Half Sized Blog Element (Single Author Style)

Half Sized Blog Element (Multi Author Style)

Spear Phishing: A Quick Review

Spear Phishing is very common to the traditional Phishing but more targeted to a specific group. Spear Phishing is define as an e-mail spoofing fraud attempt that targets a specific organization, seeking unauthorized access to confidential data. Spear Phishing attempts are not typically initiated by “random hackers” but are more likely to be conducted by perpetrators out for financial gain, trade secrets or military information (SearchSecurity, 2005).

SecurityOrb.com’s Top 10 Cyber Security Threat Predictions for 2012

2011 was an attention-grabbing year in the information security industry. We saw some interesting things such as mobile apps become a talking point as well as some Mac OS X malware. Furthermore, the issues pertaining insider threat, hacktivism, Stuxnet’s sibling Duqu, social networking site vulnerabilities as well as our share of zero-day attacks to name a few. So, what is in store for 2012 you ask?

Spear Phishing: A Quick Review

Spear Phishing is very common to the traditional Phishing but more targeted to a specific group. Spear Phishing is define as an e-mail spoofing fraud attempt that targets a specific organization, seeking unauthorized access to confidential data. Spear Phishing attempts are not typically initiated by “random hackers” but are more likely to be conducted by perpetrators out for financial gain, trade secrets or military information (SearchSecurity, 2005).

SecurityOrb.com’s Top 10 Cyber Security Threat Predictions for 2012

2011 was an attention-grabbing year in the information security industry. We saw some interesting things such as mobile apps become a talking point as well as some Mac OS X malware. Furthermore, the issues pertaining insider threat, hacktivism, Stuxnet’s sibling Duqu, social networking site vulnerabilities as well as our share of zero-day attacks to name a few. So, what is in store for 2012 you ask?