Related Posts Plugin for WordPress, Blogger...

iTechSpeak :::...

"THE HUMAN SIDE OF TECHNOLOGY" for convenience, productivity, safety, profitability or fun. This is the place to be to keep your finger on the pulse in emerging technologies. When should you zig when everyone else zags? Where should you concentrate your time, money or effort to capitalize on the next technology tsunami? Stay tuned . . . -Published by SAVVY INTRAPRENEUR

2,000+ Executives Hoodwinked by Phishing (fishing) and Whaling

Posted by Unknown Thursday, April 17, 2008

By now you may have read John Markoff's article in the yesterday's New York Times "Larger Prey Are Targets of Phishing". Over 2,000 executives received phony, but very official looking, subpoenas to appear in court. From the email they were fooled into thinking they could download a copy of the subpoena. Instead different variants of keylogger programs were installed on each computer. Keylogger programs intercept personal or sensitive corporate information typed on the computer keyboard.

John goes on to explain "The tactic of aiming at the rich and powerful with an online scam is referred to by computer security experts as whaling. The term is a play on phishing, an approach that usually involves tricking e-mail users — in this case the big fish — into divulging personal information like credit card numbers. Phishing attacks that are directed at a particular person, rather than blasted out to millions, are also known as spear phishing."

When are these phishing and whaling horror stories going to end? Never, but there proactive steps people can take. Consider making a small investment in an excellent keylogger prevention program called GuardedID by Strikeforce Technologies. Think of it as buying insurance to protect your sensitive information and prevent identity theft.

GuardedID provides a preemptive approach to protecting your information. GuardedID works by encrypting each and every keystroke the instant that you type it. It then delivers those encrypted keystrokes directly to the browser through its own Patent Pending secure channel, circumventing all the hooks keyloggers use to steal data. This prevents any chance for key loggers to intercept the users information over the keyboard. Read more . . .


Post a Comment