<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>security &#8211; Startupware: Managing Startups</title>
	<atom:link href="https://www.startupware.com/tag/security/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.startupware.com</link>
	<description>Autorunning Software &#38; Running a Software Business</description>
	<lastBuildDate>Fri, 10 Oct 2025 15:08:57 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>
	<item>
		<title>Phish Spotting</title>
		<link>https://www.startupware.com/newsletter-reprints/phish-spotting/</link>
		
		<dc:creator><![CDATA[Jerry Stern]]></dc:creator>
		<pubDate>Fri, 10 Oct 2025 14:58:33 +0000</pubDate>
				<category><![CDATA[Newsletter Reprints]]></category>
		<category><![CDATA[email]]></category>
		<category><![CDATA[free Windows help]]></category>
		<category><![CDATA[phish]]></category>
		<category><![CDATA[scams]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[Windows]]></category>
		<guid isPermaLink="false">https://www.startupware.com/?p=2717</guid>

					<description><![CDATA[<p>Phish are smarter with AI, more difficult to spot, but scammers are still relying on everyone who gets email to click and allow their hoaxes, because using non-Admin Windows accounts blocks most of the attachment malware they try to send. They rely on you to let them into your computer. Here&#8217;s how to spot a &#8230; <a href="https://www.startupware.com/newsletter-reprints/phish-spotting/" class="more-link">Continue reading <span class="screen-reader-text">Phish Spotting</span> <span class="meta-nav">&#8594;</span></a></p>
<p>The post <a rel="nofollow" href="https://www.startupware.com/newsletter-reprints/phish-spotting/">Phish Spotting</a> appeared first on Startupware.com. Visit to read more about software design, malware, and computer security.</p>
]]></description>
										<content:encoded><![CDATA[
<figure class="wp-block-image size-full"><img fetchpriority="high" decoding="async" width="800" height="450" src="https://www.startupware.com/wp-content/uploads/2025/10/how-to-spot-a-phish-4-5-8c.jpg" alt="#Phish spotting in #Email" class="wp-image-2716" srcset="https://www.startupware.com/wp-content/uploads/2025/10/how-to-spot-a-phish-4-5-8c.jpg 800w, https://www.startupware.com/wp-content/uploads/2025/10/how-to-spot-a-phish-4-5-8c-300x169.jpg 300w, https://www.startupware.com/wp-content/uploads/2025/10/how-to-spot-a-phish-4-5-8c-768x432.jpg 768w" sizes="(max-width: 800px) 100vw, 800px" /></figure>



<p>Phish are smarter with AI, more difficult to spot, but scammers are still relying on everyone who gets email to click and allow their hoaxes, because using non-Admin Windows accounts blocks most of the attachment malware they try to send. They rely on you to let them into your computer. Here&#8217;s how to spot a phish, in the new <a href="https://startupware.com/PC410_Newsletters/2025-10_PC_Updater_News-Old_and_New_Windows.pdf" target="_blank" rel="noopener">October PC Updater News</a>. Or <a href="https://startupware.com/news" target="_blank" rel="noopener">free subscriptions and back issues are online here</a>.</p>



<p></p>
<p>The post <a rel="nofollow" href="https://www.startupware.com/newsletter-reprints/phish-spotting/">Phish Spotting</a> appeared first on Startupware.com. Visit to read more about software design, malware, and computer security.</p>
<p>Original article: <a href="https://www.startupware.com/newsletter-reprints/phish-spotting/">Phish Spotting</a>.</p>]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Is That eMail for Real?</title>
		<link>https://www.startupware.com/newsletter-reprints/is-that-email-for-real/</link>
		
		<dc:creator><![CDATA[Jerry Stern]]></dc:creator>
		<pubDate>Thu, 20 Dec 2018 16:15:01 +0000</pubDate>
				<category><![CDATA[Newsletter Reprints]]></category>
		<category><![CDATA[amazon]]></category>
		<category><![CDATA[computer security]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[security]]></category>
		<guid isPermaLink="false">https://www.startupware.com/?p=1905</guid>

					<description><![CDATA[<p>OK, well then, would you click on this email? I don't remember ordering a pricy server from Amazon, but it looks like I'm getting one. I guess I'd better look in there and see who ordered it for me; could be that my account was hacked.</p>
<p>The post <a rel="nofollow" href="https://www.startupware.com/newsletter-reprints/is-that-email-for-real/">Is That eMail for Real?</a> appeared first on Startupware.com. Visit to read more about software design, malware, and computer security.</p>
]]></description>
										<content:encoded><![CDATA[
<p>The easiest way for hackers and 
ransomware to mess with your computer is social engineering. Basically, 
that means ‘Wear the appropriate repair-guy uniform, walk into the 
building looking confident, and go directly to the system that you will 
be &#8220;fixing.&#8221; No one challenges that, right?</p>



