public:emai:spam

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
Next revision
Previous revision
Last revisionBoth sides next revision
public:emai:spam [2021-06-16 10:50] veselypublic:emai:spam [2021-11-19 08:12] vesely
Line 11: Line 11:
  
   * Better safe, than sorry.   * Better safe, than sorry.
 +  * Be brave! Never try to conceal your possible mistake - take it in possitive way - we all learn from mistakes. We all :-)
 +  * Cowards who awkwardly try to avoid of mistake revealing usualy make things much worse for them and for the rest of the institution.
  
-[[https://tiptopsecurity.com/the-truth-about-clicking-links-in-email-and-what-to-do-instead/|Good article about clicking links in emails]]+Bonuses: 
 + 
 +[[https://tiptopsecurity.com/the-truth-about-clicking-links-in-email-and-what-to-do-instead/|Good article about clicking links in emails]] (phishing etc.)
  
 [[https://support.mozilla.org/en-US/kb/remote-content-in-messages|How and why Thunderbird block remote content]] [[https://support.mozilla.org/en-US/kb/remote-content-in-messages|How and why Thunderbird block remote content]]
Line 18: Line 22:
 ---- ----
  
-See also "**[[:public:emai:malware|Dealing with malware, spam, suspicious content]]**" in separated CERGE-EI Wiki article (details about security measures applied to incoming emails)+<faicon fa fa-hand-o-right> See also "**[[:public:emai:malware|Dealing with malware, spam, suspicious content]]**" in separated CERGE-EI Wiki article (details about security measures applied to incoming emails)
  
-and **[[:public:emai:spam_chain|"Spam fiters at CERGE-EI"]]**+<faicon fa fa-hand-o-right> and **[[:public:emai:spam_chain|"Spam fiters at CERGE-EI"]]**  (describing chain of email filters for incoming traffic)
  
 ---- ----
Line 27: Line 31:
  
 === spam === === spam ===
 +<code>
 +
 +[Classification: POTENTIALY DANGEROUS]
 +
 +</code>
  
   * Unsolicited mail, just offers unneeded or annoying things.   * Unsolicited mail, just offers unneeded or annoying things.
Line 33: Line 42:
  
 === hoax === === hoax ===
 +
 +<code>
 +[Classification: ANNOYING]
 +
 +</code>
  
   * By wiki: A hoax is a falsehood deliberately fabricated to masquerade as the truth.   * By wiki: A hoax is a falsehood deliberately fabricated to masquerade as the truth.
Line 39: Line 53:
  
 === phishing === === phishing ===
 +
 +<code>
 +[Classification: PRETTY DANGEROUS]
 +
 +</code>
  
   * Ask for confidential and private information, often by using fraudulent webpage, masking the request as an account renew etc. Make __time pressure__  and __urgency illusion__.   * Ask for confidential and private information, often by using fraudulent webpage, masking the request as an account renew etc. Make __time pressure__  and __urgency illusion__.
Line 45: Line 64:
  
 === spoofing === === spoofing ===
 +
 +<code>
 +[Classification: DANGEROUS]
 +
 +</code>
  
   * The message looks like sent from a trustworthy address, your jobmate, manager, IT crowd, your home institution server etc.   * The message looks like sent from a trustworthy address, your jobmate, manager, IT crowd, your home institution server etc.
Line 51: Line 75:
  
 === malware === === malware ===
 +
 +<code>
 +[Classification: DANGEROUS]
 +
 +</code>
  
   * The harmful code hidden in an executable attachment or in a document as a macro or on the fraudulent webpage linked from the message.   * The harmful code hidden in an executable attachment or in a document as a macro or on the fraudulent webpage linked from the message.
Line 56: Line 85:
  
 === ransomware === === ransomware ===
 +
 +<code>
 +[Classification: THE MOST DANGEROUS]
 +
 +</code>
  
   * Special malware __encrypting every data__  you can access and asking ransom. The process of encrypting could be long term so backups could be affected too.   * Special malware __encrypting every data__  you can access and asking ransom. The process of encrypting could be long term so backups could be affected too.
   * Avoid being infected by malware.   * Avoid being infected by malware.
  
-==== What to do, if you become a target of the cyber attack ====+==== What to do, if you are uncertain about email (possible cyber attack====
  
-  - Thing first, check all circumstances, ask in doubt. +  - Thing first, check all circumstances, ask in doubt (IT, colleagues, sender,…)
-  - Do not accept time presure, postpone actionback to 1, how many times you need. +  - Do not allow the time presure effectthink twice. postpone the action (back to step eventually :-) 
-  - Only if you are sure, make some settings, password change etc. +  - Only if you are absolutely sure, continue with an action suggested in email (settings review, password change etc.) 
-  - In case of any suspicion, tell it including all details to IT+  - In case of any suspicion at any timeshare it with IT (including all details)
-  - If you have by mistake compromised your password, change it ASAP and inform IT (compulsory).+  - If you think you have compromised your password or account in any way, change the password ASAP and inform IT (compulsory).
  
 In any doubt, do not hesitate to ask **helpdesk@cerge-ei.cz**. Please prepare complete documentation, timeline, addresses, raw text of message (see [[:public:emai:em_problem_report|wiki - problem reporting]]) In any doubt, do not hesitate to ask **helpdesk@cerge-ei.cz**. Please prepare complete documentation, timeline, addresses, raw text of message (see [[:public:emai:em_problem_report|wiki - problem reporting]])
  
  
  • /var/www/html/dokuwiki/data/pages/public/emai/spam.txt
  • Last modified: 2022-12-02 10:04
  • by vesely