Free Newsletter
Register for our Free Newsletters
Newsletter
Zones
Access Control
LeftNav
Alarms
LeftNav
Biometrics
LeftNav
Detection
LeftNav
Deutsche Zone (German Zone)
LeftNav
Education, Training and Professional Services
LeftNav
Government Programmes
LeftNav
Guarding, Equipment and Enforcement
LeftNav
Industrial Computing Security
LeftNav
IT Security
LeftNav
Physical Security
LeftNav
Surveillance
LeftNav
View All
Other Carouselweb publications
Carousel Web
Defense File
New Materials
Pro Health Zone
Pro Manufacturing Zone
Pro Security Zone
Web Lec
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
 
News

Corporate phish exposures avoidable with behavioural analysis.

Tier-3 : 09 November, 2007  (Technical Article)
Recent successful phishing attack which exposed customers to bogus invoicing serves as warning to avoid falling victim by installing behavioural analysis software.
Tier-3 has warned companies of the need to install behavioural analysis software on their systems, following the successful phishing of the company database at Salesforce.com

'Salesforce.com is a successful business software provider that was recently the victim of a series of targeted phishing attacks,' said Geoff Sweeney, Tier-3's CTO.

'Unfortunately, one of the company's employees appears to have fallen for the phishing emails and inadvertently handed over access to the firm's customer database,' he added.

According to Sweeney, the incident resulted in Salesforce.com having to send an explanatory email to almost a million customers this week, asking them to be vigilant against bogus emailed invoices that appear to come from the company.

'As if that wasn't bad enough, Salesforce.com has reportedly tracked a second wave of forged emails that contain malware. The fact that the emails are addressed to specific customers and purport to come from Salesforce.com means that the chances of a customer's PC being infected are quite high,' he said.

'This is a classic situation where popularly deployed security technologies can't be relied upon to protect organisations against these types of threats, if the companies concerned have real time behavioural analysis software installed on their systems, even if they open the bogus emails, any unauthorised interactions with their PC, including the installation of Trojans other malware and data leakage, could have been locked down,' he added.
Bookmark and Share
 
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
 
   © 2012 ProSecurityZone.com
Netgains Logo