Select Page

Phishing: Conspiracy Theory Deep Dark Secrets

Deep dark secrets! For more phishing samples, see my phishy email collection. I give this one a B+. Maybe an A-. This one will score with conspiracy theory lovers. And there are plenty of conspiracy theory lovers these days. Click here to reveal a deep dark secret....

RAID: Computer Storage Basics Everyone Should Know

People outside the IT industry occasionally ask me what RAID is all about. I finally took the time to write it up. RAID is an acronym for Redundant arrays of independent disks. The acronym in the original 1980s paper stood for “Redundant Arrays of Inexpensive...

Phishing: Clumsy Copyright Intimidation

For more phishing samples, see my phishy email collection. This one came in from a Contact form on my website. It threatens retaliation unless I get rid of all the writer’s alleged copyrighted images. The creative twist is, it comes with a link to a...

Phishing: Fake Bank Shakedown

For more phishing samples, see my phishy email collection. For security reasons, we locked your account access. Click here to make everything all better. One example of a fake bank account email. Do people still fall for this stuff? If you “click here” to...

Phishing: Fake Amazon Shipping Document

For more phishing samples, see my phishy email collection. Fake Amazon documents may be one of the most common phishing attacks. Timing is everything. Maybe you ordered something big from Amazon a couple days ago and you’re expecting a shipping...