- You will remember that Twitter confirmed that members of staff were rung up by scammers, who then socially engineered their victims into handing over credentials which gave the hackers access to Twitter’s internal tools.
- The same “voice phishing” techniques have been used against banks, web hosts, and cryptocurrency exchanges, in recent weeks.
- No surprise about LinkedIn being a key resource for the hackers. It’s a much more valuable resource for criminals trying to learn more about your company and which worker they should target than it is for job seekers.
Graham Cluley | August 19, 2020
hak-iq.us20.list-manage.comAugust 19, 2020