shutterstock-734587441
Phishing

How phishers phish

If you believe the hype, the world’s cyber criminals have huge collections of as-yet-unknown zero-day vulnerabilities hidden away, waiting to unleash on the world.

But Steve Manzuik,  Director of Security Research at Michigan-based security startup Duo Security, says in reality that’s just not the case

“Attackers are pretty lazy, they're not going to do things if they don't have to. If phishing is working, why wouldn't they keep doing it?”

 

The phishing problem

While the rewards of finding a genuine zero-day vulnerability can be extremely high, that’s because finding them is extremely difficult, and often they only have a limited window of usefulness once used.

To continue reading...


PREVIOUS ARTICLE

« Enterprise GitHub projects of the week: Microsoft special

NEXT ARTICLE

What design teams can learn from DevOps »
author_image
Dan Swinhoe

Dan is a journalist at CSO Online. Previously he was Senior Staff Writer at IDG Connect.

  • twt
  • twt
  • twt
  • Mail

Recommended for You

How to (really) evaluate a developer's skillset

Adrian Bridgwater’s deconstruction & analysis of enterprise software

Unicorns are running free in the UK but Brexit poses a tough challenge

Trevor Clawson on the outlook for UK Tech startups

Cloudistics aims to trump Nutanix with 'superconvergence' play

Martin Veitch's inside track on today’s tech trends

Poll

Is your organization fully GDPR compliant?