Diary of a Network Geek

The trials and tribulations of a Certified Novell Engineer who's been stranded in Houston, Texas.

1/25/2019

Phishing Quiz

Filed under: Fun,The Day Job — Posted by the Network Geek during the Hour of the Hare which is terribly early in the morning or 6:30 am for you boring, normal people.
The moon is Waning Gibbous

No, that’s not a typo.

This month, I’ve been dealing with a higher than normal amount of phishing emails at work. For those of you not in IT, those are the emails you get that have links which look like legitimate links, say to your bank, but that actually redirect you to a compromised website that collects your username and password for a hacker’s later use. They’re worse than regular spam email, but not quite virus payloads. Either way, they cause me no end of grief. Normally, I don’t have a hard time spotting them, but even I have to admit, these cyber crooks have gotten really clever lately.
So, this week I’m bringing you something rather more important and educational than it is strictly “fun”. Still, if you bear with me, and follow the link, you’ll be helping yourself and endearing yourself to your IT Department. Trust me.
The link is to Google’s phishing quiz and it’s meant to both test your knowledge and skill at avoiding phishing emails. As an IT professional, I can tell you, it’s harder than it looks. Honest. The first time I ran through the quiz, I missed three of the eight questions, though, one was a “false-positive”, which means I was leaning more toward safety by the end of the quiz. In any case, after you answer each question, the site takes you through what was wrong, or right, about each email.

So, yeah, not the most traditionally “fun” thing for a Friday, but it is a kind of game, so I’m going to count it!
And, with any luck at all, by this coming Friday, I may be finally able to reveal one of the things that’s been keeping me from writing up better stuff for you on Friday’s the past month or so.

 

This post originally appeared on Use Your Words.

4/15/2016

Security In A Box

Filed under: Geek Work,Red Herrings,The Dark Side,The Tools — Posted by the Network Geek during the Hour of the Hare which is terribly early in the morning or 6:00 am for you boring, normal people.
The moon is Waning Gibbous

First of all, you should know I’m talking about computer security, not home security.

Secondly, know that “in a box” really means something more like “all in one place”.
I’m suggesting this site this week because security is on my mind.  Not only in a corporate sense, but in a personal sense.  In a professional setting, I’ve brushed up against something that could conceivably heighten scrutiny of my own personal foot-print on the internet.  And, I’ve had a particular address from a particular Eastern European country banging against on of my WordPress installations pretty hard this past week.  All of which added up to me checking my collected links for a security themed site I could share with you all.
The site is called Security In A Box and it’s a collection of tips, advice and links to programs meant to help keep you safe on the internet.  Their advice covers everything from creating good passwords to staying safe on social media.  And, they have group-specific suggestions for special interest groups who might have an additional level of scrutiny, either by other special interest groups or governments.  It’s quite a good site for everyone, of course, but of special interest to anyone who might find themselves at the sharp end of one of the many sharpened sticks running loose on the internet without keepers.

So, stay safe this weekend and enjoy the lovely weather while it lasts!

10/17/2014

Destroy All Robots!

Filed under: Fun,Geek Work,Red Herrings,The Dark Side — Posted by the Network Geek during the Hour of the Tiger which is terribly early in the morning or 5:56 am for you boring, normal people.
The moon is Waning Gibbous

Or, at least, all robocallers.

So, lately, I’ve been digging through my files, finding links I saved ages ago to share with you, my few loyal blog readers, and I’m the first to admit that it’s been a mixed bag.  Some have been fun.  Some have been lame.  But, this one actually solves a problem for you.

Do you get automated calls?  Maybe you signed up for a catalog ages ago, or maybe you thought that timeshare in Miami was going to…
Read More

10/6/2010

Computer Crime is “Organized”

Filed under: Geek Work,News and Current Events,Rotten Apples,The Dark Side — Posted by the Network Geek during the Hour of the Hare which is terribly early in the morning or 6:30 am for you boring, normal people.
The moon is Waning Gibbous

Wow, even computer crime is a “family” business these days!

Hey, look, I’m from Chicago, where you can’t hardly swing a dead cat and not hit a mobster, but this surprised even me!  Apparently, according to an article that ran on CNet, 85% of all stolen data last year was linked to some kind of organized crime.  And, 38% of data breaches used stolen credentials.

But, also, people are getting rich protecting us from the threats they create!  Seriously!  According to this article at eWeek, that’s just what some of the botnet crooks are doing.  And, remember, this is BIG business.  We’re not talking about a couple hundred infected PCs, we’re talking about tens of thousands.  There are websites dedicated to the buying and selling of the data these things collect and renting out the zombie PCs to do your dirty work, like send spam.  It’s big business and where there is big money to be made doing illegal things, there’s always been organized crime.

More and more, life is becoming like a William Gibson novel…


Powered by WordPress
Any links to sites selling any reviewed item, including but not limited to Amazon, may be affiliate links which will pay me some tiny bit of money if used to purchase the item, but this site does no paid reviews and all opinions are my own.