<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>security Archives - Splintt</title>
	<atom:link href="https://www.splintt.nl/en/category/security-en/feed/" rel="self" type="application/rss+xml" />
	<link></link>
	<description>online training services</description>
	<lastBuildDate>Thu, 19 Dec 2024 13:23:43 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.7.5</generator>

<image>
	<url>https://www.splintt.nl/wp-content/uploads/2022/05/cropped-Splint-favicon-roze-32x32.png</url>
	<title>security Archives - Splintt</title>
	<link></link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>I wouldn&#8217;t want to lose it</title>
		<link>https://www.splintt.nl/en/i-wouldnt-want-to-lose-it/</link>
					<comments>https://www.splintt.nl/en/i-wouldnt-want-to-lose-it/#respond</comments>
		
		<dc:creator><![CDATA[Hidde Baggelaar]]></dc:creator>
		<pubDate>Fri, 04 Sep 2020 07:29:54 +0000</pubDate>
				<category><![CDATA[eLearning]]></category>
		<category><![CDATA[security]]></category>
		<guid isPermaLink="false">https://www.splintt.nl/i-wouldnt-want-to-lose-it/</guid>

					<description><![CDATA[<p>The post <a href="https://www.splintt.nl/en/i-wouldnt-want-to-lose-it/">I wouldn&#8217;t want to lose it</a> appeared first on <a href="https://www.splintt.nl/en/">Splintt</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><div class="et_pb_section et_pb_section_0 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_0">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_0  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_0  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h1>I wouldn&#8217;t want to lose it</h1></div>
			</div><div class="et_pb_module et_pb_text et_pb_text_1  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p>Would you also find it terrible if your laptop got stolen? Or if it suddenly stopped working? I would. Not so much because I would have to buy a new one (I already had my eye on the latest MacBook Pro), but because of all the history I would lose. The photos and videos that can&#8217;t be replaced. I&#8217;m just afraid that along the way, I&#8217;ve already lost some things, despite all the cybersecurity and information security protocols I follow.     </p></div>
			</div>
			</div>
				
				
				
				
			</div><div class="et_pb_row et_pb_row_1">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_1  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_2  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p>At least you don&#8217;t lose photo albums. I know exactly which cabinet at my parents&#8217; house holds all the photo books. They are brought out every now and then, and then they go back to the same place. I can specifically look for that one photo where I&#8217;m 5 years old and so angry that my cheeks are the color of an eggplant, or where I&#8217;m with my best friends from elementary school, that photo just after my mother removed the flowerpot from my head to show my new haircut (after she had put a band-aid on my ear).   </p>
<p>I know the photos, I know exactly what they look like, and if I start talking to my mother or brother about the eggplant photo, they know what I&#8217;m talking about, what the photo looks like, which book it&#8217;s in, and roughly on which page. It&#8217;s funny, we laugh about it, and sometimes it&#8217;s nice to actually look at the photo again. </p>
<p>On my laptop, it&#8217;s the opposite world. There are folders with names like &#8220;photos&#8221; and &#8220;New folder&#8221; and &#8220;IMG_0909.&#8221; Because that seemed logical at the time. I think. And these are then hidden in overarching folders named &#8220;backup&#8221; followed by a date. Backups of laptops that had backups of earlier laptops. All very organized.      </p></div>
			</div>
			</div>
				
				
				
				
			</div><div class="et_pb_row et_pb_row_2">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_2  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_image et_pb_image_0">
				
				
				
				
				<span class="et_pb_image_wrap "><img fetchpriority="high" decoding="async" width="1200" height="827" src="https://www.splintt.nl/wp-content/uploads/2020/09/security-fotos-philip.jpg" alt="" title="security-fotos-philip" srcset="https://www.splintt.nl/wp-content/uploads/2020/09/security-fotos-philip.jpg 1200w, https://www.splintt.nl/wp-content/uploads/2020/09/security-fotos-philip-980x675.jpg 980w, https://www.splintt.nl/wp-content/uploads/2020/09/security-fotos-philip-480x331.jpg 480w" sizes="(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) and (max-width: 980px) 980px, (min-width: 981px) 1200px, 100vw" class="wp-image-58592" /></span>
			</div><div class="et_pb_module et_pb_divider_0 et_pb_space et_pb_divider_hidden"><div class="et_pb_divider_internal"></div></div><div class="et_pb_module et_pb_text et_pb_text_3  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p>I have no idea what beautiful pictures you might find if you open the folders. They contain thousands of photos, transferred from cameras and phones and other laptops of mine or others. If I randomly click on some, I find pictures where I don&#8217;t recognize anything, where I&#8217;m in the photo but have no idea what&#8217;s going on, or where I vaguely remember what I wanted to photograph but can&#8217;t tell you who the people are.  </p>
<p>There are also all sorts of variations of those photos, because why be frugal with those MBs you can reuse, right? Variations with a slightly different smile, blurry and shaky variations, variations where I can&#8217;t really tell the difference. The collection has never been cleaned up, and no selection has ever been made, as you would do for a physical photo album.  </p>
<p>So, I almost never look at them. I can&#8217;t say with a straight face that I&#8217;ve never lost photos. Maybe I accidentally deleted a backup once, or never made a backup. I do know that I can never find what I&#8217;m looking for. That&#8217;s also a form of losing.    </p></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div></p>
<p>The post <a href="https://www.splintt.nl/en/i-wouldnt-want-to-lose-it/">I wouldn&#8217;t want to lose it</a> appeared first on <a href="https://www.splintt.nl/en/">Splintt</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.splintt.nl/en/i-wouldnt-want-to-lose-it/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Phishing through the years</title>
		<link>https://www.splintt.nl/en/phishing-through-the-years/</link>
					<comments>https://www.splintt.nl/en/phishing-through-the-years/#respond</comments>
		
		<dc:creator><![CDATA[Hidde Baggelaar]]></dc:creator>
		<pubDate>Thu, 28 May 2020 07:34:20 +0000</pubDate>
				<category><![CDATA[eLearning]]></category>
		<category><![CDATA[security]]></category>
		<guid isPermaLink="false">https://www.splintt.nl/phishing-through-the-years/</guid>

					<description><![CDATA[<p>The post <a href="https://www.splintt.nl/en/phishing-through-the-years/">Phishing through the years</a> appeared first on <a href="https://www.splintt.nl/en/">Splintt</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="et_pb_section et_pb_section_2 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_3">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_3  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_4  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h1>Phishing through the years</h1></div>
			</div><div class="et_pb_module et_pb_text et_pb_text_5  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p>Lately, I&#8217;ve noticed that phishing emails are hardly distinguishable from real ones. Where are the days when you could just laugh heartily at the desperate attempts of these cybercriminals? The question used to be, &#8220;Who falls for this?&#8221; when you showed a funny example to your colleague. Now the question is more, &#8220;How can I tell this is phishing?&#8221;   </p></div>
			</div>
			</div>
				
				
				
				
			</div><div class="et_pb_row et_pb_row_4">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_4  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_6  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p>Filled with nostalgic feelings and longing for the good old days, I googled the evolution of phishing, a phenomenon that appeared on the digital scene as early as 1996. And that wasn&#8217;t the only interesting fact I came across. Phishing scams use fake emails and websites as bait to trick unsuspecting victims into voluntarily exposing their sensitive information. Just like you use bait to catch fish. And that&#8217;s where the name comes from. &#8220;But why is it spelled with a &#8216;ph&#8217;?&#8221; I hear you ask. Well, that was also traceable. Hackers were then also called &#8220;phreaks,&#8221; and &#8220;phreaking&#8221; referred to experimenting with and studying telecommunication systems by these underground groups.       </p></div>
			</div>
			</div>
				
				
				
				
			</div><div class="et_pb_row et_pb_row_5">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_5  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_7  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p>In the beginning, phishers created credit card numbers using an algorithm. It sounds complicated and not really foolproof, but it turned out that they hit the proverbial jackpot often enough through the sheer volume of attempts to make it profitable. With the created fake credit cards, they opened accounts with the American internet provider AOL, and they used these to send out more phishing attempts. Until AOL put a stop to it.  </p></div>
			</div>
			</div>
				
				
				
				
			</div><div class="et_pb_row et_pb_row_6">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_6  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_image et_pb_image_1">
				
				
				
				
				<span class="et_pb_image_wrap "><img decoding="async" width="608" height="705" src="https://www.splintt.nl/wp-content/uploads/2024/12/ing-phishing-ezgif.com-webp-to-jpg-converter_EN.png" alt="" title="ing-phishing-ezgif.com-webp-to-jpg-converter_EN" srcset="https://www.splintt.nl/wp-content/uploads/2024/12/ing-phishing-ezgif.com-webp-to-jpg-converter_EN.png 608w, https://www.splintt.nl/wp-content/uploads/2024/12/ing-phishing-ezgif.com-webp-to-jpg-converter_EN-480x557.png 480w" sizes="(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) 608px, 100vw" class="wp-image-68570" /></span>
			</div><div class="et_pb_module et_pb_divider_1 et_pb_space et_pb_divider_hidden"><div class="et_pb_divider_internal"></div></div><div class="et_pb_module et_pb_text et_pb_text_8  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p>The next step was what we still encounter in phishing emails today: they posed as employees of a company and sent emails with urgent requests and threatening consequences. And yes, phishers wouldn&#8217;t be phishers if they didn&#8217;t pose as employees of the very company that thwarted their previous plans: AOL. Over the years, phishers expanded their repertoire to emails from banks, online stores, postal services, customs, tax authorities, and so on. They also got better at it, realized they needed to make fewer spelling mistakes, and started getting more creative in their attempts.   </p>
<p>I really long for the time when I could still chuckle at the repeated message that I was the millionth visitor, no matter which site I visited, or the chance to win a €100 voucher for the local McDonald&#8217;s. Click now! Those were the days.  </p></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
<p>The post <a href="https://www.splintt.nl/en/phishing-through-the-years/">Phishing through the years</a> appeared first on <a href="https://www.splintt.nl/en/">Splintt</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.splintt.nl/en/phishing-through-the-years/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
