There’s a new similar phishing attack thanks to Google and their .zip domain. Web browsers support a feature that lets you use addresses of the form protocol://username:password@domain.tld
. That feature allows you to log in to domain.tld
with the given credentials. When you combine that with Unicode forward slashes, you can craft addresses that look like https://microsoft.com/files/@windowsupdate.zip
, where the part between https://
and @
is a username and the part after @
is the actual address most likely used for malicious intends. My example uses normal slashes, so will lead to Microsoft’s website and page not found error. windowsupdate.zip
is a domain someone has registered, but leads to no-where as of today. PSA: Don’t go to random web addresses you find on the Internet or elsewhere.
If you google something like ‘7680hz led’, you’ll find many results of products and such. 7680 is a multiple of 20, 24, 30, 60, among others, which are all common frame speeds for video files, but also for recording video. I also found this video, which shows the difference of large size screens with different refresh rates: https://www.youtube.com/watch?v=JP6fHWcUifo