Anatomy of A Well-Planned Phishing Attack

We all know not to open email attachments, and to suspect odd emails that arrive at random from seemingly legit places. The bloggers at Solutionary have put together this rather interesting analysis of a phishing email that one of their staffers received recently. I talk about what they found in my latest entry on Dice’s Security Talent Community here.

If you haven’t been on Dice.com in a while, it is worth checking out some of the other resources that are listed, including links to security news, certifications and notable bloggers and podcasters. And that is just in one of many other communities that they have going on.

 

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.