Half Sized Blog Element (Single Author Style)

Half Sized Blog Element (Multi Author Style)

AP Twitter Hack: Lessons Learned

An posting from Information Week security in there security section: Would you trust an email that says: “Please read the following article, it’s very important: www.washinqtonpost.com/blogs/worldviews/wp/2013/04/23/”? So went a phishing email reportedly sent to multiple employees at the Associated Press, less than an hour before the company’s Twitter feed was taken over and used to issue multiple tweets, […]

How Lockheed Martin Phishes Its Own

An posting From Dark Reading about How Lockheed Martin Phishes Its Own: On several occasions over the past couple of years, employees at Lockheed Martin have flagged suspicious emails that turned out to be previously unknown targeted attack campaigns aimed at the defense contractor. This additional pair of eyes in security is one of the bonuses of […]

AP Twitter Hack: Lessons Learned

An posting from Information Week security in there security section: Would you trust an email that says: “Please read the following article, it’s very important: www.washinqtonpost.com/blogs/worldviews/wp/2013/04/23/”? So went a phishing email reportedly sent to multiple employees at the Associated Press, less than an hour before the company’s Twitter feed was taken over and used to issue multiple tweets, […]

How Lockheed Martin Phishes Its Own

An posting From Dark Reading about How Lockheed Martin Phishes Its Own: On several occasions over the past couple of years, employees at Lockheed Martin have flagged suspicious emails that turned out to be previously unknown targeted attack campaigns aimed at the defense contractor. This additional pair of eyes in security is one of the bonuses of […]