Like This Site? 
 
RSS Feed Follow Us 

on Twitter! Be Our Fan!

Back to basics: Defending against phishing attacks

Share this post!
 Vote this!

Email remains one of the most popular attack vectors used by cybercriminals to compromise systems or obtain private information. This was brought to mind recently, when a new phishing exploit came to my attention. Phishing was known at first as a type of attack where the attacker would pose as an entity “trusted” by the user, such as banks or government agencies, and try and convince the user to disclose private information including passwords and credit card information. Lately however, the use of the term has been expanded to identify almost every type of email based attack. First, I’ll quickly recap how phishing works.       more...

0 comments:

Post a Comment