+
upworthy
Family

How to protect yourself from phishing, from experts who deal with it every day.

True
Mozilla

Ever wonder what it's like to be hacked? Sarah Jeong did. So naturally, she decided to ask someone to hack her.

Jeong isn't just a random thrill-seeker — she's a respected technology journalist and lawyer, and she knew exactly what she was getting into when she recruited her friend Cooper Quintin of the Electronic Frontier Foundation to help her out. She wrote about her experience in GQ.

All it took was a couple of hours and some readily available tools, and Jeong joined the approximately 12% of the population who have fallen for a hack.


But even before she was successfully hacked — and don't worry, we'll get to that! — both Jeong and Quintin discovered some important truths about the world of online safety and what it takes to infiltrate it.

Here are just a few lessons from experts that we can all benefit from:

[rebelmouse-image 19531566 dam="1" original_size="2048x1536" caption="Photo by Blogtrepreneur/Flickr." expand=1]Photo by Blogtrepreneur/Flickr.

1. Most hacking isn't done by master "Matrix" coders.

For most people, "hacking" tends to evoke one of two images: a stereotypically out-of-shape nerd in their parents' basement or a sleek, leather-clad cyberpunk in a Guy Fawkes mask who moonlights as an extra on a Wachowski movie.

But in reality, most of what we call "hacking" is actually "phishing."  In fact, last year, then-Secretary of Homeland Security Jeh Johnson said that phishing is the threat his department fears most.

[rebelmouse-image 19531567 dam="1" original_size="1024x559" caption="THIS IS NOT WHAT HACKERS LOOK LIKE. Except when they do, which is sometimes. Photo by Vincent Diamonte/Flickr." expand=1]THIS IS NOT WHAT HACKERS LOOK LIKE. Except when they do, which is sometimes. Photo by Vincent Diamonte/Flickr.

2. Phishing is a type of scam that disguises itself as something trustworthy.

It can be an email, phone call, or text message, and it then tricks you into giving up your passwords, credit card numbers, and more. All it takes are some clever social skills plus some free online tools used by information security professionals that, technically, anyone can use. (A little coding knowledge doesn't hurt, though.)

3. Many hackers are savvier than you might think.

It doesn't matter if you have the best anti-virus software installed on your computer and run daily checks for malware along with Ghostery and ad block to keep your online browsing extra-safe. Don't get me wrong — viruses and malware are still dangerous. But phishing isn't about computers. It's about people. And that's a lot harder to protect against.

"Phishing isn’t (just) about finding a person who is technically naive," Cory Doctorow, a sci-fi author, journalist, and technology activist told Locus magazine.  As savvy as he is, even he fell for a phishing hack back in 2010. "It’s about attacking the seemingly impregnable defenses of the technically sophisticated until you find a single, incredibly unlikely, short-lived crack in the wall."

"It’s a matter of being caught out in a moment of distraction and of unlikely circumstance." In other words, it can happen to anyone.

[rebelmouse-image 19531568 dam="1" original_size="1200x624" caption="Smile! I'm stealing your identity! Image via Pixnio." expand=1]Smile! I'm stealing your identity! Image via Pixnio.

4. The terrible typos and grammar in some phishing schemes are intentional.

You're probably familiar with the classic "Nigerian prince" phishing scheme, where some kind of foreign dignitary emails you and offers you a ton of money to help facilitate the transfer of their new bajillion-dollar inheritance. You also probably know that these emails are famously riddled with grammatical errors and totally implausible premises.

What you might not know, however, is that these "mistakes" are done on purpose in order to target the most gullible people. That way, reports Business Insider, the scammers don't have to waste their time trying to persuade rational skeptics to give up their bank account information.

[rebelmouse-image 19531569 dam="1" original_size="1280x852" caption="Photo by Nate Grigg/Flickr." expand=1]Photo by Nate Grigg/Flickr.

5. To hack a specific person, all a hacker needs is social media.

You know those silly memes where you find your "porn star name" (or whatever) by using the name of your first pet and the street you grew up on?

Now think about those security questions you had to answer for your online bank account — things like, oh, the name of your first pet, the street you grew up on, or your mom's maiden name.

Yeah. See the connection there? If a hacker wants to social-engineer their way into your bank account, all they need to do is poke around your public accounts to find those little bits of information. These targeted attacks are called "spearphishing," and they're why Doctorow recommends that people "only use Facebook to convince your friends to communicate with you somewhere other than Facebook."

[rebelmouse-image 19531571 dam="1" original_size="1280x856" caption="Image from Pixabay." expand=1]Image from Pixabay.

6. Be careful what you open — even when it's sent by someone you know.

Jeong was hacked after she clicked on a malicious link made to look like it was sent from someone she knew.

To hack her, Quintin just had to scour Jeong's online presence until he found an acquaintance who could plausibly email her. He made a fake email address — using that person's real-life profile picture and everything — and that was all it took to get Jeong to give up her information.

Fake Google Docs scams, like the one she fell for, are increasingly common. In these cases, the target receives a phishing email that looks like a standard invitation to Google Docs sent from a trustworthy source — except that both the sender and the link are actually malicious frauds. This link will bring you to a landing page that resembles the standard Google password screen or bank login page you thought you were clicking on, and the hacker can use that to capture whatever password or personal information you enter into the false form.

7. Double-check your URLs.

Always make sure you're really on the website that you think you are before you enter any sensitive information.

How do you tell the difference? Generally speaking, the domain name should look like "[blank].google.com" or "bankofamerica.com/[blank]." If it's something hyphenated like "accounts-drive-google.com" or "boa-accounts-login.com," well, you should probably think twice about it.

(Another helpful tip is to look for SSL certificates, which usually appear as a lock or green text in your browser bar — but even that's not totally reliable.)

[rebelmouse-image 19531572 dam="1" original_size="1280x850" caption="What is real? What is fake? Image from Pixabay." expand=1]What is real? What is fake? Image from Pixabay.

8. You should definitely use two-step authentication.

I hate to break it to you, but your p@$$w0rd probably isn't very safe. The least you can do, according to CNET, is turn on two-step authentication. That way, every time you log in to an unfamiliar device, you'll get a text message with a secret code just to make sure it's you — because even if someone gets your password, they probably don't have your phone, too.

Unless they, um, literally walked into the AT&T store and charmed a sales rep into changing your phone number over to their phone. Which happens.

9. And use a password manager.

If you want to be extra extra safe, use a password manager such as LastPass, then set up a DiceWare password like "correct horse battery staple" (or some of these other great ones recommended by the Intercept) that are incredibly easy to remember but next-to-impossible for hackers or computers to crack.

[rebelmouse-image 19531573 dam="1" original_size="1280x959" caption="Image from Pixabay." expand=1]Image from Pixabay.

10. Remember the greatest flaw in your internet security is the trusting nature of other people.

A trusting customer service rep can easily compromise you without realizing it. Your friend who mentions you on Facebook can do the same.

Heck, my wife has a fairly gender-ambiguous name, and I can tell you from personal experience how easy it is to call up the bank and pretend I'm her — even when I have to charm my way around a security question about her high school mascot. Which, yes, I've done.

As Jeong wrote, "Successful social engineers are not just perfectly capable of interacting with human beings — they are talented manipulators who take advantage of our willingness to trust our colleagues, friends, and family."

"You can turn your digital life into Fort Knox and still be undone by an overly trusting salesperson behind a desk."

[rebelmouse-image 19531574 dam="1" original_size="1280x851" caption="Basic rule: Always look over your shoulder. Photo by Arthur Harry Chaudary/Wikimedia Commons." expand=1]Basic rule: Always look over your shoulder. Photo by Arthur Harry Chaudary/Wikimedia Commons.

There's no way to protect yourself from every possible online vulnerability. But that doesn't mean you shouldn't try!

As we've seen, the power of the internet can used for good or evil. All it takes is one trusting click, and even the savviest security professionals can find themselves compromised.

The best you can do is be smart and pay attention. A tiny bit of paranoid skepticism will save you a lot of time, stress, and energy in the long run, and that'll free you up to enjoy all the wonderful things that the internet has to offer. Trust me.

Community

How to end hunger, according to the people who face it daily

Here’s what people facing food insecurity want you to know about solving the hunger problem in America

True

Even though America is the world’s wealthiest nation, about 1 in 6 of our neighbors turned to food banks and community programs in order to feed themselves and their families last year. Think about it: More than 9 million children faced hunger in 2021 (1 in 8 children).

In order to solve a problem, we must first understand it. Feeding America, the nation’s largest domestic hunger-relief organization, released its second annual Elevating Voices: Insights Report and turned to the experts—people experiencing hunger—to find out how this issue can be solved once and for all.

Here are the four most important things people facing hunger want you to know.

Keep ReadingShow less
Pets

Family brings home the wrong dog from daycare until their cats saved the day

A quick trip to the vet confirmed the cats' and family's suspicions.

Family accidentally brings wrong dog home but their cats knew

It's not a secret that nearly all golden retrievers are identical. Honestly, magic has to be involved for owners to know which one belongs to them when more than one golden retriever is around. Seriously, how do they all seem have the same face? It's like someone fell asleep on the copy machine when they were being created.

Outside of collars, harnesses and bandanas, immediately identifying the dog that belongs to you has to be a secret skill because at first glance, their personalities are also super similar. That's why it's not surprising when one family dropped off their sweet golden pooch at daycare and to be groomed, they didn't notice the daycare sent out the wrong dog.

