Show all postsFiltered by tag: phishing

Nov 13, 2015
TAGS: phishing
Phishing 101: 5 Ways to Spot Fraudulent Emails (by BAE Systems )

There have been a number of high-profile cyber breaches that, which upon inspection, were the result of phishing attacks. These malicious e-mails aim to collect personal information and employee credentials to steal intelligence from an organization’s network or to install malware such as a data-stealing Trojan.

Read Full Article