Enviar búsqueda
Cargar
Anatomy of a Phishing Email
•
2 recomendaciones
•
740 vistas
I
IDT911
Seguir
Tecnología
Denunciar
Compartir
Denunciar
Compartir
1 de 14
Recomendados
Top 10 Security Trends of 2012
Top 10 Security Trends of 2012
IDT911
Turn Your LeakedIn Account Back Into a LinkedIn One
Turn Your LeakedIn Account Back Into a LinkedIn One
IDT911
LinkedIn Breach: How to Make Your Passwords Stronger
LinkedIn Breach: How to Make Your Passwords Stronger
IDT911
When Data Loss Is An Inside Job
When Data Loss Is An Inside Job
IDT911
How to Fight Shoddy Background Checks
How to Fight Shoddy Background Checks
IDT911
Anatomy of a Craigslist Scam
Anatomy of a Craigslist Scam
IDT911
Slideshow - Lil Rat
Slideshow - Lil Rat
megg16
How to Fight Shoddy Background Checks
How to Fight Shoddy Background Checks
IDT911
Recomendados
Top 10 Security Trends of 2012
Top 10 Security Trends of 2012
IDT911
Turn Your LeakedIn Account Back Into a LinkedIn One
Turn Your LeakedIn Account Back Into a LinkedIn One
IDT911
LinkedIn Breach: How to Make Your Passwords Stronger
LinkedIn Breach: How to Make Your Passwords Stronger
IDT911
When Data Loss Is An Inside Job
When Data Loss Is An Inside Job
IDT911
How to Fight Shoddy Background Checks
How to Fight Shoddy Background Checks
IDT911
Anatomy of a Craigslist Scam
Anatomy of a Craigslist Scam
IDT911
Slideshow - Lil Rat
Slideshow - Lil Rat
megg16
How to Fight Shoddy Background Checks
How to Fight Shoddy Background Checks
IDT911
Identity Theft
Identity Theft
Fairfax County
Identity theft
Identity theft
bhabagrahi dash
Information security
Information security
Alfred Thompson
5 Tell-Tale Signs of Phishing
5 Tell-Tale Signs of Phishing
CBIZ, Inc.
What is a phishing attack
What is a phishing attack
AariyaRathi
Identity theft
Identity theft
SARASWATHI S
Identity theft
Identity theft
Nick Chandi
Introduction to phishing
Introduction to phishing
Raviteja Chowdary Adusumalli
Black berry link installation readme
Black berry link installation readme
Johnathan Bernal
IT Sample Paper
IT Sample Paper
Write My Essay
Antiphishing
Antiphishing
Justin Eldredge
Computer 4 ict
Computer 4 ict
guest1daf5af
What to do after a data breach
What to do after a data breach
Oregon Law Practice Management
Smartphone apps
Smartphone apps
Malcolm Sheppard
Digital Risk: Protecting your Most Important Asset.
Digital Risk: Protecting your Most Important Asset.
RobbiePaterson2
Email Compromise in Business
Email Compromise in Business
PropLogix
Cyber crime
Cyber crime
srishtig993
Phishing technology
Phishing technology
harpinderkaur123
Phishing
Phishing
oitaoming
World`s Most Expensive Cyber Security Breach
World`s Most Expensive Cyber Security Breach
ClickSSL
Presentación1
Presentación1
danash14
Magic Feeling - Merry Christmas!
Magic Feeling - Merry Christmas!
Makala (D)
Más contenido relacionado
La actualidad más candente
Identity Theft
Identity Theft
Fairfax County
Identity theft
Identity theft
bhabagrahi dash
Information security
Information security
Alfred Thompson
5 Tell-Tale Signs of Phishing
5 Tell-Tale Signs of Phishing
CBIZ, Inc.
What is a phishing attack
What is a phishing attack
AariyaRathi
Identity theft
Identity theft
SARASWATHI S
Identity theft
Identity theft
Nick Chandi
Introduction to phishing
Introduction to phishing
Raviteja Chowdary Adusumalli
Black berry link installation readme
Black berry link installation readme
Johnathan Bernal
IT Sample Paper
IT Sample Paper
Write My Essay
Antiphishing
Antiphishing
Justin Eldredge
Computer 4 ict
Computer 4 ict
guest1daf5af
What to do after a data breach
What to do after a data breach
Oregon Law Practice Management
Smartphone apps
Smartphone apps
Malcolm Sheppard
Digital Risk: Protecting your Most Important Asset.
Digital Risk: Protecting your Most Important Asset.
RobbiePaterson2
Email Compromise in Business
Email Compromise in Business
PropLogix
Cyber crime
Cyber crime
srishtig993
Phishing technology
Phishing technology
harpinderkaur123
Phishing
Phishing
oitaoming
World`s Most Expensive Cyber Security Breach
World`s Most Expensive Cyber Security Breach
ClickSSL
La actualidad más candente
(20)
Identity Theft
Identity Theft
Identity theft
Identity theft
Information security
Information security
5 Tell-Tale Signs of Phishing
5 Tell-Tale Signs of Phishing
What is a phishing attack
What is a phishing attack
Identity theft
Identity theft
Identity theft
Identity theft
Introduction to phishing
Introduction to phishing
Black berry link installation readme
Black berry link installation readme
IT Sample Paper
IT Sample Paper
Antiphishing
Antiphishing
Computer 4 ict
Computer 4 ict
What to do after a data breach
What to do after a data breach
Smartphone apps
Smartphone apps
Digital Risk: Protecting your Most Important Asset.
