lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Wed Dec 14 21:53:22 2005
From: michealespinola at gmail.com (Micheal Espinola Jr)
Subject: Phishing Alert: Inland Revenue Service

Thanks for letting me know you are switching providers.  I'm glad that
that you are using the FD list as a podium for announcing phishing
attacks.  This is truly relevant information.

I'm surprised I haven't signed up for other lists that notify me about
phishing attacks, because I really think I need to stay on top of
this.  This "phishing" problem could be huge.

If you could, please let me know when you decide to change your
underwear.  You do know which day of the week it is, right?

<http://www.landsend.com/cd/fp/prod/0,,1_2_52358_54438_128640_107087_5:view=-1,00.html>

On 12/14/05, n3td3v <xploitable@...il.com> wrote:
>  Websense.com said: "Your search for internal revenue service resulted
> in 0 alerts."
>
> I guess I shouldn't listen to Websense alerts all of the time, since
> they missed out this one. If Websense had reported on it, I wouldn't
> have posted it to FD. Time to change my phishing alerts provider.
>
> On 12/14/05, Todd Towles <toddtowles@...okshires.com> wrote:
> > But the people on your security group already saw it, right? So why post
> > it here? We can all see your group like the rest of the world.
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/
>


--
ME2  <http://www.santeriasys.net/>

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