{"id":38232,"date":"2023-01-20T16:35:19","date_gmt":"2023-01-20T21:35:19","guid":{"rendered":"https:\/\/mjtsai.com\/blog\/?p=38232"},"modified":"2023-01-20T16:35:19","modified_gmt":"2023-01-20T21:35:19","slug":"identifying-phishing","status":"publish","type":"post","link":"https:\/\/mjtsai.com\/blog\/2023\/01\/20\/identifying-phishing\/","title":{"rendered":"Identifying Phishing"},"content":{"rendered":"<p><a href=\"https:\/\/tidbits.com\/2023\/01\/16\/an-annotated-field-guide-to-identifying-phish\/\">Adam Engst<\/a>:<\/p>\n<blockquote cite=\"https:\/\/tidbits.com\/2023\/01\/16\/an-annotated-field-guide-to-identifying-phish\/\">\n<p>In the past, many phishing attempts were obviously fake, and intentionally so. That&rsquo;s because they only had to sucker people who were sufficiently inexperienced, credulous, or easily deceived that they would continue to go along with the scam. Now, however, I&rsquo;m seeing phishing attempts that are more sophisticated and harder to identify quickly.<\/p>\n<p>I&rsquo;ve been examining phishing attempts for so long that it&rsquo;s hard for me to imagine what might fool someone else, so I wanted to share some recent attempts that slipped past Gmail&rsquo;s filters. For each message, I&rsquo;ve called out some of the ways I identified it as phishing.<\/p>\n<\/blockquote>","protected":false},"excerpt":{"rendered":"<p>Adam Engst: In the past, many phishing attempts were obviously fake, and intentionally so. That&rsquo;s because they only had to sucker people who were sufficiently inexperienced, credulous, or easily deceived that they would continue to go along with the scam. Now, however, I&rsquo;m seeing phishing attempts that are more sophisticated and harder to identify quickly. [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"apple_news_api_created_at":"2023-01-20T21:35:22Z","apple_news_api_id":"a4c0e2a0-534b-414c-9a29-166e06dafebc","apple_news_api_modified_at":"2023-01-20T21:35:23Z","apple_news_api_revision":"AAAAAAAAAAD\/\/\/\/\/\/\/\/\/\/w==","apple_news_api_share_url":"https:\/\/apple.news\/ApMDioFNLQUyaKRZuBtr-vA","apple_news_coverimage":0,"apple_news_coverimage_caption":"","apple_news_is_hidden":false,"apple_news_is_paid":false,"apple_news_is_preview":false,"apple_news_is_sponsored":false,"apple_news_maturity_rating":"","apple_news_metadata":"\"\"","apple_news_pullquote":"","apple_news_pullquote_position":"","apple_news_slug":"","apple_news_sections":"\"\"","apple_news_suppress_video_url":false,"apple_news_use_image_component":false,"footnotes":""},"categories":[2],"tags":[150,1200,356],"class_list":["post-38232","post","type-post","status-publish","format-standard","hentry","category-technology","tag-email","tag-phishing","tag-spam"],"apple_news_notices":[],"_links":{"self":[{"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/posts\/38232","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/comments?post=38232"}],"version-history":[{"count":1,"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/posts\/38232\/revisions"}],"predecessor-version":[{"id":38233,"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/posts\/38232\/revisions\/38233"}],"wp:attachment":[{"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/media?parent=38232"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/categories?post=38232"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/tags?post=38232"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}