mathstodon.xyz is one of the many independent Mastodon servers you can use to participate in the fediverse.
A Mastodon instance for maths people. We have LaTeX rendering in the web interface!

Server stats:

2.8K
active users

Andrew

apparently i passed a phishing awareness test last week by correctly ignoring a fake linkedin email

nobody tell my boss that i ignored it entirely on the assumption that it was a real linkedin email

@ellenor2000 I mean, if I'd opened it it'd have been perfectly clear it was fake, I just trashed it based on the subject line, I never even asked myself if it was real.

it's like if someone tried to sneak into my house by pretending to be a vacuum salesperson, I don't care if you're real, you're not coming in

@andrewt this guy gets it!!! The best way to win is to not play stupid games!

@andrewt I’m still of the opinion that those false phishing emails that IT departments send out are almost completely pointless. The emails about security training I find often look way more like real phishing emails than the emulated attacks.

@panegyr apparently we're getting one of them soon, half a mind to report it as a phishing email

@panegyr @andrewt Forwarding IT's own messages to their phishing inbox will never not be hilarious.

@Rhodium103 @panegyr @andrewt "This email purporting to be from IT with really bad grammar and poor security hygiene is trying to get me to click on a suspicious link claiming it's a mandatory security training"

@panegyr @andrewt I believe there's data to back that up which is why they're discouraged as a bad practice (and I vetoed a plan to do them back when I was Andrew's boss!)

@laser @panegyr apparently the system has flagged it as a concern that I didn't report the fake email

i also didn't check the dog shit in the street wasn't poisoned before deciding not to eat it, I don't think this should count against me

@andrewt @laser @panegyr I will happily report every LinkedIn email as a phishing attempt.

And the company newsletter.

And the security emails.

And the Jira notifications.

And the meeting invites.

And the emails demanding I stop reporting everything as a phishing attempt.

Can't be too careful these days.

@panegyr @andrewt
> The emails about security training I find often look way more like real phishing emails than the emulated attacks.

i literally found one of these from my bank this morning

in my spam box

@panegyr @andrewt I have a total of 4 emails in my corporate spam folder that were all put there by the service itself. They are all sent from my company’s security department. They all have the same header, and I assume the same content since I haven’t read them. They are from different time periods. The header reminds me that I need to do the mandatory class regarding email security. Am I going to read them? Duck no! Will I do the class? Sure, if the request does not end up as spam first

@jolle

I crafted an email filter at my previous employer that searched the raw header for the string “knowbe4” and filtered it to spam, this successfully killed off any emulated phishing attacks and also reminders to do security training, which sends one once a week with a continuously rising number of days lmao

@andrewt I have an outlook rule that auto-deletes them based on the extra header they insert. Will be dropping that one in the company slack at the end of my notice period I think 🙂

@andrewt I used to work with a guy who liked to say, "Can't get phished if I don't read my email!"

@benhamill @andrewt I prefer "can't get phished if you don't know any passwords".

@dalias @benhamill

fake login page: enter your password
me: send password reminder
fake login page: shit, er... maybe an ex partner?

@andrewt A company I worked for hired consultants to send us periodic phishing emails. The emails were sent from assorted domains that were all registered to the consulting company.

Back in the day, WHOIS data was public, so after the first email, I simply looked up all their domains and configured my mail client to flag any mail from those domains with a special label.

This was probably contrary to the spirit of the security awareness program, but I like to think it demonstrated initiative.

@angusm @andrewt @SuperMoosie lol they still do dumb stuff like that, our current pack of idiots include a X-header that mentions their company name phishing test, so I filter on that, unpack the mangled link courtesy of URLdefense, and “click” the link once per minute for a week straight

@andrewt I got into trouble for twice ignoring an email inviting me to complete a questionnaire about phishing awareness on the basis that I thought it was a phishing exercise I instructed the staff that I line managed to also ignore it. We were the only team that didn't complete it

@PatriciaLewis the tool they are training us to use accidentally got rolled out too early so the first I heard if it was when my computer popped up a screen for no apparent reason saying "do you want to grant PhishHook access to your Google account" so now I haven't got the chrome extension installed and I don't think this is a me problem

@andrewt My methods to not falling for phishing is ignoring all my emails and waiting for the "We haven't gotten your response" email from my manager herself. Highly efficient.

@kelce oh by far the most common phish we get is someone pretending to be the CEO and saying she needs us to text her on some unfamiliar number urgently

@andrewt I play it safe at work, and ignore ALL emails

@andrewt I don't much care for phishing tests; I don't feel that the truly train users on telling the difference between real and fake links.

@cambridgeport90 I think if I click on every single one of their fake phishing links and no real phishing links I should unlock a bonus stage

@andrewt Haha. That would be funny...if companies would actually start using gamification features in their training, I think people would both want to do it,and they would learn more.

@andrewt My own place of work did a similar test. I only clicked the link and provided (fake) credentials after I discovered from colleagues that it was a test. Still waiting to hear from the IT department about my failure.

@andrewt @punko

Our new favorite game is reporting all the stupid real emails (HR in particular likes to send just random ass links to things or attachments) to the spam queue. I’m pretty sure IT is gonna come ask me to rein my team in pretty soon here. 🤣

@andrewt personally I find those fake phising messages by providers like #SoSafe annoying, as I treat any attempt of information extraction and intrusion equally serious.

I wrote them a pissed-off mail once and told them to stop insulting my intellect and wasting my time, cuz if it wasn't obvious they got paid for that shit I wpuld've pulled everything I legally can to 'burn' their entire ASN, IP allocations and domains as #spammers...

@andrewt <old job> used to use phishme, who put phishme headers in the phishing awareness test emails, so I just made an outlook rule to mark them "phishing test" based on the headers XD

@andrewt
👨‍💼 "Good job ignoring that fake Facebook notification email."

:blobowo:​ *does not have Facebook* "Thanks."

@andrewt

LoL
:) <- me giving up trying to find a smiley face emoji.

@andrewt I pass these tests just by not reading my email. That's remarkably easy now that 95% of all communications are done by company Slack now.

@enmodo yeah, we let very few phishers into the company slack, it works great

@andrewt

Is there such a thing as a real linkedin email?

@dsbeans well, I mean there's "someone trying to get your details through trickery" as opposed to "linkedin in particular trying to get your details through trickery"