SlideShare ist ein Scribd-Unternehmen logo
1 von 6
Downloaden Sie, um offline zu lesen
wumber – smart email
There's safety in wumbers

#Phishing… A Thing Of The Past With wumber!

If you use email, you’re a phishing target… unless you’re
a wumble, that is!

What is Phishing?
A Phisher is a person with criminal tendencies who is going to try to obtain the security login details
to your back account, corporate computer or discover as much information about you as they can in
order to become you. Yes! Become you!
They will use you good credit score to obtain loans in your name, use your security details to clean
out your bank account or buy vehicles, obtain credit cards and use your identity for just about
anything else that is of value. Once they have exhausted your bank account and obtained loans in
your name, they will move on to another persons identity and start again.
Now, the biggest problem that you have from the lenders perspective is that there is physically no
way of determining if the perpetrator is you or someone else, so with a severely damaged credit
record and a seemingly endless string of bad debts, loan defaults and overdrawn unpaid and
overused credit cards to your name, you would expect that the police or FBI which do get involved
would be able to help you, but there is very little that they can do. So you’re going to have to sort this
one out yourself. You are encouraged to report every offense, as this enabled law enforcement
agencies to create profiles and patterns of offences which will increase the chances of catching these
criminals.
You can expect to spend basically whatever remaining money that you might have left to clear your
name and you will need to set aside about two years to do it. Any assets that you may have like a
vehicle, house, saved money will probably be forfeit to the creditors for the debts that have been
racked up in your name and legally there is going to be little that can be done to save these assets.
wumber reporters and staff have written a large number of articles about phishing and you will be
able to read some of them at our wumber anti-spam and wumber anti-phishing blog
(http://blog.wumber.com).

How can you prevent it?
The cover image of a gazelle getting rundown by a lion made me think of an old adage… A gazelle
doesn’t need to outrun a hungry lion… only a slower gazelle! So we can apply the same thinking to
Phishing! If you require too much effort, the Phisher will go for an easier target, so stay vigilant and
better protected than anyone else there is no second place.
There are many things that you can do to prevent it, the best and most effective method is simply
“don’t get involved in the first place!” I know that sounds easy and you may be thinking that you
need to go and live in a cave somewhere and forget any contact with the outside world. Nothing
could be further from the truth. You do need to do some very simple things that will become counter
productive for Phishers. Remember, you don’t have to out wit a Phisher you just have to be smarter
than another person who will become an easier target. In the animal kingdom, you don’t have to be
the fastest gazelle to get away from the hungry lion, you just need to outrun a slower gazelle. This is
the same method we are going to use.
For the most part Phishing starts with spam!
So let’s address this first. You can take whatever measures you like to prevent spam but only 1
method will totally prevent it, you can put in spam filters which will provide some amount of
REACTIVE protection but are not 100% effective and require constant maintenance and updating to
keep up to date with the spammers or you can change your email address every week, all of which is
inconvenient and impractical. So what other options are there? Well this is where wumber can help!
wumber creates a unique encoded email address which can only be used by the person that you give
that email address to. If that person give it to someone else, puts it on a mailing list, posts it on a
website or whatever, it simply wont work. This will PROACTIVELY reduce your spam to zero! If the
email isn’t as you expected or you get sick of too much email from somebody, you can limit or
disconnect them without effecting any of your other email users. And… The whole process is
seamless through your desktop email application or client or smart phone. You will forget that you
are even using wumber and your protection is 24 x 7 x 365!
At this point, you would be totally protected from the phishing threats that come through the email
as spam.

