Page 52 - Cyber Warnings
P. 52
organization, you may so easily break into the entire network and not only run some attack
which may get so obvious, but rather so silently steal many confidential information and using
such a way of campaign do the bigger harm to that institution.
Those scenarios are happening so often in a practice and employers would frequently seek that
its staffs should know how to cope with such a situation. Non-rarely, the big companies would
invest in their employee’s training looking for the best possible advices how to avoid becoming
the victim of phishing campaigns.
As it’s well-known, the phishing campaigns may go through the web, e-mails, social media or
communication messengers and it’s all about a link with the uploaded malicious content or such
a nice web content that would just grab your IP address and make it available to some hacker’s
group or individual.
Further, we would hear many explanations how to recognize such a link, but times change and
offenders are getting so advanced in their tactics to overplay us.
For instance, your bank may get a lovely message claiming that is some useful financial
magazine offering you its blog’s content for free. The banking staff may so unintentionally click
on that link expecting to see some financial news which he would non-doubly get – because
someone skillful would maintain that webpage.
At that stage, it would appear that nothing special happened at all – but very soon everyone
would know that so many confidential data leaked out. Also, those phishing links could get
packed as shorten links using bit.ly, ow.ly, buff.ly and many other standards.
Although the phishing would rise to a global concern, we would recommend to the companies
supported by a defense community to build on the entire lists of advisable websites and social
media accounts that may get trusted and used in a practice. The criterion to such a list creation
would be strictly empirical. Maybe, some solutions in the future would automatize that process
using well-trained neural network-based software.
About The Author
Since Milica Djekic graduated at the Department of Control
Engineering at University of Belgrade, Serbia, she’s been an
engineer with a passion for cryptography, cyber security, and
wireless systems. Milica is a researcher from Subotica, Serbia.
She also serves as a Reviewer at the Journal of Computer
Sciences and Applications and. She writes for American and Asia-
Pacific security magazines. She is a volunteer with the American
corner of Subotica as well as a lecturer with the local engineering
society.
52 Cyber Warnings E-Magazine – May 2016 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide