The Internet Control Message Protocol (ICMP) – Part 1

The Internet Control Message Protocol (ICMP) – Part 1

There are many security tools (such as those of Firewalls, Network Intrusion Devices, Routers, etc.) out there that can alert a Network Administrator of any penetrations that are occurring. 

Read More ...
Spear Phishing

Spear Phishing – Part 3

Incidents of Spear Phishing

As we have reviewed, Spear Phishing, is quite different than the normal Phishing attack.  In these cases, the Cyber attacker just merely launches an all-out attack, in the hopes of being able to harvest sensitive information and data. 

Read More ...
Computer with Fish Line and Hook

Spear Phishing – Part 2

What the Spear Phisher is After

Our last blog examined what a Spear Phishing attack is.  In today’s blog, we examine what the primary targets are:

1)     Money, Money, Money and lots of it:

While other Phishing based campaigns focus on getting any kind of personal information and data, the Cyber attacker in this case, wants just one thing: Your cash. 

Read More ...

Spear Phishing – Part 1

Introduction to Spear Phishing

As we know it today, Phishing has become one of the most commonly used tactics by the Cyber attacker in order to garner personal information and data. 

Read More ...