• Create BookmarkCreate Bookmark
  • Create Note or TagCreate Note or Tag
  • PrintPrint

The Shell Game

No technology can overcome the biggest security risk of all: people. Sometimes email attacks begin not with the newest technology or an obscure bug in an email program, but with a simple trick. By fooling you into responding to an email, attackers can gain information you wouldn't have provided if you had known the true nature of the request.

Case Study 2-6

Kristina received an interesting email in her inbox:

To: kreynolds@aol.com

From: lk3jdd92@yahoo.com

Subject: Is it you???

Barb,

I hope I finally have the right email address for you. It is critical that I get in
touch with you ASAP. Lisa is very ill and would like to hear from you. Please
write me back and let me know if I have finally located you.

Jim Lawson

Being a kind-hearted person, Kristina wrote back to Jim to say that she hoped Lisa would be okay, but he would need to keep looking for Barb. She was so touched by the story that she told some friends about the email. They all hoped that Jim and Lisa would be able to track down Barb someday.



PREVIEW

                                                                          

Not a subscriber?

Start A Free Trial


  
  • Creative Edge
  • Create BookmarkCreate Bookmark
  • Create Note or TagCreate Note or Tag
  • PrintPrint