shutterstock-734587441
Phishing

How phishers phish

If you believe the hype, the world’s cyber criminals have huge collections of as-yet-unknown zero-day vulnerabilities hidden away, waiting to unleash on the world.

But Steve Manzuik,  Director of Security Research at Michigan-based security startup Duo Security, says in reality that’s just not the case

“Attackers are pretty lazy, they're not going to do things if they don't have to. If phishing is working, why wouldn't they keep doing it?”

 

The phishing problem

While the rewards of finding a genuine zero-day vulnerability can be extremely high, that’s because finding them is extremely difficult, and often they only have a limited window of usefulness once used.

To continue reading...


PREVIOUS ARTICLE

« Enterprise GitHub projects of the week: Microsoft special

NEXT ARTICLE

What design teams can learn from DevOps »
author_image
Dan Swinhoe

Dan is Senior Staff Writer at IDG Connect. Writes about all manner of tech from driverless cars, AI, and Green IT to Cloudy stuff, security, and IoT. Dislikes autoplay ads/videos and garbage written about 'milliennials'.  

  • twt
  • twt
  • twt
  • Mail

Recommended for You

Tech Cynic: VR, the never-popular technology

Tech Cynic – IT without the rose-tinted spectacles

Five months on, GDPR doubts remain for this lawyer

Martin Veitch's inside track on today’s tech trends

How can smart solutions help address Southeast Asia's urban challenges?

Keri Allan looks at the latest trends and technologies

Poll

Is your organization fully GDPR compliant?