From IT Business Edge
Spear phishing, a type of email spoof, targets individuals or
departments within organizations and attempts to elicits a desired
action that could install malware, compromise login names and passwords
and steal data. Use Paul Mah's simple checklist to spot potential
phishing messages.
From the network breach at RSA to theft of intellectual property in
Operation Aurora, it is no secret that some of the most visible hacking
involves the use of spear phishing. A targeted form of phishing that is
custom-made for a specific organization, a spear phishing email message
seeks to elicit a desired action that could result in a Trojan being
loaded, or the unintended leaking of confidential or privileged data.
As
Paul Mah has written in the past, defending against spear phishing is a
challenging task that mandates some amount of user training. To assist
organizations on this front, Paul has come up with a simple checklist to
help identify a potential phishing message.
To have access to Paul's checklist visit the following URL:
http://goo.gl/lmpZR