
but I'm going to try and get it back to
31
00:01:59.200 --> 00:02:02.439
be the beginning of the month here soon. But every
32
00:02:02.439 --> 00:02:05.680
Tuesday morning at nine point fifteen Arizona time, you're going
33
00:02:05.719 --> 00:02:08.960
to get a Tuesday Tip. And you might start getting
34
00:02:08.960 --> 00:02:11.240
them and say, well, I already know these, But what
35
00:02:11.360 --> 00:02:16.000
it's doing just as important as the information in the
36
00:02:16.039 --> 00:02:19.599
Tuesday tip. What it's doing is is it helping make
37
00:02:19.719 --> 00:02:25.439
your scam prevention a habit, in your healthy skepticism a habit.
38
00:02:28.039 --> 00:02:31.159
So it's just a refresher, so it helps you the
39
00:02:31.199 --> 00:02:35.000
next time you are contacted be able to not panic,
40
00:02:35.159 --> 00:02:38.080
not get into an emotional state, but just stop and think, Okay,
41
00:02:38.120 --> 00:02:40.479
this could be a scam. What do I need to
42
00:02:40.599 --> 00:02:44.319
do to determine if it is a scam or it's legitimate.
43
00:02:44.560 --> 00:02:46.599
You can also go over to the right hand side
44
00:02:46.639 --> 00:02:49.879
at the top under Schedule your Presentation. You can learn
45
00:02:49.960 --> 00:02:53.400
more about all the different presentations we have available and
46
00:02:53.639 --> 00:02:56.960
fill out a form to send it to us with
47
00:02:57.000 --> 00:03:04.120
the information on scheduling your presentation. So today we were
48
00:03:04.439 --> 00:03:10.599
originally going to talk about how to search for different
49
00:03:10.680 --> 00:03:16.199
types of softwares using AI, and our guest David, had
50
00:03:16.199 --> 00:03:19.120
an emergency so he couldn't make it, so we did
51
00:03:19.120 --> 00:03:22.120
a little pivot for today, and I'm going to talk
52
00:03:22.120 --> 00:03:26.639
about some updates to that we've had on social media
53
00:03:26.840 --> 00:03:30.680
the last probably a couple weeks, and then also some
54
00:03:31.000 --> 00:03:35.120
FBI public service announcements that they've had out this month
55
00:03:35.360 --> 00:03:40.479
on some different scams. So let me share my screen here,
56
00:03:42.800 --> 00:03:45.159
all right, So I'm going to go to Facebook first,
57
00:03:46.240 --> 00:03:49.360
And first of all, when you get on our Facebook,
58
00:03:49.400 --> 00:03:53.560
this is what it looks like, and you can see
59
00:03:53.599 --> 00:03:57.280
up here in the search for our Facebook, dot com,
60
00:03:57.319 --> 00:04:01.719
slash rows, dot resources, dot outreach. That's the page, and
61
00:04:01.759 --> 00:04:06.240
then you can come down here and see some different posts.
62
00:04:06.280 --> 00:04:08.439
We have a golf tournament coming up, so we're thinking
63
00:04:08.960 --> 00:04:11.120
all of our sponsors. But here's one that we just
64
00:04:11.159 --> 00:04:18.160
put out yesterday. It's called push bombing. And so I'm
65
00:04:18.199 --> 00:04:22.839
sure everybody's heard of multi factor authentication or two factor authentication,
66
00:04:23.079 --> 00:04:28.079
but this is where it's also called multi factor authentification fatigue.
67
00:04:28.519 --> 00:04:32.319
Where let's say you get your codes texted to you.
68
00:04:32.319 --> 00:04:35.279
You just keep getting these codes over and over and
69
00:04:35.360 --> 00:04:38.160
over again, and it starts causing a lot of frustration
70
00:04:38.720 --> 00:04:43.519
to where you just automatically go okay, and you then
71
00:04:43.639 --> 00:04:44.120
use it.
