{"id":492,"date":"2017-01-17T21:57:04","date_gmt":"2017-01-18T04:57:04","guid":{"rendered":"http:\/\/dshsolutions.com\/wordpress\/?p=492"},"modified":"2017-01-17T21:57:04","modified_gmt":"2017-01-18T04:57:04","slug":"beware-this-is-the-smartest-gmail-phishing-attack-youll-ever-encounter","status":"publish","type":"post","link":"https:\/\/dshsolutions.com\/wordpress\/beware-this-is-the-smartest-gmail-phishing-attack-youll-ever-encounter\/","title":{"rendered":"Beware! This Is The Smartest Gmail Phishing Attack You&#8217;ll Ever Encounter"},"content":{"rendered":"<blockquote><p>Gmail phishing is one of most common methods used by hackers to compromise the online security of naive users. But, a recent Gmail phishing attack, uncovered by Wordfence, mimics your past conversations and succeeds in fooling the tech-savvy netizens.<\/p><\/blockquote>\n<blockquote><p>&#8230;.<\/p><\/blockquote>\n<blockquote>\n<h3>How does this scary Gmail phishing attack work?<\/h3>\n<p>This phishing attack first compromises a victim\u2019s Gmail account and starts sniffing the contact list. Then, it sends fake emails, which look very much legitimate, to everyone.<\/p>\n<p>Now comes the smart part \u2014 the attack scans the user\u2019s Gmail history and finds the file names of the sent attachments. Then, it applies the same name to the new attachments that appear to be PDFs. However, they are images that send the user to phishing web pages.\u00a0To make the overall scheme more convincing, the attack steals subject lines from previous emails.<\/p>\n<p><a href=\"https:\/\/fossbytes.com\/smartest-gmail-phishing-attack\/\">Read the entire article including how to defeat this phishing attack&#8230;<\/a><\/p><\/blockquote>\n<p>Source: <em><a href=\"https:\/\/fossbytes.com\/smartest-gmail-phishing-attack\/\">Beware! This Is The Smartest Gmail Phishing Attack You&#8217;ll Ever Encounter<\/a><\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Gmail phishing is one of most common methods used by hackers to compromise the online security of naive users. But, a recent Gmail phishing attack, uncovered by Wordfence, mimics your past conversations and succeeds in fooling the tech-savvy netizens. &#8230;. How does this scary Gmail phishing attack work? This phishing attack first compromises a victim\u2019s [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4,5],"tags":[],"class_list":["post-492","post","type-post","status-publish","format-standard","hentry","category-privacy","category-security-2"],"_links":{"self":[{"href":"https:\/\/dshsolutions.com\/wordpress\/wp-json\/wp\/v2\/posts\/492","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/dshsolutions.com\/wordpress\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/dshsolutions.com\/wordpress\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/dshsolutions.com\/wordpress\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/dshsolutions.com\/wordpress\/wp-json\/wp\/v2\/comments?post=492"}],"version-history":[{"count":0,"href":"https:\/\/dshsolutions.com\/wordpress\/wp-json\/wp\/v2\/posts\/492\/revisions"}],"wp:attachment":[{"href":"https:\/\/dshsolutions.com\/wordpress\/wp-json\/wp\/v2\/media?parent=492"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/dshsolutions.com\/wordpress\/wp-json\/wp\/v2\/categories?post=492"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/dshsolutions.com\/wordpress\/wp-json\/wp\/v2\/tags?post=492"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}