{"id":15581,"date":"2018-09-17T08:23:41","date_gmt":"2018-09-17T12:23:41","guid":{"rendered":"http:\/\/www.thundercloud.net\/infoave\/new\/?p=15581"},"modified":"2018-09-17T08:23:41","modified_gmt":"2018-09-17T12:23:41","slug":"phishing-is-the-internets-most-successful-con-a-great-read","status":"publish","type":"post","link":"https:\/\/www.thundercloud.net\/infoave\/new\/phishing-is-the-internets-most-successful-con-a-great-read\/","title":{"rendered":"Phishing is the Internet&#8217;s Most Successful Con [A Great Read]"},"content":{"rendered":"<h1 class=\"c-article-header__hed\"><span style=\"font-family: helvetica, arial, sans-serif;\">Phishing Is the Internet\u2019s Most Successful Con<\/span><\/h1>\n<div class=\"c-article-meta\">\n<h3 class=\"c-dek\"><span style=\"font-family: helvetica, arial, sans-serif;\">Tricking people out of sensitive information online is far too easy.<\/span><\/h3>\n<p>(<span style=\"text-decoration: underline;\"><a href=\"https:\/\/www.theatlantic.com\/technology\/archive\/2018\/09\/phishing-is-the-internets-most-successful-con\/569920\/?utm_source=feed\" target=\"_blank\" rel=\"noopener\">From &#8220;The Atlantic&#8221;<\/a><\/span> )<\/p>\n<\/div>\n<blockquote><p>In the classic 1973 heist movie The Sting, two con men\u2014played by Robert Redford and Paul Newman\u2014build a fictitious world in a Depression-era Chicago basement to defraud a corrupt banker. They make an offtrack-betting room, hire actors to ensure the scene is convincing, and even enlist pretend law enforcement to fake-bust their mark. The film is memorable because it is one of the finest movies in the genre, well written and funny, but also because the duo\u2019s work is so meticulously detailed.<\/p>\n<p>The con has changed since then, both short and long. In this age, the online equivalent of The Sting is a phishing site: a fake reality that lives online, set up to capture precious information such as logins and passwords, bank-account numbers, and the other functional secrets of modern life. You don\u2019t get to see these spaces being built, but\u2014like The Sting\u2019s betting room\u2014they can be perfect in every detail. Or they can be thrown together at the last minute like a clapboard set.<\/p>\n<p>This might be the best way to think about phishing: a set built for you, to trick information out of you; built either by con men or, in the case of the recent spear-phishing attack caught and shut down by Microsoft, by spies and agents working for (or with) interfering governments, which seems a bit more sinister than Paul Newman with a jaunty smile and a straw hat.<\/p>\n<p>But perhaps it should not seem so sinister, because phishing is profoundly easy to do. So easy, and comparatively cheap, that any country that isn\u2019t using it as part of its espionage strategy should probably fire its intelligence agency.<\/p>\n<p>Computer security often focuses on malware: software that attacks faults in your computer to take control of it and give that control to someone else. Malware is often sophisticated software that can quietly take over a computer without being detected\u2014from there, it can do anything, from copying every keystroke you type, to watching every page you open, to turning your camera and microphone on and recording you, to encrypting your hard drive and ransoming your computer\u2019s contents back to you. But novel malware is difficult to write, and can take many paid hours for some of the most talented programmers, in addition to finding or buying a security flaw that allows you to get your malware onto someone\u2019s computer undetected. It\u2019s painfully expensive, and often ends up leaving a trail back to the authors.<\/p>\n<p>Phishing doesn\u2019t attack computers. It attacks the people using computers.<\/p>\n<p>Setting up a phishing website is something a summer intern can do in a couple of weeks, and it works. If you were to try to create a phishing version of this article, you could start by saving the complete webpage from your browser\u2014that would get you the picture, text, and code that makes the page you\u2019re reading now. If this article contained an account login, you could put it on a server you control, and maybe register another domain, something like http:\/\/tehatlantic.com. If you enticed someone to try to use their TheAtlantic.com username and password on tehatlantic.com, you would then have that information&#8230;.<\/p>\n<p>John Podesta, the chairman of the Hillary Clinton campaign, was\u00a0<a href=\"https:\/\/www.theatlantic.com\/technology\/archive\/2016\/12\/why-some-people-think-a-typo-cost-clinton-the-election\/510572\/\" data-omni-click=\"r'article',r'',d,r'intext',r'4',r'None'\">famously spear-phished<\/a>\u00a0in 2016 by an email saying someone in Ukraine was attempting to log into his Gmail account. When he clicked the link and entered his username and password (instead of using the Google domain passed along by his own help-desk person), his account was actually captured. His emails, along with Democratic National Committee emails harvested the same way, were later leaked online,<\/p><\/blockquote>\n<p>This article is well-written and worth the time it takes to read it in its entirety. The more you know the less likely you&#8217;ll be become a victim.<a href=\"https:\/\/www.theatlantic.com\/technology\/archive\/2018\/09\/phishing-is-the-internets-most-successful-con\/569920\/?utm_source=feed\" target=\"_blank\" rel=\"noopener\"><strong><span style=\"text-decoration: underline;\"> Please take a few minutes to read this entire article from &#8220;The Atlantic&#8221;.<\/span><\/strong><\/a> You&#8217;ll really be glad you did.<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Phishing Is the Internet\u2019s Most Successful Con Tricking people out of sensitive information online is far too easy. (From &#8220;The Atlantic&#8221; ) In the classic 1973 heist movie The Sting, two con men\u2014played by Robert Redford and Paul Newman\u2014build a fictitious world in a Depression-era Chicago basement to defraud a corrupt banker. They make an offtrack-betting room, hire\u2026 <span class=\"read-more\"><a href=\"https:\/\/www.thundercloud.net\/infoave\/new\/phishing-is-the-internets-most-successful-con-a-great-read\/\">Read More &raquo;<\/a><\/span><\/p>\n","protected":false},"author":1,"featured_media":13950,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1821,1461,228,1683,1433,1678,1,1670,1656,1674,10],"tags":[914,194,2667,331,2666],"_links":{"self":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts\/15581"}],"collection":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/comments?post=15581"}],"version-history":[{"count":1,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts\/15581\/revisions"}],"predecessor-version":[{"id":15582,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts\/15581\/revisions\/15582"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/media\/13950"}],"wp:attachment":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/media?parent=15581"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/categories?post=15581"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/tags?post=15581"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}