[vip_students] Re: Web Notes: What is a Phishing attack?

  • From: "Paul Traynor" <paul.traynor@xxxxxxx>
  • To: <vip_students@xxxxxxxxxxxxx>
  • Date: Mon, 27 Aug 2007 21:40:36 +0100

Hi Noreen,

No I don't recommend that you delete this shortcut as it is what informs
cloudmark when it needs to update itself and if you delete this then
cloudmark will not be active so that it can  bring down necessary updates.
You're right about Jims café and I will add that I am just sorry I can't
access it right now,*smiles*.

Paul.
 

-----Original Message-----
From: vip_students-bounce@xxxxxxxxxxxxx
[mailto:vip_students-bounce@xxxxxxxxxxxxx] On Behalf Of noreenmeagher
Sent: 27 August 2007 20:16
To: vip_students@xxxxxxxxxxxxx
Subject: [vip_students] Re: Web Notes: What is a Phishing attack?

Hi Paul,
Having downloaded that great programme Cloud Mark, I notice in my Start up
sub menu there is an entry for Cloud Mark Desk Top for Outlook Express. 
Should I delete this from Start up?
Wouldn't it be great if all websites were as accessible as that of Jim's
Cafe?
Thanks again,
Noreen

----- Original Message -----
From: "Paul Traynor" <paul.traynor@xxxxxxx>
To: <vip_students@xxxxxxxxxxxxx>
Sent: Monday, August 27, 2007 9:27 AM
Subject: [vip_students] Web Notes: What is a Phishing attack?


> Phishing attacks are on the rise, so having protection from them is a 
> great
> addition to IE7. A
>
> phishing attack is one where someone sends an e-mail claiming to be a
> reputable organization such as a bank. The e-mail can look quite 
> legitimate,
> so many people are fooled into clicking the link.
>
> When they get to the website, they see a display that looks very much like
> the reputable organization's website. In fact, sometimes they look exactly
> alike. The whole purpose of this ruse is to obtain personal information 
> from
> the user including social security number, date of birth, and mother's
> maiden name. The person who was phishing can now open a credit card in the
> user's name. As you can see, having good protection from this kind of 
> attack
> is a must because a phishing attack can take any form. For example, 
> someone
> might do the very same thing to gain access to your corporate network.
> Internet explorer 7 which some of you will have offers protection against
> such attacks as do spam blockers such as cloudmark or spamfighter.
>
> Regards,
>
> Paul.
>
>
> ********************************************************************
>
> NOTICE: The information contained in this email and any attachments
> is confidential and may be privileged.  If you are not the intended
> recipient you should not use, disclose, distribute or copy any of
> the content of it or of any attachment; you are requested to notify
> the sender immediately of your receipt of the email and then to
> delete it and any attachments from your system.
>
> NCBI endeavours to ensure that emails and any attachments generated
> by its staff are free from viruses or other contaminants.  However,
> it cannot accept any responsibility for any such which are
> transmitted.  We therefore recommend you scan all attachments.
>
> Please note that the statements and views expressed in this email
> and any attachments are those of the author and do not necessarily
> represent the views of NCBI
>
>
> ********************************************************************
>
>
>
>
>
>
>
> -- 
> No virus found in this incoming message.
> Checked by AVG Free Edition.
> Version: 7.5.484 / Virus Database: 269.12.8/974 - Release Date: 26/08/2007

> 16:34
>
> 




********************************************************************

NOTICE: The information contained in this email and any attachments 
is confidential and may be privileged.  If you are not the intended 
recipient you should not use, disclose, distribute or copy any of 
the content of it or of any attachment; you are requested to notify 
the sender immediately of your receipt of the email and then to 
delete it and any attachments from your system.

NCBI endeavours to ensure that emails and any attachments generated 
by its staff are free from viruses or other contaminants.  However, 
it cannot accept any responsibility for any such which are 
transmitted.  We therefore recommend you scan all attachments.

Please note that the statements and views expressed in this email 
and any attachments are those of the author and do not necessarily 
represent the views of NCBI


********************************************************************




Other related posts: