Good afternoon,
Today, I received a message claiming to be from "noreply@barracuda.com". Never heard of them. The message tells me to click a link in the message to view an encrypted message. Now I know that clicking links in e-mail is risky. How do I safely determine if this is genuine and safe without clicking that link?
thanks, Bill.
El dic 1, 2018, a las 12:23 PM, home user via users users@lists.fedoraproject.org escribió:
Good afternoon,
Today, I received a message claiming to be from "noreply@barracuda.com". Never heard of them. The message tells me to click a link in the message to view an encrypted message. Now I know that clicking links in e-mail is risky. How do I safely determine if this is genuine and safe without clicking that link?
Please make sure that the domain name in the link's destination URL ends in "barracuda.com".
If not, someone is trying to phish you. In that case, please contact Barracuda Networks (at barracuda.com) and also file a complaint with the U.S. Federal Trade Commission at ftccomplaintassistant.gov (as Barracuda Networks is a U.S. company) and, if applicable, the equivalent agency in your other country.
thanks, Bill. _______________________________________________ users mailing list -- users@lists.fedoraproject.org To unsubscribe send an email to users-leave@lists.fedoraproject.org Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines List Archives: https://lists.fedoraproject.org/archives/list/users@lists.fedoraproject.org
El dic 1, 2018, a las 12:37 PM, Ryan Cunningham storybox703@yahoo.com escribió:
[. . .] and also file a complaint with the U.S. Federal Trade Commission at ftccomplaintassistant.gov [. . .]
CORRECTION: You should instead file the complaint with the Internet Crime Complaint Center (IC3) at ic3.gov.
Ryan,
Please make sure that the domain name in the link's destination URL ends in "barracuda.com".
The link's destination URL starts with "https://encrypt.barracudanetworks.com/login?nid=". The rest is a very long alpha-numeric string.
I'm using Thunderbird on Fedora-28; there is no "anti-virus" available. Is this safe?
thanks, Bill.
On 12/1/18 12:51 PM, home user via users wrote:
Ryan,
Please make sure that the domain name in the link's destination URL ends in "barracuda.com".
The link's destination URL starts with "https://encrypt.barracudanetworks.com/login?nid=". The rest is a very long alpha-numeric string.
If you're not expecting this message, I expect that it's going to be some kind of scam message. However, as for safety, if I'm curious, I will take the hostname of the url and use Firefox private mode to check it. In this case, "https://encrypt.barracudanetworks.com". It appears to be a messaging system, so I assume that the site is "ok". Try loading the url, again in private mode and see what happens. It is extremely unlikely that going to a website using Firefox on Fedora is going to harm your system. Just of course be wary of entering information unless you're very sure of the site you're on.
I'm using Thunderbird on Fedora-28; there is no "anti-virus" available. Is this safe?
I've never found "anti-virus" to have any use on a Linux system other than a way to use up CPU time. I've personally never used it or installed it on any systems I have setup for other people and there have never been any issues in the more than 20 years I've been doing this. People that I know have tried using it have generally disabled it because it's annoying and a CPU hog. It has the same effect on Windows systems, but there it appears to be useful.
On Sat, 1 Dec 2018 at 17:18, Samuel Sieb samuel@sieb.net wrote:
On 12/1/18 12:51 PM, home user via users wrote:
Ryan,
[...]
I'm using Thunderbird on Fedora-28; there is no "anti-virus" available. Is this safe?
I've never found "anti-virus" to have any use on a Linux system other than a way to use up CPU time. I've personally never used it or installed it on any systems I have setup for other people and there have never been any issues in the more than 20 years I've been doing this. People that I know have tried using it have generally disabled it because it's annoying and a CPU hog. It has the same effect on Windows systems, but there it appears to be useful.
The main reason for running AV on linux is to protect Windows systems that exchange files with the linux box. I'm retired, but at my former work many users have mail accounts on linux systems, but Windows is the "corporate standard", so emails or email attachments get moved back and forth. We also used macOS, which had clamav with Apple's customized patterns. In one case, a user with a macbook was in a high level meeting with military brass, etc. and documents were being exchanged via a USB key. ClamAV found a trojan "copy.exe" on the USB key that was not detected by any of the Windows laptops (presumably running current high-end AV software). Over the years, clamav has found many Windows malware instances in email archives or Word documents. These would have passed Windows AV scans when the messages were delivered. Most clamav hits, but not all, were detected by current Windows AV tools. I suppose suspect mails should be quarantined a few months to let AV software catch up.
Even with AV software there were several large-scale Windows infestations at my former work. AV software has been a huge PITA on Windows, but with faster processors and better algorithms it is much less intrusive these days.
home user via users writes:
Ryan,
Please make sure that the domain name in the link's destination URL ends in "barracuda.com".
The link's destination URL starts with "https://encrypt.barracudanetworks.com/login?nid=". The rest is a very long alpha-numeric string.
How did you determine that this is the destination URL? That's what you see, in the HTML-formatted E-mail?
I'll be happy to send you an HTML message with a link whose destination URL seems to be https://www.whitehouse.gov, but once clicked you'll wind up on https://pornhub.com
Would you like to conduct this harmless experiment?
I'm using Thunderbird on Fedora-28; there is no "anti-virus" available. Is this safe?
Well, if you were running MS-Windows it would definitely be not safe.
On 12/2/18 10:46 AM, Sam Varshavchik wrote:
I'll be happy to send you an HTML message with a link whose destination URL seems to be https://www.whitehouse.gov, but once clicked you'll wind up on https://pornhub.com
FWIW, with T-Bird it is easy to recognize this deception. To see if what is displayed in the message is different than where you will be sent you just need to hover your cursor over the link. The actual link will be displayed in the lower left next to the "online" indicator.
On Sun, 2018-12-02 at 11:05 +0800, Ed Greshko wrote:
On 12/2/18 10:46 AM, Sam Varshavchik wrote:
I'll be happy to send you an HTML message with a link whose destination URL seems to be https://www.whitehouse.gov, but once clicked you'll wind up on https://pornhub.com
FWIW, with T-Bird it is easy to recognize this deception. To see if what is displayed in the message is different than where you will be sent you just need to hover your cursor over the link. The actual link will be displayed in the lower left next to the "online" indicator.
AFAIK most MUAs do that (at least those I've seen), as well as most browsers.
poc
On Sun, 2018-12-02 at 09:59 +0000, Patrick O'Callaghan wrote:
On Sun, 2018-12-02 at 11:05 +0800, Ed Greshko wrote:
On 12/2/18 10:46 AM, Sam Varshavchik wrote:
I'll be happy to send you an HTML message with a link whose destination URL seems to be https://www.whitehouse.gov, but once clicked you'll wind up on https://pornhub.com
FWIW, with T-Bird it is easy to recognize this deception. To see if what is displayed in the message is different than where you will be sent you just need to hover your cursor over the link. The actual link will be displayed in the lower left next to the "online" indicator.
AFAIK most MUAs do that (at least those I've seen), as well as most browsers.
poc _______________________________________________ users mailing list -- users@lists.fedoraproject.org To unsubscribe send an email to users-leave@lists.fedoraproject.org Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines List Archives:
I'm still using evolution in F28 and it doesn't do that. If I am interested, I copy the link location and paste it into a new email. Generally I'm not interested, so it is not too troubling. but it would be nice if the hover function worked in evolution too. Les
On Sun, 2018-12-02 at 12:59 -0500, Howard Howell wrote:
On Sun, 2018-12-02 at 09:59 +0000, Patrick O'Callaghan wrote:
On Sun, 2018-12-02 at 11:05 +0800, Ed Greshko wrote:
On 12/2/18 10:46 AM, Sam Varshavchik wrote:
I'll be happy to send you an HTML message with a link whose destination URL seems to be https://www.whitehouse.gov, but once clicked you'll wind up on https://pornhub.com
FWIW, with T-Bird it is easy to recognize this deception. To see if what is displayed in the message is different than where you will be sent you just need to hover your cursor over the link. The actual link will be displayed in the lower left next to the "online" indicator.
AFAIK most MUAs do that (at least those I've seen), as well as most browsers.
poc _______________________________________________ users mailing list -- users@lists.fedoraproject.org To unsubscribe send an email to users-leave@lists.fedoraproject.org Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines List Archives:
I'm still using evolution in F28 and it doesn't do that. If I am interested, I copy the link location and paste it into a new email. Generally I'm not interested, so it is not too troubling. but it would be nice if the hover function worked in evolution too.
I'm now on F29 (Evolution 3.20.3) and it definitely does do that. AFAIK it has done so for the last several years, but of course I can't be sure without rolling it back.
poc
Allegedly, on or about 2 December 2018, Howard Howell sent:
I'm still using evolution in F28 and it doesn't do that. If I am interested, I copy the link location and paste it into a new email. Generally I'm not interested, so it is not too troubling. but it would be nice if the hover function worked in evolution too.
Look in the View menu, inside the Layout section, enable the Show Status Bar item.
On Tue, 2018-12-04 at 00:29 +1030, Tim via users wrote:
Allegedly, on or about 2 December 2018, Howard Howell sent:
I'm still using evolution in F28 and it doesn't do that. If I am interested, I copy the link location and paste it into a new email. Generally I'm not interested, so it is not too troubling. but it would be nice if the hover function worked in evolution too.
Look in the View menu, inside the Layout section, enable the Show Status Bar item.
I'd forgotten that could even be turned off :-)
poc
On Tue, 2018-12-04 at 00:29 +1030, Tim wrote:
Allegedly, on or about 2 December 2018, Howard Howell sent:
I'm still using evolution in F28 and it doesn't do that. If I am interested, I copy the link location and paste it into a new email. Generally I'm not interested, so it is not too troubling. but it would be nice if the hover function worked in evolution too.
Look in the View menu, inside the Layout section, enable the Show Status Bar item.
It shows 4 options, all checked. What did you think I would find there?
On Mon, 2018-12-03 at 10:59 -0800, Howard Howell wrote:
On Tue, 2018-12-04 at 00:29 +1030, Tim wrote:
Allegedly, on or about 2 December 2018, Howard Howell sent:
I'm still using evolution in F28 and it doesn't do that. If I am interested, I copy the link location and paste it into a new email. Generally I'm not interested, so it is not too troubling. but it would be nice if the hover function worked in evolution too.
Look in the View menu, inside the Layout section, enable the Show Status Bar item.
It shows 4 options, all checked. What did you think I would find there?
I'm seeing five options: - Show Menu Bar - Show Tool Bar - Show Status Bar - Show Side Bar F9 - Show To Do Bar
poc
On Mon, 2018-12-03 at 23:12 +0000, Patrick O'Callaghan wrote:
On Mon, 2018-12-03 at 10:59 -0800, Howard Howell wrote:
On Tue, 2018-12-04 at 00:29 +1030, Tim wrote:
Allegedly, on or about 2 December 2018, Howard Howell sent:
I'm still using evolution in F28 and it doesn't do that. If I am interested, I copy the link location and paste it into a new email. Generally I'm not interested, so it is not too troubling. but it would be nice if the hover function worked in evolution too.
Look in the View menu, inside the Layout section, enable the Show Status Bar item.
It shows 4 options, all checked. What did you think I would find there?
I'm seeing five options:
- Show Menu Bar
- Show Tool Bar
- Show Status Bar
- Show Side Bar F9
- Show To Do Bar
poc _______________________________________________ users mailing list -- users@lists.fedoraproject.org To unsubscribe send an email to users-leave@lists.fedoraproject.org Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines List Archives: https://lists.fedoraproject.org/archives/list/users@lists.fedoraproject.org
After the latest update I show five, too. They are all checked, but the hover function described still doesn't work. Maybe something in my setup or .config. I'll create a new user and see what shows up there.
It's not a big deal, but I am curious now.
Regards, Les H
On Tue, 2018-12-04 at 10:11 -0800, Howard Howell wrote:
After the latest update I show five, too. They are all checked, but the hover function described still doesn't work. Maybe something in my setup or .config. I'll create a new user and see what shows up there.
It's not a big deal, but I am curious now.
If you still have problems you might want to ask on the Evolution mailing list. See:
https://mail.gnome.org/mailman/listinfo/evolution-list
poc
Tim:
Look in the View menu, inside the Layout section, enable the Show Status Bar item.
Howard Howell:
It shows 4 options, all checked. What did you think I would find there?
Amongst other options, the one I just described...
If you do have a "Show Status Bar" item in the list, try un-ticking and re-ticking it.
Another thing that springs to mind: Have you resized the window, and pushed the bottom half of it off the screen, or behind other parts of the GUI?
On Wed, 2018-12-05 at 15:20 +1030, Tim wrote:
Tim:
Look in the View menu, inside the Layout section, enable the Show Status Bar item.
Howard Howell:
It shows 4 options, all checked. What did you think I would find there?
Amongst other options, the one I just described...
If you do have a "Show Status Bar" item in the list, try un-ticking and re-ticking it.
Another thing that springs to mind: Have you resized the window, and pushed the bottom half of it off the screen, or behind other parts of the GUI?
Thanks for the reply Tim, unchecked, rechecked, still no hover function on links.
Don't worry about it. I'll check out using another user later.
Regards, Lesh
Sam asked:
How did you determine that this is the destination URL That's what you see, in the HTML-formatted E-mail?
I already knew about the "trick" that Ed Greshko suggests before he posted his suggestion. (But thank-you, Ed, for trying to help.) That's how I determined the destination URL.
On 12/1/18 3:51 PM, home user via users wrote:
I'm using Thunderbird on Fedora-28; there is no "anti-virus" available. Is this safe?
If you're using Thunderbird, then a simple control-U works wonders. It shows the email "source code" unmasking any HTML hiding the link. This is only useful if you can read/understand HTML.
thanks, Bill.
On Thu, 2018-12-06 at 21:03 -0500, Kevin Cummings wrote:
On 12/1/18 3:51 PM, home user via users wrote:
I'm using Thunderbird on Fedora-28; there is no "anti-virus" available. Is this safe?
If you're using Thunderbird, then a simple control-U works wonders. It shows the email "source code" unmasking any HTML hiding the link. This is only useful if you can read/understand HTML.
thanks, Bill.
-- Kevin J. Cummings cummings@kjchome.homeip.net cummings@kjc386.framingham.ma.us kjchome@icloud.com Registered Linux User #1232 (http://www.linuxcounter.net/) _______________________________________________ users mailing list -- users@lists.fedoraproject.org To unsubscribe send an email to users-leave@lists.fedoraproject.org Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines List Archives: https://lists.fedoraproject.org/archives/list/users@lists.fedoraproject.org
Thanks for the tip Bill, I am not great with HTML, it's been a few years since I learned it, but I think I can figure out a link entry. That is a good tip.
Regards, Les H
Howard:
Thanks for the tip Bill, ...
Thank Kevin, not me.
Kevin (and everyone else), View -> Message Source and More -> View Source do the same thing as Control-U. Unfortunately, what I get (after the header) is three blocks of seemingly random characters, not html. Changing the View -> Text Encoding setting at the top of the window created to display the message source makes no difference.
Bill.
On 12/8/18 9:38 AM, home user via users wrote:
Kevin (and everyone else), View -> Message Source and More -> View Source do the same thing as Control-U. Unfortunately, what I get (after the header) is three blocks of seemingly random characters, not html. Changing the View -> Text Encoding setting at the top of the window created to display the message source makes no difference.
The email was sent base64 encoded, so viewing the source doesn't work very well in that case.
copy link and paste this link to Tor browser(if possible otherwise any browser in private window) and make sure link end with barracuda.com and there is a green lock on your browser address bar.
-------- Original Message -------- On 2 Dec 2018, 1:53 AM, home user via users wrote:
Good afternoon,
Today, I received a message claiming to be from "noreply@barracuda.com". Never heard of them. The message tells me to click a link in the message to view an encrypted message. Now I know that clicking links in e-mail is risky. How do I safely determine if this is genuine and safe without clicking that link?
thanks, Bill. _______________________________________________ users mailing list -- users@lists.fedoraproject.org To unsubscribe send an email to users-leave@lists.fedoraproject.org Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines List Archives: https://lists.fedoraproject.org/archives/list/users@lists.fedoraproject.org
On Sat, 2018-12-01 at 20:45 +0000, finn via users wrote:
and make sure there is a green lock on your browser address bar.
Have a look at: https://krebsonsecurity.com/2018/11/half-of-all-phishing-sites-now-have-the-...
AV
On 01Dec2018 13:23, home user mattison.computer@yahoo.com wrote:
Today, I received a message claiming to be from "noreply@barracuda.com". Never heard of them. The message tells me to click a link in the message to view an encrypted message. Now I know that clicking links in e-mail is risky. How do I safely determine if this is genuine and safe without clicking that link?
1: You've never heard of them. This is usually an indication that it is bogus.
