Geeq Spaces – How to Avoid Social Engineering Scams – July 24, 2025

By: Geeq  on Jul 29, 2025

🔐 Why People Are the Weakest Link in Cybersecurity – and How Geeq Fixes It

💡 X Space Summary
Host: Geeq
Speaker: John P. Conley, Co-Founder of Geeq
Topic: Social engineering – why people are often the weakest link in cybersecurity and how scams are evolving.

🌐 Introduction

Modern cybersecurity is not just a battle of technologies – it’s a battle of minds. In this Geeq X Space, John P. Conley explains how social engineering exploits human psychology and why Geeq’s Layer Zero and Zero Trust architecture are essential to protect individuals and institutions in an AI-powered threat landscape.

🔎 What is Social Engineering?

Social engineering is the art of manipulating people into revealing confidential information or performing actions that compromise security.
Common Examples:

  • Phishing emails: Fake DocuSign requests, urgent Norton billing alerts, or password reset prompts.
  • Psychological tactics: Fear, urgency, or threats of consequences if victims don’t act immediately.

🚨 Common Phishing Tactics to Watch For

Emails from trusted brands with suspicious links (e.g. amazon.email.com, where the subdomain tricks you into thinking it’s Amazon).

  • Push vs Pull:
    • Push: Unsolicited requests or information (emails, calls, texts) sent to you.
    • Pull: You initiate contact with trusted sources (e.g. manually logging into your bank or tax platform).

🎯 Real-life Example

The host shared receiving a fake Portuguese tax refund email that perfectly mimicked official communication. Verification by comparing with past authentic emails and logging into the tax platform revealed it as a scam.

🤖 Advanced Social Engineering Techniques

1. QR Code Scams (Quishing)

  • Malicious QR codes can install malware even if scanned unintentionally (e.g. visible in public posters or photos).

2. Remote Access Scams

  • Fake “tech support” calls convincing victims to grant remote access, leading to complete device compromise.

3. Confidence Tricks

  • Scammers build believable social contexts to gain trust (e.g. posing as hospital staff requesting student data).

📰 Fake Ads on Legitimate Websites

Even reputable sites like NYTimes host ads from third-party networks, some of which can be malicious, leading to malware downloads or phishing sites.

💣 Ransom and Extortion Emails

Scams threatening to release fake compromising data unless victims pay in crypto. These cost scammers nothing to send and exploit fear to achieve profitable conversion rates despite low response percentages.

🎭 Deepfakes and AI-Powered Scams

AI now generates realistic fake videos and voices, making scams almost impossible to detect. Future attacks will:

  • Tailor scams to individual psychology, browsing history, and behavioural weaknesses.
  • Create hyper-personalised deception at scale.

🔐 Why Multi-Factor Authentication (MFA) Falls Short

Problems with MFA:

  • Still push-based: Users push passwords or OTPs that attackers can intercept or steal via SIM swaps and phishing.
  • Trust based on origin is weak: Because pushed information can be faked.

🔁 The Pull vs Push Security Paradigm

Pull-based (secure): You initiate contact, verifying the source (e.g. calling your bank back).
Push-based (vulnerable): You respond to unsolicited requests, risking exposure to scams.

Effective security requires two-sided pull authentication, ensuring:

  • You authenticate the institution.
  • The institution authenticates you.

🛡️ Geeq’s Solution – Mutual Authentication at Layer Zero

How Current HTTPS/TLS Works:

  • Uses SSL/TLS certificates to confirm URL ownership, not necessarily organizational authenticity.
  • Similar URLs can deceive users (e.g. bankofamerica.net vs. bankofamerica.com.pk).
  • Root certificates in browsers rely on central authorities, a systemic vulnerability.

🔷 Geeq’s Layer Zero & Zero Trust Architecture

Geeq ID Chain & Local Web of Trust:

  • Uses NFT-based credentials minted on Geeq’s blockchain.
  • Example: Vanderbilt University issues an NFT to an employee’s device containing its public key and permissions.

Authentication Flow:

  1. User authenticates institution: Device uses stored public key from NFT to initiate encrypted connection.
  2. Institution authenticates user: Retrieves user’s public key from NFT, sends data encrypted with it.

Result: Only the rightful user can decrypt, proving identity without passwords or MFA codes.

🔒 Why This is Superior

✅ Eliminates reliance on passwords, OTPs, or browser certificates.
✅ Provides cryptographic proof of identity, immutable and decentralized.
✅ Empowers Zero Trust, treating all devices and connections as untrusted until verified cryptographically.
✅ Prevents phishing, credential theft, and website spoofing.

📌 Key Takeaways

✔️ Always verify unsolicited requests independently.
✔️ Never grant remote access unless you initiated contact.
✔️ Push-based information is untrustworthy by default.
✔️ Be cautious with QR codes in public spaces.
✔️ Deepfake and AI-driven scams are making attacks more believable; vigilance is essential.
✔️ Mutual authentication > MFA alone for security in the AI era.

📝 Final Note

Scammers play a numbers game.
Even with low conversion rates, mass attacks remain profitable.
Everyone is vulnerable at some stage, especially during periods of reduced judgement, stress, or aging.

💭 Join the Conversation

Want to learn how Geeq is building the foundations of a safer internet with Layer Zero and Zero Trust security?

👉Follow us on X and join our next Space to stay ahead of evolving cybersecurity threats.