[anti-abuse-wg] [policy-announce] 2017-02 Review Phase (Regular abuse-c Validation)
- Previous message (by thread): [anti-abuse-wg] [policy-announce] 2017-02 Review Phase (Regular abuse-c Validation)
- Next message (by thread): [anti-abuse-wg] [policy-announce] 2017-02 Review Phase (Regular abuse-c Validation)
Messages sorted by: [ date ] [ thread ] [ subject ] [ author ]
Luis E. Muñoz
lem at uniregistry.link
Fri Jan 19 19:00:46 CET 2018
On 19 Jan 2018, at 2:21, Wolfgang Tremmel wrote: > I can imagine as the "click here and solve captcha" emails will be > standardized that a carefully crafted attack might lure fist line > helpdesk people onto shady websides and making them click stuff. If your helpdesk in charge of abuse is so vulnerable that clicking on a link or by extension, receiving a malware sample, will become a successful attack, then I would be interested to understand how exactly do they handle abuse reports today? Almost all of what we get involves links and/or potentially dangerous malware samples. Yet we somehow don't get compromised as easily as your message suggests. Luis Muñoz Director, Registry Operations ____________________________ http://www.uniregistry.link/ 2161 San Joaquin Hills Road Newport Beach, CA 92660 Office +1 949 706 2300 x 4242 lem at uniregistry.link -------------- next part -------------- An HTML attachment was scrubbed... URL: <https://lists.ripe.net/ripe/mail/archives/anti-abuse-wg/attachments/20180119/301b1d56/attachment.html>
- Previous message (by thread): [anti-abuse-wg] [policy-announce] 2017-02 Review Phase (Regular abuse-c Validation)
- Next message (by thread): [anti-abuse-wg] [policy-announce] 2017-02 Review Phase (Regular abuse-c Validation)
Messages sorted by: [ date ] [ thread ] [ subject ] [ author ]