72
00:04:46.199 --> 00:04:48.240
So it'll stop texting you.
73
00:04:48.279 --> 00:04:50.800
But it's really a scammer behind it, knowing that this
74
00:04:50.920 --> 00:04:54.160
is going to frustrate you and get you to then
75
00:04:55.720 --> 00:05:01.079
give the multi factor code. They get your how does
76
00:05:01.120 --> 00:05:03.360
it work? They get your user name and password through
77
00:05:03.360 --> 00:05:08.279
different fishing techniques, breaches or hacks at companies, or maybe
78
00:05:08.319 --> 00:05:12.279
if you've reused a password and they figured that password
79
00:05:12.279 --> 00:05:14.800
out on another account. We've talked about this a lot.
80
00:05:15.199 --> 00:05:17.040
They've got a software where they're going to put that
81
00:05:17.720 --> 00:05:20.959
log in credentials in and it's just automatically going to
82
00:05:21.000 --> 00:05:25.079
scan through thousands of different accounts until it hits and
83
00:05:25.160 --> 00:05:27.759
wherever you've reused that password, it's going to hit and
84
00:05:27.800 --> 00:05:31.839
now they can have they can are closer to having
85
00:05:31.879 --> 00:05:34.920
access because if you have multi factor authentication set up,
86
00:05:35.480 --> 00:05:40.560
then authentication setup, then you're going to have to give
87
00:05:40.600 --> 00:05:42.680
them the code in order for them to be able
88
00:05:42.680 --> 00:05:45.399
to get in. And that's where this MFA fatigue comes in.
89
00:05:46.160 --> 00:05:49.800
They repeatedly send you the MFA log in requests and
90
00:05:49.839 --> 00:05:51.879
then the goal is to wear you down until you
91
00:05:51.920 --> 00:05:59.160
approve the log in, and that sometimes it comes through
92
00:05:59.199 --> 00:06:01.600
where it's just you know, you're trying to log in
93
00:06:01.639 --> 00:06:04.720
as this shoe you see and you just quickly say
94
00:06:04.800 --> 00:06:06.959
yes to get rid of it, because if you say no,
95
00:06:07.120 --> 00:06:08.839
then you're going to get another one that comes back,
96
00:06:08.879 --> 00:06:12.560
and it just keeps coming. So how to protect yourself,
97
00:06:12.680 --> 00:06:18.319
So never approve an unexpected multi factor request and always
98
00:06:18.399 --> 00:06:21.439
use strong, unique passwords for every account. The other thing
99
00:06:21.480 --> 00:06:24.360
I'm going to say, there is a lot of accounts
100
00:06:24.439 --> 00:06:28.000
now give you the option of setting up a pass key,
101
00:06:28.439 --> 00:06:31.240
which is biometric information. And we talked about this just
102
00:06:31.279 --> 00:06:35.839
a couple of weeks ago. It's a facial scam, a fingerprint,
103
00:06:36.639 --> 00:06:38.959
or it's a pin number. Now, that pin number is
104
00:06:39.000 --> 00:06:42.920
different than a multi factor code because you are telling
105
00:06:43.720 --> 00:06:47.600
whichever company you're setting up that pass key with. You're
106
00:06:47.639 --> 00:06:50.839
telling that company, this is your pin number. So it's waiting,
107
00:06:51.279 --> 00:06:53.720
just like it's waiting for you to scan your face
108
00:06:53.800 --> 00:06:56.920
to look for those pinpoints or to scan your fingerprint
109
00:06:56.959 --> 00:06:59.839
to look for those pinpoints on your fingerprint, it's waiting
110
00:06:59.839 --> 00:07:02.519
for you to put that specific code in as a
111
00:07:02.560 --> 00:07:06.240
match to allow you in. So it's an option for you.
112
00:07:06.680 --> 00:07:10.040
But if you are still using passwords, I know a
113
00:07:10.079 --> 00:07:13.040
lot of us like to reuse passwords, But before you
114
00:07:13.120 --> 00:07:17.199
want to reuse a password, just please ask yourself this question.
