this post was submitted on 27 Apr 2024
64 points (92.1% liked)

Technology

59374 readers
3125 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each another!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed

Approved Bots


founded 1 year ago
MODERATORS
64
Lorem ipsum (lemmy.world)
submitted 6 months ago* (last edited 6 months ago) by [email protected] to c/[email protected]
 

Lorem ipsum

top 18 comments
sorted by: hot top controversial new old
[–] [email protected] 28 points 6 months ago (1 children)

This is a really hard way to learn to keep your personal accounts off of work devices. That has to hurt.

[–] [email protected] 8 points 6 months ago* (last edited 6 months ago) (2 children)
[–] [email protected] 9 points 6 months ago

Why not relegate Windows to a VirtualBox environment? That way you can just turn it off when you're not using it and not need to reboot. You can use the guest additions and everything to get your proper native screen resolution and pass through USB devices etc.

[–] [email protected] 2 points 6 months ago* (last edited 6 months ago)

You can also get a KVM (and second machine) and keep them fully seperate that way. Some rootkits may still be able to infect both of your installs if you dual boot. Just depends on your paranoia level.

[–] [email protected] 19 points 6 months ago (1 children)

This is the first time you noticed you caught a malware. I wouldn't be so confident about never having caught one and Im way more paranoid than you. This one was just really noisy.

[–] [email protected] 5 points 6 months ago* (last edited 6 months ago) (1 children)
[–] [email protected] 11 points 6 months ago

Those are just some uses of malwares. It's not always that noticeable.

[–] [email protected] 16 points 6 months ago (1 children)

You can be the most diligent, tech-savvy, cyber warfare general of nato and all it takes is one second of not thinking and a click...

[–] [email protected] 4 points 6 months ago

I totally never accidentally fell for the spam awareness email at Monday at 8am before my caffeine to hangover ratio was balanced while being the admin.

[–] [email protected] 8 points 6 months ago

Was it an actual zip file that managed to exploit some vulnerability in the program that opened it or was it something like "filename.zip.exe" and windows hid the .exe part?

[–] [email protected] 5 points 6 months ago

Thanks for sharing. Sorry that happened to you and hope you got everything back in order.

Was it an .exe file that looked like a zip file that you opened? Or was there an executable in the zip file?

[–] [email protected] 5 points 6 months ago

A cautionary tale from the digital trenches. Good luck with the cleanup.

[–] [email protected] 4 points 6 months ago

This might have been avoidable using a software firewall that doesn't defacto allow outbound connections.

That's a big maybe.

[–] [email protected] 3 points 6 months ago

And here I am, emailing password protected zip files to people when the documents are not to be scanned by my mail provider.

[–] [email protected] 2 points 6 months ago (1 children)

Wait so you were logged into sensitive accounts? If you weren't, then your accounts wouldn't have been as compromised?

[–] [email protected] 3 points 6 months ago* (last edited 6 months ago) (1 children)
[–] [email protected] 3 points 6 months ago (1 children)

So I'm guessing they grabbed the %appdata% for Chrome and were able to get the passwords out of that?

[–] [email protected] 2 points 6 months ago* (last edited 6 months ago)

lorem ipsum