Download now Free registration required
In today's information driven world, cyber criminals are more active than ever before and putting the average computer user and organizations at risk of significant data, brand and financial loss. One method that is frequently employed is phishing, which the criminally fraudulent process of attempting to acquire sensitive information such as user names, passwords and credit card details by appearing as a trustworthy entity in an electronic communication. Examples of phishing include communications to unsuspecting end users purporting to be from financial Institutions, popular social websites, auction sites, online payment processors or IT administrators.
- Format: PDF
- Size: 160.2 KB