▲ | typpilol 3 days ago | |||||||
But this wasn't even really a spear fishing attack. It was a generic Phish email you were in every single Corp 101 security course | ||||||||
▲ | acdha 3 days ago | parent [-] | |||||||
The attacker did have a great domain name choice, didn’t overuse it to the point where it got on spam block lists, and got them at a moment of distraction, so it worked. It’s really easy to look at something in a training exercise and say “who’d fall for that” without thinking about what happens when you’re not at your best in a calm, focused state. My main point was simply that the better response isn’t to mock them but to build systems which can’t fail this badly. WebAuthn is great, but you have to go all in if you want to prevent phishing. NPM would also benefit immensely from putting speed bumps and things like code signing requirements in place, but that’s a big usability hit if it’s not carefully implemented. | ||||||||
|