Source: National Cyber Security – Produced By Gregory Evans Phishing is big business for attackers, and being able to craft the right message to a target is a valuable skill. Social networks are great resources for potential attackers, both to learn about a target victim and to deploy a The…
The head of the spear: remembering Mandela’s humanistic imperative
In my first year as a doctoral student at Clark Atlanta University, I enrolled in a course called “The Person in History and Literature.” One of the first texts on our course reading list was an autobiography entitled, Long Walk to Freedom. Consequently, it was during that semester that I…
CERT warns of targeted gas pipeline firm ‘spear phishing’ attacks
The United States Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) has issued a warning about an active “spear phishing” campaign targeting companies in the natural gas pipeline sector. View full post on Techworld.com security View full post on National Cyber Security » Computer Hacking
Spear phishing examples: How to stop phishing from compromising users
Spear phishing targets the weakest link in most security programs: users. These spear phishing examples can help your enterprise thwart attacks. <img alt="Spear phishing examples: How to stop phishing from compromising users, Blog, Stop, from, users, phishing, Spear, examples, compromising"height="0" width="0" border="0" style="display:none" src="http://segment-pixel.invitemedia.com/pixel?code=TechBiz &partnerID=167&key=segment”/><img alt="Spear phishing examples: How to…