Tag: spoofing

The Limitations of Forensic Analysis

This article describes restrictions on the use of forensic tools, including social engineering, to obtain information about breached servers. It provides a general approach, but provides a short discussion of several well known attack methods, which are not covered in detail. The authors identify several important limitations of forensic analysis that prevent a comprehensive discussion…

Read More

What Is Phishing and How Does It Work?

When cybercriminals send unsolicited email to your organization, you may find that it becomes your most valuable asset — particularly if you can’t immediately filter it out. But with the phishing threats and the potential for such attacks to cost your organization millions, you may well lose the opportunity to protect your valuable data. The…

Read More