March 21, 2005Tips for Identifying Phishing & Fraudulent E-MailsMicrosoft, in its battle against spam and online fraud, has a very good article describing deceptive e-mails. It covers how they work, and how you can spot their characteristics. To summarize, many deceptive e-mails have the following attributes, either separately or in combination:
Say what you will about Microsoft security, but I applaud their efforts to educate people on these attacks. Protective software and security only go so far, especially when it comes to e-mail. The rest is up to the recipients, so we need to know how to protect ourselves.
Topic(s):
Privacy & Security
Posted by Jeff Beard Comments
|