Written by a phishing security expert at a top financial institution, this unique book helps IT professionals respond to phishing incidents.
After describing in detail what goes into phishing expeditions, the author provides step-by-step directions for discouraging attacks and responding to those that have already happened.
The site looks legitimate, and 3 to 5 percent of people who receive the e-mail go on to surrender their information-to crooks. One e-mail monitoring organization reported 2.3 billion phishing messages in February 2004 alone.
If that weren’t enough, the crooks have expanded their operations to include malicious code that steals identity information without the computer user’s knowledge. Thousands of computers are compromised each day, and phishing code is increasingly becoming part of the standard exploits. Written by a phishing security expert at a top financial institution, this unique book helps IT professionals respond to phishing incidents. After describing in detail what goes into phishing expeditions, the author provides step-by-step directions for discouraging attacks and responding to those that have already happened.
*Disclaimer: As an Amazon Associate we earn from qualifying purchases.