And what's wrong with that? Heck, I even let my mail client filter those pesky HTML attachments through lynx if need be -- too many bastards put the contents as such an attachment instead of the mail's body.
No operating system would be insane enough to run executables this way, would it?
Oh wait. This is Slashdot. Asking for constructive solutions? Talk about pissing into the wind.
I know y'all [typical Slashdot commenters] will find the notion hilarious (at best), but I actually think there are solution approaches. I'm just mystified why no one is approaching them, though I'd appreciate your guidance to existing solutions almost as much as your better ideas.
For example, to whit...
A lot of these problematic links could be quickly identified if the intended victims were asked to help. Or even
We have started receiving some very high-quality Office365 "Your password is about to expire" notifications. They are super specific and somehow they know we use MS. As usual they are an exact copy of the real email (none of the usual grammar or spelling mistakes). The fact MS spam filtering doesn't flag these is troubling.
If it weren't for the "From: Microsoft Office365 (billybob3248@ustexasam.edu)" it would look totally legit. My big issue that is that Outlook normally hides some of this information
And what's wrong with that? Heck, I even let my mail client filter those pesky HTML attachments through lynx if need be -- too many bastards put the contents as such an attachment instead of the mail's body.
No operating system would be insane enough to run executables this way, would it?
A new study from email security company Mimecast shows that malicious links in emails are being missed by many security systems
Of The Six Dumbest Ideas in Computer Security [ranum.com], this is a combination of 1 (on the part of the MUAs) and 2 (on the part of the scanners). So, no kidding.
Oh wait. This is Slashdot. Asking for constructive solutions? Talk about pissing into the wind.
I know y'all [typical Slashdot commenters] will find the notion hilarious (at best), but I actually think there are solution approaches. I'm just mystified why no one is approaching them, though I'd appreciate your guidance to existing solutions almost as much as your better ideas.
For example, to whit...
A lot of these problematic links could be quickly identified if the intended victims were asked to help. Or even
We have started receiving some very high-quality Office365 "Your password is about to expire" notifications. They are super specific and somehow they know we use MS. As usual they are an exact copy of the real email (none of the usual grammar or spelling mistakes). The fact MS spam filtering doesn't flag these is troubling.
If it weren't for the "From: Microsoft Office365 (billybob3248@ustexasam.edu)" it would look totally legit. My big issue that is that Outlook normally hides some of this information