Activity
Mon
Wed
Fri
Sun
Oct
Nov
Dec
Jan
Feb
Mar
Apr
May
Jun
Jul
Aug
Sep
What is this?
Less
More

Memberships

ReadyOpsGo by Lena Gallagher

13 members • Free

Career Like A BOSS

180 members • Free

Learn Online Security

26 members • Free

11 contributions to Learn Online Security
The problem with Out of Office Reply's
Our upcoming podcast is focused on the information that a thief can gather from your Out of Office Reply. One of the biggest targets with this information tends to be admin assistants, secretaries, or interns. The scammer learns that the boss is gone to a conference and then uses the information learned to pretend to be the boss and extract a financial reward. So, a couple of questions for this morning. 1. How much information do you think is in an out-of-office reply? 2. How do you think that information would be used against you? 3. Do you use an out-of-office reply?
The problem with Out of Office Reply's
3 likes • 14d
Looking forward to our next podcast!
2 likes • 1d
@David Harborne WOW that would be crazy. My personal pet peeve is when people send out mass emails and cc everyone instead of blind cc-ing the list and emailing it to themselves.
CIRA Cybersecurity trying to collect children's data
I was recently sent a newsletter from CIRA about Cyber safety for the whole family. I thought, "Okay, I'll bite. What kind of toolkit are you putting together for us to 'help make cyber safety a top priority this back-to-school season?" It turns out their toolkit is a joke. A collection of poorly put-together mazes and word searches with a couple of terms, but it teaches absolutely nothing. The whole goal of the toolkit is to promote the CIRA Canadian Shield App. The Canadian Shield App is free, and it "uses a SmartVPN® that protects you from malware, viruses, and phishing websites by blocking access to known malicious domains. It also provides DNS privacy by keeping your DNS requests in Canada. This app works by changing your phone's DNS settings to run your requests through CIRA's Canadian server network." So let's break this down. 1. We have an app that we are getting children to install on their phones. 2. We have terms of use, as you can see from the screenshot, that both collect and share web browsing data of those children. 3. There is no way to delete your data once it goes to their servers. 4. All of this runs through SmartVPN® This is where I am stuck. As far as I can tell, SmartVPN® is owned by Draytek, a Chinese company. I need to verify that somehow, but if we put this all together. CIRA is using schools and teachers to get children to install their app to protect them, while also collecting their browsing habits and sharing that with third parties, potentially overseas. I have a problem with that....
CIRA Cybersecurity trying to collect children's data
2 likes • 3d
How many teachers would see this and trying to do the right thing just promote it without question?🤔
0 likes • 2d
@Richard Bankert
⚠️ Hack? Attack? Scam?
Most business owners don’t realize these aren’t the same thing—and knowing the difference could save your company. 👉 Which of these do you worry about most?
Poll
1 member has voted
4
0
Don't miss the attack
Most of the time we focus on the hack or scam or theft and forget that there is a bigger picture here. We have to see the attack as a process and not a simple event. There are preplanned, well thought out, processes. The earlier we can pick up on the process, the quicker we can thwart the attack.
Don't miss the attack
3 likes • 4d
Some of the most famous heists in history are famous because of the amount of time and effort the thieves spent getting it right before the actual theft. For example, United California Bank burglary in 1972, they cased the place before hand. They did exploratory trips to the bank to see what the security was like. They cut a hole into the roof the night before and covered their tracks with tar so that the hole couldn't be seen from above during the day. Their exploratory trips told them what type of alarms the bank had and they brought the tools they'd need to thwart the security system on the night of the heist. I think it's a good example of the time and effort that goes into a scam or hack when the stakes are high.
❓ Poll Question:
What type of social engineering attack do you think is the HARDEST to spot?
Poll
3 members have voted
3
0
1-10 of 11
Tracy Stephenson
3
45points to level up
@t-stephenspn-7363
I work w/ Learn Online Security. We’re a team of designers, developers and IT who are passionate about teaching social engineering awareness.

Active 8h ago
Joined Sep 9, 2025