Forgot your password?
typodupeerror

+ - The Psychology Of Phishing

Submitted by Anonymous Coward
An anonymous reader writes "Phishing emails are without a doubt one of the biggest security issues consumers and businesses face today. Cybercriminals understand that we are a generation of clickers and they use this to their advantage. They will take the time to create sophisticated phishing emails because they understand that today users can tell-apart spam annoyances from useful email, however they still find it difficult identifying phishing emails, particularly when they are tailored to suit each recipient individually. Fake emails are so convincing and compelling that they fool 10% of recipients into clicking on the malicious link. To put that into context a legitimate marketing department at a FTSE 100 company typically expects less than a 2% click rate on their advertising campaigns. So, how are the cybercriminals out-marketing the marketing experts?"

+ - China Censors Inflatable Toad After Internet Users Compare it to President->

Submitted by Anonymous Coward
An anonymous reader writes "China is blocking all reports of a huge inflatable toad seen in a park in Beijing after social media users started comparing it to one if its former Communist Party leaders.

The 22-metre (72ft) yellow toad was unveiled at Beijing's Yuyuantan Park, but its appearance was quickly compared to that of the country's former president Jiang Zemin.

All reports on Chinese web portal Sina – which operates Sina Weibo – removed all mentions of the toad and a story on Chinese news agency Xinhua also deleted its report on the inflatable animal."

Link to Original Source

Comment: Re:I don't see the problem. (Score 5, Insightful) 667

by sinij (#47496903) Attached to: Russian Government Edits Wikipedia On Flight MH17

False equivalence.
 
Sides are not equally wrong, and truth is not somewhere in the middle. There is a very clear wrong side - Russian equipment operated by Russian-sponsored terrorists and/or Russian military misidentifying civilian aircraft and shooting it down. Anything else is intentional misinformation.

Comment: Re:'Vulnerability" is rubbish. (Score 1) 151

by sinij (#47471993) Attached to: LibreSSL PRNG Vulnerability Patched
Ok, so best-case scenario is that OpenBSD has additional sources of randomness and that issue simply weakened crypto instead of outright breaking it.

For ignoramus that downmoded my GPP - all cryptographic functions heavily rely on random numbers being both unpredictable and computationally indistinguishable from true random. It can break two ways - first by broken seeding, where it becomes predictable. Second by having algorithm that has non-uniform (e.g. some numbers have higher chance than 1/u). Both of these can be exploited to break strongest crypto. Why? Because all our crypto is deterministic.

Comment: Oversimplified answer (Score 4, Insightful) 509

by sinij (#47459677) Attached to: Ask Slashdot: Future-Proof Jobs?
Common dangers to your career and wages are:
1. Outsourcing
2. Automation
3. Disruptive innovation
4. Boom and bust economic cycles

Ways to protect your career and wages are:
1. Merit and Knowledge
2. Restricted professions & credentials
3. Union or government position

Not all dangers are avoidable, for example disruptive innovation is all but unavoidable, but boom and bust cycles are easier to survive in a bigger industry.

Not all way to protect career are available to everyone, for example merit and knowledge is unobtainable goal for significant portion of population (merit, by definition, it is zero-sum game). Additionally some have drawbacks - proximity to government or union usually has negative effect on one's maximum earning potential.

Now for more practical advice - a technical profession that interfaces with government, requires accreditation, and deals with local or critical infrastructure would be most stable long-term position. Civil engineer, food inspector, dentist are some typical example.

+ - @Congressedits tweets anonymous Wikipedia edits from Capitol Hill->

Submitted by mpicpp
mpicpp (3454017) writes "Ed Summers, an open source Web developer, recently saw a friend tweet about Parliament WikiEdits, a UK Twitter “bot” that watched for anonymous Wikipedia edits coming from within the British Parliament’s internal networks. Summers was immediately inspired to do the same thing for the US Congress.

“The simplicity of combining Wikipedia and Twitter in this way immediately struck me as a potentially useful transparency tool,” Summers wrote in his personal blog. “So using my experience on a previous side project [Wikistream, a Web application that watches Wikipedia editing activity], I quickly put together a short program that listens to all major language Wikipedias for anonymous edits from Congressional IP address ranges and tweets them.”

The stream for the bot, @congressedits, went live a day later, and it now provides real-time tweets when anonymous edits of Wikipedia pages are made. Summers also posted the code to GitHub so that others interested in creating similar Twitter bots can riff on his work.

So far, @congressedits hasn’t caught anything scandalous; most of the edits caught have been stylistic changes rather than factual ones. The most interesting edit found so far was to the Wikipedia article on horse head masks—adding a reference to President Obama shaking hands with a man in such a mask on a recent trip to Denver."

Link to Original Source

"Just think of a computer as hardware you can program." -- Nigel de la Tierre

Working...