Anatomy of A Well-Planned Phishing Attack

We all know not to open email attachments, and to suspect odd emails that arrive at random from seemingly legit places. The bloggers at Solutionary have put together this rather interesting analysis of a phishing email that one of their staffers received recently. I talk about what they found in my latest entry on Dice’s Security Talent Community here.

If you haven’t been on in a while, it is worth checking out some of the other resources that are listed, including links to security news, certifications and notable bloggers and podcasters. And that is just in one of many other communities that they have going on.



Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )


Connecting to %s