Phishing refers to a variety of attacks that are intended to convince you to forfeit sensitive data to an imposter. These attacks can take a number of different forms; from spear-phishing (which targets a specific individual within an organization), to whaling (which goes one step further and targets senior executives or leaders). Furthermore, phishing attacks take place over multiple channels or even across channels; from the more traditional email-based attacks to those using voice – vishing – to those coming via text message – smishing. Regardless of the type or channel, the intent of the attack is the same – to exploit human nature to gain control of sensitive information (citation 1). These attacks typically make use of several techniques including impersonated websites, attacker-in-the-middle, and relay or replay to achieve their desired outcome.


More

Venture Beat: You can now use your Android phone as a 2FA security key for Google accounts

Venture Beat reports on Google’s announcement that phones running Android 7.0 Nougat and higher can…

Read More →

Venturebeat: Firefox 66 brings Web Authentication API support for Windows Hello

WebAuthn support for Windows Hello means that with the next Windows 10 update, users will…

Read More →

PC World: WebAuthn: What you need to know about the future of the passwordless Web

In this feature article, PC World answers common questions about Web Authentication – what is…

Read More →