Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

1/23/2019
12:00 PM
50%
50%

Google Creates Online Phishing Quiz

Google Alphabet incubator Jigsaw says knowing how to spot a phish plus two-factor authentication are the best defenses against falling for a phishing email.

Jigsaw, Google Alphabet's incubator subsidiary, has launched a free online phishing quiz so users can test how well they can spot a malicious email message.

Justin Henck, Jigsaw product manager, said in a blog post today that the quiz was created from security training the company has held with 10,000 journalists, activists, and political leaders worldwide. "We've studied the latest techniques attackers use, and designed the quiz to teach people how to spot them," he said in the post.

Google considers two-factor authentication the best way to protect against phishing, he said. "When you have two-factor authentication enabled, even if an attacker successfully steals your password they won't be able to access your account," Henck said. "We also offer a Chrome extension called Password Alert that protects you from entering your Google password in a fake login page."

Take the Google Phishing Quiz here.

Dark Reading's Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Elephant man
50%
50%
Elephant man,
User Rank: Apprentice
11/27/2019 | 3:49:06 PM
Last example is bad advice
The last example in the quiz states "you should click the applications link to ensure any additional information seems correct"....that is 100% WRONG - sorry google! Shame on you, that is awful...
ThomasMaloney
50%
50%
ThomasMaloney,
User Rank: Apprentice
2/14/2019 | 9:10:48 PM
It's not all that easy
I think we need a lot more than quizzes to educate people on what exactly and attack on their security systems is going to look like. Honestly at the rate that these emails and hacks are coming out you would think that people would know better, but there are still plenty of people who are swindled every day!
REISEN1955
50%
50%
REISEN1955,
User Rank: Ninja
2/11/2019 | 9:07:42 AM
Re: Great first step
I'll try two factor again on my account - worked well on web but Outlook hated it.
EdwardThirlwall
50%
50%
EdwardThirlwall,
User Rank: Moderator
2/11/2019 | 1:18:43 AM
Safety needs measures
Other platforms ought to learn a thing or two from the security experts so as to prevent data breaches in their firms as well. It usually starts small but a simple hack could cause an entire site to shut down for good. Following the footsteps of Google with their 2-factors authentication would mean a much more tedious step for users but at the end of the day, they would appreciate their confidential data being kept safe.
RyanSepe
50%
50%
RyanSepe,
User Rank: Ninja
1/23/2019 | 4:00:06 PM
Great first step
I like the progress that Google is making to train users on potential nefarious actions. I'm going to take this myself and if it turns out to be effective I'm going to try and echo it through the security community.
News
US Formally Attributes SolarWinds Attack to Russian Intelligence Agency
Jai Vijayan, Contributing Writer,  4/15/2021
News
Dependency Problems Increase for Open Source Components
Robert Lemos, Contributing Writer,  4/14/2021
News
FBI Operation Remotely Removes Web Shells From Exchange Servers
Kelly Sheridan, Staff Editor, Dark Reading,  4/14/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-20527
PUBLISHED: 2021-04-19
IBM Resilient SOAR V38.0 could allow a privileged user to create create malicious scripts that could be executed as another user. IBM X-Force ID: 198759.
CVE-2021-27028
PUBLISHED: 2021-04-19
A Memory Corruption Vulnerability in Autodesk FBX Review version 1.4.0 may lead to remote code execution through maliciously crafted DLL files.
CVE-2021-27029
PUBLISHED: 2021-04-19
The user may be tricked into opening a malicious FBX file which may exploit a Null Pointer Dereference vulnerability in FBX's Review causing the application to crash leading to a denial of service.
CVE-2021-27030
PUBLISHED: 2021-04-19
A user may be tricked into opening a malicious FBX file which may exploit a Directory Traversal Remote Code Execution vulnerability in FBX’s Review causing it to run arbitrary code on the system.
CVE-2021-27031
PUBLISHED: 2021-04-19
A user may be tricked into opening a malicious FBX file which may exploit a use-after-free vulnerability in FBX's Review causing the application to reference a memory location controlled by an unauthorized third party, thereby running arbitrary code on the system.