PS5 details: Is there a risk that hackers will exploit them?
inet infosec

PS5 details: Is there a risk that hackers will exploit them?

Sony's game developer and creator, Mark Cerny, gave some details about the new PS5 console. In one...
Read More

Cisco warns of vulnerabilities in 9000 series routers

Cisco has released 31 security tips this week, but has focused users on "critical" patches for ...
Read More

HP: Adds the Sure Sense malware blocker to its new devices

HP announced a series of updates and new features for PCs, as well as the official HP release ...
Read More

Covering vacancies in hacker security

Incidents of online attacks are increasing day by day. Previously no such attention was paid. After the incident with the ...
Read More

Oracle: New Critical Patch Update fixes 297 vulnerabilities

Oracle releases a collection of patches for multiple critical security vulnerabilities. The update contains 297 new security fixes ...
Read More
Latest Posts

What is spear phishing and how can we protect it


In our times, the phishing attacks, also known as "phishing," are emerging as a growing threat. It is therefore very important to learn how we can remain safe from such attacks.

Internet security experts, warn that there are different phishing attacks, with spear phishing being one of the most widespread.

Spear phishing focuses on targeting specific individuals or groups, as opposed to simple phishing that does not target its victims. According to a Barracuda Networks security company's report, these types of attacks are often reviewed in advance and are designed to capture data such as login credentials or other sensitive information. For attacks to be more faithful, they often use impersonation and pretend to be a company that consumers trust, as researchers find.

In particular, attackers send emails that may seem to come from a reputable and popular company, such as a leading business or a financial institution. Apple and Microsoft are two of the companies most used by cyber criminals to fool their victims. And in some cases, it's hard to see if the email is fake because it comes from a trustworthy but already compromised account or one that looks almost identical to the company.

Other two phishing techniques used are business email compromise and blackmail. In the case of blackmail, attackers usually have some personal information, mainly from the victim's social media, and blackmail them to publish them unless the victim satisfies their request.

Business email compromise, on the other hand, is relatively unusual but not less dangerous. In these cases, the attackers are presented as a high-ranking corporate executive to manipulate an unsuspecting colleague to share personal information or complete banking transactions.

Fortunately, however, there are some steps users can take to protect themselves from being hit by such attacks.

First of all, multi-factor verification is one of the most important things you can do. Then using a password manager can be very helpful. In addition, you must always be careful with the links or documents contained in your emails, and do not open links that you are not sure that can lead you. And finally, always be sure you know where and why you are importing your login credentials.

Do you have an opinion? Leave your comment.

The author allows you to copy his / her text only if you report the source (, as an e-mail address (Live URL) of the article.
Updated on by

Reader Interactions

Leave a reply

Your email address is not published. Τα υποχρεωτικά πεδία σημειώνονται με *