Recent updates
-
Banners: Similar Display Name Impersonation
Updated onArticleDisplay name deception is the most common form of email spoofing and is often successful because many email clients (especially on mobile devices) show only the display name. With this kind of attack, criminals can insert the identity of a trusted individual (such as the name of an executive at the targeted company) or a trusted brand (such as the name of the bank used by the targeted individual) into the display name. Since common consumer mailbox services, such as Gmail and Yahoo, allow a user to specify any value in the display name, this type of attack is simple and cheap to stage from such a service. For example:
Additional Information Visible-IR (Incident Response) Email Security
-
Banners: Sender Address Spoofing
Updated onArticleSender Address Spoofing occurs when an attacker purports to be a known, familiar or plausible contact by either altering the email address to match a trusted contact or mimicking the email address of a known contact. For example:
- [email protected]
- [email protected] (letter S replaced with the number 5)
- [email protected] (the period replaced with a dash)
Additional Information Visible-IR (Incident Response) Email Security
-
Banners: First Time Sender
Updated onArticleThis banner may appear the first time you have received an email from a new sender. This is a low priority notice just to make you aware that you have never received an email from this person (in case an attacker is trying to make you think they are someone else).
Additional Information Visible-IR (Incident Response) Email Security
-
Banners: Email Reported by Another User
Updated onArticleThis email was received by multiple users at your organization and was reported as malicious by one or more of your co-workers. This email should be handled with great care as we do not yet know if this email is dangerous! Links and attachments appear in this email may not be safe and might compromise your computer. The Security team is aware and is investigating this incident.
If this email is found to be safe the banner will be removed from the email.
Additional Information Visible-IR (Incident Response) Email Security
-
Reporting Emails In Outlook Mobile
Updated onArticleFollow the steps below to report a suspicious email using the [Report Phish] button in Outlook Mobile.
Additional Information Visible-IR (Incident Response) Email Security
-
Reporting Emails In Outlook Web
Updated onArticleFollow the steps below to report a suspicious email using the [Report Phish] button in Outlook Web.
Additional Information Visible-IR (Incident Response) Email Security
-
Reporting Emails In Outlook Desktop
Updated onArticleFollow the steps below to report a suspicious email using the [Report Phish] button in Outlook Desktop.
Additional Information Visible-IR (Incident Response) Email Security
-
Course: 2311 - Removeable Media
Updated onArticleWhat do USB drives, removable hard drives and phones have in common? They are all considered forms of removable media, and they can all be dangerous. Get the facts on removable media today.
Additional Information Visible-IQ Security Awareness 2023 Course Catalog
-
Course: 2309 - Mobile Security
Updated onArticleYour phone is an office that you carry in your pocket. Get the facts on what it takes to secure, protect and use your phone safely.
Additional Information Visible-IQ Security Awareness 2023 Course Catalog
-
Course: 2308 - Social Engineering 2
Updated onArticleTake a moment to explore the importance of policies and procedures. What are they, and what’s the difference between them? And why is it important to stick to the policy?
Additional Information Visible-IQ Security Awareness 2023 Course Catalog