Introduction Hackers will try just about anything to get you to click on a malicious link. The key is to make the overall email seem as believable as possible. The more legitimate it seems, the better. The more believable it seems, the better. The race to get end-users to click on links is on, and creative examples abound. One tactic that we’re seeing more and more of is using voicemail as a lure to get users to click. Many corporate phone systems are tied to email—voicemails left on the phone can be available to be listened to via email. Hackers […]
The post Fake Voicemail as Credential Harvesting Lure appeared first on Check Point Blog.
This article has been indexed from Check Point Blog