public:emai:spam

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
Next revision
Previous revision
public:emai:spam [2021-06-16 10:51] veselypublic:emai:spam [2022-12-02 10:04] (current) vesely
Line 11: Line 11:
  
   * Better safe, than sorry.   * Better safe, than sorry.
 +  * Be brave! Never try to conceal your possible mistake - take it in possitive way - we all learn from mistakes. We all :-)
 +  * Cowards who awkwardly try to avoid of mistake revealing usualy make things much worse for them and for the rest of the institution.
  
-[[https://tiptopsecurity.com/the-truth-about-clicking-links-in-email-and-what-to-do-instead/|Good article about clicking links in emails]]+Bonuses: 
 + 
 +[[https://tiptopsecurity.com/the-truth-about-clicking-links-in-email-and-what-to-do-instead/|Good article about clicking links in emails]] (phishing etc.)
  
 [[https://support.mozilla.org/en-US/kb/remote-content-in-messages|How and why Thunderbird block remote content]] [[https://support.mozilla.org/en-US/kb/remote-content-in-messages|How and why Thunderbird block remote content]]
Line 18: Line 22:
 ---- ----
  
-See also "**[[:public:emai:malware|Dealing with malware, spam, suspicious content]]**" in separated CERGE-EI Wiki article (details about security measures applied to incoming emails)+<faicon fa fa-hand-o-right> See also "**[[:public:emai:malware|Dealing with malware, spam, suspicious content]]**" in separated CERGE-EI Wiki article (details about security measures applied to incoming emails)
  
-and **[[:public:emai:spam_chain|"Spam fiters at CERGE-EI"]]** (describing chain of email filters for incoming traffic)+<faicon fa fa-hand-o-right> and **[[:public:emai:spam_chain|"Spam fiters at CERGE-EI"]]**  (describing chain of email filters for incoming traffic)
  
 ---- ----
Line 27: Line 31:
  
 === spam === === spam ===
 +<code>
 +
 +[Classification: POTENTIALY DANGEROUS]
 +
 +</code>
  
   * Unsolicited mail, just offers unneeded or annoying things.   * Unsolicited mail, just offers unneeded or annoying things.
Line 33: Line 42:
  
 === hoax === === hoax ===
 +
 +<code>
 +[Classification: ANNOYING]
 +
 +</code>
  
   * By wiki: A hoax is a falsehood deliberately fabricated to masquerade as the truth.   * By wiki: A hoax is a falsehood deliberately fabricated to masquerade as the truth.
Line 40: Line 54:
 === phishing === === phishing ===
  
-  Ask for confidential and private information, often by using fraudulent webpage, masking the request as an account renew etc. Make __time pressure__  and __urgency illusion__.+<code> 
 +[Classification: PRETTY DANGEROUS] 
 + 
 +</code> 
 + 
 +  Asks for confidential and private information, often by using fraudulent webpage, masking the request as an account renew etc. Make __time pressure__  and __urgency illusion__.
   * Never use offered links without its __authenticity thorough verification__.   * Never use offered links without its __authenticity thorough verification__.
   * Be very careful and abstemious by inserting your login and password anywhere.   * Be very careful and abstemious by inserting your login and password anywhere.
  
 === spoofing === === spoofing ===
 +
 +<code>
 +[Classification: DANGEROUS]
 +
 +</code>
  
   * The message looks like sent from a trustworthy address, your jobmate, manager, IT crowd, your home institution server etc.   * The message looks like sent from a trustworthy address, your jobmate, manager, IT crowd, your home institution server etc.
Line 51: Line 75:
  
 === malware === === malware ===
 +
 +<code>
 +[Classification: DANGEROUS]
 +
 +</code>
  
   * The harmful code hidden in an executable attachment or in a document as a macro or on the fraudulent webpage linked from the message.   * The harmful code hidden in an executable attachment or in a document as a macro or on the fraudulent webpage linked from the message.
Line 56: Line 85:
  
 === ransomware === === ransomware ===
 +
 +<code>
 +[Classification: THE MOST DANGEROUS]
 +
 +</code>
  
   * Special malware __encrypting every data__  you can access and asking ransom. The process of encrypting could be long term so backups could be affected too.   * Special malware __encrypting every data__  you can access and asking ransom. The process of encrypting could be long term so backups could be affected too.
   * Avoid being infected by malware.   * Avoid being infected by malware.
  
-==== What to do, if you become a target of the cyber attack ====+==== What to do, if you are uncertain about email (possible cyber attack====
  
-  - Thing first, check all circumstances, ask in doubt. +  - Thing first, check all circumstances, ask in doubt (IT, colleagues, sender,…)
-  - Do not accept time presure, postpone actionback to 1, how many times you need. +  - Do not allow the time presure effectthink twice. postpone the action (back to step eventually :-) 
-  - Only if you are sure, make some settings, password change etc. +  - Only if you are absolutely sure, continue with an action suggested in email (settings review, password change etc.) 
-  - In case of any suspicion, tell it including all details to IT+  - In case of any suspicion at any timeshare it with IT (including all details)
-  - If you have by mistake compromised your password, change it ASAP and inform IT (compulsory).+  - If you think you have compromised your password or account in any way, change the password ASAP and inform IT (compulsory).
  
 In any doubt, do not hesitate to ask **helpdesk@cerge-ei.cz**. Please prepare complete documentation, timeline, addresses, raw text of message (see [[:public:emai:em_problem_report|wiki - problem reporting]]) In any doubt, do not hesitate to ask **helpdesk@cerge-ei.cz**. Please prepare complete documentation, timeline, addresses, raw text of message (see [[:public:emai:em_problem_report|wiki - problem reporting]])
  
  
  • /var/www/html/dokuwiki/data/attic/public/emai/spam.1623840673.txt.gz
  • Last modified: 2021-06-16 10:51
  • by vesely