Be on the Lookout for Stealthy Attack Types

It’s not enough to teach your users not to click on unknown links or open attachments from untrusted senders. It’s also important to educate them about more devious attack methods such as fake WAPs, cookie theft, advanced file name tricks, and file location exploits.

Read about these and more in this InfoWorld article from Roger Grimes:,1

About The Author

Leave a Comment

Your email address will not be published. Required fields are marked *

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Scroll to Top