Differences
This shows you the differences between two versions of the page.
| Both sides previous revision Previous revision Next revision | Previous revision | ||
| public:emai:spam [2021-10-26 09:42] – vesely | public:emai:spam [2022-12-02 10:04] (current) – vesely | ||
|---|---|---|---|
| Line 11: | Line 11: | ||
| * Better safe, than sorry. | * Better safe, than sorry. | ||
| + | * Be brave! Never try to conceal your possible mistake - take it in possitive way - we all learn from mistakes. We all :-) | ||
| + | * Cowards who awkwardly try to avoid of mistake revealing usualy make things much worse for them and for the rest of the institution. | ||
| Bonuses: | Bonuses: | ||
| - | [[https:// | + | [[https:// |
| [[https:// | [[https:// | ||
| Line 20: | Line 22: | ||
| ---- | ---- | ||
| - | See also " | + | <faicon fa fa-hand-o-right> |
| - | and **[[: | + | <faicon fa fa-hand-o-right> |
| ---- | ---- | ||
| Line 29: | Line 31: | ||
| === spam === | === spam === | ||
| + | < | ||
| + | |||
| + | [Classification: | ||
| + | |||
| + | </ | ||
| * Unsolicited mail, just offers unneeded or annoying things. | * Unsolicited mail, just offers unneeded or annoying things. | ||
| Line 35: | Line 42: | ||
| === hoax === | === hoax === | ||
| + | |||
| + | < | ||
| + | [Classification: | ||
| + | |||
| + | </ | ||
| * By wiki: A hoax is a falsehood deliberately fabricated to masquerade as the truth. | * By wiki: A hoax is a falsehood deliberately fabricated to masquerade as the truth. | ||
| Line 42: | Line 54: | ||
| === phishing === | === phishing === | ||
| - | | + | < |
| + | [Classification: | ||
| + | |||
| + | </ | ||
| + | |||
| + | | ||
| * Never use offered links without its __authenticity thorough verification__. | * Never use offered links without its __authenticity thorough verification__. | ||
| * Be very careful and abstemious by inserting your login and password anywhere. | * Be very careful and abstemious by inserting your login and password anywhere. | ||
| === spoofing === | === spoofing === | ||
| + | |||
| + | < | ||
| + | [Classification: | ||
| + | |||
| + | </ | ||
| * The message looks like sent from a trustworthy address, your jobmate, manager, IT crowd, your home institution server etc. | * The message looks like sent from a trustworthy address, your jobmate, manager, IT crowd, your home institution server etc. | ||
| Line 53: | Line 75: | ||
| === malware === | === malware === | ||
| + | |||
| + | < | ||
| + | [Classification: | ||
| + | |||
| + | </ | ||
| * The harmful code hidden in an executable attachment or in a document as a macro or on the fraudulent webpage linked from the message. | * The harmful code hidden in an executable attachment or in a document as a macro or on the fraudulent webpage linked from the message. | ||
| Line 58: | Line 85: | ||
| === ransomware === | === ransomware === | ||
| + | |||
| + | < | ||
| + | [Classification: | ||
| + | |||
| + | </ | ||
| * Special malware __encrypting every data__ | * Special malware __encrypting every data__ | ||
| * Avoid being infected by malware. | * Avoid being infected by malware. | ||
| - | ==== What to do, if you become a target of the cyber attack ==== | + | ==== What to do, if you are uncertain about email (possible |
| - | - Thing first, check all circumstances, | + | - Thing first, check all circumstances, |
| - | - Do not accept | + | - Do not allow the time presure |
| - | - Only if you are sure, make some settings, password change etc. | + | - Only if you are absolutely |
| - | - In case of any suspicion, | + | - In case of any suspicion |
| - | - If you have by mistake | + | - If you think you have compromised your password |
| In any doubt, do not hesitate to ask **helpdesk@cerge-ei.cz**. Please prepare complete documentation, | In any doubt, do not hesitate to ask **helpdesk@cerge-ei.cz**. Please prepare complete documentation, | ||