Jump to content

Avoid Phishing Attacks: Difference between revisions

Line 38: Line 38:
An email arrives, apparently from a trustworthy source, but instead it leads the unknowing recipient to a bogus website full of malware. These emails often use clever tactics to get victims' attention.  
An email arrives, apparently from a trustworthy source, but instead it leads the unknowing recipient to a bogus website full of malware. These emails often use clever tactics to get victims' attention.  
== How to protect yourself from spear phishing ==
== How to protect yourself from spear phishing ==
Traditional security often doesn't stop these attacks because they are so cleverly customized. As a result, they're becoming more difficult to detect. One employee mistake can have serious consequences. With stolen data, fraudsters can reveal sensitive information. In addition, spear phishing attacks can deploy malware to hijack computers, organizing them into enormous networks called botnets that can be used for denial of service attacks.
To fight spear phishing scams, employees need to be aware of the possibility of bogus emails landing in their inbox.
To fight spear phishing scams, employees need to be aware of the possibility of bogus emails landing in their inbox.
2,227

edits