Scam Of The Week: The Evil Airline Phishing Attack
-
@IRJ said in Scam Of The Week: The Evil Airline Phishing Attack:
@RojoLoco said in Scam Of The Week: The Evil Airline Phishing Attack:
@scottalanmiller said in Scam Of The Week: The Evil Airline Phishing Attack:
@IRJ said in Scam Of The Week: The Evil Airline Phishing Attack:
@mlnews said in Scam Of The Week: The Evil Airline Phishing Attack:
@IRJ said in Scam Of The Week: The Evil Airline Phishing Attack:
Is there an actual blog link so I can share?
https://mangolassi.it/topic/13150/scam-of-the-week-the-evil-airline-phishing-attack/
Believe me I love mangolassi, but sending management to a forum to read a security article, probably won't be as effective as sending them to a blog link.
btw
https://blog.knowbe4.com/scam-of-the-week-the-evil-airline-phishing-attackWhat makes management respond to one form of blogging in one way and not the other? That reaction should be a security concern. The difference between a blog and a forum is only one of perception.
Sure, but if an individual knows that their boss would prefer blog post A to forum post B, then you give them the blog post instead of trying to convince them that their perception is skewed. That's called "keeping your job 101".
It has to do with legitimacy. Sure anyone can build a corporate style website, but it's quite a bit of effort compared to making a post on a forum and acting like an expert. Also, KnowBe4 is a known player and they produce regular, reputable content.
But it was KnowBe4 making the post here. I was taking that into account.
-
@IRJ said in Scam Of The Week: The Evil Airline Phishing Attack:
@scottalanmiller , wasn't the reason fo ML because SW got to be a bunch of home users and managers with no IT knowledge?
No, not the driving reason.
-
Look at curtis. He has alot of "cred" when you look at his SW points, But everything he posts is garbage.
-
@IRJ said in Scam Of The Week: The Evil Airline Phishing Attack:
@RojoLoco said in Scam Of The Week: The Evil Airline Phishing Attack:
@scottalanmiller said in Scam Of The Week: The Evil Airline Phishing Attack:
@IRJ said in Scam Of The Week: The Evil Airline Phishing Attack:
@mlnews said in Scam Of The Week: The Evil Airline Phishing Attack:
@IRJ said in Scam Of The Week: The Evil Airline Phishing Attack:
Is there an actual blog link so I can share?
https://mangolassi.it/topic/13150/scam-of-the-week-the-evil-airline-phishing-attack/
Believe me I love mangolassi, but sending management to a forum to read a security article, probably won't be as effective as sending them to a blog link.
btw
https://blog.knowbe4.com/scam-of-the-week-the-evil-airline-phishing-attackWhat makes management respond to one form of blogging in one way and not the other? That reaction should be a security concern. The difference between a blog and a forum is only one of perception.
Sure, but if an individual knows that their boss would prefer blog post A to forum post B, then you give them the blog post instead of trying to convince them that their perception is skewed. That's called "keeping your job 101".
It has to do with legitimacy. Sure anyone can build a corporate style website, but it's quite a bit of effort compared to making a post on a forum and acting like an expert. Also, KnowBe4 is a known player and they produce regular, reputable content.
Remember that KnowBe4 is a verified vendor here in ML. So the same kind of verification process that you would have from someone checking a corporate blog.
-
@scottalanmiller said in Scam Of The Week: The Evil Airline Phishing Attack:
@IRJ said in Scam Of The Week: The Evil Airline Phishing Attack:
@RojoLoco said in Scam Of The Week: The Evil Airline Phishing Attack:
@scottalanmiller said in Scam Of The Week: The Evil Airline Phishing Attack:
@IRJ said in Scam Of The Week: The Evil Airline Phishing Attack:
@mlnews said in Scam Of The Week: The Evil Airline Phishing Attack:
@IRJ said in Scam Of The Week: The Evil Airline Phishing Attack:
Is there an actual blog link so I can share?
https://mangolassi.it/topic/13150/scam-of-the-week-the-evil-airline-phishing-attack/
Believe me I love mangolassi, but sending management to a forum to read a security article, probably won't be as effective as sending them to a blog link.
btw
https://blog.knowbe4.com/scam-of-the-week-the-evil-airline-phishing-attackWhat makes management respond to one form of blogging in one way and not the other? That reaction should be a security concern. The difference between a blog and a forum is only one of perception.
Sure, but if an individual knows that their boss would prefer blog post A to forum post B, then you give them the blog post instead of trying to convince them that their perception is skewed. That's called "keeping your job 101".
It has to do with legitimacy. Sure anyone can build a corporate style website, but it's quite a bit of effort compared to making a post on a forum and acting like an expert. Also, KnowBe4 is a known player and they produce regular, reputable content.
