The technique, known as spear-phishing, lures potential victimsby appearing to come from a trusted source, such as a member of theIT staff at the same company. The email may ask for usernames,passwords and other personal information or redirect recipients toa bogus version of the company website or intranet. "Those whoreply to these messages will inadvertently be supplying informationthat the phisher can use for malicious purposes, such as identityfraud," the company explains.


Spear-phishers can generate the email addresses of potentialvictims through trial and error, or by exploiting a list ofemployees on social networks like Facebook or LinkedIn. The bottomline: Think twice before responding to any email or text message,even if it seems like it's from a trusted source.


Still not convinced there's a need for caution? Consider thesefacts from SophosLabs just released midyear security threatupdate:

  • Total number of different malware (virus) threats in existence:more than 11 million
  • New web infections: one new infected webpage discovered everyfive seconds
  • Spam-related webpages: one new page discovered every 20seconds
  • Top malware-hosting country: US with 38%
  • Top spam-relaying continent: Asia with 35%
  • Email with infected attachments: 1 in 2500
  • Spam in business email: 97%
  • New types of spam: Cell, Facebook and backscatter spam
  • Top host for malware: Blogger (

Want to continue reading?
Become a Free ALM Digital Reader.

  • Unlimited access to GlobeSt and other free ALM publications
  • Access to 15 years of GlobeSt archives
  • Your choice of GlobeSt digital newsletters and over 70 others from popular sister publications
  • 1 free article* every 30 days across the ALM subscription network
  • Exclusive discounts on ALM events and publications

© 2024 ALM Global, LLC, All Rights Reserved. Request academic re-use from All other uses, submit a request to [email protected]. For more information visit Asset & Logo Licensing.