Phishing 101: Beware and Prepare this Holiday Season

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12
Next Next

Different Phishing Tactics

A number of different phishing tactics are designed to steal your information or get into your network. Spear phishing is one tactic that targets specific individuals, companies and organizations to gather personal information. Clone phishing is another sneaky tactic that replaces legitimate, previously delivered email content with malicious content and attachments. Cybercrooks often get away with it by claiming that they are sending an updated version of the previous email. Another example is whaling. Just what it sounds like, whaling is when phishers are after the "big phish." Common examples include a subpoena being delivered to a CFO for fraud or a customer complaint to the director of customer service.

With the holiday shopping season upon us, the FBI is warning consumers to be on the lookout for cyber scams and phishing attacks. Why such concern? According to research, phishing remains a popular and surprisingly effective attack method — in fact, 23 percent of recipients open phishing messages and 11 percent click on attachments.

Unfortunately, phishing campaigns come in many different shapes and sizes. While some are obvious and indiscriminate, luring only the most susceptible of victims (like that long-lost uncle who just needs your routing number to give you $100,000), others are more poised and targeted, only interested in targeting those with big bank accounts or holders of confidential company documents.

In this slideshow, Jon French, security analyst, AppRiver, breaks down what consumers and organizations need to know about phishing scams in order to protect themselves and their networks, this holiday season and beyond.

 

Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

 
More Slideshows

Security117-190x128.jpg 5 Steps to Protect Executives from a Whale-Phishing Attack

Whaling is a type of spearphishing targeting "big fish" in an organization with access to sensitive, highly-valuable information. ...  More >>

Security116-190x128.jpg 5 Common Failures Companies Make Regarding Data Breaches

Five common failures companies make when preparing for, and responding to, a data breach, as well as guidance for companies on how they can tackle these issues. ...  More >>

Security115-290x195 Data-Centric Approach Starves Data-Hungry Cybercriminals

Incorporating security capabilities such as encryption, better control and management and a data security framework will help alleviate the burden breaches place on the organization and people's lives. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.