Our mobile, social, and collaborative lifestyles have transformed the way we use technology at home, at work, and everywhere in between. We want – and need – to secure our devices, personal information, and business data; to keep our families safe online, and our employees productive; to take advantage of all that new technologies can offer us while minimizing the risk.
In our recently released report, Operation Pawn Storm, we talked about an operation that involved three attack scenarios. For this post, we will talk about the third scenario: phishing emails that redirect victims to fake Outlook Web Access login pages. What’s most notable about this is that … [read post]