There are many types of phishing attack nowadays, to the extent it can be tricky to keep up with them all. We have unique names for mobile attacks, postal attacks, threats sent via SMS and many more besides. However, we often see folks mix up their spears and their whales, and even occasionally confuse them with regular phish attempts. We’re here to ex
It’s 3:45 pm on Friday and you are ready to be done for the week. A last-minute email from your boss pops into your inbox. It’s a Google file invitation that says you need to update this document before the end of the day. Being the dedicated employee that you are, you click the link and end up at a Google login page. The login page displays your name
An engineer has devised a new way to help combat BeEF, or browser exploit framework attacks.The tool, a Chrome extension, detects and blocks hooks from BeEF–an exploit tool similar to Metasploit–that uses JavaScript to control browsers. Routinely used by researchers, pen testers, and attackers, the tool has a multifunctional control panel that al