But it was KnowBe4 making the post here. I was taking that into account.
right, but my manager wouldn't have known. That is all I was saying
-
@IRJ said in Scam Of The Week: The Evil Airline Phishing Attack:
Look at curtis. He has alot of "cred" when you look at his SW points, But everything he posts is garbage.
SW has no cred system. It only has an "activity" system. But I'm unclear what that means in this context. We are talking about the same person posting on one blog or another. Curtis posting on a corporate blog should be considered a joke, being on a corporate blog should not give him any credibility.
-
@scottalanmiller said in Scam Of The Week: The Evil Airline Phishing Attack:
@IRJ said in Scam Of The Week: The Evil Airline Phishing Attack:
Look at curtis. He has alot of "cred" when you look at his SW points, But everything he posts is garbage.
SW has no cred system. It only has an "activity" system. But I'm unclear what that means in this context. We are talking about the same person posting on one blog or another. Curtis posting on a corporate blog should be considered a joke, being on a corporate blog should not give him any credibility.
Any legitimate blog would filter his post, before posting it. In a forum all posts can be found and/or linked.
-
@scottalanmiller said in Scam Of The Week: The Evil Airline Phishing Attack:
@IRJ said in Scam Of The Week: The Evil Airline Phishing Attack:
Look at curtis. He has alot of "cred" when you look at his SW points, But everything he posts is garbage.
SW has no cred system.
I was referring to pepper points.
-
@IRJ said in Scam Of The Week: The Evil Airline Phishing Attack:
@scottalanmiller said in Scam Of The Week: The Evil Airline Phishing Attack:
@IRJ said in Scam Of The Week: The Evil Airline Phishing Attack:
Look at curtis. He has alot of "cred" when you look at his SW points, But everything he posts is garbage.
SW has no cred system. It only has an "activity" system. But I'm unclear what that means in this context. We are talking about the same person posting on one blog or another. Curtis posting on a corporate blog should be considered a joke, being on a corporate blog should not give him any credibility.
Any legitimate blog would filter his post, before posting it. In a forum all posts can be found and/or linked.
So a corporate blog on the Internet is like a verified corporate blogger on the Internet
-
@IRJ said in Scam Of The Week: The Evil Airline Phishing Attack:
@scottalanmiller said in Scam Of The Week: The Evil Airline Phishing Attack:
@IRJ said in Scam Of The Week: The Evil Airline Phishing Attack:
Look at curtis. He has alot of "cred" when you look at his SW points, But everything he posts is garbage.
SW has no cred system.
I was referring to pepper points.
Me too. There is no credibility tied to that system. It is a measurement of activity and nothing else. Never supposed to show anything but that. Was never supposed to encourage anything other than participation. The idea that it was connected to credibility was just made up by some community members who spread it as a rumous.
-
@scottalanmiller said in Scam Of The Week: The Evil Airline Phishing Attack:
@IRJ said in Scam Of The Week: The Evil Airline Phishing Attack:
@scottalanmiller said in Scam Of The Week: The Evil Airline Phishing Attack:
@IRJ said in Scam Of The Week: The Evil Airline Phishing Attack:
Look at curtis. He has alot of "cred" when you look at his SW points, But everything he posts is garbage.
SW has no cred system. It only has an "activity" system. But I'm unclear what that means in this context. We are talking about the same person posting on one blog or another. Curtis posting on a corporate blog should be considered a joke, being on a corporate blog should not give him any credibility.
Any legitimate blog would filter his post, before posting it. In a forum all posts can be found and/or linked.
So a corporate blog on the Internet is like a verified corporate blogger on the Internet
- Look at Knowbe4's website, it obviously wasn't thrown together in a week. They are an actual legitmate company that makes a profit. They aren't going to have someone like curtis post shit content and ruin their name.
or
- Anybody can log into a forum and make an account.
-
@IRJ said in Scam Of The Week: The Evil Airline Phishing Attack:
- Anybody can log into a forum and make an account.
But not as a certified vendor, which we've established was the point. KnowBe4's site could easily be copied, completely, and set up at a different domain with alternative content here and there. The "look and feel" of a site is not a good security protocol to use. If you know a site / forum and frequent it that is one thing. But if you need someone to bring you information about something, that's not a reliable way to tell. If the fear is that the blog has misleading information meant to mislead you, then taking the small time to copy a site from somewhere else is no big deal.
-
@scottalanmiller said in Scam Of The Week: The Evil Airline Phishing Attack:
@IRJ said in Scam Of The Week: The Evil Airline Phishing Attack:
- Anybody can log into a forum and make an account.
But not as a certified vendor, which we've established was the point. KnowBe4's site could easily be copied, completely, and set up at a different domain with alternative content here and there. The "look and feel" of a site is not a good security protocol to use. If you know a site / forum and frequent it that is one thing. But if you need someone to bring you information about something, that's not a reliable way to tell. If the fear is that the blog has misleading information meant to mislead you, then taking the small time to copy a site from somewhere else is no big deal.
Sure, cloning a website is pretty easy. Buying a similar domain to spoof it just to post a blog post is a long shot at best. Not to mention If you went through all this effort, then you are probably pretty knowledgeable on the subject of security.
-
@scottalanmiller said in Scam Of The Week: The Evil Airline Phishing Attack:
@IRJ said in Scam Of The Week: The Evil Airline Phishing Attack:
- Anybody can log into a forum and make an account.
But not as a certified vendor, which we've established was the point. KnowBe4's site could easily be copied, completely, and set up at a different domain with alternative content here and there. The "look and feel" of a site is not a good security protocol to use. If you know a site / forum and frequent it that is one thing. But if you need someone to bring you information about something, that's not a reliable way to tell. If the fear is that the blog has misleading information meant to mislead you, then taking the small time to copy a site from somewhere else is no big deal.
Yes, but you're assuming management will not just assume it's BS, and management is often stupid and goes against its own interests. I get what @IRJ is saying.
-
@thanksajdotcom said in Scam Of The Week: The Evil Airline Phishing Attack:
@scottalanmiller said in Scam Of The Week: The Evil Airline Phishing Attack:
@IRJ said in Scam Of The Week: The Evil Airline Phishing Attack:
- Anybody can log into a forum and make an account.
But not as a certified vendor, which we've established was the point. KnowBe4's site could easily be copied, completely, and set up at a different domain with alternative content here and there. The "look and feel" of a site is not a good security protocol to use. If you know a site / forum and frequent it that is one thing. But if you need someone to bring you information about something, that's not a reliable way to tell. If the fear is that the blog has misleading information meant to mislead you, then taking the small time to copy a site from somewhere else is no big deal.
Yes, but you're assuming management will not just assume it's BS, and management is often stupid and goes against its own interests. I get what @IRJ is saying.
Also, they are a certified vendor. But that's assuming management will:
- Check
- Has at least some information and context as to how the site works, is laid out, etc
- Trusts the judgment of ML to "certify" a vendor
-
@IRJ said in Scam Of The Week: The Evil Airline Phishing Attack:
@scottalanmiller said in Scam Of The Week: The Evil Airline Phishing Attack:
@IRJ said in Scam Of The Week: The Evil Airline Phishing Attack:
- Anybody can log into a forum and make an account.
But not as a certified vendor, which we've established was the point. KnowBe4's site could easily be copied, completely, and set up at a different domain with alternative content here and there. The "look and feel" of a site is not a good security protocol to use. If you know a site / forum and frequent it that is one thing. But if you need someone to bring you information about something, that's not a reliable way to tell. If the fear is that the blog has misleading information meant to mislead you, then taking the small time to copy a site from somewhere else is no big deal.
Sure, cloning a website is pretty easy. Buying a similar domain to spoof it just to post a blog post is a long shot at best. Not to mention If you went through all this effort, then you are probably pretty knowledgeable on the subject of security.
Not really. No security knowledge needed to do that. Very, very entry level non-security stuff. If "corporate look" is the criteria making a site look reliable, it makes the process that much easier and more reliable to try doing.
-
@thanksajdotcom said in Scam Of The Week: The Evil Airline Phishing Attack:
@thanksajdotcom said in Scam Of The Week: The Evil Airline Phishing Attack:
@scottalanmiller said in Scam Of The Week: The Evil Airline Phishing Attack:
@IRJ said in Scam Of The Week: The Evil Airline Phishing Attack:
- Anybody can log into a forum and make an account.
But not as a certified vendor, which we've established was the point. KnowBe4's site could easily be copied, completely, and set up at a different domain with alternative content here and there. The "look and feel" of a site is not a good security protocol to use. If you know a site / forum and frequent it that is one thing. But if you need someone to bring you information about something, that's not a reliable way to tell. If the fear is that the blog has misleading information meant to mislead you, then taking the small time to copy a site from somewhere else is no big deal.
Yes, but you're assuming management will not just assume it's BS, and management is often stupid and goes against its own interests. I get what @IRJ is saying.
Also, they are a certified vendor. But that's assuming management will:
- Check
- Has at least some information and context as to how the site works, is laid out, etc
- Trusts the judgment of ML to "certify" a vendor
No, my point was that the same verification would be needed in both cases. So if the same diligence isn't done in both cases, then my point about security should be correct.
