{"id":2937,"date":"2024-08-07T11:01:43","date_gmt":"2024-08-07T09:01:43","guid":{"rendered":"https:\/\/certitude.consulting\/blog\/?p=2937"},"modified":"2024-08-20T14:42:01","modified_gmt":"2024-08-20T12:42:01","slug":"the-e-register-august-7th-2024","status":"publish","type":"post","link":"https:\/\/certitude.consulting\/blog\/en\/the-e-register-august-7th-2024\/","title":{"rendered":"The e-Register &#8211; August 7th, 2024"},"content":{"rendered":"\n<p>William Moody and Wolfgang Ettlinger, cyber security experts at Certitude Consulting, found out how simple it is to hide a warning displayed by Outlook when a user receives messages from an address that typically doesn&#8217;t contact them. The whole article can be found <a href=\"https:\/\/www.theregister.com\/2024\/08\/07\/small_css_tweaks_can_help\/\">here<\/a>.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"762\" src=\"https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2024\/08\/Bild1-1024x762.jpg\" alt=\"\" class=\"wp-image-2980\" srcset=\"https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2024\/08\/Bild1-1024x762.jpg 1024w, https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2024\/08\/Bild1-300x223.jpg 300w, https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2024\/08\/Bild1-768x571.jpg 768w, https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2024\/08\/Bild1.jpg 1070w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1023\" height=\"444\" src=\"https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2024\/08\/Bild2-3.jpg\" alt=\"\" class=\"wp-image-2981\" srcset=\"https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2024\/08\/Bild2-3.jpg 1023w, https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2024\/08\/Bild2-3-300x130.jpg 300w, https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2024\/08\/Bild2-3-768x333.jpg 768w\" sizes=\"auto, (max-width: 1023px) 100vw, 1023px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"842\" height=\"460\" src=\"https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2024\/08\/Bild3-1.jpg\" alt=\"\" class=\"wp-image-2982\" style=\"width:691px;height:auto\" srcset=\"https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2024\/08\/Bild3-1.jpg 842w, https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2024\/08\/Bild3-1-300x164.jpg 300w, https:\/\/certitude.consulting\/blog\/wp-content\/uploads\/2024\/08\/Bild3-1-768x420.jpg 768w\" sizes=\"auto, (max-width: 842px) 100vw, 842px\" \/><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>William Moody and Wolfgang Ettlinger, cyber security experts at Certitude Consulting, found out how simple it is to hide a warning displayed by Outlook when a user receives messages from an address that typically doesn&#8217;t contact them. The whole article can be found here.<\/p>\n","protected":false},"author":12,"featured_media":2803,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[128],"tags":[411],"class_list":["post-2937","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-press","tag-press-en"],"_links":{"self":[{"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/posts\/2937","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/users\/12"}],"replies":[{"embeddable":true,"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/comments?post=2937"}],"version-history":[{"count":4,"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/posts\/2937\/revisions"}],"predecessor-version":[{"id":3003,"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/posts\/2937\/revisions\/3003"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/media\/2803"}],"wp:attachment":[{"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/media?parent=2937"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/categories?post=2937"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/tags?post=2937"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}