On Monday we looked at the some of the primary attack vectors used by cyber-criminals. Here are the rest of the attack vectors that Kevin Thompson from FireEye shared at the Cyber Security Summit. Many of these are significant twists on old exploits, or more sophisticated exploits.
- Attacks using legitimate services.
- Social networks – make friends or connections, gather information.
- Cloud storage services to host malware downloads. Link looks legitimate, its from Google Docs or DropBox.
- Comment ...
NOV

Not trying to be rude here. Phishing has become the most prevalent form of cyber-attack, and the reason for that is that IT WORKS! It works because most people are very trusting and easily convinced, and are clicking on links and opening attachments without much concern. It also works because most people have not been trained