Profile cover photo
Profile photo
Amber Peall
5,757 followers -
I'm English, Egalitarian and Pastafarian.
I'm English, Egalitarian and Pastafarian.

5,757 followers
About
Amber's posts

Post has attachment

Post has shared content
I hadn't realised this "advice" has been making the rounds. Yeah, that's pretty terrible advice if you don't like being touched... 
I remember everybody posting this tumblr post (including me??) long ago but I just wanted to clarify.
re-share for awareness because I know how much the tumblr post circulated

p.s: credit goes to the instagram user.
PhotoPhotoPhoto
4/27/17
3 Photos - View album

Post has attachment

Post has shared content
Shared without comment
Photo

Post has shared content

Post has attachment
Ubby's dragon Perty rocks a cape and cap - how very #LizardsInHats !
https://www.instagram.com/p/BSqvrGiFi4_/
Photo

Post has shared content
Follow your passion: Topics on Google+ let you see people, Collections and Communities your interested in

To see the recommended Topics, head to your home stream and look for the “Topics to explore” cards. Topics will be rolling out over the next day or so, so don’t worry if you don’t see any suggestions right away.

Learn more about +Google+​ topics on the Google blog:

https://blog.google./products/google-plus/googleplus-topics/

Post has shared content
People are the weakest link: Spearphishing is the most boring kind of hacking, but also the most dangerous

Spearphishing targets specific individuals and uses social engineering, not fancy hacks. And often it starts with what looks like an email from a friend, family member or even Google.

Reporter Sarah Jeong asked Electronic Frontier Foundation staff technologist Cooper Quintin to hack her, to see how it works. It was surprisingly (or maybe not so surprisingly) easy, just using publicly available information.

I got a taste of what might have tricked Andrea Manafort when an e-mail from my friend, Parker, inviting me to look at a Google Doc, landed in my inbox.

A thumbnail of his photo hovered next to a message. “Hey Sarah do you mind reviewing this blog post I’m writing about Oracle? Thanks!” A reassuringly familiar blue “Open in Docs” button lay beneath. I clicked.

The button took me to what looked like my Google Drive, except a login screen prompted me to type in my password again. The moment I did, a pop-up leapt out:

YOU HAVE JUST BEEN SPEARPHISHED

It did take some effort on Quintin's part, researching Jeong's information, choosing who the message should appear to be from, creating the payload and so forth. But that effort is worth it if you are a high profile target.

And a spearphishing attack is difficult to defend yourself against

Ironically, the more sophisticated forms of hacking are easier to address: a zero-day exploit (a vulnerability that exists in software from the day it’s deployed) can usually only be abused so many times before a company fixes it; viruses can be reverse-engineered and inoculated against; broken encryption can be replaced. For many problems in security, you can “sell a box”—a solution, a product—to fix it, says Quintin. And since there’s a market for boxes, money gets poured into studying those forms of hacking, instead of studying social engineering.

You can’t sell a box that stops people from trusting their daughters, from missing a typo in an e-mail address, from being a little too tired to check the URL of a link.

Jeong's article is well worth reading. Check it out at +GQ:
http://www.gq.com/story/getting-hacked-is-easier-and-dumber-than-you-think-it-is


Post has shared content
The discovery of alien life may be close. How will religion survive it?
Encounters with new worlds and new life will present religions with the ultimate theological conundrum. 
Wait while more posts are being loaded