Techworld

Spear-Phishing Email: Most Favored APT Attack Bait

Spear-Phishing Email: Most Favored APT Attack Bait
This research paper presents findings on APT-related spear phishing from February to September 2012. We analysed APT-related spear-phishing emails collected throughout this period to understand and mitigate attacks. The information we gathered not only allowed us to obtain specific details on spear phishing but also on targeted attacks. We found, for instance, that 91% of targeted attacks involve spear-phishing emails, reinforcing the belief that spear phishing is a primary means by which APT attackers infiltrate target networks.
Download Whitepaper
Related Whitepapers
Thanks for downloading Spear-Phishing Email: Most Favored APT Attack Bait. Here are some other white papers that we feel may be of interest to you given your recent download:
  • This whitepaper discusses how organisations can use VDI to reduce costs and complexity, increase security and provide a consistent user experience when managing their growing number of end user devices. • Data security and availability take on new dimensions with so many out-of-office devices. • User experiences can be managed through the deployment of uniform high performance architecture. • Purpose-built solutions simplify purchase, streamline provisioning, and lower deployment risk. Download whitepaper »

  • Many organisations believe they can transform their IT operations by simply buying a new management tool. However, this is just the start. This whitepaper discusses the dynamics of a complete transformation: • Learn why IT management tools should be more than "plug & play" • The 5-step plan to implementing ITSM for the best results long-term • Understand why your approach should be more about the data and less about the tool itself Download whitepaper »

  • Mobile devices are not just another type of endpoint. Inherent features (e.g., camera, accelerometer, proximity sensor, etc.) coupled with the always-connected, readily available nature of these devices represent an opportunity for improvement in enterprise user productivity. Enterprises can begin to realize this potential by allowing use of corporate data in both custom-built and commercially available mobile apps. Mobile workflows resulting from interactions between these apps can be faster and more intuitive than those on a PC. However, the need to always retain control over corporate data should give an enterprise pause before sanctioning the widespread use of sensitive business information on mobile devices. Download whitepaper »

Top Whitepapers

Twitter Feed

Featured Whitepapers