TechGainer
  • Tools
  • Apps
  • Facebook
  • Google
    • Android
    • Chrome
  • iOS
  • Linux
  • Microsoft
    • Windows
  • Mozilla
    • Firefox
  • Web
Select Page

Spear Phishing: What You Need To Know Right Now

by Fglynn | 25 Jun, 2011 | Security

About spear phishing, security tipsPhishing attacks usually involve using email messages, pop ups, and websites that pretend to be from a legitimate bank, business, or well-known websites. People encounter these ‘lures’, and because they think they’re legitimate, they’ll share financial and personal information, login details, and contact information. Spear phishing, on the other hand is a little more sophisticated.

How Spear Phishing Works

Spear phishing works in much the same way, except that it’s highly targeted.  Attackers send emails, set up pop ups, or create false websites members or employees of a particular organization, group, agency, or company would normally access.

Usually, these messages claim to be from someone who manages the computers or human resources at the mimicked website. They’ll almost always request login or personal information. The attacker then uses this information to gain access to the main system, and allows them to take over an entire computer.

Spear Phishing Attacks Expected to Rise

Several big brands have suffered security breaches in the last few years, compromising billions of users. Honda, McDonalds, Epsilon, Sony, and many other companies have all lost email lists or sensitive user information.

This information could easily be used by hackers to start spear phishing attacks. What makes this truly scary is that the information compromised in these original attacks could make it significantly harder to tell phishing emails from genuine ones.

Email Programs Aren’t the Answer

Don’t make the mistake of thinking email programs will protect you from spear phishing attempts. A recent experiment by PacketFocus found most of the big name email products, including Microsoft Outlook and Exchange, Outlook Express, and Cisco IronPort, failed to protect users. The experiment sent out spoof emails that resembled a LinkedIn invitation to connect with Bill Gates. The experiment had a 100% delivery rate.

PacketFocus’ CEO Joshua Perrymon says the reason these kinds of programs fail to protect users is because they’re based on blacklists. Spammers, on the other hand, often use sophisticated spear phishing attacks with new servers. Therefore, there isn’t time or a reason to get them blacklisted.

Protect Yourself

Education and awareness is crucial to thwarting spear phishing attempts. Take time to educate staff on how spear phishing attacks work and how to reduce their effects. All employees, regardless of how long they’ve been at the company, should receive regular courses and education to keep their defenses up and keep them up-to-date with the latest security dangers.

  • Your online business habits matter too. Make sure when you, or your staff, sign up for vendor sites and other business related sites that you don’t provide more information than is absolutely necessary.
  • When something suspicious does occur, make it’s easy for users to report incidents. But more than that, make sure any reports or complaints are acted on quickly.
  • Set up a system to ensure all software and programs are updated regularly. This will minimize the amount of time security holes exist in your system. You’ll also want to check your site regularly and repair any weaknesses found. You may even consider penetration testing to ensure your security.
  • To prevent hackers from using your site and stealing information from your customers, don’t use emails to gather information from your users or employees. Then, make sure your users and employees know that. This way, they know instantly that any spam emails requesting this kind of information are phony.

Be on the lookout for suspicious emails. Phrases requesting personal information or urging you to log in through a link are usually a pretty good indication that an email is malicious. Links are another feature to watch. In a suspicious email, a link might look legitimate, but when you hover over the link, the URL preview in the bottom of the browser is different. You also want to watch carefully for misspellings, typos, hyphens, and alternative Top level domains (TLD).

It’s easy to sacrifice security in favor of speed and efficiency, but considering the possible outcome, this sacrifice just isn’t worth it. Educate yourself and always be cautious about emails with links or information requests.

Author: Fglynn

Fergal is the director of product marketing and a writer for Veracode, where they feature cross site request forgery prevention. Fergal has spent most of his career working extensively in internet security and software development.

Share:

  • Facebook
  • Twitter
  • LinkedIn
  • Email
  • Print

Submit a Comment Cancel reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Smartwatch OS Comparison:

  • Android Wear vs watchOS vs Tizen OS

Popular Posts:

  • IDM new version notification How to Disable Internet Download Manager Automatic Update Check
  • Move Mouse Automatically Move Mouse Pointer Automatically When you are away from your Desktop
  • View Hardware detains in Linux 5 GUI Tools to See Hardware Information in Ubuntu/Linux
  • Note the Installation Drive letter How to Offline Install .NET Framework 3.5 in Windows 10 and 8 Easily
  • Troll of Viber's "Seen" status in message How to Stop Viber from Sending your “Seen” Status while Chatting
  • Disable UAC for single application How to Disable UAC Prompts for Specific Programs on Windows
  • Disable IDM integration from Browser How to Disable IDM Browser Integration Selectively or Completely
  • Mount Linux Ext Partition in Windows How to Mount and Access Linux Partitions (Ext4/Ext3/Ext2) in Windows Explorer Easily
  • Exit Steam How to Backup Steam for Future Offline Installation
  • WhatsApp message status tick marks with details WhatsApp Message ‘Sent’, ‘Delivered’ and ‘Read’ Status Identification using Indicators and Tick Marks

Recent Posts :

  • How to Disable “Quick Access” Section in Google Drive Web and Mobile App
  • Automatically Backup APK Files while Installing Apps from Play Store
  • WhatsApp Message ‘Sent’, ‘Delivered’ and ‘Read’ Status Identification using Indicators and Tick Marks
  • Find Out the Sleeping Schedule of Someone using “Sleeping Time”
  • How to Find the IMEI Number of a Lost or Stolen Android Phone
  • 10+ Proven Tips to Make Google Chrome Super Fast on Desktop
  • How to Use Pushbullet in Ubuntu and Linux Mint using Pushbullet Indicator

SmartwatchSpex

  • All Smartwatch Specifications | SmartwatchSpex
  • Amazfit Pace vs Amazfit Pace 2 vs Amazfit Bip Smartwatch Comparisons
  • Ticwatch 2 vs Amazfit Smartwatch
  • Ticwatch Pro vs Ticwatch 2 vs E vs S Smartwatch Comparisons
  • Facebook
  • Twitter
  • Google
loading Cancel
Post was not sent - check your email addresses!
Email check failed, please try again
Sorry, your blog cannot share posts by email.