Phishing in early 2002
A short follow-up to last year's phishing posts. The category continues to mature; the techniques are stabilising; the response is forming.
Long-form thinking on cyber defence, detection, and resilience — from Slackware-era honeypots through to AI-driven SOC analytics.
Showing posts tagged social engineering — 3 results.
A short follow-up to last year's phishing posts. The category continues to mature; the techniques are stabilising; the response is forming.
Phishing volume against UK targets has grown substantially in late 2001. The techniques have matured. A walk through what is changing and what defenders should know.
A friend forwarded me a phishing email targeting a UK bank's customers. The construction is more sophisticated than I expected. A walk through what makes it work and what defenders should know.