lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <200405082129.i48LTAck001252@web186.megawebservers.com> From: 1 at malware.com (http-equiv@...ite.com) Subject: DEEP SEA PHISHING: Internet Explorer / Outlook Express Saturday, May 08, 2004 More silliness : <A HREF=http://www.microsoft.com alt="http://www.microsoft.com"> <IMG SRC="malware.gif" USEMAP="#malware" border=0 alt="http://www.microsoft.com"></A> <map NAME="malware" alt="http://www.microsoft.com">> <area SHAPE=RECT COORDS="224,21" HREF="http://www.malware.com" alt="http://www.microsoft.com"> </MAP> Notes: Outlook 2003 has a bubble that correctly identifies it even with the alternative text Working Example: http://www.malware.com/pheeesh.zip End Call -- http://www.malware.com