Long description: We've getting reports from both LogMeIn customers and the general public about suspicious emails that are designed to look like they are coming from LogMeIn addresses -- they have all the hallmarks of phishing attempts. The email subject lines vary slightly, but include language about an 'Invoice' and 'Credit Card Declined.' We want to make it clear that these did NOT come from LogMeIn and people should not click on any of the links in the emails. As part of our commitment to security, we want to make sure our users and the public are aware of these specific emails, and we wanted to share what we've learned, as well as provide an easy way for people to identify the tell tale signs of phishing attacks .
HTTP headers allow the client and the server to pass additional information with the request or the response. A request header consists of its case-insensitive name followed by a colon ':', then by its value (without line breaks). Leading white space before the value is ignored.
<head> section doesn't contain any styles.
Name | Value |
---|
<head> section doesn't contain any internal script sections.
Name | Value |
---|
<head> section doesn't contain a base section.