VOLUME 2: GLITCH

Page 32

Phishy Business: A Guide to Cyber Security

NON-FICTION

by Vanessa Love, Director of Education at UTS Cyber Security Society.

Our societies now run on new technological infrastructure that, if compromised, could result in frustration, extreme loss or even the destruction of our civilisation as a whole.

Beware of Phishing Emails

Phishing emails are sent by bad actors in an attempt to In this article, we’re going to teach you some basic security get you to reveal sensitive information about yourself. measures you can implement to avoid identity theft, Often these look like legitimate emails you would receive being hacked, and the loss of personal data and accounts. from companies, however, when you click on links, download attachments, or respond to these emails, you’re actually sending your data to the hackers. There are some ways to identify these emails. First, check for any common spelling mistakes. A poorly drafted email could be a phishing attempt. Second, look at the company that’s Implement 2FA sending the email and ask yourself questions. Do I have 2 Factor Authentication (2FA) is offered by most websites an account with this website? Have they ever contacted as a way to keep your account secure. This involves me before? They’re asking for my bank details; shouldn’t downloading an app on your phone and connecting it to they already have them? Third, go into the properties of your account. When you next log into your account and the email and check the address in the reply field. If the provide your password, you will also be asked for a token URL is not correct and redirects to a suspicious domain, from the app on your phone. Entering this code as a this is a phishing email. Fourth, even if you think the second method of authentication prevents bad actors email is legitimate, always go to the actual website to from being able to access your account if they crack your login as you usually would. There’s no need to click the password as they don’t have access to your 2FA token. link they provided you when you can go to the website online yourself.

30


Turn static files into dynamic content formats.

Create a flipbook

Articles inside

THE ETHNOCULTURAL COLLECTIVE'S RESPONSE TO THE COUP IN MYANMAR

10min
pages 122-132

HOROSCROPES

21min
pages 114-121

3 NIGHT STAND WITH RESPECT.NOW.ALWAYS Olivia Mathis + Sevin Pakbaz

12min
pages 100-107

TECHNOLOGY’S IMPLICIT RACIAL BIAS Katherine Rajwar

5min
pages 98-99

GAMESTOP NEVER GAMESTOPPING? Jaimee Lee

4min
pages 92-93

10-20-40 Joseph Lucas

9min
pages 88-91

FRIEND OR FOE-NE Joella Marcus

1min
page 84

PREF+ Ch’aska Cuba de Reed

3min
pages 80-81

CONFESSIONS OF A SERIAL SWIPER Milly Guiffre

2min
pages 82-83

POSIMENTE: TECHNOLOGY MEETS MENTAL HEALTH Pnina Hagege

6min
pages 76-79

3 WAYS TO NAIL YOUR NEXT JOB INTERVIEW Anisha Premawardhana

3min
pages 74-75

IN CONVERSATION WITH UTS STARTUPS Sevin Pakbaz

11min
pages 62-67

ZOOM FATIGUE Anna Lei

3min
pages 70-71

MY LIFE AS A DIGITAL HOARDER Erin Ewen

5min
pages 56-59

PHISHY BUSINESS Vanessa Love, UTS Cyber Security Society

4min
pages 32-33

DISMANTLING TOXIC DIET CULTURE Eva Harrington

4min
pages 34-36

SUCCUMBING TO DYSTOPIA Angela Jin

5min
pages 48-49

MUSIC IN THE ETERNAL PRESENT Luca Moujaes

5min
pages 40-43

COMATOSE IN THE COMMENT SECTION: INTERNET TROLLS, DOOM SCROLLING AND PROCRASTINATION Nour Jamal

3min
pages 28-30

WRAPPED UP IN 'TOWEL HEAD' Alice Winn

3min
pages 26-27

SELF-DIAGNOSING MENTAL ILL-HEALTH Evlin DuBose

9min
pages 10-13
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.