Phishing test…



So, I’ve talked a good deal about phishing scam emails and I had to read when I found this article at the sunbeltblog. They posted a link to a site with some tips on phishing, as well as a “test your phishing smarts” kind of test at mailfrontier.com.


I HIGHLY recommend the test. I got 10 of 10 correct, but frankly some of the legitimate messages are ones that would have me going directly to the site’s home page to verify (instead of clicking on enclosed links.) Unfortunately all of them are “out of context” screenshots only, so there’s no way to “investigate” other than what’s on screen. In dealing with financial information related emails it’s better to be cautious.

Also, I HAVE to give a link to the Dilbert cartoon referenced in the spywaredaily.com blog… I had to laugh out loud. (Even though I’ve seen it before.)

Related Posts

Blog Traffic Exchange Related Posts
  • Microsoft Outlook - duplicate email messages Part II This is part II, click here for part one of the saga... Okay, so I revisit to install Microsoft Office 2003 SP2 and hope that solves it. Somewhere along this time, I had also found a suggestion of removing the entire mail PROFILE and creating a new one. *(The theory......
  • Phishing - so many flaws to exploit so little time In the last week there was a well documented writeup of a cross site scripting vulnerability which had allowed a phisher to pose as a paypal login with THE LEGIT PAYPAL SSL CERTIFICATE.... Brian Krebs at the Security Fix has some details on some of the new and interesting ways......
  • Emailing large files.... There are lot's of ways to get a file from one place to another, emailing is the first that many think of. (For larger files I'll usually just upload to a directory on the website and then email a link...) The problem with email is multiple.... 1)viruses exploit email as......
Blog Traffic Exchange Related Websites
  • Black Hat // Webcast 28 - HTTP Parameter Pollution Vulnerabilities in Web Applications HTTP Parameter Pollution Vulnerabilities in Web Applications // Marco Balduzzi http://links.covertchannel.blackhat.com/ctt?kn=4&m=36625440&r=ODMwMzU3MTg2MAS2&b=2&j=MTAxNjM3NzA1S0&mt=1&rt=0 ----------------------------------- OVERVIEW: While input validation vulnerabilities such as XSS and SQL injection have been intensively studied, a new class of injection vulnerabilities called HTTP Parameter Pollution (HPP) has not received as much attention. HPP attacks consist of injecting encoded......
  • Link Building Building incoming links is more important than ever these days. Yes, it's okay to do reciprocal linking but one-way inbound links are better. And avoid linking to so-called bad neighbourhoods, or using link-building software (yuck!). Link Building - Tips & Strategies That Work! Link building is more important than ever......
  • Getting Backlinks To Your Site No doubt one of the most important things you can do for yourself if you are building  network marketing blogs is getting links back to your site. To be honest with you Network Marketing is a very hard keyword phrase to get ranked for.  If you are just getting started......
PDF24    Send article as PDF   

Similar Posts


See what happened this day in history from either BBC Wikipedia
Search:
Keywords:
Amazon Logo

Comments are closed.


Switch to our mobile site