Wednesday, October 18, 2006

Defensive measures for evolving phishing tactics

From image spam to cross-site scripting, hackers certainly have a large arsenal of weapons to choose from. But as AT&T recently learned, hackers are putting a new twist on ever-dependable phishing schemes to gain access to confidential and sensitive information. In this tip, Ed Skoudis examines how phishing tactics have evolved and what enterprises can do to defend themselves.

Comments: Post a Comment



<< Home

This page is powered by Blogger. Isn't yours?