- From: Mandyam, Giridhar <mandyam@qti.qualcomm.com>
- Date: Thu, 3 Sep 2015 15:32:50 +0000
- To: request.allow.spoof <request.allow.spoof@qualcomm.com>, "public-media-capture@w3.org" <public-media-capture@w3.org>
Please release this email. It is standards related. -Giri -----Original Message----- From: request.allow.spoof@qualcomm.com [mailto:request.allow.spoof@qualcomm.com] Sent: Monday, August 31, 2015 3:06 PM To: public-media-capture@w3.org Subject: QUALCOMM spoof attempt detected: Use of BlobEvent in MediaStream Recorder and ImageCapture PLEASE RESEND THE INFORMATION USING A PERSONAL EMAIL ADDRESS. -------------------------------------------------------------------------------------- An email has been sent to you from outside of Qualcomm, but the “From” address has been changed (i.e., spoofed) to make it look like it originated from inside Qualcomm. Since this can indicate a phishing attack the email has been quarantined to protect you. “Spoofing” can also occur when you use your Qualcomm email address on external websites to send yourself, friends, and colleagues articles, directions, reservations, etc. If you do not recognize the email or the email sender, there is no action required by you. The quarantined email will be deleted. If the quarantined email is business related, simply reply to this email with a justification for its release. To learn more about spoofing and why this email may have been labeled a spoofed email, please visit http://qwiki.qualcomm.com/it/QCSpoof. Quarantine: https://quarantine.qualcomm.com Remote Host: frink.w3.org Server IP: 128.30.52.56 Envelope Sender: public-media-capture-request+bounce-mandyam=quicinc.com@listhub.w3.org From: "Mandyam, Giridhar" <mandyam@qti.qualcomm.com> To: "public-media-capture@w3.org" <public-media-capture@w3.org> Subject: Use of BlobEvent in MediaStream Recorder and ImageCapture
Received on Thursday, 3 September 2015 15:33:20 UTC