Changes for page Podvodné zprávy - phishing
Last modified by Denisa Wernerová on 18.08.2024 16:06
To version 10.2
edited by Denisa Wernerová
on 18.08.2024 16:06
on 18.08.2024 16:06
Change comment:
There is no comment for this version
Summary
-
Page properties (1 modified, 0 added, 0 removed)
Details
- Page properties
-
- Content
-
... ... @@ -49,7 +49,7 @@ 49 49 {{id name="how-to-help"/}} 50 50 **How you can help** 51 51 52 -* Forward to us every suspicious message by email on [[abuse@vsb.cz>>path:mailto:abuse@vsb.cz]] and attach also the source code of the message (see guides for [[Outlook 2016>>doc:uzivatel.email.exchange.outlook-2016.outlook2016-zdrojovy-kod.WebHome]], [[Thunderbird>>doc:uzivatel.email.postovni-klienti.mozilla-dalsi-navody.thund-zdroj-kod.WebHome]], [[Roundcube>>uzivatel.email.roundcube.zdrojovy-kod.WebHome]], [[Office 365>>uzivatel.email.office365-mail.office365-zdroj-kod.WebHome]]).52 +* Forward to us every suspicious message by email on [[abuse@vsb.cz>>path:mailto:abuse@vsb.cz]] and attach also the source code of the message (see guides for [[Outlook>>doc:uzivatel.email.postovni-klienti.ms-outlook.outlook-zdrojovy-kod.WebHome]], [[Thunderbird>>doc:uzivatel.email.postovni-klienti.mozilla-dalsi-navody.thund-zdroj-kod.WebHome]], [[Roundcube>>uzivatel.email.roundcube.zdrojovy-kod.WebHome]], [[Office 365>>uzivatel.email.office365-mail.office365-zdroj-kod.WebHome]]). 53 53 54 54 {{id name="protect-account"/}} 55 55 **What can you do to protect your account security** ... ... @@ -71,25 +71,25 @@ 71 71 * View message head detail in the email client and check addresses. From and Reply-to. Don´t tell your login and password by email. 72 72 73 73 **Example No. 1** 74 -\\[[[[image:phishing.gif||style="vertical-align:middle"]]>>attach:phishing.gif]] 74 +\\[[~[~[image:phishing.gif~|~|style="vertical-align:middle"~]~]>>attach:phishing.gif]] 75 75 76 76 77 77 **Example No. 2** 78 -\\[[[[image:phishing_2.gif||style="vertical-align:middle"]]>>attach:phishing_2.gif]] 78 +\\[[~[~[image:phishing_2.gif~|~|style="vertical-align:middle"~]~]>>attach:phishing_2.gif]] 79 79 \\**Example No. 3** 80 -\\[[[[image:phishing_3.png||style="vertical-align:middle"]]>>attach:phishing_3.png]] 80 +\\[[~[~[image:phishing_3.png~|~|style="vertical-align:middle"~]~]>>attach:phishing_3.png]] 81 81 **Example No. 4** 82 -\\[[[[image:phishing_4.png||style="vertical-align:middle"]]>>attach:phishing_4.png]] 82 +\\[[~[~[image:phishing_4.png~|~|style="vertical-align:middle"~]~]>>attach:phishing_4.png]] 83 83 84 84 **Example No. 5** 85 -\\[[[[image:phishing_5.png||style="vertical-align:middle"]]>>attach:phishing_5.png]] 85 +\\[[~[~[image:phishing_5.png~|~|style="vertical-align:middle"~]~]>>attach:phishing_5.png]] 86 86 \\**Example No. 6** 87 -\\[[[[image:phishing_6.png||style="vertical-align:middle"]]>>attach:phishing_6.png]] 87 +\\[[~[~[image:phishing_6.png~|~|style="vertical-align:middle"~]~]>>attach:phishing_6.png]] 88 88 89 89 **Example No. 7** 90 -\\[[[[image:phishing_7.png||style="vertical-align:middle"]]>>attach:phishing_7.png]] 90 +\\[[~[~[image:phishing_7.png~|~|style="vertical-align:middle"~]~]>>attach:phishing_7.png]] 91 91 \\**Example No. 8** 92 -\\[[[[image:phishing_8.png||style="vertical-align:middle"]]>>attach:phishing_8.png]] 92 +\\[[~[~[image:phishing_8.png~|~|style="vertical-align:middle"~]~]>>attach:phishing_8.png]] 93 93 \\**Example No. 9** 94 -\\[[[[image:phishing_9.png||style="vertical-align:middle"]]>>attach:phishing_9.png]] 94 +\\[[~[~[image:phishing_9.png~|~|style="vertical-align:middle"~]~]>>attach:phishing_9.png]] 95 95