2: Look at your message headers. Is the To: address to your real email address, with your full and correct name? If not, also suspicious.
3: _Mouse over_ the link. Is it the same domain as the From:? If not, sus again.
4: Are you expecting an encrypted message from someone you've never heard of? I've never received one, and if I did I would expect it to be encrypted _to me_ i.e. GPG encrypted with _my_ public key. The key take here is that to retrieve it I don't have to go anywhere: I have the message in the email and I have my personal private key to hand. You can't "go to a web site" to fetch an encrypted message, because said site doesn't have any of _your_ private information.
However, you can bet that such a site will _ask_ for your personal imformation: that is usually the point, to get information that can then be used for fraud or identity theft.
5: Look at the headers, particularly the Received: headers. How did this message reach you? Note that any of these may be forged, but those for you and/or your immediate ISP will be real, and will show the immediate source.
6: Look at the spelling/grammar. Is it at all dodgy? If so, almost always sus. Corporate communications, especially automated ones, are usually well prepared before getting to run.
7: Is there a good rationale for viewing this message? Just "you have a message" doesn't reach that bar for me.
8: You can fetch the target page with curl or wget. Example:
wget -S -O - 'paste URL here between single quotes'
Depending on your knowledge, this may be revealing or not.
Phishing sites are usually set up to closely resemble the organisation they are pretending to be. But there are often signs of forgery.
I had a look at "whois encrypt.barracudanetworks.com". No record. barracuda.com at least has a whois record. This isn't very definitive.
Myself, I would not trust this. I've received quite a few resembling what you describe.
Cheers, Cameron Simpson cs@cskk.id.au
On 12/1/18 2:14 PM, Cameron Simpson wrote:
4: Are you expecting an encrypted message from someone you've never heard of? I've never received one, and if I did I would expect it to be encrypted _to me_ i.e. GPG encrypted with _my_ public key. The key take here is that to retrieve it I don't have to go anywhere: I have the message in the email and I have my personal private key to hand. You can't "go to a web site" to fetch an encrypted message, because said site doesn't have any of _your_ private information.
That long string of characters will be the identification, possibly even the encryption key. It might be a somewhat looser definition of encrypted than we would like, but quite possibly valid.
I had a look at "whois encrypt.barracudanetworks.com". No record. barracuda.com at least has a whois record. This isn't very definitive.
You have to do the whois on the base domain, in this case "barracudanetworks.com". Doing that returns the same info as "barracuda.com". I believe that the site is valid, but I can't say anything about the contents of the message.
I pasted the link into the Tor Browser. The only info I had to give was to set a password.
Sometime last month, I used the web site for the Colorado consumer complaints office to ask where/how to file a federal complaint about national-brand canned food products sold in supermarkets being significantly underweight. I could not find an appropriate federal web site for this. The "encrypted" message was their reply.
I wish companies and government agencies would quit putting links into messages. It's very difficult to know when it's legitimate and when it's a spoof or phishing attempt. A few years ago, friends received messages "from me" that I did not compose or send: spoofs. But I did not find any hint of unauthorized logins to my e-mail account. In one case, the spoofs were sent after I had deleted the account, and no one else had taken that login name. But the spoofs cost me friendships. I hope y'all understand my being uncomfortable and wary.
Thank-you, all 4 of you, for the tips. Some specific comments....
Ryan: Good to know where to report phishing attempts.
Samuel: I understand what you said about anti-virus software. I was incorrect about wanting it for Thunderbird. In this case, it would be for the browser. I think you're mostly correct, but I still wish for something to protect against some things such as coin mining and spyware. I also do not like that web site owners know when I'm using ad blockers.
finn: I used Tor in this case. But in retrospect, one thing I was concerned about was the site downloading something malicious without me knowing it. Would Tor have protected me against that?
Cameron: Great tips in most cases. This was one of those odd exceptions. Strange that the Colorado consumer protection office would go through Barracuda rather than simply sending the message directly to me.
spoofing, phishing, ransomware, spyware, cryptojacking, browser fingerprinting, evercookies, steganography, clickjacking; what's next? I've even received phone calls from myself, and I surely didn't call myself!
Bill.
finn: I used Tor in this case. But in retrospect, one thing I was concerned about was the site downloading something malicious without me knowing it. Would Tor have protected me against that?
yep, Tor browser is harden enough to protect you from these kind of attack and provide better anonymity unless and untill you don't do any stupidity. If possible always prefer to use Tor Browser.
Sorry for the top post, but my phone seems to insist on it using K9 mail. Anyway, I keep an old smartphone that I no longer use -- I have moved my SIM card to my current phone. It can still connect to WiFi, though. I use it to try out dodgy links. I figure there's little loss if it gets screwed up. At worst, I'll circular file a $10 phone.
Of course there's the issue of the "reset your password" scam. My firm rule is to never enter or change a password following a link I didn't initiate.
Another intriguing attempt at isolation is QubesOS, which puts windows in different virtual mavhines. There is thus a default "untrusted" domain that is isolated from other windows. It was too slow for me using my older hardware. You really need an SSD, it seems. But the idea is appealing.
On December 2, 2018 12:44:26 AM EST, finn via users users@lists.fedoraproject.org wrote:
finn: I used Tor in this case. But in retrospect, one thing I was concerned about was the site downloading something malicious without
me
knowing it. Would Tor have protected me against that?
yep, Tor browser is harden enough to protect you from these kind of attack and provide better anonymity unless and untill you don't do any stupidity. If possible always prefer to use Tor Browser. _______________________________________________ users mailing list -- users@lists.fedoraproject.org To unsubscribe send an email to users-leave@lists.fedoraproject.org Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines List Archives: https://lists.fedoraproject.org/archives/list/users@lists.fedoraproject.org
Allegedly, on or about 1 December 2018, home user via users sent:
Samuel: I understand what you said about anti-virus software. I was incorrect about wanting it for Thunderbird. In this case, it would be for the browser. I think you're mostly correct, but I still wish for something to protect against some things such as coin mining and spyware. I also do not like that web site owners know when I'm using ad blockers.
Anti-virus, etc., can be useful to stop things automatically getting through. But when you click on things, issue commands, etc., they're usually ineffective at protecting you. You have more authority than them, so to speak.
If you can look at something, and decide not to run it, allow it, follow it, etc., you're protecting yourself better than most anti- malware programs.
A safety catch is no good if you're just going to flick it and pull the trigger.
Cameron: Great tips in most cases. This was one of those odd exceptions. Strange that the Colorado consumer protection office would go through Barracuda rather than simply sending the message directly to me.
Sounds odd. Or is it third-party? (The people you complained *about* responding.)
I hate it when a company that you've communicated with uses some other service provider with their messages, whether that be so they can track reception of messages, outsource a survey, or whatever. You're never quite sure if it's legit, and your contact details just got passed on to someone else without your prior approval.
I've even received phone calls from myself, and I surely didn't call myself!
I've had that. I picked up the phone, to hear someone playing a recording of me saying hello. Never figured out what was going on with that one.
As far as I'm concerned, official emails should come from the exact same domain name as their website.
e.g. If the website is www.example.com then the mail should be from a username@example.com.
If one or the other is seemingly related but still different, like examplesomething.com, they're completely different domains. And although they could be owned by the same people, it's almost impossible to really tell (someone could set up a faked domain using faked credentials the same as the other domain).
Any company that does that malarkey, is doing themselves a disservice.
home user via users writes:
Good afternoon,
Today, I received a message claiming to be from "noreply@barracuda.com". Never heard of them. The message tells me to click a link in the message to view an encrypted message. Now I know that clicking links in e-mail is risky. How do I safely determine if this is genuine and safe without clicking that link?
You can safely determine that this is 100% chance of a malicious attachment.
It won't really do much harm, it's likely some MS-Windows payload, which won't really do much, on Linux.
Barracuda Networks provides common e-mail SPAM appliances and mail archiving appliances
On Sat, Dec 1, 2018 at 3:24 PM home user via users < users@lists.fedoraproject.org> wrote:
Good afternoon,
Today, I received a message claiming to be from "noreply@barracuda.com". Never heard of them. The message tells me to click a link in the message to view an encrypted message. Now I know that clicking links in e-mail is risky. How do I safely determine if this is genuine and safe without clicking that link?
thanks, Bill. _______________________________________________ users mailing list -- users@lists.fedoraproject.org To unsubscribe send an email to users-leave@lists.fedoraproject.org Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines List Archives: https://lists.fedoraproject.org/archives/list/users@lists.fedoraproject.org