-
@scottalanmiller said in Scam Of The Week: The Evil Airline Phishing Attack:
@thanksajdotcom said in Scam Of The Week: The Evil Airline Phishing Attack:
@thanksajdotcom said in Scam Of The Week: The Evil Airline Phishing Attack:
@scottalanmiller said in Scam Of The Week: The Evil Airline Phishing Attack:
@IRJ said in Scam Of The Week: The Evil Airline Phishing Attack:
- Anybody can log into a forum and make an account.
But not as a certified vendor, which we've established was the point. KnowBe4's site could easily be copied, completely, and set up at a different domain with alternative content here and there. The "look and feel" of a site is not a good security protocol to use. If you know a site / forum and frequent it that is one thing. But if you need someone to bring you information about something, that's not a reliable way to tell. If the fear is that the blog has misleading information meant to mislead you, then taking the small time to copy a site from somewhere else is no big deal.
Yes, but you're assuming management will not just assume it's BS, and management is often stupid and goes against its own interests. I get what @IRJ is saying.
Also, they are a certified vendor. But that's assuming management will:
- Check
- Has at least some information and context as to how the site works, is laid out, etc
- Trusts the judgment of ML to "certify" a vendor
No, my point was that the same verification would be needed in both cases. So if the same diligence isn't done in both cases, then my point about security should be correct.
And that's true, the same verification would be needed. But one is already established in the field as such, whereas following a process that was probably already done at a previous time for this site would be extraneous work for a manager just to drive clicks. In this case, it makes more sense, from a business standpoint, to just use the original blog post link.
-
@thanksajdotcom said in Scam Of The Week: The Evil Airline Phishing Attack:
@scottalanmiller said in Scam Of The Week: The Evil Airline Phishing Attack:
@thanksajdotcom said in Scam Of The Week: The Evil Airline Phishing Attack:
@thanksajdotcom said in Scam Of The Week: The Evil Airline Phishing Attack:
@scottalanmiller said in Scam Of The Week: The Evil Airline Phishing Attack:
@IRJ said in Scam Of The Week: The Evil Airline Phishing Attack:
- Anybody can log into a forum and make an account.
But not as a certified vendor, which we've established was the point. KnowBe4's site could easily be copied, completely, and set up at a different domain with alternative content here and there. The "look and feel" of a site is not a good security protocol to use. If you know a site / forum and frequent it that is one thing. But if you need someone to bring you information about something, that's not a reliable way to tell. If the fear is that the blog has misleading information meant to mislead you, then taking the small time to copy a site from somewhere else is no big deal.
Yes, but you're assuming management will not just assume it's BS, and management is often stupid and goes against its own interests. I get what @IRJ is saying.
Also, they are a certified vendor. But that's assuming management will:
- Check
- Has at least some information and context as to how the site works, is laid out, etc
- Trusts the judgment of ML to "certify" a vendor
No, my point was that the same verification would be needed in both cases. So if the same diligence isn't done in both cases, then my point about security should be correct.
And that's true, the same verification would be needed. But one is already established in the field as such, whereas following a process that was probably already done at a previous time for this site would be extraneous work for a manager just to drive clicks. In this case, it makes more sense, from a business standpoint, to just use the original blog post link.
And we don't want to cause issues for our loyal people, like @IRJ
-
@thanksajdotcom said in Scam Of The Week: The Evil Airline Phishing Attack:
@scottalanmiller said in Scam Of The Week: The Evil Airline Phishing Attack:
@thanksajdotcom said in Scam Of The Week: The Evil Airline Phishing Attack:
@thanksajdotcom said in Scam Of The Week: The Evil Airline Phishing Attack:
@scottalanmiller said in Scam Of The Week: The Evil Airline Phishing Attack:
@IRJ said in Scam Of The Week: The Evil Airline Phishing Attack:
- Anybody can log into a forum and make an account.
But not as a certified vendor, which we've established was the point. KnowBe4's site could easily be copied, completely, and set up at a different domain with alternative content here and there. The "look and feel" of a site is not a good security protocol to use. If you know a site / forum and frequent it that is one thing. But if you need someone to bring you information about something, that's not a reliable way to tell. If the fear is that the blog has misleading information meant to mislead you, then taking the small time to copy a site from somewhere else is no big deal.
Yes, but you're assuming management will not just assume it's BS, and management is often stupid and goes against its own interests. I get what @IRJ is saying.
Also, they are a certified vendor. But that's assuming management will:
- Check
- Has at least some information and context as to how the site works, is laid out, etc
- Trusts the judgment of ML to "certify" a vendor
No, my point was that the same verification would be needed in both cases. So if the same diligence isn't done in both cases, then my point about security should be correct.
And that's true, the same verification would be needed. But one is already established in the field as such, whereas following a process that was probably already done at a previous time for this site would be extraneous work for a manager just to drive clicks. In this case, it makes more sense, from a business standpoint, to just use the original blog post link.
You missed my point. What makes it easier?