Last modified by Denisa Wernerová on 03.08.2023 12:55

From version 10.1
edited by Denisa Wernerová
on 03.08.2023 12:55
Change comment: Imported from XAR
To version 9.1
edited by Denisa Wernerová
on 29.08.2017 12:45
Change comment: Renamed back-links.

Summary

Details

Page properties
Content
... ... @@ -1,3 +1,10 @@
1 +{{info}}
2 +(% style="font-size: 18px;font-weight: bold;" %)The last logged fraudulent messages:(%%)
3 +
4 +* 28.03.2017 ICT služby!
5 +
6 +{{/info}}
7 +
1 1  **Do not try to fight phishing on their own, because in many cases it can disrupt the already established and proven practices of our security team at the Technical University.**
2 2  
3 3  **If you read the message with many hours delay (more than about 12 hours), usually already we know about this incident and there is no need for us to report news!** Please forward fraudulent messages to abuse@vsb.cz immediately after delivery to your inbox. Thank you for your understanding.
... ... @@ -49,7 +49,7 @@
49 49  {{id name="how-to-help"/}}
50 50  **How you can help**
51 51  
52 -* Forward to us every suspicious message by email on [[abuse@vsb.cz>>path:mailto:abuse@vsb.cz]] and attach also the source code of the message (see guides for [[Outlook 2016>>doc:uzivatel.email.exchange.outlook-2016.outlook2016-zdrojovy-kod.WebHome]], [[Thunderbird>>doc:uzivatel.email.postovni-klienti.mozilla-dalsi-navody.thund-zdroj-kod.WebHome]], [[Roundcube>>uzivatel.email.roundcube.zdrojovy-kod.WebHome]], [[Office 365>>uzivatel.email.office365-mail.office365-zdroj-kod.WebHome]]).
59 +* Forward to us every suspicious message by email on [[abuse@vsb.cz>>path:mailto:abuse@vsb.cz]] and attach also the source code of the message (see guides for [[Outlook 2010>>uzivatel.email.postovni-klienti.outlook.outlook-dalsi-navody.2010-zdroj-kod.WebHome]], [[Outlook 2007>>uzivatel.email.postovni-klienti.outlook.outlook-dalsi-navody.2007-zdroj-kod.WebHome]], [[Thunderbird>>doc:uzivatel.email.postovni-klienti.mozilla-dalsi-navody.thund-zdroj-kod.WebHome]], [[Roundcube>>uzivatel.email.roundcube.zdrojovy-kod.WebHome]], [[Office 365>>uzivatel.email.office365-mail.office365-zdroj-kod.WebHome]]).
53 53  
54 54  {{id name="protect-account"/}}
55 55  **What can you do to protect your account security**
... ... @@ -71,25 +71,38 @@
71 71  * View message head detail in the email client and check addresses. From and Reply-to. Don´t tell your login and password by email.
72 72  
73 73  **Example No. 1**
74 -\\[[[[image:phishing.gif||style="vertical-align:middle"]]>>attach:phishing.gif]]
75 75  
82 +[[[[image:phishing.gif||style="vertical-align: middle;" width="680"]]>>attach:phishing.gif]]
83 +
76 76  
77 77  **Example No. 2**
78 -\\[[[[image:phishing_2.gif||style="vertical-align:middle"]]>>attach:phishing_2.gif]]
79 -\\**Example No. 3**
80 -\\[[[[image:phishing_3.png||style="vertical-align:middle"]]>>attach:phishing_3.png]]
86 +
87 +[[[[image:phishing_2.gif||style="vertical-align: middle;" width="439"]]>>attach:phishing_2.gif]]
88 +
89 +**Example No. 3**
90 +
91 +[[[[image:phishing_3.png||style="vertical-align: middle;" width="680"]]>>attach:phishing_3.png]]
81 81  **Example No. 4**
82 -\\[[[[image:phishing_4.png||style="vertical-align:middle"]]>>attach:phishing_4.png]]
93 +
94 +[[[[image:phishing_4.png||style="vertical-align: middle;" width="680"]]>>attach:phishing_4.png]]
83 83  
84 84  **Example No. 5**
85 -\\[[[[image:phishing_5.png||style="vertical-align:middle"]]>>attach:phishing_5.png]]
86 -\\**Example No. 6**
87 -\\[[[[image:phishing_6.png||style="vertical-align:middle"]]>>attach:phishing_6.png]]
97 +
98 +[[[[image:phishing_5.png||style="vertical-align: middle;" width="496"]]>>attach:phishing_5.png]]
99 +
100 +**Example No. 6**
101 +
102 +[[[[image:phishing_6.png||style="vertical-align: middle;" width="680"]]>>attach:phishing_6.png]]
88 88  
89 89  **Example No. 7**
90 -\\[[[[image:phishing_7.png||style="vertical-align:middle"]]>>attach:phishing_7.png]]
91 -\\**Example No. 8**
92 -\\[[[[image:phishing_8.png||style="vertical-align:middle"]]>>attach:phishing_8.png]]
93 -\\**Example No. 9**
94 -\\[[[[image:phishing_9.png||style="vertical-align:middle"]]>>attach:phishing_9.png]]
95 95  
106 +[[[[image:phishing_7.png||style="vertical-align: middle;" width="680"]]>>attach:phishing_7.png]]
107 +
108 +**Example No. 8**
109 +
110 +[[[[image:phishing_8.png||style="vertical-align: middle;" width="680"]]>>attach:phishing_8.png]]
111 +
112 +**Example No. 9**
113 +
114 +[[[[image:phishing_9.png||style="vertical-align: middle;" width="680"]]>>attach:phishing_9.png]]
115 +\\