See, not even their human parents can tell them apart because when the swapped dog got home, nothing seemed odd to the owners at first. She was freshly groomed so any small differences were quickly brushed off. But this accidental doppelgänger wasn't fooling her feline siblings.

Keep ReadingShow less
Family

15 best colostrum supplements

Invigorate your journey to optimal health with these wellness-enhancing colostrum supplements.

Editor's Note: Upworthy earns a percentage of revenue from items purchased on this list.


Embarking on a journey toward enhanced well-being is a rewarding endeavor, and when it comes to unlocking nature's potential, colostrum supplements stand as remarkable allies. Did you know that the global colostrum market is projected to experience a growth of over 3.5% in the coming years, a testament to the increasing recognition of its incredible benefits? Moreover, scientific interest in colostrum's immune-boosting properties has led to a surge in research publications, with a remarkable 37% rise observed in the last five years alone. As we delve into the realm of wellness-enhancing supplements, this article unveils an illuminating guide to the 15 best colostrum supplements, offering a chance to embrace vitality and invigorate the journey to optimal health.

15 best colostrum supplements

  1. Elm & Rye Colostrum Supplements
  2. Swanson Ultra High Immunoglobulin Colostrum Supplement
  3. California Gold Nutrition, Colostrum
  4. ARMRA Colostrum Immune Revival Unflavored
  5. Mt. Capra Goat Milk Colostrum
  6. PipingRock Ultra Colostrum Quick Release Capsules
  7. NOW Foods, Colostrum Powder
  8. Nature’s Sunshine Colostrum Capsules
  9. Ancestral Supplements Grass Fed Beef Colostrum Supplement
  10. WONDERCOW Colostrum Powder Supplement
  11. Symbiotics Colostrum Chewables
  12. Brain Basics Ultra-Pure Colostrum
  13. Surthrival: Colostrum Powder Capsules
  14. Double Wood Supplements Colostrum Supplement Capsules
  15. Pure Velvet Colostrum Powder
Keep ReadingShow less
Sandra Maria/Youtube, Official Lives & Music Videos/Youtube

You can't not sing this song.

The music of Queen has a profound visceral effect on everyone. Few pieces of art can cause complete strangers to put aside their differences and come together in song, but by golly, “Bohemian Rhapsody” is one of them. It would be cheesy if it weren’t so absolutely beautiful.

This pertains even to non-English-speaking countries, it appears. Recently, thousands of Harry Styles concertgoers in Warsaw, Poland, began cheering as those iconic beginning piano notes penetrated the air.
Keep ReadingShow less
Photo by Long Truong on Unsplash
woman in white sleeveless dress kissing man in blue dress shirt


"It may be the most important thing we do in life; learn how to love and be loved."

At least, that's according to Harvard psychologist and researcher Rick Weissbourd.

He's been collecting data on the sex and love habits of young people for years through surveys, interviews, and even informal conversation — with teens and the important people in their lives.

Through it all, one thing has been abundantly clear:

"We spend enormous amount of attention helping parents prepare their kids for work and school," Weissbourd says. "We do almost nothing to prepare them for the tender, tough, subtle, generous, focused work of developing mature healthy relationships. I'm troubled by that."

Keep ReadingShow less

Mom shares PSA on about being a sports mom while also working

Being a mom can be challenging enough, but when you add in working full time and kids activities, it feels like you need a few clones to help you out. Recently we signed our youngest up for soccer, he's 5-years-old and happens to be ten years younger than his closest sibling, so I've done the sports stuff.

At one point I was working full-time while my daughter took tap, ballet and jazz while also on a soccer team and my two older boys played soccer, baseball and football. We rarely saw the inside of our home unless it was to sleep, I'm not even sure I knew how my stove worked during those years. Now here we are starting all over again.

So when Mo, a mom running the TikTok page Rex & Mo posted a video ranting about how impossible it feels to add organized activities for kids into the mix, parents everywhere related, myself included.

Keep ReadingShow less
@mychal3ts/TikTok

This is "the power of the library"

Editor's Note: This story discusses suicide. If you are having thoughts about taking your own life, or know of anyone who is in need of help, the 988 Suicide & Crisis Lifeline is a United States-based suicide prevention network of over 200+ crisis centers that provides 24/7 service via a toll-free hotline with the number 9-8-8. It is available to anyone in suicidal crisis or emotional distress.


Libraries aren’t just a place to score free books. For many, they provide safe refuge.

This secondary offering has lately been overshadowed by political controversy, as there has been a laser focus from conservatives on the types of literature libraries provide, especially titles that pertain to LGBTQ and racial topics.

But one librarian’s retelling of a life saving encounter reminds us of how essential these community spaces really are—and it has nothing to do with books at all.

Keep ReadingShow less