Get to the Source Campaign
Attempts to lure users into opening emails, clicking on links, downloading files, transferring money or data, and entering information such as passwords into websites. All are forms of phishing.
Area 1 tradeshow campaign for Gartner Security summit.
bec
c2 callback
imposter attacks
pharming
ransomware
search engine harvesting
spoofing
watering hole attacks
whaling
View all tags
Posted on
Jan 21, 2018
More by Area 1 View profile
Like