Watering Hole Attacks

New phishing tactic: Infect sites and wait for catch

By

Researchers believe watering hole strategies, where attackers compromise sites visited by their targets, are used to steal personal information and set the stage for spear phishing attacks.

Google Aurora attackers continue online crime spree

By

The same criminal gang that infiltrated Google in 2010 is continuing to target intellectual property housed by U.S. companies, but its using new web-based tactics to maximize its effectiveness.

Advertisement

How to Prevent Insider Threats!

POLL