The Latest in IT Security

The top 10 phishing lures of 2015

20
Jul
2015

phishinglures

Years after they were first used to catch out unwary users, simple phishing scams sent via email are both common and effective. On the face of it this is surprising. Businesses installed email-filtering gateways a decade ago, some even investing in technologies designed to authenticate messages such as Sender Policy Framework (SPF), DomainKeys Identified Mail (DKIM) and Domain-based Message Authentication, Reporting & Conformance (DMARC).

While this has made some difference in filtering out spam and unwanted messages, phishing email has evolved to counter these techniques. The plain truth is that users have to open email, some of that will have been targeted well enough to allay suspicion, and getting around the defenses that have been thrown up is still more than possible.

Read More

Leave a reply


Categories

FRIDAY, APRIL 19, 2024
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments