Experience the James Wood method

Consider following on social media!

Quick note: if you’re viewing this via email, come to the site for better viewing. Enjoy!

Someone walking on a beach
What trying to find a job that needs my skillset in 2022 looks like.
Photo by Pixabay, please show support by following @pexels.com

Let’s say you’re on a beach, you’re taking a lovely stroll by yourself, watching the sun setting on the horizon as you walk by. The birds are flying high in the air, weaving up and down, some gliding to the ground and landing ahead of you.

You enjoy the smell of fresh ocean air with every step you take. As you’re walking taking in all that’s ahead, you notice some funny activity behind you like someone is following. You say to yourself, “Nah, this is a public beach, so it could be people just walking up to the water line.”

You turn around wide-eyed to find someone has been following you and not only has that person been pursuing you, but others have been trailing you as well. You see, while you’ve been taking this lovely soul-searching, deep thought-provoking stroll, those majestic footprints you have been leaving behind have turned into what are called “breadcrumbs” for anyone to track you.

If you didn’t know, the internet has always seen you with the ability to leave your mark in the digital sand. However, a perk to real sand is water washes your record in time. With digital, not so much.

creepy guy in mask wearing black robe in the woods
Thank you for shopping at Walmart, don’t forget to fill out our survey.
Photo by Rulo Mora, please show support by following @pexels.com

Digital Horror Ahead

What is this madness that lets people track you like you’re in a horror movie? They’re called digital footprints, or digital shadows as some would call them. Digital footprints are traceable activities, actions, or pretty much anything you do on the internet.

This could range from visiting websites (any sites, not just the ones with scantily clothed individuals you’re thinking about, ya freak…again, I am judging you) sending personal or professional emails, or even searching for your favorite Christmas dinner recipe that Nana posted so many years back.

And trust me, Gen-Z is finding out all about these footprints. There are several types of digital footprint which are passive, active, personally identifiable, anonymous, user input, and sensor data. In a nutshell, they range from “oh I didn’t know I was going to be redirected” to, “hey, my phone auto-suggested something I like”.

Having access to a lot of things is great but also being followed unknowingly and it being legal kinda sucks. I mean, where is the consent…I know I glossed over the privacy policy, but it was too long, and I wanted to see what the “baddies” on Instagram were all about.

man with cold stare
Helping shoppers around every corner.
Photo by Pixabay, please show support by following @pexels.com

Every Step You Take

So…this is about to get uncomfortable. Who tracks you like the sweet slow jam from the 80s? Well, one of them is ironically named the Police and just so happens to be one group that would turn to use digital footprints.

Police or law enforcement would use footprints to track cybercriminals and possibly keep track of online behavior. Do you remember that “Here, have a seat” guy? Digital footprints aid in situations like that. Do you like cookies? You do, that’s great!

Advertisers and people seeking your business like them too, cookies are used to customize ads for targeting you. Like, in my situation, you purchase one electric bike and now all you see in the ad space of every site you go to are electric bikes. It’s very haunting.

But while there are some creepy effects, digital footprint does have its benefits, ranging from detecting and preventing fraud, making shopping a breeze because, well everything is tailored to your interests, and even just the simple act of being able to recall a previously visited site.

Despite the fact you may click “no” in your preferences or settings when visiting a site, they still track you anyway. It’s like going to a store and one of the employees on the floor ask, “Do you need help finding anything?” and you reply with a “No, thank you, just browsing.” Followed by an awkward moment of silence and a brief stare.

You turn to walk, and they start following you anyway. Like good god, I just said no, go away.

Enjoy the read so far? Why don’t you consider subscribing so you can keep up to date?

woman with gen z cake
Fun fact: if you bring a cake to your job interview…your chances of getting the job are still the same.
Photo by Polina Tankilevitch, please show support by following @pexels.com

Safe Space Results 404

Do you recall when I mentioned that Gen-Z is finding out about the horrors of digital footprints? No, then go back up and read this like a decent human being. If yes, then here goes the “oh no” moment, potential employers incorporate this in their decision to hire you.

This means every time you upload or like a twerk video, try to viral a cringe TikTok, post about how great America is compared to other countries on Facebook, or even tell your previous employer to go screw themselves on LinkedIn (sidenote; never air out your previous employer on social media), all of this runs the risk of you not landing that sought after position or promotion you’re seeking to claim.

However, there are ways to keep your footprint as small as possible, most of which are going to require you to do some work and by some, meaning a lot. This pretty much parallels fixing your credit score, your options are contacting data collectors, and telling them to forget your information (some of which may not play ball). Make your social media private.

If you wanted to take an easier route, you can sign up for third-party services that will handle things for you (keep in mind this is not a one-time buy, so as long as you’re on the internet and care about the effect of your online interactions, you’ll have to pay).

You can hide your browsing habits by using a good virtual private network or VPN, but like I always tell people, “Using a VPN is the same as using a condom, you can still get pregnant.”

