Professional Documents
Culture Documents
MELC 8 Intellectual Property Copyright and
MELC 8 Intellectual Property Copyright and
MELC 8 Intellectual Property Copyright and
COPYRIGHT AND
FAIR USE GUIDELINES
INTELLECTUAL
PROPERTY (IP)
1. DECEPTIVE PHISHING
refers to any attack by which fraudsters impersonate a legitimate
company and attempt to steal people’s personal information or login
credentials.
2. SPEAR PHISHING
Fraudsters customize their attack emails with the target’s name,
position, company, work phone number and other information in an
attempt to trick the recipient into believing that they have a connection
with the sender.
COMMON PHISHING ATTACKS AND
HOW TO PROTECT AGAINST THEM
3. DROPBOX PHISHING
attack emails according to an individual company or
service.
Example: Drop box
To protect against Drop box phishing attacks, users should
consider implementing two-step verification (2SV) on their
accounts. For a step-by-step guide on how to activate this
additional layer of security,
COMMON PHISHING ATTACKS AND
HOW TO PROTECT AGAINST THEM
3. DROPBOX PHISHING
attack emails according to an individual company or
service.
Example: Drop box
To protect against Drop box phishing attacks, users should
consider implementing two-step verification (2SV) on their
accounts. For a step-by-step guide on how to activate this
additional layer of security,
COMMON PHISHING ATTACKS AND
HOW TO PROTECT AGAINST THEM