Executives hold the keys to the corporate kingdom. If attackers can gain the trust of executives using layered social engineering techniques, they may be able to access sensitive corporate information such as intellectual property, financial data or administrative control logins and passwords. While phishing remains the primary pathway to executive compromise, increasing C-suite awareness of […]
The post It all adds up: Pretexting in executive compromise appeared first on Security Intelligence.
Continue reading It all adds up: Pretexting in executive compromise→