This shows you the differences between two versions of the page.
| Both sides previous revision Previous revision Next revision | Previous revision |
| public:emai:malware [2023-03-09 12:11] – vesely | public:emai:malware [2026-04-19 21:40] (current) – vesely |
|---|
| <font inherit/inherit;;#f39c12;;inherit>**Both areas**</font> of | <font inherit/inherit;;#f39c12;;inherit>**Both areas**</font> of |
| <font inherit/inherit;;#c0392b;;inherit>**malicious or potentially problematic emails**</font> and | <font inherit/inherit;;#c0392b;;inherit>**malicious or potentially problematic emails**</font> and |
| <font inherit/inherit;;#339933;;inherit>**regular emails**</font> ** <font inherit/inherit;;#f39c12;;inherit>are overlapping</font> **; it is not easy to distinguish between them sometimes. | <font inherit/inherit;;#339933;;inherit>**regular emails**</font> ** |
| | <font inherit/inherit;;#f39c12;;inherit>are overlapping</font> **; it is not easy to distinguish between them sometimes. |
| |
| **The most dangerous threats are usually those of the "zero day attack" nature**; they usually take advantage of badly protected or misprotected email servers and domains so they can mimic the regular sender.\\ | **The most dangerous threats are usually those of the "zero day attack" nature**; they usually take advantage of badly protected or misprotected email servers and domains so they can mimic the regular sender.\\ |