Powered By Blogger

Tuesday 2 March 2010

The Phishing Flow Chart

Here is a handy phishing flow chart that can help inexperienced computer users in analyzing potentially dangerous emails. Check out our how to identify phishing attacks guide for additional information and tips on phishing attacks.
The flow chart basically walks a user through the analysis of an email. It begins by identifying the sender and then checking consecutively if the email contains links or attachments and if it requests personal information.
The red end points define potentially dangerous emails while the blue end point an email that is likely safe.

No comments:

Post a Comment