{"id":7,"date":"2008-08-14T08:26:40","date_gmt":"2008-08-14T13:26:40","guid":{"rendered":"http:\/\/blogs.law.harvard.edu\/fireunderembers\/2008\/08\/14\/snap-phishing-attack-in-web-20-space\/"},"modified":"2008-08-14T18:24:03","modified_gmt":"2008-08-14T23:24:03","slug":"snap-phishing-attack-in-web-20-space","status":"publish","type":"post","link":"https:\/\/archive.blogs.harvard.edu\/fireunderembers\/?p=7","title":{"rendered":"(Snap) Phishing Attack in Web 2.0 Space?"},"content":{"rendered":"<p>Yesterday I received a fascinating email to my corporate email address. It was &#8212; as far as I can tell&#8211; a phishing attack launched as an invitation to (the aptly-named) Snapfish photosharing site. The content of the message is baldly flim-flam &#8212; &#8220;Computer Central has identified you as &#8230;Your name appeared among the beneficiaries who will receive part-payment of US $5.5 million&#8230;[etc etc]&#8221; But the invitation to click through is decidedly Web 2.0 &#8212; &#8220;you&#8217;re invited to\u00a0view James&#8217;s photos &#8211; plus, get 20 FREE prints when you upload your photos to Snapfish.&#8221; &#8212; all in lovely Snapfish web 2.0 graphics and colors.\u00a0<\/p>\n<p>I love the play\u00a0in &#8220;lemming-space.&#8221;\u00a0 The web 2.0 world\/wisdom of crowds embraces the unknown user. Yet the unknown user is also the unauthorized user, and the great risk of the websphere.\u00a0 Gosh, it&#8217;s well done &#8212; except for the decidely East European cant to the English invitation, it rides the Web 2.0 wave beautifully.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Yesterday I received a fascinating email to my corporate email address. It was &#8212; as far as I can tell&#8211; a phishing attack launched as an invitation to (the aptly-named) Snapfish photosharing site. The content of the message is baldly flim-flam &#8212; &#8220;Computer Central has identified you as &#8230;Your name appeared among the beneficiaries who [&hellip;]<\/p>\n","protected":false},"author":1649,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-7","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/archive.blogs.harvard.edu\/fireunderembers\/index.php?rest_route=\/wp\/v2\/posts\/7","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/archive.blogs.harvard.edu\/fireunderembers\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/archive.blogs.harvard.edu\/fireunderembers\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/archive.blogs.harvard.edu\/fireunderembers\/index.php?rest_route=\/wp\/v2\/users\/1649"}],"replies":[{"embeddable":true,"href":"https:\/\/archive.blogs.harvard.edu\/fireunderembers\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=7"}],"version-history":[{"count":0,"href":"https:\/\/archive.blogs.harvard.edu\/fireunderembers\/index.php?rest_route=\/wp\/v2\/posts\/7\/revisions"}],"wp:attachment":[{"href":"https:\/\/archive.blogs.harvard.edu\/fireunderembers\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=7"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/archive.blogs.harvard.edu\/fireunderembers\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=7"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/archive.blogs.harvard.edu\/fireunderembers\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=7"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}