So it's still ultimately the victim opening a dodgy email attachment or link. Apparently, people will never learn not to do this.
Cybersecurity
c/cybersecurity is a community centered on the cybersecurity and information security profession. You can come here to discuss news, post something interesting, or just chat with others.
THE RULES
Instance Rules
- Be respectful. Everyone should feel welcome here.
- No bigotry - including racism, sexism, ableism, homophobia, transphobia, or xenophobia.
- No Ads / Spamming.
- No pornography.
Community Rules
- Idk, keep it semi-professional?
- Nothing illegal. We're all ethical here.
- Rules will be added/redefined as necessary.
If you ask someone to hack your "friends" socials you're just going to get banned so don't do that.
Learn about hacking
Other security-related communities [email protected] [email protected] [email protected] [email protected] [email protected]
Notable mention to [email protected]
You get 20 emails a week with pdfs attached claiming to be sponsoring offers. How do you know the malware one is laced with malware?
You really don't. The clever bit is the social engineering so that the victim has their guard down. But it does pay to be extra careful with all email attachments and links.
It's more nuanced than that. Collaboration is often initiated by simple, "Hey, can we collaborate?" emails, and that's how these are crafted to look. Legitimate emails of this sort may or may not have attached business proposals.
What is being exploited here is the banality of these kinds of routine business interactions, and it highlights where people have gotten lax in their own practices.
So while I agree that it's essentially people not following the same standard security advice that's been repeated over the last two decades, there's an element of "business dealings are not exempt" that many of these and future entrepreneurs need to remember.