115
00:07:18.000 --> 00:07:20.680
If I reuse this password on this account and it's
116
00:07:20.759 --> 00:07:25.160
already on this other account, if scammers were to access
117
00:07:25.199 --> 00:07:28.600
it on one of the accounts, it now affects this account,
118
00:07:29.360 --> 00:07:36.279
what damage could be done? And then ask yourself, after
119
00:07:36.360 --> 00:07:38.439
you've figured what damage could be done?
120
00:07:38.480 --> 00:07:40.160
Am I do you want to take that risk?
121
00:07:42.040 --> 00:07:47.199
You can consider the app based authenticators over the text notifications.
122
00:07:47.240 --> 00:07:55.399
The app based authenticators are like Google Authenticator and Microsoft
123
00:07:55.600 --> 00:07:59.759
or no, what is it? Yeah? Microsoft Authenticator, and those
124
00:07:59.800 --> 00:08:05.560
are apps that you download into your into your phone.
125
00:08:05.759 --> 00:08:08.279
And I was just going to look mine up really quick.
126
00:08:12.000 --> 00:08:16.360
Mine is just just.
127
00:08:16.319 --> 00:08:17.519
Called the authenticator.
128
00:08:17.560 --> 00:08:21.959
If you go to if you go to your app store,
129
00:08:22.600 --> 00:08:25.560
you could get on and just look up the authenticator.
130
00:08:25.920 --> 00:08:31.800
But those are more secure than the text based notifications
131
00:08:31.839 --> 00:08:35.120
because the text based ones, those codes last for like
132
00:08:35.200 --> 00:08:40.919
five minutes, maybe ten minutes, but these authenticator apps, those
133
00:08:40.960 --> 00:08:45.000
codes only last for with thirty seconds, and you can
134
00:08:45.080 --> 00:08:47.279
actually see the code when you get in there, and
135
00:08:47.720 --> 00:08:50.320
there's a like a time clock counting down, so you
136
00:08:50.360 --> 00:08:52.639
can see, well, it's already on five seconds. I'm going
137
00:08:52.679 --> 00:08:54.919
to wait until it gets to zero and gives me
138
00:08:54.960 --> 00:08:56.759
a new code to give me time to.
139
00:08:56.720 --> 00:08:58.879
Put it in and get it accepted.
140
00:08:59.759 --> 00:09:02.720
And another thing it says here is to also stay
141
00:09:02.759 --> 00:09:06.159
alert for messages claiming to be it support. Those go
142
00:09:06.279 --> 00:09:09.720
around all the time. They just change their techniques. They're
143
00:09:09.720 --> 00:09:14.480
basically trying to have you give them access to your devices,
144
00:09:14.960 --> 00:09:18.039
and that can create so much damage if you consider
145
00:09:18.120 --> 00:09:20.240
what you have on your device. So that's called push
146
00:09:20.360 --> 00:09:27.919
bombing or multi factor authentication fatigue, which is very very frustrating.
147
00:09:29.039 --> 00:09:34.519
Here's another one. We put this out late last week.
