• A jetlagged Troy Hunt accidentally clicked a link and logged into an account only to realise he had been phished.
  • Despite reacting quickly, attackers were able to export a mailing list for Hunt’s personal blog.
  • Hunt has detailed the attack and warned his subscribers in a timely fashion.
  • heavy@sh.itjust.works
    link
    fedilink
    English
    arrow-up
    138
    ·
    5 days ago

    Solving the “being human” part of security will probably never happen, which is why you’re encouraged to do stuff like use 2FA, different passwords, service isolation and stuff like that.

    Anyone and everyone can be fooled at some point, best to try and limit the damage.

        • Matt/D@programming.dev
          link
          fedilink
          English
          arrow-up
          3
          ·
          4 days ago

          Unfortunately the article said he just put in his credentials anyway, even though his password manager wouldn’t autofill for him. Pretty stupid, but at least he acknowledges it

      • Nalivai@lemmy.world
        link
        fedilink
        English
        arrow-up
        4
        ·
        5 days ago

        I clicked one once by accident when trying to select it. You can be as diligent as you want you still will slip up from time to time

    • sugar_in_your_tea@sh.itjust.works
      link
      fedilink
      English
      arrow-up
      17
      ·
      5 days ago

      Exactly. Put as many obstacles as possible into the path of scammers, and give yourself as many chances as possible to stop said scammers, and all without making services too annoying to use.

      MFA + password manager seems to work well.

    • Cornelius_Wangenheim@lemmy.world
      link
      fedilink
      English
      arrow-up
      6
      ·
      edit-2
      5 days ago

      FIDO2 and security keys are the closest things we have to a solution. Unfortunately far too few companies support them. It would have saved him here because each credential only works with the proper URL for it.