Article | August 28, 2020

Phishing Ain't What It Used To Be: How An Old Attack Has Evolved

Source: Carbonite

By Tyler Moffitt, Carbonite

Phishing

Phishing attacks are proliferating on the web. Their sheer volume has helped them become one of the most common sources of data breach used today.

From the time it was first described in a paper by the International HP Users Group, Interex in 1987 to today, phishing has become one of the most well-known strategies for stealing credentials among both cybersecurity experts and the general public.

Itself a subset of social engineering, phishing has exploded in diversity in recent years, evolving from error-riddle, wide-net attempts to fool one user out of thousands to a highly sophisticated and often narrowly targeted con. The endgame remains the same: to swipe confidential information from an unsuspecting target in order to extract something of value.

We’ll dive into a few of these methods here, but for examples of these attacks and additional techniques, download the 11 Types of Phishing eBook here.

VIEW THE ARTICLE!
Signing up provides unlimited access to:
Signing up provides unlimited access to:
  • Trend and Leadership Articles
  • Case Studies
  • Extensive Product Database
  • Premium Content
HELLO. PLEASE LOG IN. X

Not yet a member of VAR Insights? Register today.

ACCOUNT SIGN UP X
Please fill in your account details
Login Information
I'm interested in newsletter subscriptions.
ACCOUNT SIGN UP

Subscriptions

Sign up for the newsletter that brings you the industry's latest news, technologies, trends and products.