shutterstock-734587441
Phishing

How phishers phish

If you believe the hype, the world’s cyber criminals have huge collections of as-yet-unknown zero-day vulnerabilities hidden away, waiting to unleash on the world.

But Steve Manzuik,  Director of Security Research at Michigan-based security startup Duo Security, says in reality that’s just not the case

“Attackers are pretty lazy, they're not going to do things if they don't have to. If phishing is working, why wouldn't they keep doing it?”

 

The phishing problem

While the rewards of finding a genuine zero-day vulnerability can be extremely high, that’s because finding them is extremely difficult, and often they only have a limited window of usefulness once used.

To continue reading...


PREVIOUS ARTICLE

« Enterprise GitHub projects of the week: Microsoft special

NEXT ARTICLE

What design teams can learn from DevOps »
author_image
Dan Swinhoe

Dan is a journalist at CSO Online. Previously he was Senior Staff Writer at IDG Connect.

  • twt
  • twt
  • twt
  • Mail

Recommended for You

Trump hits partial pause on Huawei ban, but 5G concerns persist

Phil Muncaster reports on China and beyond

FinancialForce profits from PSA investment

Martin Veitch's inside track on today’s tech trends

Future-proofing the Middle East

Keri Allan looks at the latest trends and technologies

Poll

Do you think your smartphone is making you a workaholic?