Enviar búsqueda
Cargar
Anatomy of a Phishing Email
•
2 recomendaciones
•
740 vistas
I
IDT911
Seguir
Tecnología
Denunciar
Compartir
Denunciar
Compartir
1 de 14
Recomendados
Top 10 Security Trends of 2012
Top 10 Security Trends of 2012
IDT911
Turn Your LeakedIn Account Back Into a LinkedIn One
Turn Your LeakedIn Account Back Into a LinkedIn One
IDT911
LinkedIn Breach: How to Make Your Passwords Stronger
LinkedIn Breach: How to Make Your Passwords Stronger
IDT911
When Data Loss Is An Inside Job
When Data Loss Is An Inside Job
IDT911
How to Fight Shoddy Background Checks
How to Fight Shoddy Background Checks
IDT911
Anatomy of a Craigslist Scam
Anatomy of a Craigslist Scam
IDT911
Slideshow - Lil Rat
Slideshow - Lil Rat
megg16
How to Fight Shoddy Background Checks
How to Fight Shoddy Background Checks
IDT911
Recomendados
Top 10 Security Trends of 2012
Top 10 Security Trends of 2012
IDT911
Turn Your LeakedIn Account Back Into a LinkedIn One
Turn Your LeakedIn Account Back Into a LinkedIn One
IDT911
LinkedIn Breach: How to Make Your Passwords Stronger
LinkedIn Breach: How to Make Your Passwords Stronger
IDT911
When Data Loss Is An Inside Job
When Data Loss Is An Inside Job
IDT911
How to Fight Shoddy Background Checks
How to Fight Shoddy Background Checks
IDT911
Anatomy of a Craigslist Scam
Anatomy of a Craigslist Scam
IDT911
Slideshow - Lil Rat
Slideshow - Lil Rat
megg16
How to Fight Shoddy Background Checks
How to Fight Shoddy Background Checks
IDT911
Identity Theft
Identity Theft
Fairfax County
Identity theft
Identity theft
bhabagrahi dash
Information security
Information security
Alfred Thompson
5 Tell-Tale Signs of Phishing
5 Tell-Tale Signs of Phishing
CBIZ, Inc.
What is a phishing attack
What is a phishing attack
AariyaRathi
Identity theft
Identity theft
SARASWATHI S
Identity theft
Identity theft
Nick Chandi
Introduction to phishing
Introduction to phishing
Raviteja Chowdary Adusumalli
Black berry link installation readme
Black berry link installation readme
Johnathan Bernal
IT Sample Paper
IT Sample Paper
Write My Essay
Antiphishing
Antiphishing
Justin Eldredge
Computer 4 ict
Computer 4 ict
guest1daf5af
What to do after a data breach
What to do after a data breach
Oregon Law Practice Management
Smartphone apps
Smartphone apps
Malcolm Sheppard
Digital Risk: Protecting your Most Important Asset.
Digital Risk: Protecting your Most Important Asset.
RobbiePaterson2
Email Compromise in Business
Email Compromise in Business
PropLogix
Cyber crime
Cyber crime
srishtig993
Phishing technology
Phishing technology
harpinderkaur123
Phishing
Phishing
oitaoming
World`s Most Expensive Cyber Security Breach
World`s Most Expensive Cyber Security Breach
ClickSSL
Presentación1
Presentación1
danash14
Magic Feeling - Merry Christmas!
Magic Feeling - Merry Christmas!
Makala (D)
Más contenido relacionado
La actualidad más candente
Identity Theft
Identity Theft
Fairfax County
Identity theft
Identity theft
bhabagrahi dash
Information security
Information security
Alfred Thompson
5 Tell-Tale Signs of Phishing
5 Tell-Tale Signs of Phishing
CBIZ, Inc.
What is a phishing attack
What is a phishing attack
AariyaRathi
Identity theft
Identity theft
SARASWATHI S
Identity theft
Identity theft
Nick Chandi
Introduction to phishing
Introduction to phishing
Raviteja Chowdary Adusumalli
Black berry link installation readme
Black berry link installation readme
Johnathan Bernal
IT Sample Paper
IT Sample Paper
Write My Essay
Antiphishing
Antiphishing
Justin Eldredge
Computer 4 ict
Computer 4 ict
guest1daf5af
What to do after a data breach
What to do after a data breach
Oregon Law Practice Management
Smartphone apps
Smartphone apps
Malcolm Sheppard
Digital Risk: Protecting your Most Important Asset.
Digital Risk: Protecting your Most Important Asset.
RobbiePaterson2
Email Compromise in Business
Email Compromise in Business
PropLogix
Cyber crime
Cyber crime
srishtig993
Phishing technology
Phishing technology
harpinderkaur123
Phishing
Phishing
oitaoming
World`s Most Expensive Cyber Security Breach
World`s Most Expensive Cyber Security Breach
ClickSSL
La actualidad más candente
(20)
Identity Theft
Identity Theft
Identity theft
Identity theft
Information security
Information security
5 Tell-Tale Signs of Phishing
5 Tell-Tale Signs of Phishing
What is a phishing attack
What is a phishing attack
Identity theft
Identity theft
Identity theft
Identity theft
Introduction to phishing
Introduction to phishing
Black berry link installation readme
Black berry link installation readme
IT Sample Paper
IT Sample Paper
Antiphishing
Antiphishing
Computer 4 ict
Computer 4 ict
What to do after a data breach
What to do after a data breach
Smartphone apps
Smartphone apps
Digital Risk: Protecting your Most Important Asset.
Digital Risk: Protecting your Most Important Asset.
Email Compromise in Business
Email Compromise in Business
Cyber crime
Cyber crime
Phishing technology
Phishing technology
Phishing
Phishing
World`s Most Expensive Cyber Security Breach
World`s Most Expensive Cyber Security Breach
Destacado
Presentación1
Presentación1
danash14
Magic Feeling - Merry Christmas!
Magic Feeling - Merry Christmas!
Makala (D)
5 aplicatii
5 aplicatii
petrovali
aplicacion de la reingenieria
aplicacion de la reingenieria
jesuannyg
The lessons of tango
The lessons of tango
Paul Yang
Trabajo en-grupo-problemas-ambientales
Trabajo en-grupo-problemas-ambientales
Deynna Morales
Facebook Deep face
Facebook Deep face
Emanuele Santellani
bioavalability and bioequivalance
bioavalability and bioequivalance
BBAU LUCKNOW GOVIND
Sách Luyện Đọc Nhanh
Sách Luyện Đọc Nhanh
Nhân Nguyễn Sỹ
Ifp ch. no. 5 pneumatic circuits
Ifp ch. no. 5 pneumatic circuits
Amol Kokare
RESPIRATORIO
RESPIRATORIO
Grupos de Estudio de Medicina
Ict environment
Ict environment
Germain Anthony
What to Expect on the FAFSA
What to Expect on the FAFSA
Jodi Okun
The Rose Bower - by J. W. Waterhouse
The Rose Bower - by J. W. Waterhouse
Makala (D)
Islam
Islam
mariuszprezentacja2
Fashion people for buyer & shops ②
Fashion people for buyer & shops ②
Tatsuo Shigematsu
Destacado
(16)
Presentación1
Presentación1
Magic Feeling - Merry Christmas!
Magic Feeling - Merry Christmas!
5 aplicatii
5 aplicatii
aplicacion de la reingenieria
aplicacion de la reingenieria
The lessons of tango
The lessons of tango
Trabajo en-grupo-problemas-ambientales
Trabajo en-grupo-problemas-ambientales
Facebook Deep face
Facebook Deep face
bioavalability and bioequivalance
bioavalability and bioequivalance
Sách Luyện Đọc Nhanh
Sách Luyện Đọc Nhanh
Ifp ch. no. 5 pneumatic circuits
Ifp ch. no. 5 pneumatic circuits
RESPIRATORIO
RESPIRATORIO
Ict environment
Ict environment
What to Expect on the FAFSA
What to Expect on the FAFSA
The Rose Bower - by J. W. Waterhouse
The Rose Bower - by J. W. Waterhouse
Islam
Islam
Fashion people for buyer & shops ②
Fashion people for buyer & shops ②
Similar a Anatomy of a Phishing Email
How to Fight Shoddy Background Checks
How to Fight Shoddy Background Checks
IDT911
Lesson learned from linked in
Lesson learned from linked in
Payza
Scams
Scams
dentonjo
Identity Theft and Data Compromise - TWCA Fall 2012
Identity Theft and Data Compromise - TWCA Fall 2012
The Texas Network, LLC
Sugar integration for a Cisco call center solution
Sugar integration for a Cisco call center solution
SugarCRM
IS Presetation.pptx
IS Presetation.pptx
Tanvir Amin
Fraud and risk communication
Fraud and risk communication
Rosetta
Seven Secrets to Selling with LinkedIn
Seven Secrets to Selling with LinkedIn
Dropbox
Top 10 Government Breaches of 2012
Top 10 Government Breaches of 2012
IDT911
Cyber Security for REALTORS®
Cyber Security for REALTORS®
Danny Fredericks
Internet safety gerard and saul
Internet safety gerard and saul
Saul Vidal Swales
Identity Theft
Identity Theft
Debt Management Credit Counseling Corp
Faisal Abidi’s Thoughts on How to Deal with Internet Frauds/Scams
Faisal Abidi’s Thoughts on How to Deal with Internet Frauds/Scams
Faisal Abidi
travel Safely
travel Safely
ssuser4b758a
5 Tips How To Stay Secure During Tax Season 2018
5 Tips How To Stay Secure During Tax Season 2018
Deepanshu Gahlaut
Protecting Yourself Against Identity Theft
Protecting Yourself Against Identity Theft
Dolf Dunn
Similar a Anatomy of a Phishing Email
(16)
How to Fight Shoddy Background Checks
How to Fight Shoddy Background Checks
Lesson learned from linked in
Lesson learned from linked in
Scams
Scams
Identity Theft and Data Compromise - TWCA Fall 2012
Identity Theft and Data Compromise - TWCA Fall 2012
Sugar integration for a Cisco call center solution
Sugar integration for a Cisco call center solution
IS Presetation.pptx
IS Presetation.pptx
Fraud and risk communication
Fraud and risk communication
Seven Secrets to Selling with LinkedIn
Seven Secrets to Selling with LinkedIn
Top 10 Government Breaches of 2012
Top 10 Government Breaches of 2012
Cyber Security for REALTORS®
Cyber Security for REALTORS®
Internet safety gerard and saul
Internet safety gerard and saul
Identity Theft
Identity Theft
Faisal Abidi’s Thoughts on How to Deal with Internet Frauds/Scams
Faisal Abidi’s Thoughts on How to Deal with Internet Frauds/Scams
travel Safely
travel Safely
5 Tips How To Stay Secure During Tax Season 2018
5 Tips How To Stay Secure During Tax Season 2018
Protecting Yourself Against Identity Theft
Protecting Yourself Against Identity Theft
Último
How to write a Business Continuity Plan
How to write a Business Continuity Plan
Databarracks
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
Dilum Bandara
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
Mattias Andersson
