top | item 24659876

(no title)

mikorym | 5 years ago

Is it still done via actual downloads? It's very easy for script kiddies to do that.

I would have expected a bit more sophistication, like hidden URLs in emails that autoresolve, at the least. Not my area, though.

discuss

order

unixhero|5 years ago

It is done in every possible way. The dumbest form your defenses will allow in is what you get. Can absolutely be done via downloads yes. Because they perform an impersonation attack on you, or use a supplier as an attack vector, and by impersonating a trusted user, they get you to open a file or similar.

Better finetune your email security, because humans are a hard problem. Loads of awareness, phishing drills and information sec training is needed.