Webinar: A Perfect Crime: The Tech and Psych of Effective Phishing on Jan 31, 2019

Register Now for an Offer You Can’t Refuse!

Join Erich Kron of KnowBe4 for a technical foundation of phishing with tools such as Modlishka and SET and how to drastically ramp up their effectiveness with proven techniques of hacking the human brain combining them in a live demo not to be missed. Would you prefer the hope & pray method of Fredo Corleone or the more calculating and successful method of The Don himself? Find out in this FREE EH-Net Live! webinar on Thursday January 31, 2019 at 1:00 PM US Eastern. Join us live to receive certificates for easy submission of CPEs!

The InfoSec industry has done a pretty good job over the last couple of decades in protecting internal corporate infrastructure and the endpoints that made up the traditional perimeter. With the ever-increasing blur of those perimeters with BYOD, the cloud and remote working, it’s more evident than ever that the weakest link in any organization is the human.

EH-Net Live! - A Perfect Crime: The Tech and Psych of Effective Phishing - Godfather Fredo Fishing

The Godfather Part II – Fredo Fishing

In the Godfather Part II, the mighty Corleone family was compromised when their enemies coerced the unappreciated, elder brother with promises of his own glory. When Fredo took his younger brother’s son fishing, he shared with him the secret to catching fish – saying a prayer. Was he naïve or just making peace with his impending doom? Regardless, Michael Corleone was triumphant, because he knew how to use the latest weaponry as well as manipulate the human psyche to accomplish both a string of perfect crimes and mitigate threats to the family.

In criminal attacks as well as penetration testing, the fastest and easiest way into an organization is through phishing. Erich Kron of KnowBe4 will present the basics of phishing, a technical foundation with tools such as Modlishka and SET (Social-Engineer (Read more...)

*** This is a Security Bloggers Network syndicated blog from The Ethical Hacker Network authored by Don Donzal. Read the original post at: