Tags: Trends


Yesterday, I speculated that LinkedIn could be used as an attack vector for a phishing attack. Although it's interesting to try and theorize how an attack could take place it's even more interesting to hear first hand how an attempted phish did take place.

Within hours of reading my blog post, Matt Hartley, responded with a first hand account of how he almost fell victim to such an attack. Fortunately, he was the one that got away and didn't take the bait. Perhaps people think of online scams as being ridiculously obvious such as being written in capital letters, referencing obscure countries they've never been to and the chance of obtaining millions of dollars of inheritance. In reality they can be much more sophisticated.

Subscribe To Our Blog

Free White Paper - Why Use an SMTP Relay Service

Let Us Know What You Thought about this Post.

Put your Comment Below.