Enhance cybersecurity awareness and survivability for DoD, industry partners, and academia in the face of the ever-increasing threat of cyber attacks. Cybersecurity (CS) includes managing risks related to the use, processing, storage, and transmission of information and the systems and processes used for those purposes, including analog and physical form. CS includes information availability, identification and authentication, confidentiality, integrity, and non-repudiation as well as the economic considerations with respect to selection of CS techniques, CS processes, and industry trends.
Office 365 Phishing Images
- This topic has 0 replies, 1 voice, and was last updated 3 months, 3 weeks ago by .
-
Topic
-
An Office 365 phishing scam has been inverting images that are used as backgrounds for legitimate websites. The phishing kits attempt to clone login pages and used the same background in order to appear as the real website. In order to deceive scanning technologies, they invert the backgrounds color, causing the image hash to be different from the original. The phishing kit then uses Cascading Style Sheets (CSS) to revert the background image back to the original colors.
You must be logged in to reply to this topic.