{"id":95168,"date":"2019-05-03T09:21:50","date_gmt":"2019-05-03T16:21:50","guid":{"rendered":"https:\/\/securingtomorrow.mcafee.com\/?p=95168"},"modified":"2025-08-12T23:42:09","modified_gmt":"2025-08-13T06:42:09","slug":"what-is-phishing-find-out-with-gary-davis-on-the-latest-episode-of-tech-nation","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/internet-security\/what-is-phishing-find-out-with-gary-davis-on-the-latest-episode-of-tech-nation\/","title":{"rendered":"What is Phishing? Find Out with Gary Davis on the Latest Episode of Tech Nation"},"content":{"rendered":"<p>Gary Davis is now a regular contributor on the Tech Nation podcast!\u00a0 In this episode, Gary Davis educates that phishing is more than just an innocent-looking email in your inbox and shares tips to avoid getting hooked.<\/p>\n<p><iframe loading=\"lazy\" src=\"https:\/\/podomatic.com\/embed\/html5\/episode\/9218396?autoplay=false\" width=\"504\" height=\"208\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/p>\n<h2>The Transcript<\/h2>\n<p><strong>Moira Gunn:\u00a0\u00a0 <\/strong>00:00\u00a0\u00a0 I&#8217;m Moira Gunn, you&#8217;re listening to Tech Nation.<\/p>\n<p><strong>Moira Gunn:<\/strong>\u00a0\u00a0 00:06\u00a0\u00a0 I was surprised to learn that on the internet nearly three quarters of all cyber attacks start with what&#8217;s calling a phishing email, or should we say, a fishy email. I was able to speak with regular Tech Nation contributor Gary Davis, the Chief Consumer Security Evangelist at McAfee.<\/p>\n<p><strong>Moira Gunn:<\/strong>\u00a0\u00a0 00:26\u00a0\u00a0 Now we always hear about phishing.<\/p>\n<p><strong>Gary Davis:<\/strong>\u00a0\u00a0\u00a0\u00a0 00:27\u00a0\u00a0 Yeah.<\/p>\n<p><strong>Moira Gunn<\/strong>:\u00a0\u00a0 00:28\u00a0\u00a0 It&#8217;s P-H-I-S-H-I-N-G.<\/p>\n<p><strong>Gary Davis:<\/strong>\u00a0\u00a0\u00a0\u00a0 00:31\u00a0\u00a0 Yes.<\/p>\n<p><strong>Moira Gunn:<\/strong>\u00a0\u00a0 00:32\u00a0\u00a0 Phishing.<\/p>\n<p><strong>Gary Davis:<\/strong>\u00a0\u00a0\u00a0\u00a0 00:33\u00a0\u00a0 Phishing with a \u201cp\u201d<\/p>\n<p><strong>Moira Gunn:\u00a0\u00a0 <\/strong>00:34\u00a0\u00a0 Not like \u201cgone fishing\u201d.<\/p>\n<p><strong>Gary Davis:<\/strong>\u00a0\u00a0\u00a0\u00a0 00:35\u00a0\u00a0 It&#8217;s not like gone fishing, but it&#8217;s very similar. If you think about how we fish, we put the &#8230; The concept is, let&#8217;s put a lot of lines in the water and see if we can snag a fish, right?<\/p>\n<p><strong>Moira Gunn:<\/strong>\u00a0\u00a0 00:45\u00a0\u00a0 Yeah.<\/p>\n<p><strong>Gary Davis:<\/strong>\u00a0\u00a0\u00a0\u00a0 00:45\u00a0\u00a0 So, it&#8217;s conceptually fishing, but it&#8217;s a different type of fishing.<\/p>\n<p><strong>Moira Gunn:<\/strong>\u00a0\u00a0 00:49\u00a0\u00a0 It&#8217;s phishing for you.<\/p>\n<p><strong>Gary Davis:<\/strong>\u00a0\u00a0\u00a0\u00a0 00:50\u00a0\u00a0 Yes. It&#8217;s phishing for the bad guys.<\/p>\n<p><strong>Moira Gunn:<\/strong>\u00a0\u00a0 00:52\u00a0\u00a0 71% of all cyber attacks start with a phishing email?<\/p>\n<p><strong>Gary Davis:<\/strong>\u00a0\u00a0\u00a0\u00a0 00:56\u00a0\u00a0 Yeah. Yeah. You know, phishing preys on, uh, our nature to, to act on email, right? We get an email, um, and, and quite honestly for, for your listeners, the, where phishing is usually most effective, targeting organizations in particular, is sending something to HR. HR is expecting to get resumes for candidates who are applying for jobs, right? More often than not, those include some sorta malicious payload which will allow them to get behind your firewall, then do something malicious in your company.<\/p>\n<p><strong>Gary Davis:<\/strong>\u00a0\u00a0\u00a0\u00a0 01:32\u00a0\u00a0 So, that&#8217;s one of the more popular techniques for, for accessing and trying to get inside a company, but yeah it just, phishing, 71% because, they know what works. They know that, that, that if they write it well enough and it looks like it&#8217;s from somebody you know and trust, that you&#8217;re gonna do the action they&#8217;re looking for, which is gonna la- enable them to get access to the information they&#8217;re trying to get access to.<\/p>\n<p><strong>Moira Gunn:<\/strong>\u00a0\u00a0 01:56\u00a0\u00a0 And, the initial thing they may have asked you for may not seem all that big, like, &#8220;Give us all your money,&#8221; or-<\/p>\n<p><strong>Gary Davis:<\/strong>\u00a0\u00a0\u00a0\u00a0 02:03\u00a0\u00a0 Yeah.<\/p>\n<p><strong>Moira Gunn:\u00a0\u00a0 <\/strong>02:03\u00a0\u00a0 &#8220;Give us all your passwords,&#8221; or, &#8220;Give us all your account,&#8221; or, &#8220;Just click here and we can resolve a fairly benign situation.&#8221;<\/p>\n<p><strong>Gary Davis:<\/strong>\u00a0\u00a0\u00a0\u00a0 02:11\u00a0\u00a0 Yeah.<\/p>\n<p><strong>Moira Gunn:<\/strong>\u00a0\u00a0 02:11\u00a0\u00a0 &#8220;Like we need to update the, the month and data on your credit card,&#8221; &#8217;cause that frequently happens.