148
00:09:34.679 --> 00:09:38.799
So the genealogy sites, so a lot of people are
149
00:09:38.879 --> 00:09:46.080
using them twenty three and meters I believe was part
150
00:09:46.159 --> 00:09:49.799
of a breach not too long ago, maybe sometime in
151
00:09:49.840 --> 00:09:54.080
the last year. But there's a lot of other genealogy
152
00:09:54.080 --> 00:09:57.519
and DNA platforms as well. But just think about what
153
00:09:58.080 --> 00:10:01.559
you're sharing when you set up the page. There your
154
00:10:01.600 --> 00:10:04.799
full name, including your maiden names, your birth dates, the
155
00:10:04.919 --> 00:10:09.519
locations the current location where you live, plus any past locations,
156
00:10:09.559 --> 00:10:13.240
your family relationships, a lot of history, and you might,
157
00:10:13.440 --> 00:10:16.240
you know, think, well, this feels harmless because you're trying
158
00:10:16.320 --> 00:10:23.080
to you know, figure out, you know, who your ancestry
159
00:10:23.159 --> 00:10:25.440
and stuff. And that's a great thing to do, right
160
00:10:25.559 --> 00:10:31.320
especially there's people that have been adopted and they didn't
161
00:10:31.360 --> 00:10:35.919
know who their birth parents were, or they have a
162
00:10:35.919 --> 00:10:39.200
whole other family out there and they want to be
163
00:10:39.240 --> 00:10:44.480
able to search to find that family. So it has
164
00:10:44.600 --> 00:10:47.480
a lot of really great benefits to it. You just
165
00:10:47.519 --> 00:10:52.279
have to understand that the information that you're giving, and
166
00:10:52.320 --> 00:10:55.679
then also if there was a breach into that system,
167
00:10:57.039 --> 00:10:59.759
the information that now scammers are going to have access to,
168
00:11:00.000 --> 00:11:03.759
which means you need to be even more diligent at
169
00:11:03.799 --> 00:11:07.799
protecting yourself and watching out for those phishing attempts or
170
00:11:07.840 --> 00:11:12.559
those schmishing attempts or vishing with voicemails and and all
171
00:11:12.559 --> 00:11:15.279
of that. But so scammers use that data they can
172
00:11:15.559 --> 00:11:20.039
answer security questions to access accounts. And this is a
173
00:11:20.039 --> 00:11:23.440
lot of banks, a lot of financial accounts. Have you
174
00:11:23.480 --> 00:11:26.519
set up security questions? And if you think about what
175
00:11:26.600 --> 00:11:31.399
a lot of them. What's your mother's maiden name, you know,
176
00:11:31.440 --> 00:11:35.120
what's the name of your your first pet, what's the
177
00:11:35.200 --> 00:11:40.320
name of your what's your father's middle name, what's the
178
00:11:40.399 --> 00:11:43.960
name of your oldest child, you know, what's the name
179
00:11:44.000 --> 00:11:46.879
of your favorite aunt. Right, So there's a lot of
180
00:11:46.919 --> 00:11:51.120
that genealogy information that can answer those questions. So you know,
181
00:11:51.519 --> 00:11:55.879
something to think about with those security questions is do
182
00:11:55.919 --> 00:11:57.960
you ask yourself, do I really have to give the
183
00:11:58.000 --> 00:11:58.679
truth out?
184
00:11:59.480 --> 00:12:00.759
If I love on these.
185
00:12:00.639 --> 00:12:05.039
Questions, it's my answer that I put down, whether I'm
186
00:12:05.120 --> 00:12:07.399
lying or I'm truthful, this is the answer I want
187
00:12:07.399 --> 00:12:10.080
to give. The only thing is if you're going to lie,
188
00:12:10.879 --> 00:12:15.600
then you need to record at someplace because you're not
189
00:12:15.679 --> 00:12:19.360
going to You're most likely not going to remember what
190
00:12:19.480 --> 00:12:24.399
you put in that was a lie, right, So just
191
00:12:24.600 --> 00:12:26.799
record it someplace so if you ever have to answer
192
00:12:26.840 --> 00:12:30.159
those questions, you have them available. If you use a
193
00:12:30.159 --> 00:12:34.159
password manager, you can get into that account in your vault,
194
00:12:34.159 --> 00:12:36.679
and they usually have a place for notes, and that's
