The One Foolproof Method to Spotting Phishing Attacks: Understanding URL/Link Syntax

Photo by Colman Byrne on Unsplash

Saudi Journalist Jamal Khashoggi, Chairman of Hilary Clinton’s 2016 presidential campaign John Podesta and the Ukrainian power grid. What do all of these have in common? The answer: they were all victims of computer phishing attacks.

These attacks delivered malware that took over their device, resulting in Khashoggi’s eventual murder, the leaking of John Podesta’s emails disrupting the 2016 US election and the Ukrainian power grid being temporarily disabled.

Despite the cited examples being quite high-profile, that doesn’t mean phishing attacks are only used against high-value targets. Quite the contrary, they are the most common form of cyber-attack used today…


Very Nice!

My Analysis and Rebuttals on Sacha Baron Cohen’s Social Media Policy Proposals

On November 21 2019, Borat Star Sacha Baron Cohen gave his keynote address to the ADL’s Never is Now Summit on Anti-Semitism and Hate.

In it, he takes aim at social media companies for their role in facilitating rising hatred and misinformation. Further, he posits solutions that touch on free speech rights and technological feasibility.

This article is my analysis. I will be focusing only on what I can definitively say is true, and will be leaving inferences out to prevent my bias from influencing my ability to be impartial. …


A Comprehensive Guide to Online Account Security

Grandpa Simpson Asking Homer Simpson, “What’s my password? — Facepalm
Grandpa Simpson Asking Homer Simpson, “What’s my password? — Facepalm

Recently I was observing my friends trying to log in to their accounts. ‘Trying’ being the operative word. I’m always stunned by how poor the average person’s online security is against the unauthorised, but also how impressive their security is against themselves.

This article will first cover some background information on passwords: their importance, how to create a good one, and why using one password across accounts doesn’t work. I will then provide three solutions: Two-Step Verification, Password Managers and Password Database Breach Monitoring.

By the end of the article, you should have learned how to secure all your online…

Daniel van Driel

IT Consultant. Writer for The Startup. Specialising in the Business and Governance of Technology and Cyber Security. @Daniel_vanDriel

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store