[RERELEASE] What are BEC attacks?
Description
In this phishy edition of the Exploring Information Security podcast, Steve Ragan of CSO joins me to discuss business email compromise (BEC) attacks.
Steve (@SteveD3) has been covering BEC types of attacks for the past year at CSO. These types of attacks are increasing. It may get worse with GDPR requirements next month. This ended up being one of the more difficult podcasts to get scheduled. Steve and I had to cancel on each other a few times because of phishing related stuff.
In this episode we discuss:
What are BEC types of attacks?
Who is performing BEC attacks?
How are people falling for them?
What can people do protect against this type of attack?
<form autocomplete="on" class="newsletter-form" method="POST">
Subscribe
Sign up with your email address to receive news and updates.
<label class="newsletter-form-field-label title" for="email-yui_3_17_2_1_1704234756218_223631-field">Email Address</label>
<input autocomplete="email" class="newsletter-form-field-element field-element" id="email-yui_3_17_2_1_1704234756218_223631-field" name="email" type="email" />
<button class="
newsletter-form-button
sqs-system-button
sqs-editable-button-layout
sqs-editable-button-style
sqs-editable-button-shape
sqs-button-element--primary
" type="submit" value="Sign Up">
Sign Up
</button>
We respect your privacy.
Thank you!
</form>