phishing

March 8, 2019
Phishing, Smishing premium
Phishing, vishing, whaling, spear-phishing: the list of clever new terms seems constantly to change. A successful attack by any other name, though, is just as sweet to the adversary. Terminology aside, the fundamental problem is this. Phishing is the most common and effective way to steal data because it goes after the weakest chain in […]
premium
don.maclean@dlt.com'
November 18, 2016
How Malware and Spam Groups Exploited the U.S. Election premium
Cybersecurity, or lack thereof, was a hallmark of the 2016 election season. With Clinton’s campaign chairman, John Podesta, being chief among the targets of cyber attackers. In March of this year, Podesta fell victim to the oldest trick in the book – phishing – which led to the subsequent hacking and Wikileaks-led disclosure of hundreds […]
premium
qa@dlt.com'
July 22, 2014
The State of Phishing Cyber Attacks: An Infographic premium
Though it's the oldest hacking trick in the book, phishing cyber attacks are still a nightmare for cybersecurity. We created an infographic that offers a look at what phishing attacks are, how they're launched, tips to defend yourself, and examples.
premium
Shelby.Robinson@dlt.com'
November 20, 2013
DLT Went Phishing premium
We decided to teach our employees about cybersecurity. So we phished them to find out what would happen. Read about those results, the lessons we learned, and how we trained employees on the danger.
premium
Tia.Bayley@dlt.com'
April 3, 2013
GovDefenders Wednesdays | Are Your Paleolithic Post-Patch and Post-Phish Processes Leaving You in a Pickle? premium
Last month the National Institute of Standards (NIST) database of software vulnerabilities, the National Vulnerability Database (NVD), was taken offline for several days because it was discovered that the web servers hosting the NVD, as well as other government databases, had been compromised by a software vulnerability. In this blog, I’ll review the problem; next week I’ll identify tools and processes that can help solve the problem.
premium
blogs@dlt.com'
January 23, 2013
GovDefenders Wednesdays: Cybersecurity Starts at the Bottom of the Totem Pole premium
One of the most frequently misused quotes references the bottom of the totem pole. Many people associate it with negativity - “I’m stuck at the bottom of the totem pole.” However, the bottom is one of the places you wanted to be because it was one of the most honorable positions. It was those at the bottom who everyone relied on to hold society up. Cybersecurity is no different. Those at the bottom now must help hold those at the top.
premium
josh.davis@dlt.com'