What about when your online?
wumber uses a two prong attack on spam and phishing. It works on the assumption that you don’t
trust anybody so remains totally vigilant at all times. wumber uses a unique technology called
INFRAMAPPING
(https://www.wumber.com/wumberSupport/IE-AddOn/Pages/IEAddOnHowItWorks.aspx)which thoroughly investigate and fingerprint the infrastructure behind any
website that the wumber add-on is activated on. This fingerprint mapping includes computer names,
Domain Names, IP Addresses and a plethora of other information which isn’t immediately available
to you as a human when you look at a website or webpage.
wumber provides this INFRAMAPPING tool totally free of charge to any wumber subscriber –
wumber
is
free
to
join
and
free
to
use
(https://www.wumber.com/JoinWumber/Pages/default.aspx), so this whole process won’t cost
you a dime.
wumber’s
anti-phishing
add-on
for
Microsoft
Internet
Explorer
(https://www.wumber.com/wumberSupport/IE-AddOn/Pages/IEAddOn-HowItWorks.aspx)has a
number of other tricks up it’s sleeves too. Like the built-in password purse, which can do some
amazing things such as generate a unique email address, user identity (login) and random strong
password for every single web site that you subscribe to and you don’t even need to think about it.
wumber Add-On for Microsoft Internet Explorer
(http://wumber.files.wordpress.com/2013/12/ie-addon_1.png)
1. Secure SSL Login directly from the add-on
2. Select a specialist Custom Sender Name (CSN) and User Vanity Name (UVN) from your
subscription
3. Every website generates a unique wumber to allow exacting control over the use of the email
address
4. Automatically generate a random strong password from 8 to 20 characters
5. Cancel “Remember Me” feature
6. “Remember Me” feature for automatic login whenever the add-on is launched on a web page
7. Generate a new wumber, if you don’t like the one automatically presented.
8. Generate a new password if you don’t like the one automatically presented.
9. Display the advanced options
(http://wumber.files.wordpress.com/2013/12/ie-addon_2.png)
10. Use a unique login for the web site – derived from the email address, random or user selected
11. Generate a unique random login name for the web site
12. Use a shortened version of the wumber as a login
13. always present this wumber to the website as a lowercase email address
14. Force this wumber to be retained at the end of a trial period or in transition from a paid period to
a free period of subscription
15. Conceal the password on the Main Screen of the add-on as a series of asterisks (****).
The wumber Add-On for Microsoft Internet Explorer is activated by moving your mouse over any
field on a web page as right-clicking your mouse to display the IE Page menu.
IMPORTANT: wumber is totally FREE to join, and it’s FREE to use! So join today and leave the spam
behind (https://www.wumber.com/JoinWumber/Pages/default.aspx).
If you want to learn more about wumber, check out the 2 minute video below.
http://www.youtube.com/watch?v=FeMf4RYL-HA (http://www.youtube.com/watch?
v=FeMf4RYL-HA)
Tags: Anti Phishing (http://blog.wumber.com/tag/anti-phishing/), Anti-spam techniques
(http://blog.wumber.com/tag/anti-spam-techniques/),
Bank
account
(http://blog.wumber.com/tag/bank-account/),
Domain
name
(http://blog.wumber.com/tag/domain-name/),
Email
address
(http://blog.wumber.com/tag/email-address/),
Email
filtering
(http://blog.wumber.com/tag/email-filtering/), FBI (http://blog.wumber.com/tag/fbi/), Federal
Bureau
of
Investigation
(http://blog.wumber.com/tag/federal-bureau-of-investigation/),
Inframapping
(http://blog.wumber.com/tag/inframapping/),
Internet
Explorer
(http://blog.wumber.com/tag/internet-explorer/), IP address (http://blog.wumber.com/tag/ipaddress/),
phishing
(http://blog.wumber.com/tag/phishing/),
Website
(http://blog.wumber.com/tag/website/)
This entry was posted on December 9, 2013 at 2:11 am and is filed under general information. You
can follow any responses to this entry through the RSS 2.0 feed. You can leave a response, or
trackback from your own site.

Customized Kubrick Theme. Blog at WordPress.com.
Entries (RSS) and Comments (RSS).
Follow

Follow “wumber - smart email”
Powered by WordPress.com

Weitere ähnliche Inhalte

Kürzlich hochgeladen

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Kürzlich hochgeladen (20)

04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 

Empfohlen

Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
Kurio // The Social Media Age(ncy)
 

Empfohlen (20)

Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work
 
ChatGPT webinar slides
ChatGPT webinar slidesChatGPT webinar slides
ChatGPT webinar slides
 
More than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike RoutesMore than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike Routes
 
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
 

#Phishing… a thing of the past with wumber! | wumber smart email

  • 1. wumber – smart email There's safety in wumbers #Phishing… A Thing Of The Past With wumber! If you use email, you’re a phishing target… unless you’re a wumble, that is! What is Phishing? A Phisher is a person with criminal tendencies who is going to try to obtain the security login details to your back account, corporate computer or discover as much information about you as they can in order to become you. Yes! Become you! They will use you good credit score to obtain loans in your name, use your security details to clean out your bank account or buy vehicles, obtain credit cards and use your identity for just about anything else that is of value. Once they have exhausted your bank account and obtained loans in your name, they will move on to another persons identity and start again.
  • 2. Now, the biggest problem that you have from the lenders perspective is that there is physically no way of determining if the perpetrator is you or someone else, so with a severely damaged credit record and a seemingly endless string of bad debts, loan defaults and overdrawn unpaid and overused credit cards to your name, you would expect that the police or FBI which do get involved would be able to help you, but there is very little that they can do. So you’re going to have to sort this one out yourself. You are encouraged to report every offense, as this enabled law enforcement agencies to create profiles and patterns of offences which will increase the chances of catching these criminals. You can expect to spend basically whatever remaining money that you might have left to clear your name and you will need to set aside about two years to do it. Any assets that you may have like a vehicle, house, saved money will probably be forfeit to the creditors for the debts that have been racked up in your name and legally there is going to be little that can be done to save these assets. wumber reporters and staff have written a large number of articles about phishing and you will be able to read some of them at our wumber anti-spam and wumber anti-phishing blog (http://blog.wumber.com). How can you prevent it? The cover image of a gazelle getting rundown by a lion made me think of an old adage… A gazelle doesn’t need to outrun a hungry lion… only a slower gazelle! So we can apply the same thinking to Phishing! If you require too much effort, the Phisher will go for an easier target, so stay vigilant and better protected than anyone else there is no second place. There are many things that you can do to prevent it, the best and most effective method is simply “don’t get involved in the first place!” I know that sounds easy and you may be thinking that you need to go and live in a cave somewhere and forget any contact with the outside world. Nothing could be further from the truth. You do need to do some very simple things that will become counter productive for Phishers. Remember, you don’t have to out wit a Phisher you just have to be smarter than another person who will become an easier target. In the animal kingdom, you don’t have to be the fastest gazelle to get away from the hungry lion, you just need to outrun a slower gazelle. This is the same method we are going to use. For the most part Phishing starts with spam! So let’s address this first. You can take whatever measures you like to prevent spam but only 1 method will totally prevent it, you can put in spam filters which will provide some amount of REACTIVE protection but are not 100% effective and require constant maintenance and updating to keep up to date with the spammers or you can change your email address every week, all of which is inconvenient and impractical. So what other options are there? Well this is where wumber can help! wumber creates a unique encoded email address which can only be used by the person that you give that email address to. If that person give it to someone else, puts it on a mailing list, posts it on a
  • 3. website or whatever, it simply wont work. This will PROACTIVELY reduce your spam to zero! If the email isn’t as you expected or you get sick of too much email from somebody, you can limit or disconnect them without effecting any of your other email users. And… The whole process is seamless through your desktop email application or client or smart phone. You will forget that you are even using wumber and your protection is 24 x 7 x 365! At this point, you would be totally protected from the phishing threats that come through the email as spam. What about when your online? wumber uses a two prong attack on spam and phishing. It works on the assumption that you don’t trust anybody so remains totally vigilant at all times. wumber uses a unique technology called INFRAMAPPING (https://www.wumber.com/wumberSupport/IE-AddOn/Pages/IEAddOnHowItWorks.aspx)which thoroughly investigate and fingerprint the infrastructure behind any website that the wumber add-on is activated on. This fingerprint mapping includes computer names, Domain Names, IP Addresses and a plethora of other information which isn’t immediately available to you as a human when you look at a website or webpage. wumber provides this INFRAMAPPING tool totally free of charge to any wumber subscriber – wumber is free to join and free to use (https://www.wumber.com/JoinWumber/Pages/default.aspx), so this whole process won’t cost you a dime. wumber’s anti-phishing add-on for Microsoft Internet Explorer (https://www.wumber.com/wumberSupport/IE-AddOn/Pages/IEAddOn-HowItWorks.aspx)has a number of other tricks up it’s sleeves too. Like the built-in password purse, which can do some amazing things such as generate a unique email address, user identity (login) and random strong password for every single web site that you subscribe to and you don’t even need to think about it. wumber Add-On for Microsoft Internet Explorer
  • 4. (http://wumber.files.wordpress.com/2013/12/ie-addon_1.png) 1. Secure SSL Login directly from the add-on 2. Select a specialist Custom Sender Name (CSN) and User Vanity Name (UVN) from your subscription 3. Every website generates a unique wumber to allow exacting control over the use of the email address 4. Automatically generate a random strong password from 8 to 20 characters 5. Cancel “Remember Me” feature 6. “Remember Me” feature for automatic login whenever the add-on is launched on a web page 7. Generate a new wumber, if you don’t like the one automatically presented. 8. Generate a new password if you don’t like the one automatically presented. 9. Display the advanced options
  • 5. (http://wumber.files.wordpress.com/2013/12/ie-addon_2.png) 10. Use a unique login for the web site – derived from the email address, random or user selected 11. Generate a unique random login name for the web site 12. Use a shortened version of the wumber as a login 13. always present this wumber to the website as a lowercase email address 14. Force this wumber to be retained at the end of a trial period or in transition from a paid period to a free period of subscription 15. Conceal the password on the Main Screen of the add-on as a series of asterisks (****). The wumber Add-On for Microsoft Internet Explorer is activated by moving your mouse over any field on a web page as right-clicking your mouse to display the IE Page menu. IMPORTANT: wumber is totally FREE to join, and it’s FREE to use! So join today and leave the spam behind (https://www.wumber.com/JoinWumber/Pages/default.aspx). If you want to learn more about wumber, check out the 2 minute video below. http://www.youtube.com/watch?v=FeMf4RYL-HA (http://www.youtube.com/watch? v=FeMf4RYL-HA) Tags: Anti Phishing (http://blog.wumber.com/tag/anti-phishing/), Anti-spam techniques (http://blog.wumber.com/tag/anti-spam-techniques/), Bank account (http://blog.wumber.com/tag/bank-account/), Domain name (http://blog.wumber.com/tag/domain-name/), Email address (http://blog.wumber.com/tag/email-address/), Email filtering (http://blog.wumber.com/tag/email-filtering/), FBI (http://blog.wumber.com/tag/fbi/), Federal Bureau of Investigation (http://blog.wumber.com/tag/federal-bureau-of-investigation/),
  • 6. Inframapping (http://blog.wumber.com/tag/inframapping/), Internet Explorer (http://blog.wumber.com/tag/internet-explorer/), IP address (http://blog.wumber.com/tag/ipaddress/), phishing (http://blog.wumber.com/tag/phishing/), Website (http://blog.wumber.com/tag/website/) This entry was posted on December 9, 2013 at 2:11 am and is filed under general information. You can follow any responses to this entry through the RSS 2.0 feed. You can leave a response, or trackback from your own site. Customized Kubrick Theme. Blog at WordPress.com. Entries (RSS) and Comments (RSS). Follow Follow “wumber - smart email” Powered by WordPress.com