Chastity Mansfield I'm a writer, an amateur designer, and a collector of trinkets that nobody else wants. You can find me on Noozeez, and Twitter.

The connection between phishing and cyberattacks

21 sec read

It was originally designed as a way for identity thieves to get personal information about people in order to gain access to their accounts and profiles. Today, phishing has graduated to become a weapon of choice in cyberterror. Will that connection stick?

As we mark the 10th annual National Cyber Security Awareness, the most common — and effective — cyberattack method is spear phishing.

Some 92 percent of targeted attacks in 2012 started with spear phishing, according to research by Trend Micro.

Attackers can simply e-mail a targeted victim and entice him or her to click on a malicious link.

Avatar of Chastity Mansfield
Chastity Mansfield I'm a writer, an amateur designer, and a collector of trinkets that nobody else wants. You can find me on Noozeez, and Twitter.

Chicago tried and failed to use big data to…

Have you ever seen the movie Minority Report? If you haven’t, all you need to know is that it’s about a special police unit that’s able...
Avatar of Sal McCloskey Sal McCloskey
1 min read

Google believes artificial intelligence will be bigger than virtual…

When Mark Zuckerberg thinks about the future, he sees a world that’s dominated by mobile devices and virtual reality, but when Google CEO Sundar Pichai...
Avatar of Lorie Wimble Lorie Wimble
56 sec read

China wants to build floating nuclear power plants for…

I’m sure you’ve heard about that man-made island chain that China has built in the South China Sea, the one that’s been causing a...
Avatar of Alfie Joshua Alfie Joshua
1 min read

Leave a Reply

Your email address will not be published. Required fields are marked *