YeOldeStonecat
Well-Known Member
- Reaction score
- 6,755
- Location
- Englewood Florida
"merde out of luck"..I like that one to keep it sorta clean on a forum!
As much spearphishing that targets the real estate industry I think I would have already moved on.Calyx Point... right now... uses Active X to install...
You must use IE to install it as a result. I'm overjoyed at this news, because they're FINALLY going to have to fix that stupid installer.
Sadly, I got a little too excited with this news, because there's an IE mode of Edge that's still there, and will be around for sometime yet. But it looks like you need Group Policy to configure it... which means registry hacks to enable specific sites to be insecure. So pretty much a security wash... unless ActiveX is finally dead because it can't get out of the sandbox... need to read some more.
Called Calyx Support, they "claim" they're adapting there installation process to be browser agnostic and are already making changes to that effect. I told them, you have until the end of the year, if we get into 2022 and this crap is still IE dependent we're moving to a competitors product.
They just took over a month past a massive legal change in paperwork to get us the updated forms... So I'm in full on business integrity mode because this company has a documented history of taking too long for simple changes, much less something like this.
As much spearphishing that targets the real estate industry I think I would have already moved on.
Only the general lack of regard for security that keeping Active X represents. If they are not bothering with that, what else are they behind on?The following is being asked without a trace of snark, and is focused on this comment coming in the context of ActiveX: How is spearphishing relevant?
It could be that I completely misunderstand spearphishing, but I don't think so. My basic understanding is that it is very, very custom targeted phishing, with very sophisticated facsimilies of "official" correspondence to make it look real. It still depends, entirely, on the target taking an action they shouldn't based on being convinced by the lure.
I guess the lure could involve ActiveX, but I don't see how that's central. What am I not getting, or not understanding, here?
Only the general lack of regard for security that keeping Active X represents. If they are not bothering with that, what else are they behind on?
I've been training them for the last decade to recognize this threat, so they're doing OK.
Yes, but it only works in low turn over, small environments where people actually care and take responsibility. Larger entities have no choice but to fork over for Sentinel One or something similar.And, in the final analysis, this is the very best way to prevent spearphishing from being successful. Keep up the good work and good fight!
Larger entities have no choice but to fork over for Sentinel One or something similar.
No argument from me. But anything that relies on technology to stop what is primarily the result of human error is bound to have a higher rate of failure than one would hope. I sometimes wonder if they're worse than nothing, as there is no opportunity to develop "sniff test" skills, and without those falling for the lure is just so much more likely.
There are many industries that are lazy and quite essential!