The Latest in IT Security

How to stop spear-phishing cold

31
May
2017

Phishing concept

How do I hack thee?   Let me count the ways. Among others, I hack thee to the depth and breadth and height of a spear-phishing attack (apologies to Elizabeth Barrett Browning).

By now, you may be aware that many of the most devastating hacks that have occurred in recent history—the Democratic National Committee (DNC), Yahoo, the W-2 scam—have been launched from a base of information or access garnered by sending a poisoned email with tailored details to a specific individual, who then becomes the vector for the rest of the attack.

Read More

Leave a reply


Categories

FRIDAY, MARCH 29, 2024
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments