Providing Free and Editor Tested Software Downloads
< HOME | TUTORIALS | GEEK-CADE| WEB TOOLS | YOUTUBE | NEWSLETTER | DEALS! | FORUMS | >

MajorGeeks.com - The Few, The Proud, The Geeks.

Software Categories

All In One Tweaks
Android
Antivirus & Malware
Appearance
Back Up
Browsers
CD\DVD\Blu-Ray
Covert Ops
Drivers
Drives (SSD, HDD, USB)
Games
Graphics & Photos
Internet Tools
Linux Distros
MajorGeeks Windows Tweaks
Multimedia
Networking
Office & Productivity
System Tools

Other news

· How To and Tutorials
· Life Hacks and Reviews
· Way Off Base
· MajorGeeks Deals
· News
· Off Base
· Reviews




spread the word

· YouTube
· Facebook
· Instagram
· Twitter
· Pintrest
· RSS/XML Feeds
· News Blur
· Yahoo
· Symbaloo

about

· Top Freeware Picks
· Malware Removal
· Geektionary
· Useful Links
· About Us
· Copyright
· Privacy
· Terms of Service
· How to Uninstall

top downloads

1. GS Auto Clicker
2. Macrium Reflect FREE Edition
3. Smart Defrag
4. Visual C++ Redistributable Runtimes AIO Repack
5. Visual C++ Runtime Installer (All-In-One)
6. McAfee Removal Tool (MCPR)
7. MusicBee
8. Rufus
9. K-Lite Mega Codec Pack
10. Sergei Strelec's WinPE
More >>

top reads

Star How to Disable 1-Click Ordering on Amazon (and Avoid Surprise Charges)

Star How to Fix Shallow Paint Layer Depth in Bambu Studio

Star Aviator Betting Game Secrets: Unlock 97% RTP & Triple Your Wins

Star Windows Recall: What It Is, Why Hackers Will Love It, and How to Stay Safe

Star Star Trek Fleet Command Promo Codes: Redeem Codes for Free Shards, Blueprints And Resources

Star How To Use VLC Media Player to Trim Video Clips

Star What Is the $WinREAgent Folder and Can I Delete It?

Star Swear Your Way to Better Search Results

Star How to Get a Dark Start Menu and Taskbar in Windows 10 & 11

Star Enable, Disable, Manage, Delete or Create a System Restore Point


MajorGeeks.Com » News » April 2015 » Crafting a phishing email 101

Crafting a phishing email 101


Posted by: Timothy Weaver on 04/23/2015 09:17 AM [ comments Comments ]


How do hackers craft a phishing email? It's really pretty simple.

What the hacker looks for first is security holes in a company's information system. The object of the scam is to infiltrate a company with an infected email.

Ray Boisvert, a veteran of Canada's intelligence services, said: "People love to click on that blue line."

The hacker would scour LinkedIn looking for the least cybersavvy employees, such as those who work in nontechnical areas and new hires unlikely to recognize an atypical email. After learning the format of the companies emails (e.g., x.name@company.com), he will begin sending out emails until they stop bouncing back.

The next trick is to scour social media to find out as much as possible about the selected victim. He will look to learn his target's professional background, friends, and general interests.

He can then customize the phishing email to lure the victim into clicking on a link that would take the employee to a malware site that downloads the malware onto the victims computer. From there he can access the company network and find usernames and passwords.

Source: BusinessInsider


« Dennis Technology Labs tests AV software · Crafting a phishing email 101 · Random Photo: A clever X answer »




Comments
comments powered by Disqus

MajorGeeks.Com » News » April 2015 » Crafting a phishing email 101

© 2000-2025 MajorGeeks.com
Powered by Contentteller® Business Edition