“Phishing” Select one of the following and discuss in no less than three paragraphs
- Research phishing schemes on the web. Find a recent scheme and summarize and discuss why it may have been successful. What are the red flags that one should look out for to avoid becoming a victim, and what should one do if one encounters such schemes?
- As a security manager what actions might you take to assure your company does not fall victim to phishing? Include any training or simulation/white hat hacking you might consider.
- Any current topic or article related to penetration techniques.