<\/p>\n<p><strong>Gary Davis:<\/strong>\u00a0\u00a0\u00a0\u00a0 02:17\u00a0\u00a0 Yeah, yeah.<\/p>\n<p><strong>Moira Gunn:<\/strong>\u00a0\u00a0 02:18\u00a0\u00a0 You know, that your, your, your, you get a new credit card after a few years, it&#8217;s the same everything, it&#8217;s just the month and date ab- I was like, &#8220;Oh yeah. I guess so, I guess we need to &#8230; &#8221;<\/p>\n<p><strong>Gary Davis:<\/strong>\u00a0\u00a0\u00a0\u00a0 02:26\u00a0\u00a0 Yeah.<\/p>\n<p><strong>Moira Gunn:<\/strong>\u00a0\u00a0 02:28\u00a0\u00a0 And it&#8217;s accounting, it&#8217;s accounting, from this global firm.<\/p>\n<p><strong>Gary Davis:<\/strong>\u00a0\u00a0\u00a0\u00a0 02:29\u00a0\u00a0 Yeah.<\/p>\n<p><strong>Moira Gunn:\u00a0\u00a0 <\/strong>02:31\u00a0\u00a0 You know, emailing me and saying you need to update it.<\/p>\n<p><strong>Gary Davis:<\/strong>\u00a0\u00a0\u00a0\u00a0 02:32\u00a0\u00a0 It happened to me a couple of weeks ago. I w- I was in Greece, and I was, went to the, I was staying in the Hilton there, and, you know, the, even though I&#8217;d paid using points, they said, &#8220;Well, we need a credit card for incidentals.&#8221; And they had my credit card on file. Well, typically I&#8217;m using a different credit card for, &#8217;cause it&#8217;s usually company related, and since I was using points, I was putting it on my personal card. And, and after a little while, they call me, &#8220;Hey, look your credit card&#8217;s not working.&#8221; What do you mean it&#8217;s not working?<\/p>\n<p><strong>Gary Davis:<\/strong>\u00a0\u00a0\u00a0\u00a0 02:59\u00a0\u00a0 And, come to find out after I called my bank, it, it&#8217;d been such a long time since I accessed the application. You&#8217;re right, I got a new credit card, new, uh, expiration date, and I hadn&#8217;t updated it. But you&#8217;re right, it would be very benign to get, &#8220;Oh yeah, I do use that service, um, I should go and change it.&#8221; But that&#8217;s where d- you, this is where we, we need to change our behaviors, because instead of clicking on that email and just blindly following wherever it leads me, if I was to think, &#8220;Well geez, I need to go change my, um, my, my expiration date for Hilton.&#8221; I went to my Hilton app, opened that up and changed it in there, instead of trying to follow a link.<\/p>\n<p>Moira Gunn:\u00a0\u00a0 03:37\u00a0\u00a0 So, they come at you and it&#8217;s valid, you have, what you do is you go around the other way-<\/p>\n<p><strong>Gary Davis:<\/strong>\u00a0\u00a0\u00a0\u00a0 03:43\u00a0\u00a0 Exactly.<\/p>\n<p><strong>Moira Gunn:<\/strong>\u00a0\u00a0 03:43\u00a0\u00a0 Have your own access, in the old days you&#8217;d say, &#8220;I&#8217;m gonna go and see the lady at the bank.&#8221;<\/p>\n<p><strong>Gary Davis:<\/strong>\u00a0\u00a0\u00a0\u00a0 03:46\u00a0\u00a0 (laughs)<\/p>\n<p><strong>Moira Gunn:<\/strong>\u00a0\u00a0 03:48\u00a0\u00a0 &#8220;Or the gentleman at the bank.&#8221; And now it&#8217;s like, no no, don&#8217;t go through what informs you-<\/p>\n<p><strong>Gary Davis:<\/strong>\u00a0\u00a0\u00a0\u00a0 03:53\u00a0\u00a0 Exactly.<\/p>\n<p><strong>Moira Gunn:<\/strong>\u00a0\u00a0 03:54\u00a0\u00a0 Whatever you do.<\/p>\n<p><strong>Gary Davis:<\/strong>\u00a0\u00a0\u00a0\u00a0 03:55\u00a0\u00a0 You think about it, e- every month we get a statement from our bank, right? And I get one from my bank, and, and I am 99.9% sure that that&#8217;s a good email. But I have trained myself not to click on that email. Instead I&#8217;ll go to my, I&#8217;ll login into my bank account, and I&#8217;ll look at my account there, because I just, I&#8217;ve conditioned myself not to click on links and email. Even if you think it&#8217;s from a known good source, because you just never know, that the bad guys are getting so good, it&#8217;s what&#8217;s called \u201cspoofing\u201d, where you think it&#8217;s coming from an organization but they, they&#8217;ve changed something ever so slightly that you&#8217;re going to someplace you shouldn&#8217;t be going.<\/p>\n<p><strong>Gary Davis:<\/strong>\u00a0\u00a0\u00a0\u00a0 04:33\u00a0\u00a0 So, if, if you can just teach yourself or train yourself, when you, when you get an email and you think it&#8217;s legitimate and you&#8217;re expecting it, and it&#8217;s from somebody you&#8217;d expect to get a notification from, instead of acting on the email, go directly to the source and interact that way. It&#8217;s gonna save you potentially a lot of heartache.<\/p>\n<p><strong>Moira Gunn:<\/strong>\u00a0\u00a0 04:51\u00a0\u00a0 And to make matters even worse, there&#8217;s different kinds of phishing.<\/p>\n<p><strong>Gary Davis:<\/strong>\u00a0\u00a0\u00a0\u00a0 04:54\u00a0\u00a0 Yeah.<\/p>\n<p><strong>Moira Gunn:\u00a0\u00a0 <\/strong>04:55\u00a0\u00a0 Spear phishing, whale phishing, all have-<\/p>\n<p><strong>Gary Davis:<\/strong>\u00a0\u00a0\u00a0\u00a0 04:58\u00a0\u00a0 Smishing.<\/p>\n<p><strong>Moira Gunn:<\/strong>\u00a0\u00a0 04:58\u00a0\u00a0 Shmishing.<\/p>\n<p><strong>Gary Davis:<\/strong>\u00a0\u00a0\u00a0\u00a0 04:58\u00a0\u00a0 (laughs)<\/p>\n<p><strong>Moira Gunn:\u00a0\u00a0 <\/strong>05:00\u00a0\u00a0 Oh my goodness. Okay, let&#8217;s go down through them in any order you would like.<\/p>\n<p><strong>Gary Davis:<\/strong>\u00a0\u00a0\u00a0\u00a0 05:03\u00a0\u00a0 Right. Well, well smishing is probably the most, well regular phishing is, is, is simple as sending a bunch of emails out en masse, hoping that somebody&#8217;s gonna, you know, take your bait. Um, smishing is actually when they&#8217;ll send it to your phone via an SMS or text message. So, imagine getting some sort of account information to your phone, which is not that unlikely. I, almost every place I go now-<\/p>\n<p><strong>Moira Gunn:<\/strong>\u00a0\u00a0 05:25\u00a0\u00a0 Your, your bill is due.<\/p>\n<p><strong>Gary Davis:<\/strong>\u00a0\u00a0\u00a0\u00a0 05:26\u00a0\u00a0 Yeah, yeah. You click here to pay. &#8220;Oh okay, I&#8217;m gonna click on it &#8217;cause I, I&#8217;m expecting it.&#8221; So, getting it on your phone, that&#8217;s called smishing. Uh, spear phishing is where you actually do what&#8217;s called social engineering, or you try to collect information about a particular group of people, and then use it to target that group.<\/p>\n<p><strong>Gary Davis:<\/strong>\u00a0\u00a0\u00a0\u00a0 05:44\u00a0\u00a0 You know, a good example is, a couple of years ago the, um, I think it was, uh, one of the NBA teams, they had gotten an email from the owner saying, &#8220;Oh, send me your user name and password because we got this special thing we wanna do for you.&#8221; Well, so they, &#8220;Of course, it&#8217;s from our owner, it&#8217;s got our logo on it.&#8221; And we go ahead and send my user name, password, which of course opened up the, the-<\/p>\n<p><strong>Moira Gunn:<\/strong>\u00a0\u00a0 06:06\u00a0\u00a0 (laughs)<\/p>\n<p><strong>Gary Davis:<\/strong>\u00a0\u00a0\u00a0\u00a0 06:06\u00a0\u00a0 Door, having everybody going doing whatever they want so, but they used a combination of, you know, you know, techniques that use the imagery and the tone and the social engineer- socially engineered information about the players and organization, to go do something like that.<\/p>\n<p><strong>Gary Davis:<\/strong>\u00a0\u00a0\u00a0\u00a0 06:24\u00a0\u00a0 Another, a subset of spear phishing, it&#8217;s called whale phishing, and that&#8217;s where you, you tend to focus on a high net worth individual, let&#8217;s say the CEO or some high level executive in a company using other techniques. So you, let&#8217;s say that, you know, that, that they know that the CEO is on vacation, so they, they send an email, spoof the CFO to somebody else in the organization saying, &#8220;Well the CEO told me to do this.&#8221; So all these mechanics work using high net worth individuals to go do malicious deeds.<\/p>\n<p><strong>Gary Davis:<\/strong>\u00a0\u00a0\u00a0\u00a0 06:57\u00a0\u00a0 Then there&#8217;s other types of, of phishing. There&#8217;s search engine phishing, where you would basically put up a, a, a fake search site, in order to direct people to your own search results which would in turn take you to fraudulent pages. So there, there are a variety of different techniques around phishing, all of which has the intent of trying to extract information from you, do something that you wouldn&#8217;t otherwise do, and\/or in a lot of cases they&#8217;re trying to install malware on your device of, of some type.<\/p>\n<p><strong>Moira Gunn:<\/strong>\u00a0\u00a0 07:30\u00a0\u00a0 Now, in all those cases, I guess you could say what we might call the bleeding heart phishing, that&#8217;s out there.<\/p>\n<p><strong>Gary Davis:<\/strong>\u00a0\u00a0\u00a0\u00a0 07:36\u00a0\u00a0 It, it happens more than you might know. Whenever there is a, a major event, let&#8217;s say there&#8217;s a natural disaster, a, um, you know, we saw a lot of traffic around the Boeing Max Eight, when you had those two crashes and there was a lot of pouring out to help those in need, then they would create these fake sites and to lure people and to give them money. Um, that&#8217;s another great example.<\/p>\n<p><strong>Gary Davis:<\/strong>\u00a0\u00a0\u00a0\u00a0 07:59\u00a0\u00a0 Big sporting events, the Super Bowl, the World Cup, all these big sporting events see, um, NCAA tournament, all these events, you know, po- everybody knows, or the, the bad guys know that there&#8217;s gonna be a lot of attention given to these, so they&#8217;re gonna try to leverage those in order to try to get you to do something you wouldn&#8217;t wise- you wouldn&#8217;t otherwise do.<\/p>\n<p><strong>Gary Davis:<\/strong>\u00a0\u00a0\u00a0\u00a0 08:20\u00a0\u00a0 But that&#8217;s a great point, that you almost always try to tie it to something that&#8217;s gonna be on your mind, some sort of pop culture reference, that wouldn&#8217;t, that wouldn&#8217;t, that would motivate you to go do something. And, it&#8217;s just, it&#8217;s too bad because, you know, people typically are, are engaging with these because they feel like they genuinely wanna help. And then to know that you&#8217;re taking of that, our, our good will, I just, uh, it&#8217;s just-<\/p>\n<p><strong>Moira Gunn:<\/strong>\u00a0\u00a0 08:46\u00a0\u00a0 And it&#8217;s perfect because you don&#8217;t expect anything back.