Whilst most people know what phishing is, very few realize the lengths criminals will go to in order to initiate a phishing attack. Phishing has moved beyond simply distributing emails with fake corporate logos, attacks are now much more sophisticated, using clickable advertising to create legitimate-looking phishing websites to capture the sensitive data of an unsuspecting victim. This infographic highlights the five steps taken by cybercriminals to help you better understand the anatomy of a phishing attack.
Adrian Schofield sheds light on tech in South Africa
Mark Chillingworth on IT leadership