On Fri, 24 Feb 2017 18:07:50 +0000
RW <rwmailli...@googlemail.com> wrote:

> > OK.  Any FPs, though?  That's the other half of the test.

> No, but it's pretty unlikely there would be. 

Actually, it's very likely there will be a lot of FPs, but it's also
very likely that any given user of the list won't see them.  That's
because when someone's email address gets compromised and then the
system administrator clears it up, the only recipients to suffer
false-positives are those with whom the sender would normally
correspond.

We have seen a few of these cases happen.

> It seems like a lot of hassle for little benefit.

The APER doesn't catch all that much, nor do the known-phishing URLs catch
much, but every little bit helps.

As a data point, one of our installations scanned 4 million messages
yesterday.  Of those, only 262 hit our known-phishing URL list (which
uses APER and additional sources) and 155 hit APER's known-phishing
email address list.

But maybe those few hundred were really worth stopping because they
prevented phishing attacks.  Who knows?

Regards,

Dianne.

Reply via email to