public:emai:spam

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
Next revision
Previous revision
public:emai:spam [2021-10-26 10:01] veselypublic:emai:spam [2022-12-02 10:04] (current) vesely
Line 22: Line 22:
 ---- ----
  
-See also "**[[:public:emai:malware|Dealing with malware, spam, suspicious content]]**" in separated CERGE-EI Wiki article (details about security measures applied to incoming emails)+<faicon fa fa-hand-o-right> See also "**[[:public:emai:malware|Dealing with malware, spam, suspicious content]]**" in separated CERGE-EI Wiki article (details about security measures applied to incoming emails)
  
-and **[[:public:emai:spam_chain|"Spam fiters at CERGE-EI"]]**  (describing chain of email filters for incoming traffic)+<faicon fa fa-hand-o-right> and **[[:public:emai:spam_chain|"Spam fiters at CERGE-EI"]]**  (describing chain of email filters for incoming traffic)
  
 ---- ----
Line 31: Line 31:
  
 === spam === === spam ===
 +<code>
  
 [Classification: POTENTIALY DANGEROUS] [Classification: POTENTIALY DANGEROUS]
 +
 +</code>
  
   * Unsolicited mail, just offers unneeded or annoying things.   * Unsolicited mail, just offers unneeded or annoying things.
Line 40: Line 43:
 === hoax === === hoax ===
  
 +<code>
 [Classification: ANNOYING] [Classification: ANNOYING]
 +
 +</code>
  
   * By wiki: A hoax is a falsehood deliberately fabricated to masquerade as the truth.   * By wiki: A hoax is a falsehood deliberately fabricated to masquerade as the truth.
Line 48: Line 54:
 === phishing === === phishing ===
  
 +<code>
 [Classification: PRETTY DANGEROUS] [Classification: PRETTY DANGEROUS]
  
-  Ask for confidential and private information, often by using fraudulent webpage, masking the request as an account renew etc. Make __time pressure__  and __urgency illusion__.+</code> 
 + 
 +  Asks for confidential and private information, often by using fraudulent webpage, masking the request as an account renew etc. Make __time pressure__  and __urgency illusion__.
   * Never use offered links without its __authenticity thorough verification__.   * Never use offered links without its __authenticity thorough verification__.
   * Be very careful and abstemious by inserting your login and password anywhere.   * Be very careful and abstemious by inserting your login and password anywhere.
Line 56: Line 65:
 === spoofing === === spoofing ===
  
 +<code>
 [Classification: DANGEROUS] [Classification: DANGEROUS]
 +
 +</code>
  
   * The message looks like sent from a trustworthy address, your jobmate, manager, IT crowd, your home institution server etc.   * The message looks like sent from a trustworthy address, your jobmate, manager, IT crowd, your home institution server etc.
Line 64: Line 76:
 === malware === === malware ===
  
 +<code>
 [Classification: DANGEROUS] [Classification: DANGEROUS]
 +
 +</code>
  
   * The harmful code hidden in an executable attachment or in a document as a macro or on the fraudulent webpage linked from the message.   * The harmful code hidden in an executable attachment or in a document as a macro or on the fraudulent webpage linked from the message.
Line 71: Line 86:
 === ransomware === === ransomware ===
  
 +<code>
 [Classification: THE MOST DANGEROUS] [Classification: THE MOST DANGEROUS]
 +
 +</code>
  
   * Special malware __encrypting every data__  you can access and asking ransom. The process of encrypting could be long term so backups could be affected too.   * Special malware __encrypting every data__  you can access and asking ransom. The process of encrypting could be long term so backups could be affected too.
  • /var/www/html/dokuwiki/data/attic/public/emai/spam.1635242492.txt.gz
  • Last modified: 2021-10-26 10:01
  • by vesely