{"id":1237,"date":"2019-10-30T08:00:11","date_gmt":"2019-10-30T13:00:11","guid":{"rendered":"http:\/\/tech2.mountdesales.net\/?p=1237"},"modified":"2019-10-22T08:52:16","modified_gmt":"2019-10-22T13:52:16","slug":"something-scary-pt-3","status":"publish","type":"post","link":"https:\/\/tech.mountdesales.net\/?p=1237","title":{"rendered":"Something Scary, pt 3."},"content":{"rendered":"\n<p>A live Cyber Threat map that lists when and where Malware, Phishing, and Exploit attacks are occurring. BILLIONS of attacks each day are tracked.<\/p>\n\n\n\n<p>Yes, that was Billions, with a &#8220;B&#8221;.<\/p>\n\n\n\n<p><a href=\"https:\/\/threatmap.checkpoint.com\/\">https:\/\/threatmap.checkpoint.com\/<\/a><\/p>\n\n\n\n<iframe src=\"https:\/\/threatmap.checkpoint.com\/\" height=\"800px\"><\/iframe>\n\n\n\n\n<figure class=\"wp-block-image\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" width=\"474\" height=\"221\" data-attachment-id=\"1238\" data-permalink=\"https:\/\/tech.mountdesales.net\/?attachment_id=1238\" data-orig-file=\"https:\/\/i0.wp.com\/tech.mountdesales.net\/wp-content\/uploads\/2019\/10\/image-2.png?fit=1871%2C874&amp;ssl=1\" data-orig-size=\"1871,874\" data-comments-opened=\"0\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"image\" data-image-description=\"\" data-image-caption=\"\" data-large-file=\"https:\/\/i0.wp.com\/tech.mountdesales.net\/wp-content\/uploads\/2019\/10\/image-2.png?fit=474%2C221&amp;ssl=1\" src=\"https:\/\/i0.wp.com\/tech2.mountdesales.net\/wp-content\/uploads\/2019\/10\/image-2-1024x478.png?resize=474%2C221\" alt=\"\" class=\"wp-image-1238\" srcset=\"https:\/\/i0.wp.com\/tech.mountdesales.net\/wp-content\/uploads\/2019\/10\/image-2.png?resize=1024%2C478&amp;ssl=1 1024w, https:\/\/i0.wp.com\/tech.mountdesales.net\/wp-content\/uploads\/2019\/10\/image-2.png?resize=150%2C70&amp;ssl=1 150w, https:\/\/i0.wp.com\/tech.mountdesales.net\/wp-content\/uploads\/2019\/10\/image-2.png?resize=300%2C140&amp;ssl=1 300w, https:\/\/i0.wp.com\/tech.mountdesales.net\/wp-content\/uploads\/2019\/10\/image-2.png?resize=768%2C359&amp;ssl=1 768w, https:\/\/i0.wp.com\/tech.mountdesales.net\/wp-content\/uploads\/2019\/10\/image-2.png?w=1871&amp;ssl=1 1871w, https:\/\/i0.wp.com\/tech.mountdesales.net\/wp-content\/uploads\/2019\/10\/image-2.png?w=948&amp;ssl=1 948w, https:\/\/i0.wp.com\/tech.mountdesales.net\/wp-content\/uploads\/2019\/10\/image-2.png?w=1422&amp;ssl=1 1422w\" sizes=\"auto, (max-width: 474px) 100vw, 474px\" \/><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>A live Cyber Threat map that lists when and where Malware, Phishing, and Exploit attacks are occurring. BILLIONS of attacks each day are tracked. Yes, that was Billions, with a &#8220;B&#8221;. https:\/\/threatmap.checkpoint.com\/<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"advanced_seo_description":"","jetpack_seo_html_title":"","jetpack_seo_noindex":false,"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[30,26,13],"tags":[464,459,463,267,305,462,429,460],"class_list":["post-1237","post","type-post","status-publish","format-standard","hentry","category-more","category-network","category-websites","tag-attack","tag-cyber","tag-exploit","tag-internet","tag-malware","tag-phishing","tag-security","tag-threat"],"jetpack_featured_media_url":"","jetpack_shortlink":"https:\/\/wp.me\/p42ogX-jX","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":1844,"url":"https:\/\/tech.mountdesales.net\/?p=1844","url_meta":{"origin":1237,"position":0},"title":"Go Phishing?????","author":"Tom Rule","date":"06\/08\/2023","format":false,"excerpt":"Billions of \"phishing\" emails are sent every day - where someone tried to trick you into giving out info that they can use to hurt you. How good are you at spotting a phishing email? https:\/\/www.sonicwall.com\/phishing-iq-test\/ Over 90% of today\u2019s data breaches start with a phishing attack. Can you spot\u2026","rel":"","context":"In &quot;More&quot;","block_context":{"text":"More","link":"https:\/\/tech.mountdesales.net\/?cat=30"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/tech.mountdesales.net\/wp-content\/uploads\/2023\/06\/image-1.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/tech.mountdesales.net\/wp-content\/uploads\/2023\/06\/image-1.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/tech.mountdesales.net\/wp-content\/uploads\/2023\/06\/image-1.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/tech.mountdesales.net\/wp-content\/uploads\/2023\/06\/image-1.png?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":1233,"url":"https:\/\/tech.mountdesales.net\/?p=1233","url_meta":{"origin":1237,"position":1},"title":"Something Scary, pt 2","author":"Tom Rule","date":"10\/29\/2019","format":false,"excerpt":"The below is a Cyber Threat Map from FireEye that animates threats as they are tracked by FireEye's servers. The screen shows which countries the attacks originated from and what type of industries are most attacked. https:\/\/www.fireeye.com\/cyber-map\/threat-map.html","rel":"","context":"In &quot;More&quot;","block_context":{"text":"More","link":"https:\/\/tech.mountdesales.net\/?cat=30"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/tech.mountdesales.net\/wp-content\/uploads\/2019\/10\/image-1.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/tech.mountdesales.net\/wp-content\/uploads\/2019\/10\/image-1.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/tech.mountdesales.net\/wp-content\/uploads\/2019\/10\/image-1.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/tech.mountdesales.net\/wp-content\/uploads\/2019\/10\/image-1.png?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/tech.mountdesales.net\/wp-content\/uploads\/2019\/10\/image-1.png?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/tech.mountdesales.net\/wp-content\/uploads\/2019\/10\/image-1.png?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":2075,"url":"https:\/\/tech.mountdesales.net\/?p=2075","url_meta":{"origin":1237,"position":2},"title":"Take the Phishing quiz!","author":"tech","date":"02\/01\/2025","format":false,"excerpt":"Over 90% of today\u2019s data breaches start with a phishing attack. Can you spot when you\u2019re being phished? Test your ability to identify fraudulent emails and see how susceptible you really are to social engineering and phishing scams.The SonicWall Phishing Quiz uses real examples from some of the most common\u2026","rel":"","context":"In &quot;More&quot;","block_context":{"text":"More","link":"https:\/\/tech.mountdesales.net\/?cat=30"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/tech.mountdesales.net\/wp-content\/uploads\/2025\/01\/image.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/tech.mountdesales.net\/wp-content\/uploads\/2025\/01\/image.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/tech.mountdesales.net\/wp-content\/uploads\/2025\/01\/image.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/tech.mountdesales.net\/wp-content\/uploads\/2025\/01\/image.png?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":816,"url":"https:\/\/tech.mountdesales.net\/?p=816","url_meta":{"origin":1237,"position":3},"title":"Macs and Antivirus &#8211; an opinion","author":"Tom Rule","date":"03\/17\/2017","format":false,"excerpt":"The iPad Guy has also been known as the MaconMacGuy for a \"good while now\" - and sometimes gets asked about running antivirus software for the Mac. In general, Macs are less susceptible to getting nailed with a true virus. HOWEVER - we have seen a couple of annoyances on\u2026","rel":"","context":"In &quot;Make Tech Easier&quot;","block_context":{"text":"Make Tech Easier","link":"https:\/\/tech.mountdesales.net\/?cat=111"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":1783,"url":"https:\/\/tech.mountdesales.net\/?p=1783","url_meta":{"origin":1237,"position":4},"title":"Are you smart enough to not be Phished? Let&#8217;s find out!","author":"Tom Rule","date":"01\/13\/2023","format":false,"excerpt":"Take the Sonicwall Phishing quiz. [It's free, and fun!] CLICK HERE to get started. Phishing = sending out fake emails to trick someone into giving you their email address, login information, any sorts of \"useful\" information if you are looking to scam someone. Take the Quiz, and see if you\u2026","rel":"","context":"In &quot;More&quot;","block_context":{"text":"More","link":"https:\/\/tech.mountdesales.net\/?cat=30"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/tech.mountdesales.net\/wp-content\/uploads\/2023\/01\/image.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/tech.mountdesales.net\/wp-content\/uploads\/2023\/01\/image.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/tech.mountdesales.net\/wp-content\/uploads\/2023\/01\/image.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/tech.mountdesales.net\/wp-content\/uploads\/2023\/01\/image.png?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":1440,"url":"https:\/\/tech.mountdesales.net\/?p=1440","url_meta":{"origin":1237,"position":5},"title":"Can you pass the Phishing test?","author":"Tom Rule","date":"11\/05\/2020","format":false,"excerpt":"Criminals of all types will try to use legitimate looking email to get your information. Are you savvy enough to be able to tell the difference between a legitimate email and a scam? CLICK HERE AND TAKE THE TEST! More info: It\u2019s the Most Wonderful Time of the Year\u2026 for\u2026","rel":"","context":"In &quot;Essentials&quot;","block_context":{"text":"Essentials","link":"https:\/\/tech.mountdesales.net\/?cat=105"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]}],"jetpack_likes_enabled":true,"_links":{"self":[{"href":"https:\/\/tech.mountdesales.net\/index.php?rest_route=\/wp\/v2\/posts\/1237","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/tech.mountdesales.net\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/tech.mountdesales.net\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/tech.mountdesales.net\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/tech.mountdesales.net\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1237"}],"version-history":[{"count":0,"href":"https:\/\/tech.mountdesales.net\/index.php?rest_route=\/wp\/v2\/posts\/1237\/revisions"}],"wp:attachment":[{"href":"https:\/\/tech.mountdesales.net\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1237"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/tech.mountdesales.net\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1237"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/tech.mountdesales.net\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1237"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}