Deutsch   English   Français   Italiano  
<vbcvp4$eoqp$1@dont-email.me>

View for Bookmarking (what is this?)
Look up another Usenet article

Path: ...!news.mixmin.net!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: Don Y <blockedofcourse@foo.invalid>
Newsgroups: sci.electronics.design
Subject: Phishing
Date: Thu, 5 Sep 2024 12:11:24 -0700
Organization: A noiseless patient Spider
Lines: 14
Message-ID: <vbcvp4$eoqp$1@dont-email.me>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
Injection-Date: Thu, 05 Sep 2024 21:11:32 +0200 (CEST)
Injection-Info: dont-email.me; posting-host="6d804f263f3dfafca8be5c23a2c3adfa";
	logging-data="484185"; mail-complaints-to="abuse@eternal-september.org";	posting-account="U2FsdGVkX18TVuqNmrroBIRocRT8iL46"
User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:102.0) Gecko/20100101
 Thunderbird/102.2.2
Cancel-Lock: sha1:wpvEpxrzh7LNHUhx0Gd0ifNB47U=
Content-Language: en-US
Bytes: 1504

I'm checking my "deflected" incoming mail to see if anything that
*should* have been allowed through was mistakenly diverted
(false positive).

I see a fair number of phishing attempts on my "public" accounts.
But, all are trivially identified as such.

So, how is it that folks (organizations) are so often deceived
by these things?  Are users just lazy?  Would it be more helpful
to have mail clients make it HARDER to activate an embedded
URL or "potentially compromised" attachment?

Or, will the stupidity of users adapt, accordingly?