Deutsch English Français Italiano |
<vbcvp4$eoqp$1@dont-email.me> View for Bookmarking (what is this?) Look up another Usenet article |
Path: ...!news.mixmin.net!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail From: Don Y <blockedofcourse@foo.invalid> Newsgroups: sci.electronics.design Subject: Phishing Date: Thu, 5 Sep 2024 12:11:24 -0700 Organization: A noiseless patient Spider Lines: 14 Message-ID: <vbcvp4$eoqp$1@dont-email.me> MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 7bit Injection-Date: Thu, 05 Sep 2024 21:11:32 +0200 (CEST) Injection-Info: dont-email.me; posting-host="6d804f263f3dfafca8be5c23a2c3adfa"; logging-data="484185"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX18TVuqNmrroBIRocRT8iL46" User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:102.0) Gecko/20100101 Thunderbird/102.2.2 Cancel-Lock: sha1:wpvEpxrzh7LNHUhx0Gd0ifNB47U= Content-Language: en-US Bytes: 1504 I'm checking my "deflected" incoming mail to see if anything that *should* have been allowed through was mistakenly diverted (false positive). I see a fair number of phishing attempts on my "public" accounts. But, all are trivially identified as such. So, how is it that folks (organizations) are so often deceived by these things? Are users just lazy? Would it be more helpful to have mail clients make it HARDER to activate an embedded URL or "potentially compromised" attachment? Or, will the stupidity of users adapt, accordingly?