Leap Fraud

In the good old days, you could spot a security threat just by watching the network. Monitor the access points, check the logs, look for disruptions in traffic or anomalous activity. Good, techie stuff that you could get your hands on.

These days, however, the exploits are better camouflaged. Rather than breaking into the network physically, attackers are increasingly finding ways to gain access to the enterprise at its weakest point: the gullible user. These aren't old-school "hackers" just trying to get in; these are new-school fraud artists trying to bring data out.

But don't take our word for it take a look at what's happening in the world of phishing right now. (See New Phishing Exploits Emerge.) The Anti-Phishing Working Group says 137 organizations reported phishing exploits last month, the biggest one-month jump since December of last year. Dark Reading - Application and Perimeter Security - Leap Fraud - Security

Linked by shanmuga Friday, 30th June 2006 1:30AM