195
00:12:36.720 --> 00:12:38.679
where I stick mine is down in the notes, so
196
00:12:38.720 --> 00:12:42.840
I could always look it up there. They can scammers
197
00:12:42.840 --> 00:12:46.679
can impersonate relatives, especially in emergency scams. Now they have
198
00:12:46.759 --> 00:12:52.039
their names, they know how they're related to you. They
199
00:12:52.639 --> 00:12:55.960
can also target multiple family members at once. You know,
200
00:12:56.039 --> 00:13:00.600
if there's a bunch of family members in this ancestry tool,
201
00:13:00.840 --> 00:13:04.600
then now they know how everybody's connected, and they can
202
00:13:04.799 --> 00:13:08.159
scour the Internet for information to build profiles on each
203
00:13:08.200 --> 00:13:13.879
person and make more targeted attacks towards somebody. So again
204
00:13:13.879 --> 00:13:18.159
we're not saying don't use the ancestry pages, but understanding
205
00:13:18.600 --> 00:13:21.399
how the information can be used against you. So if
206
00:13:21.440 --> 00:13:24.960
you decide to use these sites, that you make sure
207
00:13:25.039 --> 00:13:28.720
you have it locked down, that you have other areas
208
00:13:28.759 --> 00:13:31.360
of your life locked down, and just be more aware
209
00:13:31.600 --> 00:13:37.679
that you could have more targeted scam attempts, especially using
210
00:13:38.120 --> 00:13:43.600
one of your family member's names. So you keep your
211
00:13:43.600 --> 00:13:47.679
family trees private. I'm sure it's in there in the settings.
212
00:13:48.080 --> 00:13:50.919
You can set it up that only you can access it.
213
00:13:52.080 --> 00:13:56.600
Avoid sharing full birth dates and maiden names. You know,
214
00:13:56.639 --> 00:13:59.679
A lot of that depends on, especially with the maiden names,
215
00:13:59.759 --> 00:14:03.320
is to how far you want to go through this ancestry,
216
00:14:04.440 --> 00:14:09.039
limit details about living relatives, and just be mindful of
217
00:14:09.080 --> 00:14:15.399
what you upload and where you upload it. So again,
218
00:14:15.519 --> 00:14:19.080
genealogy sites can be really helpful in a lot of
219
00:14:19.080 --> 00:14:25.159
different ways, but just you know, make sure you understand
220
00:14:25.159 --> 00:14:28.600
the information that you're giving, and yes, it's going to
221
00:14:28.679 --> 00:14:31.240
affect you positively because you can find a lot of
222
00:14:31.279 --> 00:14:35.039
long lost relatives, but also understand how it can affect
223
00:14:35.039 --> 00:14:37.799
you negatively, and that way you can prepare for that.
224
00:14:39.279 --> 00:14:42.159
Last week we put out there was a data breach
225
00:14:42.600 --> 00:14:46.600
that we became aware of an identity protection company AURA
226
00:14:47.159 --> 00:14:50.159
has can They confirmed a data breach affecting nearly nine
227
00:14:50.240 --> 00:14:55.399
hundred thousand people names, email addresses, IP addresses, and customer
228
00:14:55.440 --> 00:14:58.200
service data. Now you're going to see it mentions IP
229
00:14:58.399 --> 00:15:03.039
addresses here. When I get into the FBI public service announcements,
230
00:15:03.320 --> 00:15:05.759
one of them is going to be talking specifically about
231
00:15:05.840 --> 00:15:12.720
IP addresses. So it says that no social security numbers, passwords,
232
00:15:12.799 --> 00:15:17.759
or financial data were exposed. But this other information that
233
00:15:17.919 --> 00:15:21.279
they have can be used for phishing scams. That's where
234
00:15:21.279 --> 00:15:25.720
you get the scammer sends you an email trying to
235
00:15:25.759 --> 00:15:28.440
get you to click on links, respond to the email,
236
00:15:28.639 --> 00:15:33.159
call a phone number. Social engineering attacks, that's where they're
237
00:15:33.200 --> 00:15:35.320
going to try to get you to give up information
238
00:15:35.759 --> 00:15:39.600
using your emotions against you. And we just talked about
239
00:15:39.639 --> 00:15:42.279
this on the last one targeted fraud attempts, because now