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
NavinnSomaal
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
charlottematthew16
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
Dubai Multi Commodity Centre
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
Kalema Edgar
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
Stephanie Beckett
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
Addepto
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
comworks
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
Scott Keck-Warren
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
Mark Billinghurst
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
LoriGlavin3
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
Alfredo García Lavilla
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
Curtis Poe
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
BookNet Canada
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
Lonnie McRorey
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
Lars Bell
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
Commit University
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Precisely
Último
(20)
How to write a Business Continuity Plan
How to write a Business Continuity Plan
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Anatomy of a Phishing Email
1.
Anatomy of a
Phishing Email
2.
Spamming for money 2
phish·ing/ˈfi shiŋ/ - noun: The fraudulent practice of sending emails purporting to be from legitimate companies in order to induce individuals to reveal personal information © 2003-2012 Identity Theft 911, LLC. All Rights Reserved - Confidential July 13, 2012
3.
3
An inbox hand grenade This is what a phishing email can look like if your email client is set to display text only. © 2003-2012 Identity Theft 911, LLC. All Rights Reserved - Confidential July 13, 2012
4.
4
Looks can be deceiving And here it is loaded in rich-text or HTML. Odds are your email is set up so that a phishing email could look a lot like this. Seems official? © 2003-2012 Identity Theft 911, LLC. All Rights Reserved - Confidential July 13, 2012
5.
5
A closer look Notice the To: and Cc: boxes aren’t filled in. And while it claims to be from Wells Fargo, the email address appears to be from “activation.” © 2003-2012 Identity Theft 911, LLC. All Rights Reserved - Confidential July 13, 2012
6.
6
Not my number See how they’ve tried to make the VISA number look like something you’d recognize? Well, on most credit cards it’s the last eight numbers that are unique. © 2003-2012 Identity Theft 911, LLC. All Rights Reserved - Confidential July 13, 2012
7.
7
Obvious no-no No bank or legitimate business will ask for personal information in an email. It’s a clear sign the message is a scam. © 2003-2012 Identity Theft 911, LLC. All Rights Reserved - Confidential July 13, 2012
8.
A deeper look 8
The scammers get sophisticated. The Wells Fargo logo has an official SSL certificate, a widely accepted method for ensuring a secure connection. That means the bad guys mined the Internet for official company graphics to include in the con. © 2003-2012 Identity Theft 911, LLC. All Rights Reserved - Confidential July 13, 2012
9.
Verified, but not 9
The SSL certificate is verified, meaning it has been officially recognized as Wells Fargo. But that only applies to the logo. So if you dissect your messages for authenticity, be careful. It’s easy to be misled. © 2003-2012 Identity Theft 911, LLC. All Rights Reserved - Confidential July 13, 2012
10.
10
The evil code Looking at the email code, you can see information wouldn’t be sent to Wells Fargo, but to PayPal. It’s designed to automatically pull money from your account, through PayPal, presumably to the hackers’ account. © 2003-2012 Identity Theft 911, LLC. All Rights Reserved - Confidential July 13, 2012
11.
The reroute game 11
The scammers are also trying to mask their steps by pumping your information through a masked web address: http://0x185AED0A/T/w.php © 2003-2012 Identity Theft 911, LLC. All Rights Reserved - Confidential July 13, 2012
12.
Use your judgment 12
The best defense against these phishing attacks is sound judgment. If it doesn’t feel right, it probably isn’t. Simply pick up the phone, call your bank or business, and ask them to work with you over the phone. © 2003-2012 Identity Theft 911, LLC. All Rights Reserved - Confidential July 13, 2012
13.
Take action 13
If you’ve fallen for a phishing scam, you’re not alone. Call your bank, credit union, insurer, financial planner or attorney to see if they provide identity theft protection. © 2003-2012 Identity Theft 911, LLC. All Rights Reserved - Confidential July 13, 2012
14.
Help is out
there 14 Call Identity Theft 911 at 1-888-682-5911. © 2003-2012 Identity Theft 911, LLC. All Rights Reserved - Confidential July 13, 2012