If that weren't enough, the crooks have expanded their operations to include malicious code that steals identity information without the computer user's knowledge. Thousands of computers are compromised each day, and phishing code is increasingly becoming part of the standard exploits.
Written by a phishing security expert at a top financial institution, this unique book helps IT professionals respond to phishing incidents. After describing in detail what goes into phishing expeditions, the author provides step-by-step directions for discouraging attacks and responding to those that have already happened.
In Phishing, Rachael Lininger:
- Offers case studies that reveal the technical ins and outs of impressive phishing attacks.
- Presents a step-by-step model for phishing prevention.
- Explains how intrusion detection systems can help prevent phishers from attaining their goal-identity theft.
- Delivers in-depth incident response techniques that can quickly shutdown phishing sites.