{"id":1233,"date":"2019-10-29T08:00:35","date_gmt":"2019-10-29T13:00:35","guid":{"rendered":"http:\/\/tech2.mountdesales.net\/?p=1233"},"modified":"2019-10-22T08:53:18","modified_gmt":"2019-10-22T13:53:18","slug":"something-scary-pt-2","status":"publish","type":"post","link":"https:\/\/tech.mountdesales.net\/?p=1233","title":{"rendered":"Something Scary, pt 2"},"content":{"rendered":"\n<p>The below is a Cyber Threat Map from FireEye that animates threats as they are tracked by FireEye&#8217;s servers. The screen shows which countries the attacks originated from and what type of industries are most attacked.<\/p>\n\n\n\n<p><a href=\"https:\/\/www.fireeye.com\/cyber-map\/threat-map.html\">https:\/\/www.fireeye.com\/cyber-map\/threat-map.html<\/a><\/p>\n\n\n\n<hr \/>\n<iframe src=\"https:\/\/www.fireeye.com\/cyber-map\/threat-map.html\"><\/iframe>\n<hr \/>\n\n\n\n<figure class=\"wp-block-image\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" width=\"474\" height=\"244\" data-attachment-id=\"1234\" data-permalink=\"https:\/\/tech.mountdesales.net\/?attachment_id=1234\" data-orig-file=\"https:\/\/i0.wp.com\/tech.mountdesales.net\/wp-content\/uploads\/2019\/10\/image-1.png?fit=1514%2C780&amp;ssl=1\" data-orig-size=\"1514,780\" data-comments-opened=\"0\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"image\" data-image-description=\"\" data-image-caption=\"\" data-large-file=\"https:\/\/i0.wp.com\/tech.mountdesales.net\/wp-content\/uploads\/2019\/10\/image-1.png?fit=474%2C244&amp;ssl=1\" src=\"https:\/\/i0.wp.com\/tech2.mountdesales.net\/wp-content\/uploads\/2019\/10\/image-1-1024x528.png?resize=474%2C244\" alt=\"\" class=\"wp-image-1234\" srcset=\"https:\/\/i0.wp.com\/tech.mountdesales.net\/wp-content\/uploads\/2019\/10\/image-1.png?resize=1024%2C528&amp;ssl=1 1024w, https:\/\/i0.wp.com\/tech.mountdesales.net\/wp-content\/uploads\/2019\/10\/image-1.png?resize=150%2C77&amp;ssl=1 150w, https:\/\/i0.wp.com\/tech.mountdesales.net\/wp-content\/uploads\/2019\/10\/image-1.png?resize=300%2C155&amp;ssl=1 300w, https:\/\/i0.wp.com\/tech.mountdesales.net\/wp-content\/uploads\/2019\/10\/image-1.png?resize=768%2C396&amp;ssl=1 768w, https:\/\/i0.wp.com\/tech.mountdesales.net\/wp-content\/uploads\/2019\/10\/image-1.png?w=1514&amp;ssl=1 1514w, https:\/\/i0.wp.com\/tech.mountdesales.net\/wp-content\/uploads\/2019\/10\/image-1.png?w=948&amp;ssl=1 948w, https:\/\/i0.wp.com\/tech.mountdesales.net\/wp-content\/uploads\/2019\/10\/image-1.png?w=1422&amp;ssl=1 1422w\" sizes=\"auto, (max-width: 474px) 100vw, 474px\" \/><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>The below is a Cyber Threat Map from FireEye that animates threats as they are tracked by FireEye&#8217;s servers. The screen shows which countries the attacks originated from and what type of industries are most attacked. https:\/\/www.fireeye.com\/cyber-map\/threat-map.html<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"advanced_seo_description":"","jetpack_seo_html_title":"","jetpack_seo_noindex":false,"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[30,26,13],"tags":[458,459,461,267,429,460],"class_list":["post-1233","post","type-post","status-publish","format-standard","hentry","category-more","category-network","category-websites","tag-attacks","tag-cyber","tag-fireeye","tag-internet","tag-security","tag-threat"],"jetpack_featured_media_url":"","jetpack_shortlink":"https:\/\/wp.me\/p42ogX-jT","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":1237,"url":"https:\/\/tech.mountdesales.net\/?p=1237","url_meta":{"origin":1233,"position":0},"title":"Something Scary, pt 3.","author":"Tom Rule","date":"10\/30\/2019","format":false,"excerpt":"A live Cyber Threat map that lists when and where Malware, Phishing, and Exploit attacks are occurring. BILLIONS of attacks each day are tracked. Yes, that was Billions, with a \"B\". https:\/\/threatmap.checkpoint.com\/","rel":"","context":"In &quot;More&quot;","block_context":{"text":"More","link":"https:\/\/tech.mountdesales.net\/?cat=30"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/tech.mountdesales.net\/wp-content\/uploads\/2019\/10\/image-2.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/tech.mountdesales.net\/wp-content\/uploads\/2019\/10\/image-2.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/tech.mountdesales.net\/wp-content\/uploads\/2019\/10\/image-2.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/tech.mountdesales.net\/wp-content\/uploads\/2019\/10\/image-2.png?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/tech.mountdesales.net\/wp-content\/uploads\/2019\/10\/image-2.png?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/tech.mountdesales.net\/wp-content\/uploads\/2019\/10\/image-2.png?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":1228,"url":"https:\/\/tech.mountdesales.net\/?p=1228","url_meta":{"origin":1233,"position":1},"title":"Something Scary, part 1","author":"Tom Rule","date":"10\/28\/2019","format":false,"excerpt":"Halloween is coming, so here's something really scary - a live map showing you Top DDoS attacks happening across the planet. DDoS = Distributed Denial of Service. The \"bad guys\" collect a whole slew of computers and processors that they have wrangled control of, and command them all to try\u2026","rel":"","context":"In &quot;More&quot;","block_context":{"text":"More","link":"https:\/\/tech.mountdesales.net\/?cat=30"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/tech.mountdesales.net\/wp-content\/uploads\/2019\/10\/image.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/tech.mountdesales.net\/wp-content\/uploads\/2019\/10\/image.