Digital Risk: Protecting your Most Important Asset.
Email Compromise in Business
Email Compromise in Business
Cyber crime
Cyber crime
Phishing technology
Phishing technology
Phishing
Phishing
World`s Most Expensive Cyber Security Breach
World`s Most Expensive Cyber Security Breach
Destacado
Presentación1
Presentación1
danash14
Magic Feeling - Merry Christmas!
Magic Feeling - Merry Christmas!
Makala (D)
5 aplicatii
5 aplicatii
petrovali
aplicacion de la reingenieria
aplicacion de la reingenieria
jesuannyg
The lessons of tango
The lessons of tango
Paul Yang
Trabajo en-grupo-problemas-ambientales
Trabajo en-grupo-problemas-ambientales
Deynna Morales
Facebook Deep face
Facebook Deep face
Emanuele Santellani
bioavalability and bioequivalance
bioavalability and bioequivalance
BBAU LUCKNOW GOVIND
Sách Luyện Đọc Nhanh
Sách Luyện Đọc Nhanh
Nhân Nguyễn Sỹ
Ifp ch. no. 5 pneumatic circuits
Ifp ch. no. 5 pneumatic circuits
Amol Kokare
RESPIRATORIO
RESPIRATORIO
Grupos de Estudio de Medicina
Ict environment
Ict environment
Germain Anthony
What to Expect on the FAFSA
What to Expect on the FAFSA
Jodi Okun
The Rose Bower - by J. W. Waterhouse
The Rose Bower - by J. W. Waterhouse
Makala (D)
Islam
Islam
mariuszprezentacja2
Fashion people for buyer & shops ②
Fashion people for buyer & shops ②
Tatsuo Shigematsu
Destacado
(16)
Presentación1
Presentación1
Magic Feeling - Merry Christmas!
Magic Feeling - Merry Christmas!
5 aplicatii
5 aplicatii
aplicacion de la reingenieria
aplicacion de la reingenieria
The lessons of tango
The lessons of tango
Trabajo en-grupo-problemas-ambientales
Trabajo en-grupo-problemas-ambientales
Facebook Deep face
Facebook Deep face
bioavalability and bioequivalance
bioavalability and bioequivalance
Sách Luyện Đọc Nhanh
Sách Luyện Đọc Nhanh
Ifp ch. no. 5 pneumatic circuits
Ifp ch. no. 5 pneumatic circuits
RESPIRATORIO
RESPIRATORIO
Ict environment
Ict environment
What to Expect on the FAFSA
What to Expect on the FAFSA
The Rose Bower - by J. W. Waterhouse
The Rose Bower - by J. W. Waterhouse
Islam
Islam
Fashion people for buyer & shops ②
Fashion people for buyer & shops ②
Similar a Anatomy of a Phishing Email
How to Fight Shoddy Background Checks
How to Fight Shoddy Background Checks
IDT911
Lesson learned from linked in
Lesson learned from linked in
Payza
Scams
Scams
dentonjo
Identity Theft and Data Compromise - TWCA Fall 2012
Identity Theft and Data Compromise - TWCA Fall 2012
The Texas Network, LLC
Sugar integration for a Cisco call center solution
Sugar integration for a Cisco call center solution
SugarCRM
IS Presetation.pptx
IS Presetation.pptx
Tanvir Amin
Fraud and risk communication
Fraud and risk communication
Rosetta
Seven Secrets to Selling with LinkedIn
Seven Secrets to Selling with LinkedIn
Dropbox
Top 10 Government Breaches of 2012
Top 10 Government Breaches of 2012
IDT911
Cyber Security for REALTORS®
Cyber Security for REALTORS®
Danny Fredericks
Internet safety gerard and saul
Internet safety gerard and saul
Saul Vidal Swales
Identity Theft
Identity Theft
Debt Management Credit Counseling Corp
Faisal Abidi’s Thoughts on How to Deal with Internet Frauds/Scams
Faisal Abidi’s Thoughts on How to Deal with Internet Frauds/Scams
Faisal Abidi
travel Safely
travel Safely
ssuser4b758a
5 Tips How To Stay Secure During Tax Season 2018
5 Tips How To Stay Secure During Tax Season 2018
Deepanshu Gahlaut
Protecting Yourself Against Identity Theft
Protecting Yourself Against Identity Theft
Dolf Dunn
Similar a Anatomy of a Phishing Email
(16)
How to Fight Shoddy Background Checks
How to Fight Shoddy Background Checks
Lesson learned from linked in
Lesson learned from linked in
Scams
Scams
Identity Theft and Data Compromise - TWCA Fall 2012
Identity Theft and Data Compromise - TWCA Fall 2012
Sugar integration for a Cisco call center solution
Sugar integration for a Cisco call center solution
IS Presetation.pptx
IS Presetation.pptx
Fraud and risk communication
Fraud and risk communication
Seven Secrets to Selling with LinkedIn
Seven Secrets to Selling with LinkedIn
Top 10 Government Breaches of 2012
Top 10 Government Breaches of 2012
Cyber Security for REALTORS®
Cyber Security for REALTORS®
Internet safety gerard and saul
Internet safety gerard and saul
Identity Theft
Identity Theft
Faisal Abidi’s Thoughts on How to Deal with Internet Frauds/Scams
Faisal Abidi’s Thoughts on How to Deal with Internet Frauds/Scams
travel Safely
travel Safely
5 Tips How To Stay Secure During Tax Season 2018
5 Tips How To Stay Secure During Tax Season 2018
Protecting Yourself Against Identity Theft
Protecting Yourself Against Identity Theft
Último
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
Nathaniel Shimoni
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
ThousandEyes
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
Inflectra