You should panic a little bit if you worry about trying to land that dream job.
Photo by artawkrn, please show support by following @pexels.com

Digital History Unclear

Now you’re probably paranoid about your browser history and everything you’ve ever said on the internet. Should you be though? This is the year 2022 and we are in the age of “acceptance” and “fairness”.

Honestly, what you said years back when you were young should not come back to haunt you. Social media should be a place where you can connect with like-minded people and share ideas.

However, it seems like the internet is the best place for someone to pick up dirt and fling it at you. The internet has always been the wild wild west but for employers to add a digital footprint to your background check is madness because one or a few posts don’t display the whole picture.

Just hope one day people learn how to differentiate the before and after when making a judgment call. 

Me chances of getting a job is ruined, me should’ve stay off the hub blood. I’m ruined.
Photo by Tope A. Asokere, please show support by following @pexels.com

Made it this far and found this to be entertaining? Then a big thanks to you and please show your support by cracking a like, sharing this with whomever, scripting a comment, or plug-in to follow.

Would like to give sincere thanks to current followers and subscribers, your support and actions mean a lot and has a play in the creation of each script.

Think someone has been watching your online habits?

Script a comment about how safe you think your digital footprint are.

Bank Draining Done with Love

Consider following on social media!

Quick note: if you’re viewing this via email, come to the site for better viewing. Enjoy!

Sneaking into your computer to see what’s up.
Photo by Moiske2l Officiel, please support by following @pexel.com

Advanced Persistent Threat

You were to print “Hello World”

You know, there’s no better feeling in the world than having someone take money from your bank account. This was said by no one ever. As the world turns, we face more and more threats online. At this point, we just have to admit that hackers, scammers, threat actors, or whatever your company wants to call them, they’re getting better at their job.

To add insult to injury, when they improve, it leads to them getting better pay. When you improve at your job, you may get a new title and make about the same pay with more responsibilities. Are we saying for you to be rich? Maybe. Are we saying for you to get paid what you’re worth? Definitely. Pushing making light of corporate logic aside, an issue has surfaced online that has a few people concerned about the safety of their computers and finances.

What is this issue? Glad you asked, look no further than “GooseEgg”. You don’t know what that is? Don’t worry, we have you covered on that. We’re going to look at what GooseEgg is, a few things you may need to know, and if this is something that you should power off your computer for. Spoiler, for the most part, you should be safe.

Enjoy the read so far? Why don’t you consider subscribing so you can keep up to date?

Sitting on a park bench or laying down for a picnic, we know you have food. We’re coming.
Photo by Pixabay, please support by following @pexel.com

GooseEgg, is kind of a weird name for something on the internet but hey, the internet is a weird place and it’s only getting weirder. GooseEgg, also known as PrintNightmare, is a tool that can prompt other programs with elevated privileges.

Once a threat actor has this at their disposal, they’re in. How is this a problem? Simple, if someone has the same level of privilege as you, that means they can do anything you do and maybe… better. How does this appeal to you? You have money, we’re telling you how to keep your money safe or at least try to.

Banks will still let someone take money from your account. Think it’s covered in the insurance so, they’ll let the person take your money and refund you somewhere 90+ days later. That’s all right, it’s not like you needed the money right away for anything.

WHAT DO YOU MEAN IT’S GOING TO TAKE ABOUT 90 DAYS!?
Photo by Andrea Piacquadio, please support by following @pexel.com

So, you may be wondering the same way as Al Pacino did in Scarface. “WHO PUT THIS THING TOGETHER!?” Researchers have pointed in the direction of a Russia-linked cyberespionage group APT28. Whether they have been using it or not isn’t the point. We’re sure this can be found on the dark web, that’s where all the “fun items” are sold.

You won’t have to do anything outside of your normal for protection. Having an update-to-system, anti-virus software, and applications will keep you safeguarded. Security may not be 100%, but following best practices can see you being able to pay your rent on time.

Made it this far and found this to be entertaining? Then a big thanks to you and please show your support by cracking a like, sharing this with whomever, scripting a comment, or plug-in to follow.

Would like to give sincere thanks to current followers and subscribers, your support and actions mean a lot and has a play in the creation of each script.

Do you feel like there is something I may have missed on GooseEgge/PrintNightmare? Script a comment below.

Being able to phish is important, here’s how…

Quick note: if you’re viewing this via email, come to the site for better viewing. Enjoy!

gentleman sitting down with breakfast at a laptop
A mail-order bride doesn’t sound like a bad idea after all.
Photo by Jack Sparrow, please show support by following @pexels.com

So you get an email from someone you don’t know, more likely they’re someone who promises you something that’s usually too good to be true, like in my case a nice comfy job that would pay six figures and all I had to do was work from home.

My start date is still pending. In other cases, it could be presenting you the opportunity to hold money for them because they claim to be a rich prince (or princess) with a lot of money, and they’ll reward you handsomely for completing such a task for them.

If you haven’t gotten any of these emails, you’re the lucky one out of the bunch because other people can attest to having their spam inboxes littered with these emails.

If you have ever been unfortunate enough to complete your interaction with any of these individuals, you’ll be sad to know, you’ve just been phished (and no, it’s not what you think it is).

Don’t know what I mean? Well, you’re in luck because I’ll be going over what, how, who, and more or less how you can be more aware when checking your DMs.

gentleman pointing a handgun
Hi, I’m Sarah69lover…and you’ve just been catfished.
Photo by cottonbro studio, please show support by following @pexel.com

Phishing with Dynamite

Phishing is not what the name states although it parallels and before you ask, no none of this happens with actual fish. Phishing is the act of contacting someone posing as a contact the victim may know or trust to extract money, and information, or to provide them with problematic malware.

Malware could be installed to either gather information without you knowing, wreak havoc on your computer, or simply a combination of the two.

There are a few various forms of phishing, all come with interesting versions of the original name. You have spear-phishing, whaling, smishing, vishing, and email-phishing.

Email phishing is the most common type of attack people fall victim to. In the other attacks, in a nutshell, an attacker is targeting you directly, an attacker is aiming for the most important individual in the company (more like CEO type person), an attacker tries contacting you via text with a link, and the last one is a voice call impersonating someone from a company like Microsoft.

There are two other types of attack which get even more interesting, there’s sextortion which is the attacker contacts you with a threat of revealing a recording from your webcam watching “adult time” material (been on the hub, I know that’s an actual brand, trust me I’m not proud) and search engine phishing (or SEO poisoning) where attackers prop themselves high up on the search engine only for you to click on their link and be redirected to emptying out your pockets or worse, releasing the hounds on your computer by downloading malware.

Criminals have many interesting ways of trying to get your money and that list continues to grow.

man looking with evil intentions
I never intended to rob people, but life insisted I do.
Photo by cottonbro studio, please show support by following @pexel.com

Emailing with Delicious Intent

Who are the people that do this and how could they do this to someone you might ask? Well, for one, it could be anybody, attackers come in all shapes and sizes.

That sweet old lady at the end of the street you live on who gives cookies to children with a smile and everyone in the neighborhood waves to could also be the same prince or princess seeking to pull money from your bank account.

And to the second part of your question, well, really, come on, the economy, might be a controversial thought but people would be less inclined to commit a crime if economic hardship wasn’t a thing.

Many people today are in the “have not” section of society and the cost of living rising each year applies pressure on people to venture into areas they wouldn’t have considered the year before, theft being one of them.

I’m not saying I condone it, but I understand it.

Woman seated in front of laptop
Can’t find me a date on tinder? Looks like it’s phishing time.
Photo by Dan Nelson, please show support by following @pexel.com

Two Times a Fool

You might be thinking to yourself, “who falls for this? I mean just how? Most of the emails I come across are poorly structured and or in bad English.” Well, just because you didn’t fall victim doesn’t mean your adolescent entrepreneur or Gam-gam won’t.

In fact, most victims are either in their 20s or in their mid-late 40s, so that’s either an “I’m still trying to figure it out, oh this link says it can make me rich” or “I’m about to hit a mid-life crisis and my Nigerian princess/wife is still not here.”

People who worked for big-name companies and even some big-name IT companies often become complacent and fall victim to these attacks.

So no matter what the target size is, the effects of phishing are felt around the world.

keyboard keys spelling the word "scam"
If you can read this, click the follow or subscribe button. It’s not a scam likely, promise.
Photo by Mikhail Nilov, please show support by following @pexel.com

Phishing Abroad

At this junction, you’re probably thinking, “I don’t want to fall victim to this, how do I protect myself or is there a career path to learn more so I can protect others?” You’re in luck, protecting yourself from phishing is possible but to quote Run-DMC, “it’s tricky”.

As mentioned earlier, attackers find interesting ways to pull money and information out of you. Some ways you could protect yourself are by double checking the email for grammar, misspelled words, and links that may seem fishy (saw what I did there) an example of this would be the word “google” spelled in the link as “go0g1e”, and finally double checking the person contacting you.

If they’re asking for information that they should have on hand and you’ve had no dealings with them or their company, swipe left because it’s a scam likely. Do you want to protect others?

There are countless entry-level cybersecurity jobs and for most of them, you don’t need a degree. An Information Security Analyst is one of the most common entry-level jobs, in which they are responsible for system and network security analysis.

You can learn the necessary skills on your own through a Bootcamp (which I wouldn’t recommend since they can get pricey) or by grabbing some online courses. I currently hold a certificate for Cybersecurity Analysis provided by IBM via Coursera.

It may be just a certificate that doesn’t hold much weight as a certification but passing the quizzes and projects wasn’t an easy ride.

It’s been over three paychecks and she’s still not here. I don’t know how much more money I can send her.
Photo by Andrea Piacquadio, please show support by following @pexels.com

Made it this far and found this to be entertaining? Then a big thanks to you and please show your support by cracking a like, scripting a comment, or plug-in to follow.

Would like to give sincere thanks to current followers and subscribers, your support and actions mean a lot and has a play in the creation of each script.

Think you have what it takes to enter the world of cyber security?

Script a comment below about a time when you got a suspect looking email.