this post was submitted on 21 Jun 2023
156 points (100.0% liked)

Technology

37720 readers
621 users here now

A nice place to discuss rumors, happenings, innovations, and challenges in the technology sphere. We also welcome discussions on the intersections of technology and society. If it’s technological news or discussion of technology, it probably belongs here.

Remember the overriding ethos on Beehaw: Be(e) Nice. Each user you encounter here is a person, and should be treated with kindness (even if they’re wrong, or use a Linux distro you don’t like). Personal attacks will not be tolerated.

Subcommunities on Beehaw:


This community's icon was made by Aaron Schneider, under the CC-BY-NC-SA 4.0 license.

founded 2 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] TheOtherJake@beehaw.org 25 points 1 year ago (2 children)

"Hi Karen , this is HR. You can now log anonymous complaints about IT, by logging into this external website with your company credentials. We provide this for your security because IT is able to monitor in network communication."

[–] shmushroomsh@beehaw.org 10 points 1 year ago (1 children)

You guys are killing me! I know so many people who get their Facebook profiles hacked like this. It just cracks me up because it seems silly to fall for. It always looks wrong and the address is ridiculous.

[–] Laneus@beehaw.org 5 points 1 year ago

on some level, scammers are deliberating targeting the easiest marks. If you send out millions of phishing emails, your looking to catch few dozen of the least tech savvy people you can.

[–] Hirom@beehaw.org 2 points 1 year ago (1 children)

There are such third party services for company to receive anonymous ethics complains, or to poll employees pseudo-anonymously.

If done well it's not using the company credentials.

[–] argv_minus_one@beehaw.org 1 points 1 year ago

Legitimate? Anything like that is at least one of two kinds of painfully obvious trap, namely:

  1. It's some kind of criminal operation looking to commit industrial espionage, collect credentials, etc.
  2. It's not actually anonymous, and is in fact being used by the company to root out and get rid of insufficiently loyal employees.