Differences
This shows you the differences between two versions of the page.
Both sides previous revision Previous revision Next revision | Previous revision | ||
public:emai:spam [2021-10-26 09:58] – vesely | public:emai:spam [2022-12-02 10:04] (current) – vesely | ||
---|---|---|---|
Line 10: | Line 10: | ||
- Do not belive the sender' | - Do not belive the sender' | ||
- | * Better safe, than sorry. | + | * Better safe, than sorry. |
* Be brave! Never try to conceal your possible mistake - take it in possitive way - we all learn from mistakes. We all :-) | * Be brave! Never try to conceal your possible mistake - take it in possitive way - we all learn from mistakes. We all :-) | ||
* Cowards who awkwardly try to avoid of mistake revealing usualy make things much worse for them and for the rest of the institution. | * Cowards who awkwardly try to avoid of mistake revealing usualy make things much worse for them and for the rest of the institution. | ||
Line 22: | Line 22: | ||
---- | ---- | ||
- | See also " | + | <faicon fa fa-hand-o-right> |
- | and **[[: | + | <faicon fa fa-hand-o-right> |
---- | ---- | ||
Line 31: | Line 31: | ||
=== spam === | === spam === | ||
+ | < | ||
+ | |||
+ | [Classification: | ||
+ | |||
+ | </ | ||
* Unsolicited mail, just offers unneeded or annoying things. | * Unsolicited mail, just offers unneeded or annoying things. | ||
Line 37: | Line 42: | ||
=== hoax === | === hoax === | ||
+ | |||
+ | < | ||
+ | [Classification: | ||
+ | |||
+ | </ | ||
* By wiki: A hoax is a falsehood deliberately fabricated to masquerade as the truth. | * By wiki: A hoax is a falsehood deliberately fabricated to masquerade as the truth. | ||
Line 44: | Line 54: | ||
=== phishing === | === phishing === | ||
- | | + | < |
+ | [Classification: | ||
+ | |||
+ | </ | ||
+ | |||
+ | | ||
* Never use offered links without its __authenticity thorough verification__. | * Never use offered links without its __authenticity thorough verification__. | ||
* Be very careful and abstemious by inserting your login and password anywhere. | * Be very careful and abstemious by inserting your login and password anywhere. | ||
=== spoofing === | === spoofing === | ||
+ | |||
+ | < | ||
+ | [Classification: | ||
+ | |||
+ | </ | ||
* The message looks like sent from a trustworthy address, your jobmate, manager, IT crowd, your home institution server etc. | * The message looks like sent from a trustworthy address, your jobmate, manager, IT crowd, your home institution server etc. | ||
Line 55: | Line 75: | ||
=== malware === | === malware === | ||
+ | |||
+ | < | ||
+ | [Classification: | ||
+ | |||
+ | </ | ||
* The harmful code hidden in an executable attachment or in a document as a macro or on the fraudulent webpage linked from the message. | * The harmful code hidden in an executable attachment or in a document as a macro or on the fraudulent webpage linked from the message. | ||
Line 60: | Line 85: | ||
=== ransomware === | === ransomware === | ||
+ | |||
+ | < | ||
+ | [Classification: | ||
+ | |||
+ | </ | ||
* Special malware __encrypting every data__ | * Special malware __encrypting every data__ | ||
Line 66: | Line 96: | ||
==== What to do, if you are uncertain about email (possible cyber attack) ==== | ==== What to do, if you are uncertain about email (possible cyber attack) ==== | ||
- | - Thing first, check all circumstances, | + | - Thing first, check all circumstances, |
- Do not allow the time presure effect, think twice. postpone the action (back to step 1 eventually :-) | - Do not allow the time presure effect, think twice. postpone the action (back to step 1 eventually :-) | ||
- Only if you are absolutely sure, continue with an action suggested in email (settings review, password change etc.) | - Only if you are absolutely sure, continue with an action suggested in email (settings review, password change etc.) |