{"id":36,"date":"2016-12-22T11:07:56","date_gmt":"2016-12-22T11:07:56","guid":{"rendered":"https:\/\/blog.bham.ac.uk\/itsecurity\/?p=36"},"modified":"2018-11-02T11:35:53","modified_gmt":"2018-11-02T11:35:53","slug":"recent-phishing-email","status":"publish","type":"post","link":"https:\/\/blog.bham.ac.uk\/itsecurity\/2016\/12\/22\/recent-phishing-email\/","title":{"rendered":"Recent Phishing Email"},"content":{"rendered":"<p>As part of this blog we intend to bring you examples of phishing and other malicious emails with highlighting suspicious characteristics.\u00a0 It is hoped that this will help people spot malicious email more easily.\u00a0 Additionally, it should also be useful in helping people avoid suspicious characteristics in genuine messages.<\/p>\n<p>Here is the first example which shows an attempt to obtain your username and password by pretending to be a message from IT Services<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-39\" src=\"https:\/\/blog.bham.ac.uk\/itsecurity\/wp-content\/uploads\/sites\/36\/2016\/12\/help-desk-phishing-1.jpg\" alt=\"The image shows an example phishing email and illustrates aspects of the email that make it look suspicious.\" width=\"1047\" height=\"688\" srcset=\"https:\/\/blog.bham.ac.uk\/itsecurity\/wp-content\/uploads\/sites\/36\/2016\/12\/help-desk-phishing-1.jpg 1047w, https:\/\/blog.bham.ac.uk\/itsecurity\/wp-content\/uploads\/sites\/36\/2016\/12\/help-desk-phishing-1-300x197.jpg 300w, https:\/\/blog.bham.ac.uk\/itsecurity\/wp-content\/uploads\/sites\/36\/2016\/12\/help-desk-phishing-1-768x505.jpg 768w, https:\/\/blog.bham.ac.uk\/itsecurity\/wp-content\/uploads\/sites\/36\/2016\/12\/help-desk-phishing-1-1024x673.jpg 1024w\" sizes=\"auto, (max-width: 709px) 85vw, (max-width: 909px) 67vw, (max-width: 1362px) 62vw, 840px\" \/><\/p>\n","protected":false},"excerpt":{"rendered":"<p>As part of this blog we intend to bring you examples of phishing and other malicious emails with highlighting suspicious characteristics.\u00a0 It is hoped that this will help people spot malicious email more easily.\u00a0 Additionally, it should also be useful in helping people avoid suspicious characteristics in genuine messages. Here is the first example which &hellip; <a href=\"https:\/\/blog.bham.ac.uk\/itsecurity\/2016\/12\/22\/recent-phishing-email\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Recent Phishing Email&#8221;<\/span><\/a><\/p>\n","protected":false},"author":84,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[5,3,13],"tags":[],"class_list":["post-36","post","type-post","status-publish","format-standard","hentry","category-malicious-email","category-examples-of-malicious-email","category-phishing"],"_links":{"self":[{"href":"https:\/\/blog.bham.ac.uk\/itsecurity\/wp-json\/wp\/v2\/posts\/36","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.bham.ac.uk\/itsecurity\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.bham.ac.uk\/itsecurity\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.bham.ac.uk\/itsecurity\/wp-json\/wp\/v2\/users\/84"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.bham.ac.uk\/itsecurity\/wp-json\/wp\/v2\/comments?post=36"}],"version-history":[{"count":4,"href":"https:\/\/blog.bham.ac.uk\/itsecurity\/wp-json\/wp\/v2\/posts\/36\/revisions"}],"predecessor-version":[{"id":38,"href":"https:\/\/blog.bham.ac.uk\/itsecurity\/wp-json\/wp\/v2\/posts\/36\/revisions\/38"}],"wp:attachment":[{"href":"https:\/\/blog.bham.ac.uk\/itsecurity\/wp-json\/wp\/v2\/media?parent=36"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.bham.ac.uk\/itsecurity\/wp-json\/wp\/v2\/categories?post=36"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.bham.ac.uk\/itsecurity\/wp-json\/wp\/v2\/tags?post=36"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}