Threat Monitor

Defensive measures for evolving phishing tactics


Listen Later

From image spam to cross-site scripting, hackers certainly have a large arsenal of weapons to choose from. But as AT&T recently learned, hackers are putting a new twist on ever-dependable phishing schemes to gain access to confidential and sensitive information. In this tip, Ed Skoudis examines how phishing tactics have evolved and what enterprises can do to defend themselves.
...more
View all episodesView all episodes
Download on the App Store

Threat MonitorBy SearchSecurity.com