<p>OK, well then, would you click on this 
email? I don&#8217;t remember ordering a pricy server from Amazon, but it 
looks like I&#8217;m getting one. I guess I&#8217;d better look in there and see who
 ordered it for me; could be that my account was hacked.&nbsp;</p>



<figure class="wp-block-image"><img decoding="async" width="664" height="483" src="https://www.startupware.com/wp-content/uploads/2018/12/FakeAmazon.jpg" alt="Fake Amazon Order" class="wp-image-1906" srcset="https://www.startupware.com/wp-content/uploads/2018/12/FakeAmazon.jpg 664w, https://www.startupware.com/wp-content/uploads/2018/12/FakeAmazon-300x218.jpg 300w" sizes="(max-width: 664px) 100vw, 664px" /></figure>



<p> So what&#8217;s wrong with it? Here goes, most obvious and visible items first: </p>



<ul class="wp-block-list"><li> I ordered no such thing.</li><li>The sender&#8217;s email address has the  wrong domain, ‘amazons.com&#8217; which is also not the web address for Wonder  Woman&#8217;s family island. </li><li>The return address for Amazon orders is  generally auto-confirm@amazon.com.</li><li>The format of the email is simpler  than the usual Amazon shipping confirmation, missing gray backgrounds,  logos, and a picture of each item ordered. It looks a lot like an Amazon  confirmation from ten years ago.</li><li> The order number is not a text link in the email, and the last section has too many numbers.</li><li>&#8220;it may take 24 hours for tracking  information to be available in your account.&#8221; No, tracking shows up in  Amazon before the email is sent; it&#8217;s Fedex and UPS that will just say  ‘label printed&#8217; until the next morning.</li><li> Finally, not visible above, if you  float your mouse over the ‘Order Details&#8217; button, which is missing the  orange logo that Amazon would normally use, you will see the link, which  goes to usintecmedical_ com_br, not Amazon. That ‘com.br&#8217; points to a site in Brazil, probably hacked. </li></ul>



<p>
What to do? Will this big Dell system&nbsp;show up at my door? No. I <strong>TYPED </strong>‘amazon.com&#8217;
 into my browser, didn&#8217;t follow the link, and checked. No surprises 
there. However, that&nbsp;medical address in Brazil would likely have looked 
like an Amazon page, asked for a login, which it would keep and use, and
 then forwarded you to the real Amazon. Or the site would attempt to 
install malware. Be suspicious. These fake confirmations can look like 
they come from nearly any large company.

</p>
<p>The post <a rel="nofollow" href="https://www.startupware.com/newsletter-reprints/is-that-email-for-real/">Is That eMail for Real?</a> appeared first on Startupware.com. Visit to read more about software design, malware, and computer security.</p>
<p>Original article: <a href="https://www.startupware.com/newsletter-reprints/is-that-email-for-real/">Is That eMail for Real?</a>.</p>]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Long Passwords are better than Short C0mp1ex Passwords</title>
		<link>https://www.startupware.com/newsletter-reprints/long-passwords/</link>
		
		<dc:creator><![CDATA[Jerry Stern]]></dc:creator>
		<pubDate>Wed, 31 Oct 2018 18:30:15 +0000</pubDate>
				<category><![CDATA[Newsletter Reprints]]></category>
		<category><![CDATA[login]]></category>
		<category><![CDATA[NIST]]></category>
		<category><![CDATA[passwords]]></category>
		<category><![CDATA[security]]></category>
		<guid isPermaLink="false">https://www.startupware.com/?p=1891</guid>

