Cloning security - when attackers go after security resources

It's no secret that attackers are constantly shifting their tactics, thereby staying miles (or at least hundreds of feet) ahead of the game. This latest round is troubling as attackers have now taken to duplicate legitimate security web sites and, as expected, enhanced them with their malware. The result is that it will be become increasingly difficult for average folks to know where to go to get help.

Src: Cloning Security | HostExploit.com

No comments: