Tumgik
#I have like. a terrible fear of viruses and hacking so I’m not too too knowledgeable on the good pirating sites
gothamsfinestdummy · 1 month
Note
HI EGGBART> my reply to your POST didnt send so may i ASK where you mught be watching caped crusader if you happen to be pirating it would you mind tellin me where prettty pleasems i wanna watch it so bad but i cant find it fer free Shaking the bars of my cage hehe ANyway Hi hello Egg Bart how are you
Tumblr media
HIIIIIIIII !!!!!!!! I HOPE YOU’RE DOING AWESOME BEE!!! Im actually watching it on Prime atm! Leeching off of family members :,) not quite sure where to watch it via pirating, though :( perhaps there may be a google doc with links or it may possibly be on kisscartoon/kissanime if it’s still up? Or maybe even 9anime if they would even have American cartoons. I wish I knew, I’m sorry!
(And if you doooo find a good pirating site with little virus threats, do let me know ;D)
3 notes · View notes
re-diesirae · 3 years
Text
12. Claire
She had never felt so happy to wake up with the sunlight hitting at her face the way it did that morning. They didn't dare to leave the storage house until the first rays of light hadn't come out from the horizon. In part, because they had wanted a little more rest and in part because they didn't want to risk the chance of meeting another of those horrible creatures.
With the light, they could finally see what was inside the storage room, and after checking the contents of the boxes, they had come across some supplies that included more weapons, ammo, a first aid kit, and flashlights. The weaponry was quite old, and Claire knew they probably weren't as fancy as the ones Leon usually used, but it was better than nothing. They also found some cans of food and water that weren't yet due in the boxes. It wasn't a fancy meal, but the canned fruits provided the needed carbohydrates that their bodies required for energy. Claire had instantly felt a little more energetic after the small and humble meal, and she had to admit that compared to other times, she appreciated the locals for storing the food in that place. She would have thanked them if they hadn't turned into parasite controlled zombies, of course.
With their new gear, stock, and a full stomach, the duo had started their walk to the mysterious manor. So far, the way had been calm: only interrupted by a couple of the unfriendly locals that they defeated without problems.
Claire noticed that the closer they got to the manor, the quieter the forest became. Somehow that made her uncomfortable. The lack of sound was antinatural, and maybe it was her paranoia, but she felt observed, and she was half expecting another sudden monster to jump over them. She could tell Leon's thoughts weren't too far from her own as the man moved stealthily and alert at all times.
Nobody would think that, some years ago, this same man was a scared rookie cop trying to survive a city filled with zombies.
The thought of how much he had grown and become better drew a smile on Claire's face.
Just what are you feeling so proud about when this is all a mess?
She often felt proud of others, even if it wasn't something she was supposed to do. She was proud of her brother. Like hell, how wouldn't she? The man had saved many lives in the last few years. She was also proud of Moira; the girl had gotten over her fear of guns and trained under her father's eye. She was also proud of Natalia. She had a normal life now, making it through all the horrors of her past. Claire was very proud of Sherry. She had heard from Chris that the girl had become an agent like Leon, and even though Claire would have wished for the girl to live a quiet life, she respected her decision. Of course, she was proud of Leon's successful career as an agent.
"There it is." Leon's voice broke into her thoughts, and Claire stopped dryly, staring at the manor ahead, "It certainly gives me bad vibes..."
An unpleasant flashback ran through her head as she remembered the Ashford's Residence, but as she watched the house more carefully, she realized that the place was different. This house looked older, and the gray walls, covered by ivy and moss. More than a manor, it looked more like a castle. A quick scan around convinced them that there was no one around the area.
"Guess our friends from Neo-Umbrella didn't wait for us..." Leon whispered.
"Well, knowing their sense of hospitality, they probably left some of their pets behind to receive us, though."
"Most likely. That sounds like something terrorists would do," Leon sighed, "We'll have to take a look and find out. I think the thing jamming the sign of my phone is in there. If we can deactivate it, I can contact Hunnigan, and maybe, we can figure out something about what they were doing in here."
"All right, let's take a look. What could go wrong, right?"
A lot of things. The annoying little voice in her head muttered.
The duo made their way to the house with extreme caution. The place seemed deserted. The only evidence of people ever being in there was the mess inside: furniture was turned over or broken, papers scattered all over the floor along with other decor accessories. Claire found bloodstains in some of the walls, and she shuddered. Maybe their "friends" hadn't left after all, but something had gotten them before they arrived.
"Now, this looks ominous. Why are there so many papers in here?"
"They seem like medical records, but the papers are too dirty to read them," she said, picking some of the scattered sheets. The pages looked blurred with humidity, and some had red stains that covered half of the text.
"Knowing these guys, there's probably an electronic record somewhere. We need to find a computer." Leon replied, looking around the rooms with his gun raised, "There are signs of struggle. I guess they didn't leave on good terms…"
That if they had made it out alive.
"There's too much blood. Do you think one of their pets went through havoc?"
"Most likely, maybe it was the one that attacked us last night."
Claire picked a folder that was over a table. The yellowish surface had dried stains of blood, but she ignored it and flipped through its contents. Her face tensed as her eyes traveled over the printed letters.
"They were making a new virus, " she said with anger, "These people don't ever learn that you shouldn't mess up with nature."
"Any idea of what sort of virus that is?"
"No...this seems more like genetic blueprints," Claire replied, "RNA virus sequences and possible recombinations with other viral agents. I'm taking these. it might be useful later. I can look into it when we get back to TerraSave.."
"Didn't know you had a liking for this sort of mad scientist stuff. Didn't picture you like a science girl..."
"You know, I did finish college before I joined TerraSave," Claire laughed.
"So I heard, but I never asked what you majored in, now that I think about it."
"Oh, so you didn't check my background?" Claire replied, surprised.
"I don't do that with friends. It's easier to ask, so what did you major in?"
"Biology and life sciences. Did a specialization in virology after joining TerraSave," she replied, checking another pile of folders, "I never thought I'd get so much into viruses. You would be amazed by how many outbreaks TerraSave attends, and for worse or better, not all of them involve zombies. Going into virology sounded reasonable, logical, and useful. "
Claire's crescent interest in viruses had to lead to her choosing a virology specialization. She had thought that it would come in handy while working in TerraSave. The organization was founded as a countermeasure to terrorist attacks. However, as time went by, TerraSave began attending other cases, including viral outbreaks in affected zones and as they worked with WHO. As an active agent at the time, Claire had participated in many operatives. That made her interested in the subject. After thirteen years of working in the organization, Claire was a pretty respectable professional. She wasn't as prodigy as Saya or Rebecca, but her observations and criticisms were valuable, and she had permission to work on her own projects.
"Never pictured you like a bookworm, but it seems I was mistaken."
"Another con on my side, I guess. Relationship wise..."
"I doubt it. Nothing wrong with a smart woman. I find it much more appealing. So, does your scientific vision give you a lead to what we have here?"
"Unfortunately, nothing clear. There's a lot of things you can do with genomes and some genetic engineering. I am not a biosynthetic engineer, but this looks like design proposals? We have someone in HQ who could see through it or maybe in B.S.A.A. I want to look at the digital records; if we are lucky, there might be something left in there. What about your signal jam?"
"I think I might have found the cause. Up there in the tower, there seems to be an antenna of some 's a good lead..."
"Guess we found our next stop. Let's go. I've got the feeling that I don't want to be around when the night falls."
"Always trust a female's sixth sense."
Claire followed Leon through the house. The absence of hostiles was welcome, but at the same time made her wonder what could have happened to them. They found more papers on their way, but nothing that could give them a clue of what had taken place in that place. After a while, they finally arrived at the tower.
The room seemed to be the security command center as there were several screens and computers. Leon got himself busy as he started to work on the antenna right away. Without much else to do, Claire decided to take a look at the server and see if she could get her hands on any interesting data while Leon tried to fix his communication line.
Well, let's see what you kept in here.
Claire began typing. She wasn't a techie like Wallace, so her skills as a hacker were terrible, but to her surprise, the security around the server was much laxer than she would have imagined. Or maybe she was too used to her overestimated security system in TerraSave.
Sadly, the computers had no access to the research datalog. However, it gave Claire information about the facility, and just as expected, there was a large underground structure underneath the mansion; the security system provided a clean 3D blueprint of the facility, showing research rooms, animal essays rooms, and laboratories. Everything pinpointed on the screen.
What the hell were they researching here?
Claire checked the security protocols, which seemed typical procedures designed for facilities handling potentially pandemic agents. She was familiar to them as a few years before she had adapted to those same protocols to propose an effective plan of contention in case of bioterrorist attacks. There was nothing that could be useful to find out what she wanted, but she did find something that caught her attention.
Damn, if only Wallace were here. He could probably hack into the central system and get me that information.
"I think I got it." Leon's voice made her look away from the screen, "I have the signal back. I'll try to contact Hunningan."
"That's great news…!"
"What about you? Did you find anything?"
"No, and yes. I managed to hack into the security system, but the servers aren't linked, so I have no access to research data from here. I did get a nice blueprint of the facility, though. Just look at this, the main research area is right underneath us, which is not surprising at all. I also checked the security protocols, and from that, I can say they were doing in vivo essays. I found something alarming and unexpected."
"How come?"
"They have a viral repository here. It is curious because, with the T-virus, C-virus, and all those new strains that Umbrella had been spreading, most bioterrorists had dropped the use of traditional pathogenic weapons."
"By traditional you mean…?"
"Regular viral agents: influenza, Nipah Virus, chickenpox, ebola… Ring a bell? They have a bacteria stock, too. Anthrax, Tuberculosis, MRSA," she said, scrolling down the screen, " Basically Level 3 and 4 pathogens. Just what the hell were they doing here?"
" If you don't know, neither do I. Can you get the information from here?"
"Sorry to disappoint you, but I am a virologist, not a hacker. The information should have a back up in the central server, but I am not skilled enough to break through their encryption to get it. We would need a vicious hacker for that, and the only one I know is somewhere in Hughesville."
"So, in other words, if we want that data, we'll need to go down there."
"Very sharp, Kennedy."
"Well, I guess we should bring some company down there," Leon commented, pulling his mobile to his ear. "Hunnigan… I need a favor."
NOTE: if you guys want to come and chat about the fic, or just about CLEON in general. Feel free to drop by the discord and say hi! JOIN SERVER
9 notes · View notes
newstfionline · 6 years
Text
Would You Let Your Boss Put a Chip in Your Body?
Guy Clapperton, Medium, Jul 16, 2018
Dave Coplin is trying to explain to me why people across two continents are suddenly allowing their employers to put microchips under their skin.
“I do this to my dog--why wouldn’t I do it to myself?” Coplin says. I’m not convinced, so he launches into an anecdote about a club on the Mediterranean party island of Ibiza where people could chip themselves and then use the chip to buy drinks. Coplin suspects this was because they weren’t wearing many clothes.
But chipping yourself because you’re half-naked and don’t have a pocket for your wallet is very different from allowing your employer to chip you. So, how did we get here?
Coplin, who heads a consultancy called the Envisioners, says there are real benefits for both employer and employee--if we can only get over our squeamishness. “If it adds value, I’m all for it,” he says. “Today we look at people doing it and it feels a bit weird, but in reality there is something inevitable about it.”
Patrick McMullan is president of Three Square Market in Wisconsin. After following experiments at Swedish incubator Epicenter in Stockholm, which has been experimenting with chipping since 2015, his company decided to develop the technology further. Naturally, as a supplier and a developer, McMullan has a chip implant himself--one roughly the size of a grain of rice implanted under the skin between his thumb and index finger. It’s based on near-field communication (NFC) technology--the same chips that are used in contactless credit cards or mobile payments. Implants are done quickly and simply with a syringe and very little blood.
One current limitation, McMullan says, is that because the chip is a passive device, there is no way it can be tracked. For now, that means the chip is for accessing the building, logging into computers, and paying for things from the canteen. But McMullan’s employees are on a mission “to change the world,” he says, and more than 70 of them so far have volunteered to be part of the experiment.
The idea seems to be spreading. In addition to Three Square Market, at least 160 people have been chipped at Epicenter’s monthly “chipping parties.” Several staff members at CityWatcher.com, a surveillance company in Cincinnati, have gotten chips, as have some at a digital marketing company in Belgium called NewFusion. No doubt it’s good publicity, but chipping advocates genuinely believe this will become common practice over the next decade.
Chips will offer more benefits as the technology progresses, McMullan believes. “We are developing medical uses that will monitor vital signs. Doctors will be able to proactively treat patients rather than always react,” he says. McMullan believes the numbers of chipped employees worldwide will reach millions over a few years because the benefits of a sub-$100 chip are potentially huge.
McMullan sees no downside, despite obvious concerns that it feels perfectly dystopian to be intimately connected to your employer in a way that is hard to control or remove. Take his own idea of chips monitoring people’s health: There is obvious advantage in future embedded technologies that could monitor cholesterol, blood sugar levels, or even just dehydration.
But what if someone had a chip to monitor alcohol intake as part of an agreement to quit? Would a surgeon be allowed to refuse to operate? Could an insurance company hike the patient’s premiums if they fell off the wagon? The question of what information could or should be gathered and where it could or should go will become far more complex as chips become more advanced and more widespread. And other experts have raised concerns about hacking, as well as known health problems already associated with similar chips used in pets.
“Obviously, privacy is a massive concern,” Coplin adds. “What will people do with the data? Who’s going to see it? In practical terms, it’s bad enough that I have to carry my phone around with me, and my wallet. If this gets around some of that, I’m up for it.”
Despite the concerns, many people seem to accept it’s going to happen--and quite rapidly. Lynda Shaw, PhD, a cognitive neuroscientist and author of Your Brain Is Boss, believes chipping is a natural progression that is likely to be more acceptable to young people.
In some ways, this is already an established technology, at least among people with health problems. We already use chips for cochlear implants and even for bypassing parts of the brain in the event of brain damage, Shaw points out. “Chipping the human body is not news, but there’s always the sinister side of us that says this is a bit too Orwellian,” she says. People might become worried about computer viruses living in their bodies or about what happens when and if the hardware becomes corrupted.
Rohit Talwar, futurist and CEO of the think tank Fast Future, sees chipping becoming widespread very quickly, particularly among tech companies that want to demonstrate they are forward thinking.
Chipping will also be used, Talwar says, among companies “who want very high security so people don’t get into systems or part of the building they shouldn’t, and who want to demonstrate to clients that they’re cutting edge in security terms. You might also see it being used as a way of enabling people to exchange money in canteens, vending machines--it will get rid of identity passes.”
Shaw sees benefits as well. If someone is ill and has a pacemaker or uses anticoagulant medication, making that information available with a quick scan could save their life. But she also points to darker implications for crime scenes. In regions where the crime rate is high and bodies turn up dismembered, Shaw notes that a criminal wouldn’t need the whole body to breach security, just the limb in which a chip had been embedded. “You could end up inadvertently inciting a more horrible crime than the one originally being contemplated,” she says.
Talwar’s view is that dystopia is in the eye of the beholder. A generation born as digital natives might see this as a natural evolution and plastic passes as old-fashioned, arcane, and certainly not able to capture the kind of information that a chip inside our bodies could capture about, say, health.
“Older generations may see this as terribly invasive,” Talwar says. “I was at an event last year where they were chipping people just for fun, and the lines were going down the corridor of people waiting to be chipped--for the story and for the experience.”
So, where is chipping going? Talwar sees it as part of an inevitable process in which those who are pioneers have said for some time that if humans are going to keep up with artificial intelligence, we will have to enhance our brains and bodies.
“This is just the start point of that process. You could easily predict your mobile phone memory being inserted into you, chips to accelerate your memory and your brain,” Talwar says. “We could see a massive acceleration in this as we move into enhancing and augmenting ourselves and stepping into the world of transhumanism.”
Coplin sees chipping as part of a dialogue about how we relate to machines. He notes that one man in Australia who tried removing the chip from a travel card and embedding it in his hand failed because the terms and conditions said not to deface the card. “At the moment, it feels weird,” Coplin says, “but at the moment, I might have a device on my wrist that might have that technology. Why not a little further under my skin?”
Society has always contested the potential of technology and the changes it forces. A quarter-century ago, few people predicted the advent of mobile phones--fewer still anticipated that we’d use them as cameras and music centers. And now there are additional pressures on technologies.
“We’ve really lost trust with the people who handle our data--the banks, the Googles, the Facebooks,” Coplin says. “Until that trust is won back, we’re going to be very fearful of this kind of thing. And I think that’s a real shame because of the benefits we could have.”
1 note · View note
epicmeetsfail · 5 years
Photo
Tumblr media
Unknown Pleasures: The most august https://ift.tt/2NbjYb9
A friend from the midlands once lamented that she’d always lived there. How absurd it was to live on an island, but directly in the middle of it. I can now say, having lived in two coastal cities, that living on the edge of it is very much the same, except that there are much better chip shops and the rain is more … oceany.
It is currently hacking it down out there and I don’t want to go home in it. Join me once more than, readers, for our regular round up of the best new games on Steam that you’ll never see on a billboard. It’s Unknown Pleasures.
Gazing wistfully into the deep this week: algorithmic therapy, Scandinavian body horror, and the ol’ rotate and thrust.
Apsulov: End of Gods £15.49 / €16.79 / $20
First person horror games are usually terrible, and in all the same ways. This is great news for me because I hate them anyway so it makes very little difference, but someone’s only gone and made one I like. Apsulov is gruesome. Its very first scene is horrible, with you (an Alice, it turns out, which explains the latent magic powers) operated on by some robotic apparatus at the whim of an unseen, intensely threatening entity that’s very quick to anger. Something’s wrong with your throat, so you’re all gurgly and choking and it’s horrible, but for once it doesn’t feel sadistic (obviously the villain is sadistic, but the game doesn’t feel so. It’s meant to be horrible, not pornographic).
You escape, of course, and flee a facility, dodging muttering, screaming shamblemen, pursued by your tormentor’s evil beast, and piecing together where and who you are. Scientists have opened a sinister gate or screaming obsidian hellcube or some other thing that only a colossal fool would open, and apparently the Norse gods are involved somehow. Creeping, rapidly growing tentacles are poking through, gigantic valkyrie shields line one lab, and since your captor drilled something into your head, you have the power to see magical sigils. You’re important somehow, but how it all ties together is a mystery. This is all excellently done, and I’m genuinely intrigued to find out more. Even the occasional jump scares didn’t feel cheap, nor the pillar of the horror – that’s the dread and revulsion, and secondary to that, the wider horror of what this event means for earth in general.
I’m impressed. Oh, but the bloody keypads are a joke. You have to ‘use’ them and then take your hand off the mouse and use the arrow keys to type the numbers in. Deus Ex let us use the number pad nineteen years ago, damn it. Come on.
Exception £11.39 / €12.49 / $15
This wasn’t the game that sparked it, but I’ve had a right moan about “the 80s aesthetic” in games this week. Did you know it’s possible to style your game after something that isn’t synthwave and neon? It’s true, I saw a game do it once.
Exception is enthralling, though, and its presentation is a large part of that. It’s a simple action platformer, with a plot about emptying a woman’s computer from a load of viruses that I skipped entirely thanks to built-in options that I respect mightily. You’re a wee robot who dashes about obstacle courses, wall jumping, slashing up hostile robots, and generally dashing to the exit. Several times each level, you’ll touch a waypoint that reorients the whole level, zooming out and rotating and setting you back along the same course but upside down or along a different axis. It’s very cool and the movement flows freely and comfortably, including your attacks.
The vast majority of enemies are easily done in without altering your path, and you’re periodically given new attacks and powers that I didn’t bother with at all (frankly they seemed more trouble than they were worth). Occasional bosses take half a dozen hits and attack in simple enough patterns that they don’t disrupt things too much either. Everything’s bright and fast and spectacular, and even now, at synthwave saturation point, the soundtrack is a perfect accompaniment that drives you on when the wrong beats would undermine the action.
Phantom Rose £11.39 / €12.49 / $15
It’s another one. It’s another bloody deckbuilding roguelike. You’re doing it on purpose aren’t you?
Phantom Rose does things a little bit differently to the many others in its class. Typically in a deckbuilder you’ll draw a handful of cards and choose which to play. Here, there’s some kind of initiative system going on behind the scenes too. In each round of a fight, you and your opponent will line up cards (5 altogether, giving an advantage to one or the other of you). Yours are randomly chosen from your hand, but you can replace some or all of them from another hand drawn at the bottom of the screen. When you’re satisfied, you start the turn and cards play out from left to right.
There’s a big focus on status effects and buffs like Vampiric Whatever, which gives a chance of restoring health when you attack, or focus, which helps you break through defences. It may get complicated later but was easy to grasp for at least the first two floors. Your path goes along a grid from top left to top right, always (until you reach a map edge) offering two options. I didn’t get the sense that these make a drastic difference in terms of risk or reward, with the exception of occasional “maid” rooms, where you fight a powerful monster to free an amine maid (fairly mild on the tacky anime bullshit meter) who’ll reward you with a special item.
I like that one of the attacks lets you hit a monster with their own attack rating instead of yours. That’s a fun trick. It moves at a brisk pace too, and I even appreciate the artwork. All that red and white and black makes for a bold style.
It feels a bit too easy to run out of good attacking cards. But that might come down to practicing more.
Rashlander £2.89 / €3.29 / $4
Rashlander is a modern form of one of those old 2D rotate and thrust gravity games, whose names, aside from Thrust and Gravity Power, escape me. You pilot a wee ship about a sometimes absurdly hazardous area, aiming to land it on a warp pad to move on to the next level. Gravity and inertia are important tools and potential threats, as there’s a basic Newtonian physics system, making navigation tricky and rewarding. Your default ship (more are unlockable, although they’re balanced so that each presents its own challenge) is fragile and lives are limited. In case that wasn’t cruel enough for you, fuel is also highly limited, and when you run out you explode.
It’s bloody hard. I’m a bit rubbish at it. Each warp pad also offers an upgrade, although some have a downside (one increases fuel capacity but scrambles in-game text, an inventive and somewhat maddening invention), and some are a mixed blessing as they change the way the ship handles, which means re-learning on the fly, potentially under dangerous circumstances. While it’s not a cruel game, it’s somewhat antagonistic, although more for comic effect than anything. Levels have hidden collectables and bonus landing pads if you fancy a challenge, but it’ll likely be a while before you’re good enough to risk those as a matter of course.
Eliza £11.39 / €12.49 / $15
The cult of the algorithm is one of the biggest and most insidious disasters of our already disaster-laden era. Eliza is an exploration of this, and of the mental health crisis, and of tech startup ‘culture’, and of counselling. It’s a visual novel in which you play as Evelyn, a new recruit for the eponymous business, which is a counselling service in which all the counselling is done by an AI. The humans like Evelyn are just there to put a face on it, to the extent that they’re not allowed to say anything but whatever script the algorithms produce, based on a vast bank of heuristic data and the patient’s verbal analysis, biological data like heart rate, perspiration and so on. They can’t even interpret.
I did a bit of basic counselling training a long time ago. It’s something I’ve long been interested in, and have experienced and contemplated from many angles. I was all set to loathe Eliza simply for suggesting the idea, fearing the HIGNFY effect, that some absolute piece will get wind of it and not realise what a godawful idea this is.
And yet.
Within the very first session I was haughtily telling the system off for being an atrocious counsellor – outright lying to a patient, for one – but then the next chapter (they’re comfortably short) kicked in. Evelyn meets with an old, estranged friend for lunch, and their shared past is hinted at. She goes to a conference in which a key speaker is a former colleague, who announces that he wants to go further than Eliza, and roll out technology that will directly interface with a patient’s brain. It’s a hybrid of electroconvulsive therapy, VR therapy, and everything else Eliza already does. He also openly criticises the incredible and shameful ignorance the tech people have of psychological research that isn’t jazzed up with some faddy nerd bullshit (I paraphrased). And I’m hooked.
Much as I see the obvious downsides of this system (and not even addressing the issue of putting this in the hands of a private business, let alone a heap of silicon valley jebs)… is it actually worse than what we have now? If not this, then what are we gonna do, magically summon the hundred thousand competent and willing and experienced counsellors and doctors and therapists we need to deal with the absolutely appalling state of mental health treatment in, let’s face it, most countries?
Eliza is obviously the pick of the week.
I tangent. Eliza touched on all of the issues in under an hour. The personal story of Evelyn, the problems she had in her hold job, her own mental health, the troubles faced by her patients, their concerns with the system, its sinister dystopian possibilities, and, despite my distaste, its potential benefits. That’s not just a good idea, that’s a good idea someone really cares about and understands, and has the talent to write.
August 16, 2019 at 12:29PM
0 notes
tragicbooks · 7 years
Text
How to protect yourself from phishing, from experts who deal with it every day.
Ever wonder what it's like to be hacked? Sarah Jeong did. So naturally, she decided to ask someone to hack her.
Jeong isn't just a random thrill-seeker — she's a respected technology journalist and lawyer, and she knew exactly what she was getting into when she recruited her friend Cooper Quintin of the Electronic Frontier Foundation to help her out. She wrote about her experience in GQ.
All it took was a couple of hours and some readily available tools, and Jeong joined the approximately 12% of the population who have fallen for a hack.
But even before she was successfully hacked — and don't worry, we'll get to that! — both Jeong and Quintin discovered some important truths about the world of online safety and what it takes to infiltrate it.
Here are just a few lessons from experts that we can all benefit from:
Photo by Blogtrepreneur/Flickr.
1. Most hacking isn't done by master "Matrix" coders.
For most people, "hacking" tends to evoke one of two images: a stereotypically out-of-shape nerd in their parents' basement or a sleek, leather-clad cyberpunk in a Guy Fawkes mask who moonlights as an extra on a Wachowski movie.
But in reality, most of what we call "hacking" is actually "phishing."  In fact, last year, then-Secretary of Homeland Security Jeh Johnson said that phishing is the threat his department fears most.
THIS IS NOT WHAT HACKERS LOOK LIKE. Except when they do, which is sometimes. Photo by Vincent Diamonte/Flickr.
2. Phishing is a type of scam that disguises itself as something trustworthy.
It can be an email, phone call, or text message, and it then tricks you into giving up your passwords, credit card numbers, and more. All it takes are some clever social skills plus some free online tools used by information security professionals that, technically, anyone can use. (A little coding knowledge doesn't hurt, though.)
3. Many hackers are savvier than you might think.
It doesn't matter if you have the best anti-virus software installed on your computer and run daily checks for malware along with Ghostery and ad block to keep your online browsing extra-safe. Don't get me wrong — viruses and malware are still dangerous. But phishing isn't about computers. It's about people. And that's a lot harder to protect against.
"Phishing isn’t (just) about finding a person who is technically naive," Cory Doctorow, a sci-fi author, journalist, and technology activist told Locus magazine.  As savvy as he is, even he fell for a phishing hack back in 2010. "It’s about attacking the seemingly impregnable defenses of the technically sophisticated until you find a single, incredibly unlikely, short-lived crack in the wall."
"It’s a matter of being caught out in a moment of distraction and of unlikely circumstance." In other words, it can happen to anyone.
Smile! I'm stealing your identity! Image via Pixnio.
4. The terrible typos and grammar in some phishing schemes are intentional.
You're probably familiar with the classic "Nigerian prince" phishing scheme, where some kind of foreign dignitary emails you and offers you a ton of money to help facilitate the transfer of their new bajillion-dollar inheritance. You also probably know that these emails are famously riddled with grammatical errors and totally implausible premises.
What you might not know, however, is that these "mistakes" are done on purpose in order to target the most gullible people. That way, reports Business Insider, the scammers don't have to waste their time trying to persuade rational skeptics to give up their bank account information.
Photo by Nate Grigg/Flickr.
5. To hack a specific person, all a hacker needs is social media.
You know those silly memes where you find your "porn star name" (or whatever) by using the name of your first pet and the street you grew up on?
Now think about those security questions you had to answer for your online bank account — things like, oh, the name of your first pet, the street you grew up on, or your mom's maiden name.
Yeah. See the connection there? If a hacker wants to social-engineer their way into your bank account, all they need to do is poke around your public accounts to find those little bits of information. These targeted attacks are called "spearphishing," and they're why Doctorow recommends that people "only use Facebook to convince your friends to communicate with you somewhere other than Facebook."
Image from Pixabay.
6. Be careful what you open — even when it's sent by someone you know.
Jeong was hacked after she clicked on a malicious link made to look like it was sent from someone she knew.
To hack her, Quintin just had to scour Jeong's online presence until he found an acquaintance who could plausibly email her. He made a fake email address — using that person's real-life profile picture and everything — and that was all it took to get Jeong to give up her information.
Fake Google Docs scams, like the one she fell for, are increasingly common. In these cases, the target receives a phishing email that looks like a standard invitation to Google Docs sent from a trustworthy source — except that both the sender and the link are actually malicious frauds. This link will bring you to a landing page that resembles the standard Google password screen or bank login page you thought you were clicking on, and the hacker can use that to capture whatever password or personal information you enter into the false form.
7. Double-check your URLs.
Always make sure you're really on the website that you think you are before you enter any sensitive information.
How do you tell the difference? Generally speaking, the domain name should look like "[blank].google.com" or "http://ift.tt/2tkU3Bs]." If it's something hyphenated like "accounts-drive-google.com" or "boa-accounts-login.com," well, you should probably think twice about it.
(Another helpful tip is to look for SSL certificates, which usually appear as a lock or green text in your browser bar — but even that's not totally reliable.)
What is real? What is fake? Image from Pixabay.
8. You should definitely use two-step authentication.
I hate to break it to you, but your p@$$w0rd probably isn't very safe. The least you can do, according to CNET, is turn on two-step authentication. That way, every time you log in to an unfamiliar device, you'll get a text message with a secret code just to make sure it's you — because even if someone gets your password, they probably don't have your phone, too.
Unless they, um, literally walked into the AT&T store and charmed a sales rep into changing your phone number over to their phone. Which happens.
9. And use a password manager.
If you want to be extra extra safe, use a password manager such as LastPass, then set up a DiceWare password like "correct horse battery staple" (or some of these other great ones recommended by the Intercept) that are incredibly easy to remember but next-to-impossible for hackers or computers to crack.
Image from Pixabay.
10. Remember the greatest flaw in your internet security is the trusting nature of other people.
A trusting customer service rep can easily compromise you without realizing it. Your friend who mentions you on Facebook can do the same.
Heck, my wife has a fairly gender-ambiguous name, and I can tell you from personal experience how easy it is to call up the bank and pretend I'm her — even when I have to charm my way around a security question about her high school mascot. Which, yes, I've done.
As Jeong wrote, "Successful social engineers are not just perfectly capable of interacting with human beings — they are talented manipulators who take advantage of our willingness to trust our colleagues, friends, and family."
"You can turn your digital life into Fort Knox and still be undone by an overly trusting salesperson behind a desk."
Basic rule: Always look over your shoulder. Photo by Arthur Harry Chaudary/Wikimedia Commons.
There's no way to protect yourself from every possible online vulnerability. But that doesn't mean you shouldn't try!
As we've seen, the power of the internet can used for good or evil. All it takes is one trusting click, and even the savviest security professionals can find themselves compromised.
The best you can do is be smart and pay attention. A tiny bit of paranoid skepticism will save you a lot of time, stress, and energy in the long run, and that'll free you up to enjoy all the wonderful things that the internet has to offer. Trust me.
0 notes
vernicle · 7 years
Text
How to protect yourself from phishing, from experts who deal with it every day.
[ad_1]
At any time question what it can be like to be hacked? Sarah Jeong did. So in a natural way, she made the decision to ask a person to hack her.
Jeong just isn't just a random thrill-seeker — she's a revered engineering journalist and lawyer, and she realized specifically what she was acquiring into when she recruited her good friend Cooper Quintin of the Digital Frontier Foundation to support her out. She wrote about her working experience in GQ.
All it took was a couple of hrs and some readily available resources, and Jeong joined the close to 12% of the population who have fallen for a hack.
But even in advance of she was successfully hacked — and don't stress, we are going to get to that! — the two Jeong and Quintin identified some critical truths about the environment of on the internet protection and what it normally takes to infiltrate it.
Here are just a handful of classes from gurus that we can all gain from:
Photo by Blogtrepreneur/Flickr.
one. Most hacking just isn't carried out by master "Matrix" coders.
For most folks, "hacking" tends to evoke one particular of two illustrations or photos: a stereotypically out-of-form nerd in their parents' basement or a smooth, leather-clad cyberpunk in a Male Fawkes mask who moonlights as an excess on a Wachowski movie.
But in reality, most of what we connect with "hacking" is really "phishing."  In actuality, past 12 months, then-Secretary of Homeland Security Jeh Johnson explained that phishing is the menace his section fears most.
THIS IS NOT WHAT HACKERS Seem LIKE. Except when they do, which is from time to time. Photo by Vincent Diamonte/Flickr.
two. Phishing is a variety of rip-off that disguises itself as some thing trustworthy.
It can be an e-mail, telephone connect with, or textual content message, and it then tips you into offering up your passwords, credit card figures, and a lot more. All it normally takes are some intelligent social expertise in addition some free of charge on the internet resources utilised by information and facts stability experts that, technically, any person can use. (A minimal coding awareness isn't going to damage, however.)
three. Lots of hackers are savvier than you could think.
It isn't going to matter if you have the ideal anti-virus software program installed on your personal computer and operate every day checks for malware together with Ghostery and ad block to hold your on the internet searching excess-safe and sound. Don't get me improper — viruses and malware are nevertheless perilous. But phishing just isn't about personal computers. It really is about folks. And that is a ton more durable to shield from.
"Phishing is not (just) about finding a human being who is technically naive," Cory Doctorow, a sci-fi author, journalist, and engineering activist informed Locus magazine.  As savvy as he is, even he fell for a phishing hack back in 2010. "It is about attacking the seemingly impregnable defenses of the technically advanced right up until you come across a solitary, incredibly unlikely, short-lived crack in the wall."
"It is a matter of being caught out in a minute of distraction and of unlikely circumstance." In other words, it can materialize to any person.
Smile! I'm thieving your identification! Picture by using Pixnio.
four. The terrible typos and grammar in some phishing techniques are intentional.
You might be likely familiar with the typical "Nigerian prince" phishing scheme, in which some type of foreign dignitary e-mails you and features you a ton of revenue to support facilitate the transfer of their new bajillion-dollar inheritance. You also likely know that these e-mails are famously riddled with grammatical errors and totally implausible premises.
What you could not know, even so, is that these "mistakes" are carried out on function in buy to concentrate on the most gullible folks. That way, experiences Small business Insider, the scammers don't have to squander their time striving to persuade rational skeptics to give up their lender account information and facts.
Photo by Nate Grigg/Flickr.
five. To hack a specific human being, all a hacker needs is social media.
You know those foolish memes in which you come across your "porn star identify" (or whichever) by using the identify of your initial pet and the street you grew up on?
Now think about those stability questions you had to reply for your on the internet lender account — items like, oh, the identify of your initial pet, the street you grew up on, or your mom's maiden identify.
Yeah. See the connection there? If a hacker wants to social-engineer their way into your lender account, all they have to have to do is poke all-around your public accounts to come across those minimal bits of information and facts. These qualified attacks are named "spearphishing," and they are why Doctorow suggests that folks "only use Fb to influence your pals to communicate with you someplace other than Fb."
Picture from Pixabay.
6. Be careful what you open �� even when it can be despatched by a person you know.
Jeong was hacked just after she clicked on a malicious connection made to appear like it was despatched from a person she realized.
To hack her, Quintin just had to scour Jeong's on the internet existence right up until he observed an acquaintance who could plausibly e-mail her. He made a bogus e-mail deal with — using that person's actual-lifetime profile photo and everything — and that was all it took to get Jeong to give up her information and facts.
Pretend Google Docs scams, like the one particular she fell for, are increasingly prevalent. In these cases, the concentrate on gets a phishing e-mail that appears to be like like a typical invitation to Google Docs despatched from a trustworthy resource — other than that the two the sender and the connection are really malicious frauds. This connection will carry you to a landing web site that resembles the typical Google password screen or lender login web site you considered you were clicking on, and the hacker can use that to capture whichever password or private information and facts you enter into the phony variety.
7. Double-check out your URLs.
Normally make guaranteed you're truly on the internet site that you think you are in advance of you enter any sensitive information and facts.
How do you inform the variation? Usually talking, the domain identify ought to appear like "[blank].google.com" or "http://ift.tt/2tkU3Bs]." If it can be some thing hyphenated like "accounts-travel-google.com" or "boa-accounts-login.com," very well, you ought to likely think 2 times about it.
(Yet another handy suggestion is to appear for SSL certificates, which commonly appear as a lock or eco-friendly textual content in your browser bar — but even that is not totally trustworthy.)
What is actual? What is bogus? Picture from Pixabay.
8. You ought to certainly use two-stage authentication.
I hate to split it to you, but your p@$$w0rd likely just isn't very safe and sound. The minimum you can do, in accordance to CNET, is transform on two-stage authentication. That way, each individual time you log in to an unfamiliar product, you will get a textual content message with a solution code just to make guaranteed it can be you — for the reason that even if a person receives your password, they likely don't have your telephone, far too.
Until they, um, pretty much walked into the AT&T retail outlet and charmed a gross sales rep into changing your telephone selection about to their telephone. Which happens.
nine. And use a password manager.
If you want to be excess excess safe and sound, use a password manager these as LastPass, then established up a DiceWare password like "proper horse battery staple" (or some of these other great ones suggested by the Intercept) that are incredibly simple to keep in mind but future-to-not possible for hackers or personal computers to crack.
Picture from Pixabay.
ten. Don't forget the greatest flaw in your net stability is the trusting mother nature of other folks.
A trusting client company rep can very easily compromise you with out realizing it. Your good friend who mentions you on Fb can do the similar.
Heck, my wife has a relatively gender-ambiguous identify, and I can inform you from private working experience how simple it is to connect with up the lender and fake I'm her — even when I have to charm my way all-around a stability dilemma about her superior college mascot. Which, indeed, I've carried out.
As Jeong wrote, "Thriving social engineers are not just beautifully able of interacting with human beings — they are talented manipulators who choose advantage of our willingness to have confidence in our colleagues, pals, and loved ones."
"You can transform your electronic lifetime into Fort Knox and nevertheless be undone by an extremely trusting salesperson powering a desk."
Fundamental rule: Normally appear about your shoulder. Photo by Arthur Harry Chaudary/Wikimedia Commons.
You can find no way to shield on your own from each individual attainable on the internet vulnerability. But that isn't going to necessarily mean you shouldn't try out!
As we have found, the electrical power of the net can utilised for great or evil. All it normally takes is one particular trusting click, and even the savviest stability experts can come across by themselves compromised.
The ideal you can do is be good and pay notice. A tiny bit of paranoid skepticism will conserve you a ton of time, tension, and energy in the long operate, and that'll free of charge you up to get pleasure from all the wonderful items that the net has to offer you. Have faith in me.
[ad_2] Supply connection
from Viral News Around The World - Feed http://ift.tt/2rJ5dTr via IFTTT
0 notes
socialviralnews · 7 years
Text
How to protect yourself from phishing, from experts who deal with it every day.
Ever wonder what it's like to be hacked? Sarah Jeong did. So naturally, she decided to ask someone to hack her.
Jeong isn't just a random thrill-seeker — she's a respected technology journalist and lawyer, and she knew exactly what she was getting into when she recruited her friend Cooper Quintin of the Electronic Frontier Foundation to help her out. She wrote about her experience in GQ.
All it took was a couple of hours and some readily available tools, and Jeong joined the approximately 12% of the population who have fallen for a hack.
But even before she was successfully hacked — and don't worry, we'll get to that! — both Jeong and Quintin discovered some important truths about the world of online safety and what it takes to infiltrate it.
Here are just a few lessons from experts that we can all benefit from:
Photo by Blogtrepreneur/Flickr.
1. Most hacking isn't done by master "Matrix" coders.
For most people, "hacking" tends to evoke one of two images: a stereotypically out-of-shape nerd in their parents' basement or a sleek, leather-clad cyberpunk in a Guy Fawkes mask who moonlights as an extra on a Wachowski movie.
But in reality, most of what we call "hacking" is actually "phishing."  In fact, last year, then-Secretary of Homeland Security Jeh Johnson said that phishing is the threat his department fears most.
THIS IS NOT WHAT HACKERS LOOK LIKE. Except when they do, which is sometimes. Photo by Vincent Diamonte/Flickr.
2. Phishing is a type of scam that disguises itself as something trustworthy.
It can be an email, phone call, or text message, and it then tricks you into giving up your passwords, credit card numbers, and more. All it takes are some clever social skills plus some free online tools used by information security professionals that, technically, anyone can use. (A little coding knowledge doesn't hurt, though.)
3. Many hackers are savvier than you might think.
It doesn't matter if you have the best anti-virus software installed on your computer and run daily checks for malware along with Ghostery and ad block to keep your online browsing extra-safe. Don't get me wrong — viruses and malware are still dangerous. But phishing isn't about computers. It's about people. And that's a lot harder to protect against.
"Phishing isn’t (just) about finding a person who is technically naive," Cory Doctorow, a sci-fi author, journalist, and technology activist told Locus magazine.  As savvy as he is, even he fell for a phishing hack back in 2010. "It’s about attacking the seemingly impregnable defenses of the technically sophisticated until you find a single, incredibly unlikely, short-lived crack in the wall."
"It’s a matter of being caught out in a moment of distraction and of unlikely circumstance." In other words, it can happen to anyone.
Smile! I'm stealing your identity! Image via Pixnio.
4. The terrible typos and grammar in some phishing schemes are intentional.
You're probably familiar with the classic "Nigerian prince" phishing scheme, where some kind of foreign dignitary emails you and offers you a ton of money to help facilitate the transfer of their new bajillion-dollar inheritance. You also probably know that these emails are famously riddled with grammatical errors and totally implausible premises.
What you might not know, however, is that these "mistakes" are done on purpose in order to target the most gullible people. That way, reports Business Insider, the scammers don't have to waste their time trying to persuade rational skeptics to give up their bank account information.
Photo by Nate Grigg/Flickr.
5. To hack a specific person, all a hacker needs is social media.
You know those silly memes where you find your "porn star name" (or whatever) by using the name of your first pet and the street you grew up on?
Now think about those security questions you had to answer for your online bank account — things like, oh, the name of your first pet, the street you grew up on, or your mom's maiden name.
Yeah. See the connection there? If a hacker wants to social-engineer their way into your bank account, all they need to do is poke around your public accounts to find those little bits of information. These targeted attacks are called "spearphishing," and they're why Doctorow recommends that people "only use Facebook to convince your friends to communicate with you somewhere other than Facebook."
Image from Pixabay.
6. Be careful what you open — even when it's sent by someone you know.
Jeong was hacked after she clicked on a malicious link made to look like it was sent from someone she knew.
To hack her, Quintin just had to scour Jeong's online presence until he found an acquaintance who could plausibly email her. He made a fake email address — using that person's real-life profile picture and everything — and that was all it took to get Jeong to give up her information.
Fake Google Docs scams, like the one she fell for, are increasingly common. In these cases, the target receives a phishing email that looks like a standard invitation to Google Docs sent from a trustworthy source — except that both the sender and the link are actually malicious frauds. This link will bring you to a landing page that resembles the standard Google password screen or bank login page you thought you were clicking on, and the hacker can use that to capture whatever password or personal information you enter into the false form.
7. Double-check your URLs.
Always make sure you're really on the website that you think you are before you enter any sensitive information.
How do you tell the difference? Generally speaking, the domain name should look like "[blank].google.com" or "http://ift.tt/2tkU3Bs]." If it's something hyphenated like "accounts-drive-google.com" or "boa-accounts-login.com," well, you should probably think twice about it.
(Another helpful tip is to look for SSL certificates, which usually appear as a lock or green text in your browser bar — but even that's not totally reliable.)
What is real? What is fake? Image from Pixabay.
8. You should definitely use two-step authentication.
I hate to break it to you, but your p@$$w0rd probably isn't very safe. The least you can do, according to CNET, is turn on two-step authentication. That way, every time you log in to an unfamiliar device, you'll get a text message with a secret code just to make sure it's you — because even if someone gets your password, they probably don't have your phone, too.
Unless they, um, literally walked into the AT&T store and charmed a sales rep into changing your phone number over to their phone. Which happens.
9. And use a password manager.
If you want to be extra extra safe, use a password manager such as LastPass, then set up a DiceWare password like "correct horse battery staple" (or some of these other great ones recommended by the Intercept) that are incredibly easy to remember but next-to-impossible for hackers or computers to crack.
Image from Pixabay.
10. Remember the greatest flaw in your internet security is the trusting nature of other people.
A trusting customer service rep can easily compromise you without realizing it. Your friend who mentions you on Facebook can do the same.
Heck, my wife has a fairly gender-ambiguous name, and I can tell you from personal experience how easy it is to call up the bank and pretend I'm her — even when I have to charm my way around a security question about her high school mascot. Which, yes, I've done.
As Jeong wrote, "Successful social engineers are not just perfectly capable of interacting with human beings — they are talented manipulators who take advantage of our willingness to trust our colleagues, friends, and family."
"You can turn your digital life into Fort Knox and still be undone by an overly trusting salesperson behind a desk."
Basic rule: Always look over your shoulder. Photo by Arthur Harry Chaudary/Wikimedia Commons.
There's no way to protect yourself from every possible online vulnerability. But that doesn't mean you shouldn't try!
As we've seen, the power of the internet can used for good or evil. All it takes is one trusting click, and even the savviest security professionals can find themselves compromised.
The best you can do is be smart and pay attention. A tiny bit of paranoid skepticism will save you a lot of time, stress, and energy in the long run, and that'll free you up to enjoy all the wonderful things that the internet has to offer. Trust me.
from Upworthy http://ift.tt/2sPwOCj via cheap web hosting
0 notes