+---------------------------------------------------------------------------------------+------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+
|                                                                                       | sentence                                                                                                                                                                                                                                                                                                                                                                                                                                                         |
+=======================================================================================+==================================================================================================================================================================================================================================================================================================================================================================================================================================================================+
| ('wired.com/story/amazon-phishing-scam-prime-day-dogs-cancer-cure-facebook-ftc/', 10) | Remember : Always check who your emails are from , and >>>do n't open attachments<<< unless you 're sure they 're from someone you trust .                                                                                                                                                                                                                                                                                                                       |
+---------------------------------------------------------------------------------------+------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+
| ('wired.com/story/amazon-prime-day-phishing-campaign/', 24)                           | The good news is , the Amazon scam spree does n't appear uniquely clever , which means the >>>usual rules for protecting yourself<<< apply .                                                                                                                                                                                                                                                                                                                     |
+---------------------------------------------------------------------------------------+------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+
| ('wired.com/story/android-smartphones-vulnerable-out-of-the-box', 0)                  | Security meltdowns on your smartphone are often self-inflicted : You clicked the >>>wrong link<<< , or installed the wrong app .                                                                                                                                                                                                                                                                                                                                 |
+---------------------------------------------------------------------------------------+------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+
| ('wired.com/story/atlanta-ransomware-samsam-will-strike-again/', 10)                  | Unlike many ransomware variants that >>>spread through phishing<<< or online scams and require an individual to inadvertently run a malicious program on a PC ( which can then start a chain reaction across a network ) , SamSam infiltrates by exploiting vulnerabilities or guessing weak passwords in a target 's public-facing systems , and then uses mechanisms like the popular Mimikatz password discovery tool to start to gain control of a network . |
+---------------------------------------------------------------------------------------+------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+
| ('wired.com/story/decades-old-email-flaws-could-let-attackers-mask-identities/', 0)   | By now you 're hopefully familiar with the usual >>>advice to avoid phishing attacks<<< : Do n't be too quick to download attachments , do n't enter passwords or send money somewhere out of the blue , and of course , do n't click links unless you know for sure where they actually lead .                                                                                                                                                                  |
+---------------------------------------------------------------------------------------+------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+
| ('wired.com/story/doj-north-korea-hacker-sony-wannacry-complaint/', 22)               | The charges also provide more technical detail into North Korea 's various hacking efforts , many of which started with by now all-too-familiar >>>spear-phishing campaigns<<< .                                                                                                                                                                                                                                                                                 |
+---------------------------------------------------------------------------------------+------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+
| ('wired.com/story/early-amazon-prime-day-deals-2019/', 58)                            | Luckily there 's nothing unique about this scam , the usual rules for >>>protecting yourself from email scams<<< apply and , hopefully , are old hat at this point .                                                                                                                                                                                                                                                                                             |
+---------------------------------------------------------------------------------------+------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+
| ('wired.com/story/elaborate-hack-shows-damage-iot-bugs-can-do/', 0)                   | The bulk of major corporate hacks follow time-tested strategies , like >>>phishing emails<<< that trick employees into giving up their credentials , or hackers exploiting a bug in a web portal .                                                                                                                                                                                                                                                               |
+---------------------------------------------------------------------------------------+------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+
| ('wired.com/story/eu-diplomatic-cable-hacks-area-one/', 0)                            | On Wednesday , the security and >>>anti-phishing<<< firm Area 1 published details of a breach that compromised one of the European Union 's diplomatic communication channels for three years .                                                                                                                                                                                                                                                                  |
+---------------------------------------------------------------------------------------+------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+
| ('wired.com/story/facebook-hack-check-if-account-affected/', 26)                      | Facebook at least acknowledges this in its support page , offering some advice about >>>how to avoid phishing attempts<<< , like being " cautious of unwanted phone calls , text messages or emails from people you do n't know . "                                                                                                                                                                                                                              |
+---------------------------------------------------------------------------------------+------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+
