We have alerted our readers to many of the approach vectors that are used by cyber-criminals to gain network access, tactics such as phishing and spearphishing, drive-by downloads from compromised websites, installing remote access Trojan horse software, and the like. Sometimes the easiest way to get the network credentials you need is simply to ask for them. One of the methods that have been increasing is impersonating IT staff, either by email, or directly via a phone call. We ...
Continue Reading →MAR