<\/p>\n<p><strong>Gary Davis:<\/strong>\u00a0\u00a0\u00a0\u00a0 08:48\u00a0\u00a0 Yeah. Yeah.<\/p>\n<p><strong>Moira Gunn:\u00a0\u00a0 <\/strong>08:48\u00a0\u00a0 It&#8217;s not like I bought something, where is it? It&#8217;s like-<\/p>\n<p><strong>Gary Davis:<\/strong>\u00a0\u00a0\u00a0\u00a0 08:52\u00a0\u00a0 Exactly. Well, in some cases for example, you may have thought, &#8220;Well I&#8217;m gonna buy tickets to the game,&#8221; or the, whatever, where, when you don&#8217;t get the tickets that would be, an, a case where that wasn&#8217;t true, but you&#8217;re right. When it comes to good will, natural disasters, you know, just relief for things that have gone on in the world, you&#8217;re right, you&#8217;re not expecting anything in return except the, the, the knowledge that you did something good, and that just, it breaks my heart when I hear about things like that.<\/p>\n<p><strong>Moira Gunn:<\/strong>\u00a0\u00a0 09:16\u00a0\u00a0 You know, this result pre internet, people have been doing this for a long, long, long time.<\/p>\n<p><strong>Gary Davis:<\/strong>\u00a0\u00a0\u00a0\u00a0 09:21\u00a0\u00a0 Yeah. Yeah. Although, the internet has made it very automatic now. I guess the point is the, the barrier to entry to do this has been dramatically reduced, because it&#8217;s, it&#8217;s, it doesn&#8217;t take that much effort to dupe somebody into giving you money that, that, sh- you sh- shouldn&#8217;t otherwise be getting.<\/p>\n<p><strong>Moira Gunn:<\/strong>\u00a0\u00a0 09:40\u00a0\u00a0 And phishing per se isn&#8217;t illegal. It&#8217;s when you take money for fraudulent ends, that&#8217;s when we get into what&#8217;s legal and illegal, right?<\/p>\n<p><strong>Gary Davis:<\/strong>\u00a0\u00a0\u00a0\u00a0 09:48\u00a0\u00a0 Well, but by nature phishing it, you&#8217;re, you&#8217;re trying to access information that you shouldn&#8217;t have access to. So I think it&#8217;s, it&#8217;s, it&#8217;s probably out, call it legally gray, but right, and it&#8217;s not until you actually give your credit card to a fraudster and something bad happens that, that you-<\/p>\n<p><strong>Moira Gunn:\u00a0\u00a0 <\/strong>10:04\u00a0\u00a0 When the bad happens-<\/p>\n<p><strong>Gary Davis:<\/strong>\u00a0\u00a0\u00a0\u00a0 10:05\u00a0\u00a0 Yeah.<\/p>\n<p><strong>Moira Gunn:\u00a0\u00a0 <\/strong>10:06\u00a0\u00a0 They&#8217;ve crossed the line.<\/p>\n<p><strong>Gary Davis:<\/strong>\u00a0\u00a0\u00a0\u00a0 10:07\u00a0\u00a0 Yeah. Then they&#8217;ll act on it. I, I remember when my identity was stolen way back in the day, um, I remember the, the, the guy who did it lived up in Pennsylvania someplace. And the way it worked back then is, they would, they got a $20,000 credit card, ringing up $18,000 over the course of two days-<\/p>\n<p><strong>Moira Gunn:<\/strong>\u00a0\u00a0 10:26\u00a0\u00a0 Wow.<\/p>\n<p><strong>Gary Davis:<\/strong>\u00a0\u00a0\u00a0\u00a0 10:26\u00a0\u00a0 And then the bank decided, &#8220;Well, we should go check to make sure that this guy is legit.&#8221; And, and what they&#8217;d used to do, is they would go to electronic goods stores like Best Buy, and they would buy $18,000 worth of electronic goods, then take it to a different Best Buy for cash back. So that&#8217;s how they would cash out the, the value of the credit card, knowing that it had a limited life.<\/p>\n<p><strong>Gary Davis:<\/strong>\u00a0\u00a0\u00a0\u00a0 10:45\u00a0\u00a0 And, I remember I, I got a call once, it was from the, the police department in Pennsylvania saying, &#8220;We caught the guy, you know, trying to return your goods.&#8221; Or, &#8220;The goods he bought with your credit card at a Best Buy.&#8221;<\/p>\n<p><strong>Moira Gunn:\u00a0\u00a0 <\/strong>10:58\u00a0\u00a0 (laughs)<\/p>\n<p><strong>Gary Davis:<\/strong>\u00a0\u00a0\u00a0\u00a0 10:58\u00a0\u00a0 And, and, they, and I said, you know, to go, go get the guy. It&#8217;s not, it&#8217;s just too much work. So, there, there, it&#8217;s really hard to motivate law enforcement, &#8217;cause they got other things they gotta focus on. They&#8217;ve got, you know, all these other, y- you know, bad criminals doing, you know, physical harm to, to whomever. That, that they\u2026<\/p>\n<p><strong>Moira Gunn:<\/strong>\u00a0\u00a0 11:16\u00a0\u00a0 And, and much higher ticket items too.<\/p>\n<p><strong>Gary Davis:\u00a0\u00a0\u00a0\u00a0 <\/strong>11:18\u00a0\u00a0 Yeah.<\/p>\n<p><strong>Moira Gunn:\u00a0\u00a0 <\/strong>11:19\u00a0\u00a0 You know, when they were looking at it, they might have only been looking at five or $600.<\/p>\n<p><strong>Gary Davis:<\/strong>\u00a0\u00a0\u00a0\u00a0 11:22\u00a0\u00a0 Yeah.<\/p>\n<p><strong>Moira Gunn:\u00a0\u00a0 <\/strong>11:22\u00a0\u00a0 Because they had to go to a lot of Best Buy&#8217;s, buy a lot of stuff-<\/p>\n<p><strong>Gary Davis:<\/strong>\u00a0\u00a0\u00a0\u00a0 11:26\u00a0\u00a0 Yeah.<\/p>\n<p><strong>Moira Gunn:<\/strong>\u00a0\u00a0 11:26\u00a0\u00a0 Return a lot of stuff, going back and forth, it all is pretty small-<\/p>\n<p><strong>Gary Davis:<\/strong>\u00a0\u00a0\u00a0\u00a0 11:30\u00a0\u00a0 Yeah. Exactly.<\/p>\n<p><strong>Moira Gunn:<\/strong>\u00a0\u00a0 11:30\u00a0\u00a0 In comparison.<\/p>\n<p><strong>Gary Davis:<\/strong>\u00a0\u00a0\u00a0\u00a0 11:31\u00a0\u00a0 Yeah. It&#8217;s, &#8217;cause it, the, the identity thief knew not to try to in- to, to return all to one Best Buy, &#8217;cause then that would be a, even a bigger red flag. But you&#8217;re right, if I&#8217;m a, if I&#8217;m loca- local law enforcement, &#8220;Eh, it&#8217;s just a couple hundred dollars, well I got, you know, drug dealers I gotta go break up, and bad, other bad things. So I&#8217;m gonna go focus on that, and really not focus,&#8221; so it&#8217;s just, it but, you, that doesn&#8217;t make you feel like you&#8217;re less of a victim.<\/p>\n<p><strong>Gary Davis:<\/strong>\u00a0\u00a0\u00a0\u00a0 11:55\u00a0\u00a0 Nobody wants to be a victim of scam or identity theft. Nobody ever wants to be a victim. We, we, we empathize with victims, &#8217;cause we can put ourselves in their shoes, and it, and that&#8217;s unfortunately one of the challenges in our space is, I think a lot of the reasons why people aren&#8217;t better about things like password hygiene and, you know, checking their credit history and stuff like that, is because, well they don&#8217;t think it&#8217;s gonna happen to them, they think it&#8217;s gonna happen to somebody else. And because of that, that can be a little bit more relaxing in what I do.<\/p>\n<p><strong>Moira Gunn:\u00a0\u00a0 <\/strong>12:24\u00a0\u00a0 And it&#8217;s not just, uh, your hygiene, you may not be able to prevent it. I was, I stopped off an interstate and bought a couple of things, uh, ah, and gassed up at a little place, but it wasn&#8217;t the, one of the really big ones. Just happened to go in there, it was convenient there.<\/p>\n<p><strong>Gary Davis:\u00a0\u00a0\u00a0\u00a0 <\/strong>12:41\u00a0\u00a0 Yeah.<\/p>\n<p><strong>Moira Gunn:\u00a0\u00a0 <\/strong>12:41\u00a0\u00a0 And we were kind of in the middle of nowhere. And, for some reason, it didn&#8217;t take, put this, put this in again. So I put it in again. So, I thought, &#8220;Oh they&#8217;re probably gonna double charge me.&#8221;<\/p>\n<p><strong>Gary Davis:<\/strong>\u00a0\u00a0\u00a0\u00a0 12:51\u00a0\u00a0 Yeah.<\/p>\n<p><strong>Moira Gunn<\/strong>:\u00a0\u00a0 12:52\u00a0\u00a0 They didn&#8217;t double charge me, they took the card and then here I was in Northern California, and within just a few hours, someone in a, in another gas station in San Antonio, Texas, bought $115 worth of towels, shop towels, (laughs) just-<\/p>\n<p><strong>Gary Davis:<\/strong>\u00a0\u00a0\u00a0\u00a0 13:13\u00a0\u00a0 (laughs)<\/p>\n<p><strong>Moira Gunn:<\/strong>\u00a0\u00a0 13:13\u00a0\u00a0 Windshield wiper stuff, I mean there was just like, \u201cdoo doo doo doo doo\u2026 [counting up]<\/p>\n<p><strong>Gary Davis:<\/strong>\u00a0\u00a0\u00a0\u00a0 13:15\u00a0\u00a0 Yeah.<\/p>\n<p><strong>Moira Gunn:<\/strong>\u00a0\u00a0 13:16\u00a0\u00a0 So, $115 worth of that. I don&#8217;t know how I could have stopped that.<\/p>\n<p><strong>Gary Davis:<\/strong>\u00a0\u00a0\u00a0\u00a0 13:21\u00a0\u00a0 Uh, you, you can&#8217;t. That&#8217;s just it. That they&#8217;re, part of this is, y- y- we, we can do all we can do to not be a victim online, but I think a big part of the, the educational process is knowing what to do. You know, in that case, knowing to reach out to our credit card immediately and, and stopping any other transactions and, and going through the process. You&#8217;re right. There are things like that, that was probably a skimmer, that probably when they scanned it twice, they probably scanned it once for the gas that you actually bought, and there where, you know, you didn&#8217;t see it probably going through a different, um, reader.<\/p>\n<p><strong>Moira Gunn:<\/strong>\u00a0\u00a0 13:49\u00a0\u00a0 And I actually put it in myself.<\/p>\n<p><strong>Gary Davis:<\/strong>\u00a0\u00a0\u00a0\u00a0 13:50\u00a0\u00a0 Oh really? Okay.<\/p>\n<p><strong>Moira Gunn:<\/strong>\u00a0\u00a0 13:52\u00a0\u00a0 Put it in, take it out, put it in, take it out.<\/p>\n<p><strong>Gary Davis:<\/strong>\u00a0\u00a0\u00a0\u00a0 13:53\u00a0\u00a0 Hmm.<\/p>\n<p><strong>Moira Gunn:\u00a0\u00a0 <\/strong>13:53\u00a0\u00a0 Yeah.<\/p>\n<p><strong>Gary Davis:<\/strong>\u00a0\u00a0\u00a0\u00a0 13:56\u00a0\u00a0 You&#8217;re right.<\/p>\n<p><strong>Moira Gunn:<\/strong>\u00a0\u00a0 13:58\u00a0\u00a0 They&#8217;re always one step ahead.<\/p>\n<p><strong>Gary Davis:<\/strong>\u00a0\u00a0\u00a0\u00a0 13:59\u00a0\u00a0 Well, the, you know, it, it&#8217;s, they&#8217;re in it to make money, right? It&#8217;s a for profit business for lack of a better word. So, they&#8217;re always gonna be trying to figure out more effective ways to dupe people into, to, either dupe people or just take advantage of people without their knowledge, and, and do it for as long as they can.<\/p>\n<p><strong>Gary Davis:<\/strong>\u00a0\u00a0\u00a0\u00a0 14:15\u00a0\u00a0 Imagine if you didn&#8217;t quickly catch the fact that you were getting charged for stuff in San Antonio, and it went on for a week or so.<\/p>\n<p><strong>Moira Gunn:<\/strong>\u00a0\u00a0 14:21\u00a0\u00a0 Yeah.<\/p>\n<p><strong>Gary Davis:<\/strong>\u00a0\u00a0\u00a0\u00a0 14:21\u00a0\u00a0 They would just keep on charging, charging, charging, until, you know, either-<\/p>\n<p><strong>Moira Gunn:<\/strong>\u00a0\u00a0 14:25\u00a0\u00a0 It said no. (laughs)<\/p>\n<p><strong>Gary Davis:<\/strong>\u00a0\u00a0\u00a0\u00a0 14:26\u00a0\u00a0 Yeah. Well, or, or hopefully your bank would it, would realize, &#8220;Well hold on, you just used your card in Northern California,&#8221; which you would expect, and now that same card is being used to buy something in San Antonio, that, that would, you would think that your, your bank will-<\/p>\n<p><strong>Moira Gunn:<\/strong>\u00a0\u00a0 14:39\u00a0\u00a0 She travels fast.<\/p>\n<p><strong>Gary Davis:<\/strong>\u00a0\u00a0\u00a0\u00a0 14:42\u00a0\u00a0 (laughs)<\/p>\n<p><strong>Gary Davis:<\/strong>\u00a0\u00a0\u00a0\u00a0 14:42\u00a0\u00a0 Oh yeah.<\/p>\n<p><strong>Moira Gunn:<\/strong>\u00a0\u00a0 14:43\u00a0\u00a0 But not that fast.<\/p>\n<p><strong>Gary Davis:<\/strong>\u00a0\u00a0\u00a0\u00a0 14:43\u00a0\u00a0 That&#8217;s, that&#8217;s-<\/p>\n<p><strong>Moira Gunn:<\/strong>\u00a0\u00a0 14:43\u00a0\u00a0 There you go.<\/p>\n<p><strong>Gary Davis:<\/strong>\u00a0\u00a0\u00a0\u00a0 14:43\u00a0\u00a0 The hypersonic speed for sure.<\/p>\n<p><strong>Moira Gunn:\u00a0\u00a0 <\/strong>14:45\u00a0\u00a0 Hypersonic. Gary, always a pleasure. Please come back. See you soon.<\/p>\n<p><strong>Gary Davis:<\/strong>\u00a0\u00a0\u00a0\u00a0 14:49\u00a0\u00a0 I&#8217;ll do that. Thanks for having me.<\/p>\n<p><strong>Moira Gunn:<\/strong>\u00a0\u00a0 14:50\u00a0\u00a0 Tech Nation regular contributor Gary Davis is the Chief Consumer Security Evangelist at McAfee, the website where you can check if your email plus password has been compromised is, have I, that&#8217;s the letter I, beenpwned.com. With pawned spelled without an A. That&#8217;s P-W-N-E-D. So, it&#8217;s haveibeenpwned.com, with pawned spelled P-W-N-E-D. And that link will be on the Tech Nation website also.<\/p>\n<p><strong>Moira Gunn:<\/strong>\u00a0\u00a0 15:26\u00a0\u00a0 Of course when Gary said it during our conversation, he said, &#8220;haveibeenpwned.com.&#8221; And yes that&#8217;s true. Gary is from Texas, and that&#8217;s part of his charm.<\/p>\n<p><strong>Moira Gunn:<\/strong>\u00a0\u00a0 15:39\u00a0\u00a0 For Tech Nation, I&#8217;m Moira Gunn.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Gary Davis is now a regular contributor on the Tech Nation podcast!\u00a0 In this episode, Gary Davis educates that phishing&#8230;<\/p>\n","protected":false},"author":674,"featured_media":95169,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[10661,13],"tags":[],"coauthors":[3973],"class_list":["post-95168","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-internet-security","category-privacy-identity-protection"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>What is Phishing? Find Out with Gary Davis on the Latest Episode of Tech Nation | McAfee Blog<\/title>\n<meta name=\"description\" content=\"Gary Davis is now a regular contributor on the Tech Nation podcast!\u00a0 In this episode, Gary Davis educates that phishing is more than just an\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What is Phishing? Find Out with Gary Davis on the Latest Episode of Tech Nation | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"Gary Davis is now a regular contributor on the Tech Nation podcast!\u00a0 In this episode, Gary Davis educates that phishing is more than just an\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/internet-security\/what-is-phishing-find-out-with-gary-davis-on-the-latest-episode-of-tech-nation\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2019-05-03T16:21:50+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-13T06:42:09+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/05\/McAfee_consumer_1female_headphone_subway_station_72dpi.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1382\" \/>\n\t<meta property=\"og:image:height\" content=\"922\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"McAfee\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"McAfee\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"17 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/what-is-phishing-find-out-with-gary-davis-on-the-latest-episode-of-tech-nation\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/what-is-phishing-find-out-with-gary-davis-on-the-latest-episode-of-tech-nation\/\"},\"author\":{\"name\":\"McAfee\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\"},\"headline\":\"What is Phishing? Find Out with Gary Davis on the Latest Episode of Tech Nation\",\"datePublished\":\"2019-05-03T16:21:50+00:00\",\"dateModified\":\"2025-08-13T06:42:09+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/what-is-phishing-find-out-with-gary-davis-on-the-latest-episode-of-tech-nation\/\"},\"wordCount\":3516,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/what-is-phishing-find-out-with-gary-davis-on-the-latest-episode-of-tech-nation\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/05\/McAfee_consumer_1female_headphone_subway_station_72dpi.jpg\",\"articleSection\":[\"Internet Security\",\"Privacy &amp; Identity Protection\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/what-is-phishing-find-out-with-gary-davis-on-the-latest-episode-of-tech-nation\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/what-is-phishing-find-out-with-gary-davis-on-the-latest-episode-of-tech-nation\/\",\"name\":\"What is Phishing? Find Out with Gary Davis on the Latest Episode of Tech Nation | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/what-is-phishing-find-out-with-gary-davis-on-the-latest-episode-of-tech-nation\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/what-is-phishing-find-out-with-gary-davis-on-the-latest-episode-of-tech-nation\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/05\/McAfee_consumer_1female_headphone_subway_station_72dpi.jpg\",\"datePublished\":\"2019-05-03T16:21:50+00:00\",\"dateModified\":\"2025-08-13T06:42:09+00:00\",\"description\":\"Gary Davis is now a regular contributor on the Tech Nation podcast!\u00a0 In this episode, Gary Davis educates that phishing is more than just an\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/what-is-phishing-find-out-with-gary-davis-on-the-latest-episode-of-tech-nation\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/internet-security\/what-is-phishing-find-out-with-gary-davis-on-the-latest-episode-of-tech-nation\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/what-is-phishing-find-out-with-gary-davis-on-the-latest-episode-of-tech-nation\/#primaryimage\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/05\/McAfee_consumer_1female_headphone_subway_station_72dpi.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/05\/McAfee_consumer_1female_headphone_subway_station_72dpi.jpg\",\"width\":1382,\"height\":922,\"caption\":\"Vehicle Door; African Descent; Real People; Candid; Travel; People Traveling; Public Transportation; Boarding; Portrait; Women; Females; City Life; Railroad Station Platform; Subway Platform; Rush Hour; Music; Headphones; Young Adult; Adult; Smiling; Waiting; Standing; Listening; Entering; Commuter; Mixed Race Person; One Person; Happiness; Confidence; Modern; Transportation; Lifestyles; Urban Scene; Looking At Camera; Cheerful; Tourist; Passenger; People; Berlin; Germany; Day; Underground; Door; Subway Station; Railroad Station; Station; Casual Clothing; Subway Train; Train; Mode of Transport; Smart Casual; Fashionable\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/what-is-phishing-find-out-with-gary-davis-on-the-latest-episode-of-tech-nation\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Internet Security\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"What is Phishing? Find Out with Gary Davis on the Latest Episode of Tech Nation\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\",\"name\":\"McAfee\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"caption\":\"McAfee\"},\"description\":\"We're here to make life online safe and enjoyable for everyone.\",\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/x.com\/McAfee\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What is Phishing? Find Out with Gary Davis on the Latest Episode of Tech Nation | McAfee Blog","description":"Gary Davis is now a regular contributor on the Tech Nation podcast!\u00a0 In this episode, Gary Davis educates that phishing is more than just an","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"What is Phishing? Find Out with Gary Davis on the Latest Episode of Tech Nation | McAfee Blog","og_description":"Gary Davis is now a regular contributor on the Tech Nation podcast!\u00a0 In this episode, Gary Davis educates that phishing is more than just an","og_url":"https:\/\/www.mcafee.com\/blogs\/internet-security\/what-is-phishing-find-out-with-gary-davis-on-the-latest-episode-of-tech-nation\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_author":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2019-05-03T16:21:50+00:00","article_modified_time":"2025-08-13T06:42:09+00:00","og_image":[{"width":1382,"height":922,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/05\/McAfee_consumer_1female_headphone_subway_station_72dpi.jpg","type":"image\/jpeg"}],"author":"McAfee","twitter_card":"summary_large_image","twitter_creator":"@McAfee","twitter_site":"@McAfee","twitter_misc":{"Written by":"McAfee","Est. reading time":"17 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/what-is-phishing-find-out-with-gary-davis-on-the-latest-episode-of-tech-nation\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/what-is-phishing-find-out-with-gary-davis-on-the-latest-episode-of-tech-nation\/"},"author":{"name":"McAfee","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa"},"headline":"What is Phishing? Find Out with Gary Davis on the Latest Episode of Tech Nation","datePublished":"2019-05-03T16:21:50+00:00","dateModified":"2025-08-13T06:42:09+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/what-is-phishing-find-out-with-gary-davis-on-the-latest-episode-of-tech-nation\/"},"wordCount":3516,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/what-is-phishing-find-out-with-gary-davis-on-the-latest-episode-of-tech-nation\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/05\/McAfee_consumer_1female_headphone_subway_station_72dpi.jpg","articleSection":["Internet Security","Privacy &amp; Identity Protection"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/what-is-phishing-find-out-with-gary-davis-on-the-latest-episode-of-tech-nation\/","url":"https:\/\/www.mcafee.com\/blogs\/internet-security\/what-is-phishing-find-out-with-gary-davis-on-the-latest-episode-of-tech-nation\/","name":"What is Phishing? Find Out with Gary Davis on the Latest Episode of Tech Nation | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/what-is-phishing-find-out-with-gary-davis-on-the-latest-episode-of-tech-nation\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/what-is-phishing-find-out-with-gary-davis-on-the-latest-episode-of-tech-nation\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/05\/McAfee_consumer_1female_headphone_subway_station_72dpi.jpg","datePublished":"2019-05-03T16:21:50+00:00","dateModified":"2025-08-13T06:42:09+00:00","description":"Gary Davis is now a regular contributor on the Tech Nation podcast!\u00a0 In this episode, Gary Davis educates that phishing is more than just an","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/what-is-phishing-find-out-with-gary-davis-on-the-latest-episode-of-tech-nation\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/internet-security\/what-is-phishing-find-out-with-gary-davis-on-the-latest-episode-of-tech-nation\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/what-is-phishing-find-out-with-gary-davis-on-the-latest-episode-of-tech-nation\/#primaryimage","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/05\/McAfee_consumer_1female_headphone_subway_station_72dpi.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/05\/McAfee_consumer_1female_headphone_subway_station_72dpi.jpg","width":1382,"height":922,"caption":"Vehicle Door; African Descent; Real People; Candid; Travel; People Traveling; Public Transportation; Boarding; Portrait; Women; Females; City Life; Railroad Station Platform; Subway Platform; Rush Hour; Music; Headphones; Young Adult; Adult; Smiling; Waiting; Standing; Listening; Entering; Commuter; Mixed Race Person; One Person; Happiness; Confidence; Modern; Transportation; Lifestyles; Urban Scene; Looking At Camera; Cheerful; Tourist; Passenger; People; Berlin; Germany; Day; Underground; Door; Subway Station; Railroad Station; Station; Casual Clothing; Subway Train; Train; Mode of Transport; Smart Casual; Fashionable"},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/what-is-phishing-find-out-with-gary-davis-on-the-latest-episode-of-tech-nation\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Internet Security","item":"https:\/\/www.mcafee.com\/blogs\/internet-security\/"},{"@type":"ListItem","position":3,"name":"What is Phishing? Find Out with Gary Davis on the Latest Episode of Tech Nation"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa","name":"McAfee","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","caption":"McAfee"},"description":"We're here to make life online safe and enjoyable for everyone.","sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/x.com\/McAfee"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/95168","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/674"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=95168"}],"version-history":[{"count":3,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/95168\/revisions"}],"predecessor-version":[{"id":219136,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/95168\/revisions\/219136"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media\/95169"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=95168"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=95168"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=95168"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=95168"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}