Case Study

Phishing for the weakest link

 It’s one thing to hear about someone falling for a spear phishing attack, but it’s another thing to see it happen on a screen in front of you.

25 January 2016

To be clear, this was a simulated attack, shown to Brainstorm by security consultancy Wolfpack Information Risk in Johannesburg recently.

It all looks remarkably easy. First, the social engineering toolkit (SET) is launched. This is an open source program "specifically designed to perform advanced attacks against the human element", according to social-engineer.org.

ITWeb Premium

Get 3 months of unlimited access
No credit card. No obligation.

Already a subscriber Log in