Defensive measures for evolving phishing tactics
Threat Monitor
English - October 18, 2006 17:31 - 3.22 MBTechnology News Tech News computer security threats information hack attacks viruses worms trojans backdoors Homepage Download Apple Podcasts Google Podcasts Overcast Castro Pocket Casts RSS feed
Previous Episode: Malware: The changing landscape
Next Episode: How simple steps ensure database security
From image spam to cross-site scripting, hackers certainly have a large arsenal of weapons to choose from. But as AT&T recently learned, hackers are putting a new twist on ever-dependable phishing schemes to gain access to confidential and sensitive information. In this tip, Ed Skoudis examines how phishing tactics have evolved and what enterprises can do to defend themselves.