
Those attacks were split into two categories: mass phishing, which lures customers to fake sites asking for their credit card information, and spear phishing, which targets individuals directly in an attempt to get them to send money to a fake account or compromise their identity.
(more…)

Businesses that keep sensitive data on their computer networks need penetration tests to make sure hackers do not have access to the information. Testing often starts with a vulnerability assessment, which is an exercise that evaluates the network’s security and creates a list of potential security flaws. By scanning the network, you can often discover compromises that you didn’t know were there.