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/tech.mountdesales.net\/wp-content\/uploads\/2019\/10\/image.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/tech.mountdesales.net\/wp-content\/uploads\/2019\/10\/image.png?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/tech.mountdesales.net\/wp-content\/uploads\/2019\/10\/image.png?resize=1050%2C600&ssl=1 3x"},"classes":[]},{"id":2086,"url":"https:\/\/tech.mountdesales.net\/?p=2086","url_meta":{"origin":1233,"position":2},"title":"Is this Legit?","author":"tech","date":"02\/25\/2025","format":false,"excerpt":"Scam attack flow \/ Source: BleepingComputer Take a look at the image above. Does it look like a friendly notification from PayPal, or does it set off your spidey-sense? If you said phishy, you're on the right track!Cyber crooks are at it again \u2014 this time exploiting PayPal's \"add address\"\u2026","rel":"","context":"In &quot;Security&quot;","block_context":{"text":"Security","link":"https:\/\/tech.mountdesales.net\/?cat=520"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/tech.mountdesales.net\/wp-content\/uploads\/2025\/02\/image-2.png?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":816,"url":"https:\/\/tech.mountdesales.net\/?p=816","url_meta":{"origin":1233,"position":3},"title":"Macs and Antivirus &#8211; an opinion","author":"Tom Rule","date":"03\/17\/2017","format":false,"excerpt":"The iPad Guy has also been known as the MaconMacGuy for a \"good while now\" - and sometimes gets asked about running antivirus software for the Mac. In general, Macs are less susceptible to getting nailed with a true virus. HOWEVER - we have seen a couple of annoyances on\u2026","rel":"","context":"In &quot;Make Tech Easier&quot;","block_context":{"text":"Make Tech Easier","link":"https:\/\/tech.mountdesales.net\/?cat=111"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":1706,"url":"https:\/\/tech.mountdesales.net\/?p=1706","url_meta":{"origin":1233,"position":4},"title":"Top Tips for staying secure online","author":"Tom Rule","date":"09\/03\/2022","format":false,"excerpt":"Top tips for staying secure online, borrowed from https:\/\/www.ncsc.gov.uk\/collection\/top-tips-for-staying-secure-online While you can find a TON of articles explaining how to stay safe online, many are either too wordy, take too long to get to the point, or are annoying in other ways. Here, borrowed from https:\/\/www.ncsc.gov.uk\/collection\/top-tips-for-staying-secure-online, are some pretty easily\u2026","rel":"","context":"In &quot;Essentials&quot;","block_context":{"text":"Essentials","link":"https:\/\/tech.mountdesales.net\/?cat=105"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/tech.mountdesales.net\/wp-content\/uploads\/2022\/09\/image.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/tech.mountdesales.net\/wp-content\/uploads\/2022\/09\/image.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/tech.mountdesales.net\/wp-content\/uploads\/2022\/09\/image.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/tech.mountdesales.net\/wp-content\/uploads\/2022\/09\/image.png?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/tech.mountdesales.net\/wp-content\/uploads\/2022\/09\/image.png?resize=1050%2C600&ssl=1 3x"},"classes":[]},{"id":2079,"url":"https:\/\/tech.mountdesales.net\/?p=2079","url_meta":{"origin":1233,"position":5},"title":"Just because&#8230;.. Obscure Islands","author":"tech","date":"02\/12\/2025","format":false,"excerpt":"Did you know there is an island that switches countries every 6 months? An island that caused every map to be redrawn because they moved the International Date Line? An island originally purchased by the US to harvest.... bird poop? Check out the Obscure Islands website.","rel":"","context":"In &quot;More&quot;","block_context":{"text":"More","link":"https:\/\/tech.mountdesales.net\/?cat=30"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/tech.mountdesales.net\/wp-content\/uploads\/2025\/02\/image.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/tech.mountdesales.net\/wp-content\/uploads\/2025\/02\/image.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/tech.mountdesales.net\/wp-content\/uploads\/2025\/02\/image.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/tech.mountdesales.net\/wp-content\/uploads\/2025\/02\/image.png?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/tech.mountdesales.net\/wp-content\/uploads\/2025\/02\/image.png?resize=1050%2C600&ssl=1 3x"},"classes":[]}],"jetpack_likes_enabled":true,"_links":{"self":[{"href":"https:\/\/tech.mountdesales.net\/index.php?rest_route=\/wp\/v2\/posts\/1233","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/tech.mountdesales.net\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/tech.mountdesales.net\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/tech.mountdesales.net\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/tech.mountdesales.net\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1233"}],"version-history":[{"count":0,"href":"https:\/\/tech.mountdesales.net\/index.php?rest_route=\/wp\/v2\/posts\/1233\/revisions"}],"wp:attachment":[{"href":"https:\/\/tech.mountdesales.net\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1233"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/tech.mountdesales.net\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1233"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/tech.mountdesales.net\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1233"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}