Phishing is the attempt to acquire sensitive information by pretending to be a familiar or trustworthy source in an email. Fraudulent emails from popular sites like banks, online payment processors, and IT administrators are commonly used to lure unsuspecting victims.
Essentially, phishing is an information-gathering technique that isn’t necessarily damaging in and of itself. However, when unsuspecting victims provide bits of information, a savvy criminal can piece them together to gain access to areas and information that are private.
Spear phishing – Attempts directed at specific individuals or companies have been termed spear phishing. Attackers may gather personal information about their target to increase their probability of success.
Clone phishing – An attack whereby a legitimate and previously delivered email containing an attachment or link has had its content and recipient address(es) taken and used to create an almost identical or cloned email. The attachment or link within the email is replaced with a malicious version and then sent from an email address spoofed to appear to come from the original sender. It may claim to be a resend of the original or an updated version to the original. This technique could be used to pivot (indirectly) from a previously infected machine and gain a foothold on another machine, by exploiting the social trust associated with the inferred connection due to both parties receiving the original email.
Whaling – Several recent phishing attacks have been directed specifically at senior executives and other high profile targets within businesses, and the term whaling has been coined for these kinds of attacks.
What should you look for?
Be wary of emails from unknown sources. If you can’t recall having given your email to the company claiming to need more information, there is a good chance it is a phishing scam.
If the list of recipients (To: line) is very large or undisclosed, the email is likely a scam.
If the email is coming from your own email address (From: line), it’s time to change your password because someone is using your name and email to lure others into providing more information.
Links that are misspelled or not quite right are a telltale sign
If an email contains an attachment that you weren’t expecting, do not open it. It may contain a virus.
A Smart Consumer of Digital Information does the following:
Deletes suspicious emails
Does not open unexpected email attachments
Does not click on links in suspicious emails. Links can be doctored or spoofed to look legitimate. If you must go to the website, open a new window and type in the URL then navigate to the page with the information you are looking for.
Is it worth it to be so cautious?
Absolutely. What’s at stake is the integrity of your data and your identity. When it comes to keeping your digital data safe, you can never be too cautious.
Mankato, MN is currently adding 2 roundabouts about a half mile from my house. They are on the same road, consecutive blocks (so, boom-boom).
I’ve been slightly obsessed with roundabouts lately. Not sure why. They seem like such an elegant solution to an often troublesome problem. However, they are not elegant at all if users do not know how to use them properly. I was once a passenger in a car that was being driven by a person who didn’t know how to drive through one. I was scared for my life when she came to a complete stop inside the circle. I guess I’d like for that to never happen again….
Here are some rules of thumb about driving through a roundabout:
- Slow down before you enter.
- Pick your lane. Generally speaking, if you want to leave the circle to the right, chose the right lane. If you want to leave the circle to the left, chose the left lane.
- You may have to stop before you enter the traffic circle.
- Find a gap in the traffic to enter the circle. The traffic in the circle has the right-of-way, yield to it.
- Never switch lanes inside the circle and never overcome another vehicle.
- If you chose your lane properly, you should be able to exit the circle heading in the right direction without having to cross over a lane or another vehicle.
- Use your signal to exit the circle.
The US Department of Transportation Federal Highway Administration has published an entire technical summary of roundabouts that I thought was very interesting and fun to read.
Here are some good tidbits about roundabouts that you may not have considered:
- The geometry of the circle and the roads leading to into it are designed to be taken at slow speeds. It’s difficult to speed through without taking it on 2 wheels….
- Roundabouts are safer than traditional lighted and signed intersections. In fact, roundabouts have been shown to reduce total crashes by 35% and injury crashes by 76%. And think about this: since there are no T-bone crashes, “severe, incapacitating injuries and fatalities are rare, with one study reporting 89-percent reduction in these types of crashes and another reporting 100-percent reduction in fatalities.”
- Roundabouts are cheap! Since there is no hardware or electricity, the only costs are for landscaping maintenance.
- And the best thing is, most of the time you don’t have to stop! No idling makes it better for the environment.
And finally, for your viewing pleasure:
My company (Socket Mobile) wanted to do a 360° feature of some of its products but we were going to have to purchase some sort of software to be able to do it. We decided to do the project in-house.
The project involved three parts: 1) We needed to take professional grade product photographs, then 2) do post production work in Photoshop. And finally, 3) use Adobe Flash to animate the scanner and create a playback control (a slider bar).
My partner, Mike Gifford, and I had basic tools:
• A digital SLR camera
• A decent lens
• 3 external lights
• A tripod
In addition, we had:
• One of those white tent-like things you use to take commercial pictures of products
• A turntable with markings every 10 degrees
• A vise that would be used to hold the product precisely in the middle, precisely upright
The “studio” was set up like this, with a camera and a tripod, focused on the scanner.
Inside the tent, the vise gripped a small bit that stuck straight up. The scanner has a small screw hole in the very bottom that accommodates a screw-in stylus tip. Here we used it to “accommodate” the bit.
I stood just outside the tent, just past the flash unit, so that I could reach in and turn the turntable. We had a mark on the surface underneath the turntable to use as the reference point. Starting at 0 degrees, we took a picture every 15 degrees. (Inevitably, as we began to turn the turntable, the scanner didn’t seem to be straight up and down at certain points. We fixed it later in Photoshop.) We took 24 pictures in all.
In Photoshop, using Bridge, I did a few easy batch jobs. I cropped first because there were a few pictures with my hand still in them on the edge. Then I color balanced, then resized and optimized for the web.
The last post production step was to remove the bit from the images and align them all as precisely as possible.
Simple Interactive Animation
I used Flash to create a simple interactive animation. Just like a flip book, the images, when stacked and flipped through, give the impression that the object is spinning.
In Flash, I put each image in its own key frame, making sure they were all aligned in the same spot on each frame. I used the first one at the beginning and the end, to make one full revolution, 25 frames in all.
Next, I made two rollover buttons, a square and a circle, with only two states, Up and Over. In the Up state it is gray. In the Over state it is Socket orange.
I made 25 unique instances of the buttons, one for each frame.
Each button is linked to a frame (in the Actionscript). When the cursor hovers over a button, it turns Socket orange and displays the corresponding frame. The result is when you slide your cursor over the bar, the scanner spins.
[kml_flashembed publishmethod=”static” fversion=”8.0.0″ movie=”rotateCHS.swf” width=”311″ height=”570″ targetclass=”flashmovie”]
Leave a comment if you’d like the Actionscript 3.0.
A few months ago I moved away from my loved ones so that I could start my new career in the Bay area. The only loved one I took with me was my awesome dog, Colter. It has turned out to be a nice situation, but while I’m at work, the hound has to stay at home by himself. He’s a good ol’ boy and seems to do fine most days. But still, I worry about him and like to keep an eye on him.
To solve this problem, my husband and I came up with a workable solution that involves Skype. This has been such a great solution for me, I thought I’d make an infographic and share! So, if you’d like to keep an eye on your dog while you’re at work, check this out!
(Props to my friend Angella Watterson. She did the infographic and I LOVE IT.)
Okay, so here is a problem I encountered at my work recently:
On a datasheet for a group of products, there was a table on the front and another table on the back. The front table was glossary information about each product, and the back table was detailed data, lots of data. The sort criterion on both tables was the product model number and they were organized alphabetically. So we had products 7C, 7D, 7M, 7P, and 7X.
The problem came when the sales team tried to use the table on the front to tell the customer about the products. While the products were arranged alphabetically by model number, the characteristics of the products seemed to be all over the map, making the information hard to sort out. I would guess a potential customer would have a hard time using this table to make a good decision.
According to my subject matter expert (a sales person), there are usually only three points of information the customer wants to talk about. They are enclosure durability (the case), the engine, and the firmware. Instead of organizing the information based on the name of the product, I organized the information based on the enclosure durability.
I chose this criterion using this logic:
- More people want to know about the engine or the enclosure durability. Only a few people want to know about the firmware.
- The enclosure durability was something that could be made visible with an image to accompany the data.
- The glossary table on the front can help the customer make a decision about which model would best suit their needs.
- The detailed table on the back, organized alphabetically, can be used as a reference tool.
This is a better organization of the information altogether. Now the sales person can present the products in terms of the durability of the case, and then move on to talking about what the customer needs in an engine or firmware. When they are ready to find out more about the product, they can turn the sheet over and find the model number in the table on the back.