Recognizing Social Engineering Attacks
In 2008 and 2009, attacks like these would have typically gone after credit card numbers, debit card numbers and employee records with social security numbers to be used for identity theft. In 2010, these attacks are much more sophisticated and targeted at specific information at specific organizations. The attackers were going after targeted data such as intellectual property and confidential business information such as operations manuals or policy documents. Or in the case of RSA, the attackers were going after the root code of issued Secure ID tokens....