Educause Security Discussion mailing list archives

Re: Phishing Blog


From: "Telfer, Will" <Will_Telfer () BAYLOR EDU>
Date: Fri, 22 Feb 2019 14:50:44 +0000

I've posted screen shots with the names & email addresses of the person that reported the phish to us removed to both 
our social media & a blog site. The scammers are using our graphics (or the graphics of other universities as evidenced 
by the most recent blog post below) or the graphics of other legitimate businesses often so I doubt they are worried 
about licensing. Plus it helps educate users that phishing can & will look like legitimate email at times.

https://blogs.baylor.edu/phishing/recent-scams/

Thank You,
Will Telfer, M.S.
Information Security Analyst
Information Technology Services
[sig]
Twitter: @BearAware
Facebook: www.facebook.com/BearAware<http://www.facebook.com/BearAware>

From: The EDUCAUSE Security Community Group Listserv <SECURITY () LISTSERV EDUCAUSE EDU> On Behalf Of Hart, Michael
Sent: Friday, February 22, 2019 8:46 AM
To: SECURITY () LISTSERV EDUCAUSE EDU
Subject: Re: [SECURITY] Phishing Blog

We usually use screenshots of actual phishing emails coming in to us.  I didn't think about plagiarism and copyright.  
I would love to have one of the originators contact me with a complaint, though.  :)

From: The EDUCAUSE Security Community Group Listserv <SECURITY () LISTSERV EDUCAUSE EDU<mailto:SECURITY () LISTSERV 
EDUCAUSE EDU>> On Behalf Of Maud, Phil
Sent: Friday, February 22, 2019 2:01 AM
To: SECURITY () LISTSERV EDUCAUSE EDU<mailto:SECURITY () LISTSERV EDUCAUSE EDU>
Subject: [SECURITY] Phishing Blog

Hi

I am adding an item on Phishing to our university IT security blog

The site will be public so it needs to comply with all plagiarism and copyright considerations

To be of use I would like to include examples of phishing emails (as images in the phishing blog item)

There are many such images on the Internet but none of these seem to have open licensing such as creative commons 
enabling me to use them in such a blog

Has anyone done this, did they find a good source of images?

If so could you tell me where?

Alternatively if you have images from campaigns that you have been subjected to (suitably redacted) it would be great 
if you could share with me

thanks

Phil Maud
Information Security Analyst
Information Services
Building 63 (IT) G7, Cranfield University, Cranfield, Bedfordshire MK43 0AL
E: P.H.Maud () cranfield ac uk<mailto:P.H.Maud () cranfield ac uk>
T: +44 (0) 1234 75 4879
W: 
www.cranfield.ac.uk<https://na01.safelinks.protection.outlook.com/?url=http%3A%2F%2Fwww.cranfield.ac.uk&data=01%7C01%7CWill_Telfer%40BAYLOR.EDU%7C8bf8f88d32a542dab38708d698d47ef1%7C22d2fb35256a459bbcf4dc23d42dc0a4%7C0&sdata=K%2F7CA3g%2BFYRm4ZUDSD0O22Iq6SJvsXxCdw30MPKNdSY%3D&reserved=0>


This email and any attachments to it may be confidential and are intended only for the named addressee. If you are not 
the named addressee, please accept our apology, notify the sender immediately and then delete the email. We request 
that you do not disclose, use, copy or distribute any information within it.

Any opinions expressed are not necessarily the corporate view of Cranfield University. This email is not intended to be 
contractually binding unless specifically stated and the sender is an authorised University signatory.

Whilst we have taken steps to ensure that this email and all attachments are free from any virus, we advise that, in 
keeping with good computing practice, the recipient should ensure they are actually virus free.



Current thread: