
How cybercriminals harvest information for spear phishingIn analyzing targeted attacks over the past decade, we continually find a recurring theme: “It all started when the victim opened a phishing e-mail.” Why are spear-phishing e-mails so effective? It’s because they are contextualized and tailored to the specific victim. Victims’ social networks are often used as a …
Continue reading “How cybercriminals harvest information for spear phishing”