					<description><![CDATA[<p>Who wrote the rule that says that passwords should have “both upper and lower-case letters, a number, and special characters”?  Well, now they've un-wrote it.</p>
<p>The post <a rel="nofollow" href="https://www.startupware.com/newsletter-reprints/long-passwords/">Long Passwords are better than Short C0mp1ex Passwords</a> appeared first on Startupware.com. Visit to read more about software design, malware, and computer security.</p>
]]></description>
										<content:encoded><![CDATA[<p><img decoding="async" src="https://www.pc410.com/art/2017/PostItPasswords.jpg" width="500" height="354" alt="Long passwords are better than complex passwords" class="aligncenter size-full" /></p>
<p>Who wrote the rule that says that passwords should have “both upper and lower-case letters, a number, and special characters”? And that they should be changed every 90 days? And that it’s OK to verify a password change by asking questions that anyone on Facebook could look up?</p>
<p>Well, that was NIST, the National Institute of Standards and Technology. And they’ve removed those rules. They’re as obsolete as using ‘monkey’ for a password, and that’s good, as the rules and the monkey were both just nonsense.</p>
<p>Anyone who has done the math can tell you that a 16-character password of nothing but lower-case letters is basically one answer in a set that is 26 raised to the 16th power. That’s 4.36 x 10 22, or 401,906,756,202,070,000,000,000,000. Or you can use 6 characters that include that ‘all possible characters’ rule, and that would be around 72 characters, to the 6th power, or 139,314,069,504. That long-but-simple password is 2.8 quadrillion times harder to guess.</p>
<p>This is, of course, based on stupid. Lots of it. Here are the basic assumptions, all wrong:</p>
<ul>
<li><strong>Humans can remember super-complex 8-character passwords.</strong> Yes, maybe one of them. Not one for each banking site, let alone all the trivial web sites that demand a password.</li>
<li><strong>Online attackers can try to guess passwords in groups of trillions.</strong> They can’t, even on websites dumb enough to allow it; it would stop the ‘Net just from the traffic alone. A badly-built website would allow a few thousand attempts per day before crashing. Brute force guessing isn’t how attacks succeed on properly-configured web sites. Attackers steal your passwords with spyware, or they guess the top 100 most-popular passwords. Like ‘querty’ or ‘password’. They don’t run through every possible letter &#038; number combination; that won&#8217;t work.</li>
<li><strong>Changing passwords on a calendar basis does something useful.</strong> Nope. The assumption is that we use the same password everywhere, and once it’s lost, it will be used everywhere else after 90 days. Hackers don’t wait 90 days, and we can’t change passwords daily. But some users do repeat passwords. Don’t do that.</li>
<li><strong>Asking questions about our own history is security.</strong><br />Like ‘Pick your old address out of these 4 choices’ I’ve done it; they offered addresses of someone else I know that shares my name, my former address at an apartment, and my parents’ address, where I lived sometime in the prior century. I chose the answer of ‘Skip to next financial institution.’</li>
<li>And finally, there’s <strong>the stupid assumption that attackers know that you mixed letters and numbers</strong>.</li>
<p>They don’t, and it changes the math. If you told them, “I only use upper case”, well yes, that speeds up guessing. But they don’t know if you used all available characters, or three of them. Forcing us to use <strong>ALL</strong> those character types doesn’t add any security–a brute force guessing program won’t know which characters to guess.
</ul>
<p>OK, so the new rules are sensible, by comparison. They’re here:<br />
<a href="https://pages.nist.gov/800-63-3/sp800-63-3.html" rel="noopener" target="_blank">https://pages.nist.gov/800-63-3/sp800-63-3.html</a></p>
<p>Most of it is government lawyer-babble, an extreme case of what they call ‘terms of art’, and it spends a lot of pages on what standards and rules apply to what type of activity.</p>
<p>The recommendations include these items, all sensible:</p>
<ul>
<li>Password systems should reject dictionary words as passwords, along with the name of the service, or choosing a user name as the password.</li>
<li>Passwords should be at least 8 characters, and should be allowed to be as long as 64 characters.</li>
<li>Passwords will be stored as encrypted data, not as passwords, in a “one-way hash.&#8221; That means that a web site will ask for “the password that will encrypt to something we know”. In other words, they couldn’t tell anyone (or you) your password even if they wanted to, only if it matched what was entered when it was created. Not “it’s one letter off”, which is an answer I’ve gotten from a (former) bank, without even asking. </li>
</ul>
<p><strong>What does this mean for us?</strong></p>
<p>Well, it means that “ZebraInTheCornfield” is a higher-security password than “f0OT6a11”, and it’s easier to remember and to type. And ‘monkey’ isn’t allowed, ever. Choose your passwords accordingly, with phrases of at least 16 characters that are easy to remember, but not something anyone else would know.</p>
<p>The post <a rel="nofollow" href="https://www.startupware.com/newsletter-reprints/long-passwords/">Long Passwords are better than Short C0mp1ex Passwords</a> appeared first on Startupware.com. Visit to read more about software design, malware, and computer security.</p>
<p>Original article: <a href="https://www.startupware.com/newsletter-reprints/long-passwords/">Long Passwords are better than Short C0mp1ex Passwords</a>.</p>]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
