• Create BookmarkCreate Bookmark
  • Create Note or TagCreate Note or Tag
  • PrintPrint

Indirect Email Access

Sometimes an email attacker combines trickery with technology. That is what happens when an attacker tries to trick you into accessing an indirect email tool. By playing on your curiosity, the email attacker might be able to get you to click on a link, access another application, or even install software on your computer. By combining trickery with technology attacks, the attacker can compromise your security without your awareness.

Case Study 2-7

Hank received an email that indicated someone had sent him an important message:

To: hank_jones@aol.com

From: odsu892317@yahoo.com

Subject: Important Message

Hank,

Matt Jacobs has sent you an important message. Please click here to view this
message.

Thanks,

Secure Email Services

Hank couldn't remember a Matt Jacobs, but he wanted to make sure he didn't miss an important message. He clicked the link to find out what important news Matt wanted to tell him.



PREVIEW

                                                                          

Not a subscriber?

Start A Free Trial


  
  • Creative Edge
  • Create BookmarkCreate Bookmark
  • Create Note or TagCreate Note or Tag
  • PrintPrint