Last modified by Denisa Wernerová on 03.08.2023 12:55

From version 8.1
edited by ser0018
on 29.08.2017 12:45
Change comment: Renamed back-links.
To version 10.1
edited by Denisa Wernerová
on 03.08.2023 12:55
Change comment: Imported from XAR

Summary

Details

Page properties
Author
... ... @@ -1,1 +1,1 @@
1 -XWiki.ser0018
1 +XWiki.wer022
Content
... ... @@ -1,10 +8,3 @@
1 -{{info}}
2 -(% style="font-size: 18px;font-weight: bold;" %)The last logged fraudulent messages:(%%)
3 -
4 -* 28.03.2017 ICT služby!
5 -
6 -{{/info}}
7 -
8 8  **Do not try to fight phishing on their own, because in many cases it can disrupt the already established and proven practices of our security team at the Technical University.**
9 9  
10 10  **If you read the message with many hours delay (more than about 12 hours), usually already we know about this incident and there is no need for us to report news!** Please forward fraudulent messages to abuse@vsb.cz immediately after delivery to your inbox. Thank you for your understanding.
... ... @@ -56,7 +56,7 @@
56 56  {{id name="how-to-help"/}}
57 57  **How you can help**
58 58  
59 -* Forward to us every suspicious message by email on [[abuse@vsb.cz>>path:mailto:abuse@vsb.cz]] and attach also the source code of the message (see guides for [[Outlook 2010>>uzivatel.email.postovni-klienti.outlook.outlook-dalsi-navody.2010-zdroj-kod.WebHome]], [[Outlook 2007>>uzivatel.email.postovni-klienti.outlook.outlook-dalsi-navody.2007-zdroj-kod.WebHome]], [[Thunderbird>>doc:uzivatel.email.postovni-klienti.mozilla-dalsi-navody.thund-zdroj-kod.WebHome]], [[Roundcube>>uzivatel.email.roundcube.zdrojovy-kod.WebHome]], [[Office 365>>uzivatel.email.office365-mail.office365-zdroj-kod.WebHome]]).
52 +* Forward to us every suspicious message by email on [[abuse@vsb.cz>>path:mailto:abuse@vsb.cz]] and attach also the source code of the message (see guides for [[Outlook 2016>>doc:uzivatel.email.exchange.outlook-2016.outlook2016-zdrojovy-kod.WebHome]], [[Thunderbird>>doc:uzivatel.email.postovni-klienti.mozilla-dalsi-navody.thund-zdroj-kod.WebHome]], [[Roundcube>>uzivatel.email.roundcube.zdrojovy-kod.WebHome]], [[Office 365>>uzivatel.email.office365-mail.office365-zdroj-kod.WebHome]]).
60 60  
61 61  {{id name="protect-account"/}}
62 62  **What can you do to protect your account security**
... ... @@ -69,7 +69,7 @@
69 69  {{id name="responded"/}}
70 70  **I responded to a suspicious message**
71 71  
72 -* change disclosed password immediately (see [[password change>>uzivatel.zm-hesla]]),
65 +* change disclosed password immediately (see [[password change>>uzivatel.hesla.jednotne-heslo.zm-hesla.WebHome]]),
73 73  * don't be affraid and don't be shame we are happy and willing to help you. Please report us the situation and we also investigate if someone else has been also caught.
74 74  
75 75  {{id name="samples"/}}
... ... @@ -78,38 +78,25 @@
78 78  * View message head detail in the email client and check addresses. From and Reply-to. Don´t tell your login and password by email.
79 79  
80 80  **Example No. 1**
74 +\\[[[[image:phishing.gif||style="vertical-align:middle"]]>>attach:phishing.gif]]
81 81  
82 -[[[[image:phishing.gif||style="vertical-align: middle;" width="680"]]>>attach:phishing.gif]]
83 -
84 84  
85 85  **Example No. 2**
86 -
87 -[[[[image:phishing_2.gif||style="vertical-align: middle;" width="439"]]>>attach:phishing_2.gif]]
88 -
89 -**Example No. 3**
90 -
91 -[[[[image:phishing_3.png||style="vertical-align: middle;" width="680"]]>>attach:phishing_3.png]]
78 +\\[[[[image:phishing_2.gif||style="vertical-align:middle"]]>>attach:phishing_2.gif]]
79 +\\**Example No. 3**
80 +\\[[[[image:phishing_3.png||style="vertical-align:middle"]]>>attach:phishing_3.png]]
92 92  **Example No. 4**
93 -
94 -[[[[image:phishing_4.png||style="vertical-align: middle;" width="680"]]>>attach:phishing_4.png]]
82 +\\[[[[image:phishing_4.png||style="vertical-align:middle"]]>>attach:phishing_4.png]]
95 95  
96 96  **Example No. 5**
97 -
98 -[[[[image:phishing_5.png||style="vertical-align: middle;" width="496"]]>>attach:phishing_5.png]]
99 -
100 -**Example No. 6**
101 -
102 -[[[[image:phishing_6.png||style="vertical-align: middle;" width="680"]]>>attach:phishing_6.png]]
85 +\\[[[[image:phishing_5.png||style="vertical-align:middle"]]>>attach:phishing_5.png]]
86 +\\**Example No. 6**
87 +\\[[[[image:phishing_6.png||style="vertical-align:middle"]]>>attach:phishing_6.png]]
103 103  
104 104  **Example No. 7**
90 +\\[[[[image:phishing_7.png||style="vertical-align:middle"]]>>attach:phishing_7.png]]
91 +\\**Example No. 8**
92 +\\[[[[image:phishing_8.png||style="vertical-align:middle"]]>>attach:phishing_8.png]]
93 +\\**Example No. 9**
94 +\\[[[[image:phishing_9.png||style="vertical-align:middle"]]>>attach:phishing_9.png]]
105 105  
106 -[[[[image:phishing_7.png||style="vertical-align: middle;" width="680"]]>>attach:phishing_7.png]]
107 -
108 -**Example No. 8**
109 -
110 -[[[[image:phishing_8.png||style="vertical-align: middle;" width="680"]]>>attach:phishing_8.png]]
111 -
112 -**Example No. 9**
113 -
114 -[[[[image:phishing_9.png||style="vertical-align: middle;" width="680"]]>>attach:phishing_9.png]]
115 -\\