Changes for page Podvodné zprávy - phishing
Last modified by Denisa Wernerová on 18.08.2024 16:06
To version 10.2
edited by Denisa Wernerová
on 18.08.2024 16:06
on 18.08.2024 16:06
Change comment:
There is no comment for this version
Summary
-
Page properties (1 modified, 0 added, 0 removed)
Details
- Page properties
-
- Content
-
... ... @@ -1,10 +8,3 @@ 1 -{{info}} 2 -(% style="font-size: 18px;font-weight: bold;" %)The last logged fraudulent messages:(%%) 3 - 4 -* 28.03.2017 ICT služby! 5 - 6 -{{/info}} 7 - 8 8 **Do not try to fight phishing on their own, because in many cases it can disrupt the already established and proven practices of our security team at the Technical University.** 9 9 10 10 **If you read the message with many hours delay (more than about 12 hours), usually already we know about this incident and there is no need for us to report news!** Please forward fraudulent messages to abuse@vsb.cz immediately after delivery to your inbox. Thank you for your understanding. ... ... @@ -56,7 +56,7 @@ 56 56 {{id name="how-to-help"/}} 57 57 **How you can help** 58 58 59 -* Forward to us every suspicious message by email on [[abuse@vsb.cz>>path:mailto:abuse@vsb.cz]] and attach also the source code of the message (see guides for [[Outlook 2010>>uzivatel.email.postovni-klienti.outlook.outlook-dalsi-navody.2010-zdroj-kod.WebHome]], [[Outlook 2007>>uzivatel.email.postovni-klienti.outlook.outlook-dalsi-navody.2007-zdroj-kod.WebHome]], [[Thunderbird>>doc:uzivatel.email.postovni-klienti.mozilla-dalsi-navody.thund-zdroj-kod.WebHome]], [[Roundcube>>uzivatel.email.roundcube.zdrojovy-kod.WebHome]], [[Office 365>>uzivatel.email.office365-mail.office365-zdroj-kod.WebHome]]).52 +* Forward to us every suspicious message by email on [[abuse@vsb.cz>>path:mailto:abuse@vsb.cz]] and attach also the source code of the message (see guides for [[Outlook>>doc:uzivatel.email.postovni-klienti.ms-outlook.outlook-zdrojovy-kod.WebHome]], [[Thunderbird>>doc:uzivatel.email.postovni-klienti.mozilla-dalsi-navody.thund-zdroj-kod.WebHome]], [[Roundcube>>uzivatel.email.roundcube.zdrojovy-kod.WebHome]], [[Office 365>>uzivatel.email.office365-mail.office365-zdroj-kod.WebHome]]). 60 60 61 61 {{id name="protect-account"/}} 62 62 **What can you do to protect your account security** ... ... @@ -78,38 +78,25 @@ 78 78 * View message head detail in the email client and check addresses. From and Reply-to. Don´t tell your login and password by email. 79 79 80 80 **Example No. 1** 74 +\\[[~[~[image:phishing.gif~|~|style="vertical-align:middle"~]~]>>attach:phishing.gif]] 81 81 82 -[[[[image:phishing.gif||style="vertical-align: middle;" width="680"]]>>attach:phishing.gif]] 83 - 84 84 85 85 **Example No. 2** 86 - 87 -[[[[image:phishing_2.gif||style="vertical-align: middle;" width="439"]]>>attach:phishing_2.gif]] 88 - 89 -**Example No. 3** 90 - 91 -[[[[image:phishing_3.png||style="vertical-align: middle;" width="680"]]>>attach:phishing_3.png]] 78 +\\[[~[~[image:phishing_2.gif~|~|style="vertical-align:middle"~]~]>>attach:phishing_2.gif]] 79 +\\**Example No. 3** 80 +\\[[~[~[image:phishing_3.png~|~|style="vertical-align:middle"~]~]>>attach:phishing_3.png]] 92 92 **Example No. 4** 93 - 94 -[[[[image:phishing_4.png||style="vertical-align: middle;" width="680"]]>>attach:phishing_4.png]] 82 +\\[[~[~[image:phishing_4.png~|~|style="vertical-align:middle"~]~]>>attach:phishing_4.png]] 95 95 96 96 **Example No. 5** 97 - 98 -[[[[image:phishing_5.png||style="vertical-align: middle;" width="496"]]>>attach:phishing_5.png]] 99 - 100 -**Example No. 6** 101 - 102 -[[[[image:phishing_6.png||style="vertical-align: middle;" width="680"]]>>attach:phishing_6.png]] 85 +\\[[~[~[image:phishing_5.png~|~|style="vertical-align:middle"~]~]>>attach:phishing_5.png]] 86 +\\**Example No. 6** 87 +\\[[~[~[image:phishing_6.png~|~|style="vertical-align:middle"~]~]>>attach:phishing_6.png]] 103 103 104 104 **Example No. 7** 90 +\\[[~[~[image:phishing_7.png~|~|style="vertical-align:middle"~]~]>>attach:phishing_7.png]] 91 +\\**Example No. 8** 92 +\\[[~[~[image:phishing_8.png~|~|style="vertical-align:middle"~]~]>>attach:phishing_8.png]] 93 +\\**Example No. 9** 94 +\\[[~[~[image:phishing_9.png~|~|style="vertical-align:middle"~]~]>>attach:phishing_9.png]] 105 105 106 -[[[[image:phishing_7.png||style="vertical-align: middle;" width="680"]]>>attach:phishing_7.png]] 107 - 108 -**Example No. 8** 109 - 110 -[[[[image:phishing_8.png||style="vertical-align: middle;" width="680"]]>>attach:phishing_8.png]] 111 - 112 -**Example No. 9** 113 - 114 -[[[[image:phishing_9.png||style="vertical-align: middle;" width="680"]]>>attach:phishing_9.png]] 115 -\\