QUALCOMM spoof attempt detected: Pull request: ath 20141024

Oh, Peter poh at qca.qualcomm.com
Fri Oct 24 09:29:49 PDT 2014

Please unlock the email. It's work related.


-----Original Message-----
From: request.allow.spoof at qualcomm.com [mailto:request.allow.spoof at qualcomm.com] 
Sent: Friday, October 24, 2014 4:46 AM
To: John W. Linville; ath6kl at lists.infradead.org; linux-wireless at vger.kernel.org; ath10k at lists.infradead.org
Subject: QUALCOMM spoof attempt detected: Pull request: ath 20141024


An email has been sent to you from outside of Qualcomm, but the “From” address has been changed (i.e., spoofed) to make it look like it originated from inside Qualcomm. Since this can indicate a phishing attack the email has been quarantined to protect you.

“Spoofing” can also occur when you use your Qualcomm email address on external websites to send yourself, friends, and colleagues articles, directions, reservations, etc. 

If you do not recognize the email or the email sender, there is no action required by you. The quarantined email will be deleted.

If the quarantined email is business related, simply reply to this email with a justification for its release.

To learn more about spoofing and why this email may have been labeled a spoofed email, please visit http://qwiki.qualcomm.com/it/QCSpoof.

Quarantine: https://quarantine.qualcomm.com Remote Host: bombadil.infradead.org Server IP:
From: Kalle Valo <kvalo at qca.qualcomm.com>
To: "John W. Linville" <linville at tuxdriver.com>
Subject: Pull request: ath 20141024

More information about the ath10k mailing list