Post on 29-Jan-2018
http://map.norsecorp.com/#/
security
for
journalists
Journalists in the
Crosshairs
…a packet sniffer is also able to
sometimes decode and analyze network
traffic to extract useful information. Such
information could be passwords, or other
credentials passed over network.
WireShark
Password Crackers
What makes this phishing campaign successful is the phishing emails come from someone the victim knows. Once the victim clicks on the image, expecting Gmail to give them a preview of the attachment. Instead, a new tab opens up which prompts users to Sign-in with Google account once again. It’s a TRAP!
The subdomain of the Fake Gmail login page is accounts.google.com, which is enough to fool the majority of Gmail users into believing that they are on a legitimate Google Page.
Steps to Take• 2-step verification
• LastPass or 1Password
• Block trackers – Ghostery
• Block scripts – NoScript
• Back up critical files
• Encrypt your hard drive
• VPN
maidan square, 2013
when things get serious
Analytics
(AKA “Everything you ever wanted to know about Google Analytics, but were afraid to ask
(so you made the intern do it)
What we will learn today1. Why should journalists have to deal with
web analytics
2. What should I be looking for in the analytics?
3. How do I customize things so I only see what I need to see, instead of all that clutter?
4. What is a Creative Data Scientist?
35%
17%
11%
7.73%
6.19%
5.05%
4%
3.47%
2.85%
2.71%109
8
7
6
5
4
3
2
94% of users never make it
past the 1st page - 35% click
on the first result!
Updated: Now that Mobile Has Taken Over