Phishing & BotNets
Back to list
*Note: Email address will appear as "user domain ext" to prevent harvesting.
Re: What else to be done ?
Feb 21 2007 02:42PM
Carl Jongsma (info skiifwrald com)
There are a number of things that can be done once an institution
becomes the target of a phish attempt. Most importantly, if there
isn't already a policy in place to deal with phishing attacks, then
you really need to get one created and in place to guide the ongoing
[ more ]
Copyright 2010, SecurityFocus