| ('wired.com/story/facebook-hack-data-spammers/', 34)                                  | As always , monitoring financial and social media accounts for suspicious activity , >>>avoiding messages<<< that suddenly create a sense of urgency to act on something , and staying suspicious of links and unexpected communications are all ways to avoid scams .                                                                                                                                                                                           |
+---------------------------------------------------------------------------------------+------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+
| ('wired.com/story/fin7-wild-inner-workings-billion-dollar-hacking-group/', 35)        | And while " do n't open attachments from strangers " is the >>>first rule of not getting phished<<< , Fin7 targeted organizations that need to do just that in the regular course of business .                                                                                                                                                                                                                                                                  |
+---------------------------------------------------------------------------------------+------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+
| ('wired.com/story/foreshadow-intel-secure-enclave-vulnerability/', 42)                | They say that cheap , easy , and >>>effective techniques like phishing<<< and malware distribution are still the obvious and most cost-effective choice for targeting individuals .                                                                                                                                                                                                                                                                              |
+---------------------------------------------------------------------------------------+------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+
| ('wired.com/story/godaddy-spam-takedown-subdomains-snake-oil', 24)                    | After some sleuthing , White discovered the truth : Affiliate spammers had compromised the accounts of hundreds of GoDaddy customers , likely through a combination of a >>>phishing campaign<<< and credential stuffing , two common methods of obtaining or guessing people 's log-in information .                                                                                                                                                            |
+---------------------------------------------------------------------------------------+------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+
| ('wired.com/story/google-safe-browsing-oral-history/', 20)                            | He was saying , ' Hey Niels , this >>>phishing<<< is really becoming a problem , we should be doing something about it . '                                                                                                                                                                                                                                                                                                                                       |
+---------------------------------------------------------------------------------------+------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+
| ('wired.com/story/i-scraped-millions-of-venmo-payments-your-data-is-at-risk/', 31)    | But the most likely cyberattack to be conducted using Venmo data is >>>spearphishing<<< — and the amount of specific information available via the app would make for a very convincing phish .                                                                                                                                                                                                                                                                  |
+---------------------------------------------------------------------------------------+------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+
| ('wired.com/story/iran-cyberattacks-us-universities-indictment/', 14)                 | According to the Justice Department , many of the network intrusions began with >>>sophisticated " spear-phishing " campaigns<<< , with emails to target professors appearing to come from fellow academics at other schools .                                                                                                                                                                                                                                   |
+---------------------------------------------------------------------------------------+------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+
| ('wired.com/story/mozilla-internet-health-report/', 23)                               | As Mozilla 's report points out , those coming onto the internet today face hidden risks like deceptive advertisements , >>>phishing scams<<< , and misleading news and information .                                                                                                                                                                                                                                                                            |
+---------------------------------------------------------------------------------------+------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+
| ('wired.com/story/mueller-indictment-dnc-hack-russia-fancy-bear/', 19)                | The indictment carefully traces how the scheme unfolded , >>>including the " spearphishing "<<< by four of the GRU officers targeting the Clinton campaign in March 2016 — which enabled the Podesta email theft — and how the officers spoofed their email , hi.mymail@yandex.com , to make it appear to be from Google .                                                                                                                                       |
+---------------------------------------------------------------------------------------+------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+
| ('wired.com/story/russia-false-flag-hacks/', 0)                                       | False flags , for the modern nation-state hacker , are quickly becoming as standard a part of the toolkit as >>>phishing links<<< and infected Microsoft Office attachments .                                                                                                                                                                                                                                                                                    |
+---------------------------------------------------------------------------------------+------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+
| ('wired.com/story/us-census-2020-goes-digital/', 42)                                  | The bureau has also warned that >>>phishing attempts<<< , where fraudsters contact people posing as the Census Bureau , could trick people into divulging sensitive information about themselves .                                                                                                                                                                                                                                                               |
+---------------------------------------------------------------------------------------+------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+
| ('wired.com/story/whatsapp-hack-phone-call-voip-buffer-overflow/', 1)                 | >>>Do n't click links<<< in suspicious emails or texts .                                                                                                                                                                                                                                                                                                                                                                                                         |
+---------------------------------------------------------------------------------------+------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+