Last modified by Denisa Wernerová on 18.08.2024 16:06

From version 2.1
edited by ork01
on 30.09.2016 10:22
Change comment: There is no comment for this version
To version 10.2
edited by Denisa Wernerová
on 18.08.2024 16:06
Change comment: There is no comment for this version

Summary

Details

Page properties
Author
... ... @@ -1,1 +1,1 @@
1 -XWiki.ork01
1 +XWiki.wer022
Content
... ... @@ -1,22 +20,3 @@
1 -{{info}}
2 -(% style="font-size: 18px;font-weight: bold;" %)The last logged fraudulent messages:(%%)
3 -
4 -* 30.09.2016 Mailbox has exceeded the storage limit which is 20GB
5 -* 08.08.2016 Verification Required - PayPal
6 -* 21.07.2016 fw: OZNÁMENÍ
7 -* 19.07.2016 Validate Webmail Users 2016
8 -* 12.07.2016 Email
9 -* 21.06.2016 Paypal Security Department <paypal@service.com> / Account Suspension Notification
10 -* 09.06.2016 Your mailbox might be closed
11 -* 19.05.2016 Help Desk
12 -* 18.05.2016 Your Account locked
13 -* 13.05.2016 Bezpieczenstwa Alarm !!!
14 -* 04.05.2016 Your apple account was locked!
15 -* 04.05.2016 Warning Code: VX2G99AAJ
16 -* 02.05.2016 Your Email (petr.k@vsb.cz) Closure Administration Complaint.
17 -* 29.04.2016 Protřiďte si Vaši e-mailovou schránku na VŠB-TU Ostrava!
18 -{{/info}}
19 -
20 20  **Do not try to fight phishing on their own, because in many cases it can disrupt the already established and proven practices of our security team at the Technical University.**
21 21  
22 22  **If you read the message with many hours delay (more than about 12 hours), usually already we know about this incident and there is no need for us to report news!** Please forward fraudulent messages to abuse@vsb.cz immediately after delivery to your inbox. Thank you for your understanding.
... ... @@ -68,7 +68,7 @@
68 68  {{id name="how-to-help"/}}
69 69  **How you can help**
70 70  
71 -* Forward to us every suspicious message by email on [[abuse@vsb.cz>>path:mailto:abuse@vsb.cz]] and attach also the source code of the message (see guides for [[Outlook 2010>>uzivatel.2010-zdroj-kod]], [[Outlook 2007>>uzivatel.2007-zdroj-kod]], [[Thunderbird>>doc:uzivatel.thund-zdroj-kod]], [[Roundcube>>uzivatel.zdrojovy-kod]], [[Office 365>>uzivatel.office365-zdroj-kod]]).
52 +* Forward to us every suspicious message by email on [[abuse@vsb.cz>>path:mailto:abuse@vsb.cz]] and attach also the source code of the message (see guides for [[Outlook>>doc:uzivatel.email.postovni-klienti.ms-outlook.outlook-zdrojovy-kod.WebHome]], [[Thunderbird>>doc:uzivatel.email.postovni-klienti.mozilla-dalsi-navody.thund-zdroj-kod.WebHome]], [[Roundcube>>uzivatel.email.roundcube.zdrojovy-kod.WebHome]], [[Office 365>>uzivatel.email.office365-mail.office365-zdroj-kod.WebHome]]).
72 72  
73 73  {{id name="protect-account"/}}
74 74  **What can you do to protect your account security**
... ... @@ -81,7 +81,7 @@
81 81  {{id name="responded"/}}
82 82  **I responded to a suspicious message**
83 83  
84 -* change disclosed password immediately (see [[password change>>uzivatel.zm-hesla]]),
65 +* change disclosed password immediately (see [[password change>>uzivatel.hesla.jednotne-heslo.zm-hesla.WebHome]]),
85 85  * don't be affraid and don't be shame we are happy and willing to help you. Please report us the situation and we also investigate if someone else has been also caught.
86 86  
87 87  {{id name="samples"/}}
... ... @@ -90,38 +90,25 @@
90 90  * View message head detail in the email client and check addresses. From and Reply-to. Don´t tell your login and password by email.
91 91  
92 92  **Example No. 1**
74 +\\[[~[~[image:phishing.gif~|~|style="vertical-align:middle"~]~]>>attach:phishing.gif]]
93 93  
94 -[[[[image:phishing.gif||style="vertical-align: middle;" width="680"]]>>attach:phishing.gif]]
95 -
96 96  
97 97  **Example No. 2**
98 -
99 -[[[[image:phishing_2.gif||style="vertical-align: middle;" width="439"]]>>attach:phishing_2.gif]]
100 -
101 -**Example No. 3**
102 -
103 -[[[[image:phishing_3.png||style="vertical-align: middle;" width="680"]]>>attach:phishing_3.png]]
78 +\\[[~[~[image:phishing_2.gif~|~|style="vertical-align:middle"~]~]>>attach:phishing_2.gif]]
79 +\\**Example No. 3**
80 +\\[[~[~[image:phishing_3.png~|~|style="vertical-align:middle"~]~]>>attach:phishing_3.png]]
104 104  **Example No. 4**
105 -
106 -[[[[image:phishing_4.png||style="vertical-align: middle;" width="680"]]>>attach:phishing_4.png]]
82 +\\[[~[~[image:phishing_4.png~|~|style="vertical-align:middle"~]~]>>attach:phishing_4.png]]
107 107  
108 108  **Example No. 5**
109 -
110 -[[[[image:phishing_5.png||style="vertical-align: middle;" width="496"]]>>attach:phishing_5.png]]
111 -
112 -**Example No. 6**
113 -
114 -[[[[image:phishing_6.png||style="vertical-align: middle;" width="680"]]>>attach:phishing_6.png]]
85 +\\[[~[~[image:phishing_5.png~|~|style="vertical-align:middle"~]~]>>attach:phishing_5.png]]
86 +\\**Example No. 6**
87 +\\[[~[~[image:phishing_6.png~|~|style="vertical-align:middle"~]~]>>attach:phishing_6.png]]
115 115  
116 116  **Example No. 7**
90 +\\[[~[~[image:phishing_7.png~|~|style="vertical-align:middle"~]~]>>attach:phishing_7.png]]
91 +\\**Example No. 8**
92 +\\[[~[~[image:phishing_8.png~|~|style="vertical-align:middle"~]~]>>attach:phishing_8.png]]
93 +\\**Example No. 9**
94 +\\[[~[~[image:phishing_9.png~|~|style="vertical-align:middle"~]~]>>attach:phishing_9.png]]
117 117  
118 -[[[[image:phishing_7.png||style="vertical-align: middle;" width="680"]]>>attach:phishing_7.png]]
119 -
120 -**Example No. 8**
121 -
122 -[[[[image:phishing_8.png||style="vertical-align: middle;" width="680"]]>>attach:phishing_8.png]]
123 -
124 -**Example No. 9**
125 -
126 -[[[[image:phishing_9.png||style="vertical-align: middle;" width="680"]]>>attach:phishing_9.png]]
127 -\\