Case Study
Phishing for the weakest link
It’s one thing to hear about someone falling for a spear phishing attack, but it’s another thing to see it happen on a screen in front of you.
25 January 2016
To be clear, this was a simulated attack, shown to Brainstorm by security consultancy Wolfpack Information Risk in Johannesburg recently.
It all looks remarkably easy. First, the social engineering toolkit (SET) is launched. This is an open source program "specifically designed to perform advanced attacks against the human element", according to social-engineer.org.
ITWeb Premium
Get 3 months of unlimited access
No credit card. No obligation.
Already a subscriber
Log in