this post was submitted on 31 Aug 2023
1599 points (99.1% liked)

Comic Strips

12794 readers
4890 users here now

Comic Strips is a community for those who love comic stories.

The rules are simple:

Web of links

founded 1 year ago
MODERATORS
 
top 50 comments
sorted by: hot top controversial new old
[–] [email protected] 128 points 1 year ago* (last edited 1 year ago) (4 children)

A lot of hacking is actually social engineering. It's not hard to get a tech-illiterate person to give up their password, and that's the softest target for an attack.

[–] yokonzo 54 points 1 year ago (1 children)

I prefer the old “drop a usb in the parking lot”

[–] [email protected] 39 points 1 year ago (5 children)

Be sure to put a label on it that says "secrets!"

[–] [email protected] 37 points 1 year ago (2 children)

Nowadays you'd probably be more likely to get a hit by putting an "Anime titties" label on the drive

[–] Viking_Hippie 38 points 1 year ago

Why would you drop a drive full of world news?

[–] [email protected] 7 points 1 year ago

I'm interested.

[–] [email protected] 8 points 1 year ago (4 children)

I prefer a label that says, "Warning: USB stick contains scary virus. Do not plug into a computer"

load more comments (4 replies)
[–] xantoxis 8 points 1 year ago

Just put the CEO's name on it and a very recent date. They'll be dying to know what secret information the CEO was carrying around.

load more comments (1 replies)
[–] UnculturedSwine 22 points 1 year ago (3 children)

Or even jaded tech savvy people. I work in IT and there have been a number of times that I have witnessed or heard about people who know better causing an incident because they're burnt out or irate.

[–] [email protected] 36 points 1 year ago (1 children)

"Wait a second...I don't give a shit about this company."

[–] [email protected] 17 points 1 year ago

This seems like there is an idea for a joke or a comic here somewhere...

[–] [email protected] 9 points 1 year ago

Happy employees are less likely to be socially engineered? Wow shocker

load more comments (1 replies)
[–] CurlyMoustache 12 points 1 year ago (5 children)

That's a good point! I like the way you think! What is your password?

[–] Frozengyro 18 points 1 year ago* (last edited 1 year ago) (2 children)

It's *******, what's yours?

Edit: that's cool, Lemmy blocks it out!

[–] [email protected] 10 points 1 year ago

Ah, cool, let me try:

iWantToSuckFrozengyro'sToes69

load more comments (1 replies)
[–] son_named_bort 16 points 1 year ago (1 children)
load more comments (1 replies)
load more comments (3 replies)
[–] [email protected] 94 points 1 year ago (2 children)

Hacker voice: "I'm in"

Looks at overly complicated industry software he's never even heard of before

"I'm out"

[–] psycho_driver 41 points 1 year ago (1 children)

"Looks like these guys have already been hit with ransomware."

[–] [email protected] 30 points 1 year ago
[–] [email protected] 13 points 1 year ago (1 children)

Wait, I have an idea! Yes, just as I thought, I can overlay their proprietary operating system with this fancy looking graphical interface that resembles nothing and gain full control of their system. I'm back in!

[–] [email protected] 74 points 1 year ago* (last edited 1 year ago) (5 children)

We have these obligatory online seminars about web security /privacy at work.

Turns out that for some reason, with Privacy Badger enabled, they appear as "passed" instantly. I never saw a single second of these endless seminars.

I tried to tell the IT guy but he couldn't care less and I suspect he didn't even know what Privacy Badger actually is

[–] [email protected] 60 points 1 year ago

"Working as intended" - the dev who loves Privacy Badger.

[–] [email protected] 31 points 1 year ago

Or maybe he feels that these seminars are for people who don't use things like privacy badger.

[–] [email protected] 14 points 1 year ago

It seems like you don't need Training then (:

load more comments (2 replies)
[–] joel_feila 53 points 1 year ago (3 children)

Its like the only accurate part of hackers

load more comments (3 replies)
[–] [email protected] 45 points 1 year ago (15 children)

We get fake phishing emails that are actually from IT and if we don't recognize and report them, we get a talking-to. It's a good way of keeping employees vigilant.

[–] cynar 36 points 1 year ago (5 children)

A friend (who actually works in IT) apparently has a good system at his company. It actually automates turning real phishing attempts into internal tests. It effectively replaces links etc and sends it onwards. If the user actually clicks through, their account is immediately locked. It requires them to contact IT to unlock it again, often accompanied by additional training.

load more comments (5 replies)
[–] [email protected] 32 points 1 year ago (3 children)

My last company did this. They'd also send out surveys and training from addresses I didn't recognize, so I'd report those, too, only to be told they were legit 😂

load more comments (3 replies)
[–] SMITHandWESSON 11 points 1 year ago* (last edited 1 year ago) (4 children)

I send supervisor emails about stuff I'm not gonna do to my spam folder as well.....

"Did you get the email?"

"Nope, sorry, it looked a little suspicious so I didn't open and sent it to spam.."

load more comments (4 replies)
[–] HeyJoe 6 points 1 year ago

We do as well, except we only concern ourselves with the people who click them.

load more comments (11 replies)
[–] [email protected] 45 points 1 year ago (1 children)

(Opens DOS, frantically types)
“Heh. I was able to SSH right into their jpg with nothing but an Ethernet cable and router grease.”

[–] yokonzo 29 points 1 year ago* (last edited 1 year ago)

router grease

I don’t think that’s what you think it is sir carefully hides tissues

[–] [email protected] 35 points 1 year ago (1 children)

Nah, this isn't cool. Fuck the company, but this will fuck over the users more than anyone.

[–] WereCat 37 points 1 year ago (1 children)

If company does not give a crap about employee then they don't about customer

[–] nogrub 7 points 1 year ago

companies care about money everything else is means for the purpes

[–] kamen 26 points 1 year ago (1 children)

"I wonder why they'd need my 2FA too, but oh, well... "

[–] AssPennies 9 points 1 year ago (1 children)

You get a duo push! And you get a duo push! ...

load more comments (1 replies)
[–] aviationeast 23 points 1 year ago (2 children)

I might care if they paid me a living wage.

[–] [email protected] 33 points 1 year ago

I’m all for acting your wage, but I don’t want to make victims of anyone who is interacting with my company simply because I was feeling spiteful. The company will be fine, the tons of people who just had their information leaked are the ones who are truly inconvenienced and may face financial repercussions later on when their information is distributed. Just something to consider

load more comments (1 replies)
[–] [email protected] 16 points 1 year ago (2 children)

A good portion of the movie Hackers was social engineering. That's how Mitnick got into a lot of systems as well. Why search for vulnerabilities in apps when people are much easier to manipulate.

[–] joel_feila 9 points 1 year ago

HACK THE PLANET

load more comments (1 replies)
[–] [email protected] 12 points 1 year ago (1 children)

I wonder if that's how my old job had 780 gb of source stolen though social engineering.

[–] xantoxis 11 points 1 year ago (1 children)

780 gb of source code? Sounds a bit overengineered, I bet that was hard to audit for security flaws

[–] [email protected] 7 points 1 year ago

If there's 780 gb of source code, I doubt anyone there has the wherewithall to do security audits

[–] CADmonkey 7 points 1 year ago (1 children)

Pay people enough and this is less likely to happen.

load more comments (1 replies)
load more comments
view more: next ›