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
BookNet Canada
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
LoriGlavin3
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
LoriGlavin3
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
LoriGlavin3
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
Lonnie McRorey
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
LoriGlavin3
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
Kari Kakkonen
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
LoriGlavin3
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
DianaGray10
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
Ravi Sanghani
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
AliaaTarek5
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Pim van der Noll
2024 April Patch Tuesday
2024 April Patch Tuesday
Ivanti
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
IES VE
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
Alan Dix
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
Rick Flair
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
HarshalMandlekar2
Último
(20)
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
2024 April Patch Tuesday
2024 April Patch Tuesday
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
Anatomy of a Phishing Email
1.
Anatomy of a
Phishing Email
2.
Spamming for money 2
phish·ing/ˈfi shiŋ/ - noun: The fraudulent practice of sending emails purporting to be from legitimate companies in order to induce individuals to reveal personal information © 2003-2012 Identity Theft 911, LLC. All Rights Reserved - Confidential July 13, 2012
3.
3
An inbox hand grenade This is what a phishing email can look like if your email client is set to display text only. © 2003-2012 Identity Theft 911, LLC. All Rights Reserved - Confidential July 13, 2012
4.
4
Looks can be deceiving And here it is loaded in rich-text or HTML. Odds are your email is set up so that a phishing email could look a lot like this. Seems official? © 2003-2012 Identity Theft 911, LLC. All Rights Reserved - Confidential July 13, 2012
5.
5
A closer look Notice the To: and Cc: boxes aren’t filled in. And while it claims to be from Wells Fargo, the email address appears to be from “activation.” © 2003-2012 Identity Theft 911, LLC. All Rights Reserved - Confidential July 13, 2012
6.
6
Not my number See how they’ve tried to make the VISA number look like something you’d recognize? Well, on most credit cards it’s the last eight numbers that are unique. © 2003-2012 Identity Theft 911, LLC. All Rights Reserved - Confidential July 13, 2012
7.
7
Obvious no-no No bank or legitimate business will ask for personal information in an email. It’s a clear sign the message is a scam. © 2003-2012 Identity Theft 911, LLC. All Rights Reserved - Confidential July 13, 2012
8.
A deeper look 8
The scammers get sophisticated. The Wells Fargo logo has an official SSL certificate, a widely accepted method for ensuring a secure connection. That means the bad guys mined the Internet for official company graphics to include in the con. © 2003-2012 Identity Theft 911, LLC. All Rights Reserved - Confidential July 13, 2012
9.
Verified, but not 9
The SSL certificate is verified, meaning it has been officially recognized as Wells Fargo. But that only applies to the logo. So if you dissect your messages for authenticity, be careful. It’s easy to be misled. © 2003-2012 Identity Theft 911, LLC. All Rights Reserved - Confidential July 13, 2012
10.
10
The evil code Looking at the email code, you can see information wouldn’t be sent to Wells Fargo, but to PayPal. It’s designed to automatically pull money from your account, through PayPal, presumably to the hackers’ account. © 2003-2012 Identity Theft 911, LLC. All Rights Reserved - Confidential July 13, 2012
11.
The reroute game 11
The scammers are also trying to mask their steps by pumping your information through a masked web address: http://0x185AED0A/T/w.php © 2003-2012 Identity Theft 911, LLC. All Rights Reserved - Confidential July 13, 2012
12.
Use your judgment 12
The best defense against these phishing attacks is sound judgment. If it doesn’t feel right, it probably isn’t. Simply pick up the phone, call your bank or business, and ask them to work with you over the phone. © 2003-2012 Identity Theft 911, LLC. All Rights Reserved - Confidential July 13, 2012
13.
Take action 13
If you’ve fallen for a phishing scam, you’re not alone. Call your bank, credit union, insurer, financial planner or attorney to see if they provide identity theft protection. © 2003-2012 Identity Theft 911, LLC. All Rights Reserved - Confidential July 13, 2012
14.
Help is out
there 14 Call Identity Theft 911 at 1-888-682-5911. © 2003-2012 Identity Theft 911, LLC. All Rights Reserved - Confidential July 13, 2012