Proofpoint: Security, Compliance and the Cloud

April 29, 2013

Longline Phishing Infographic: How Industrial-scale Phishing Attacks Work

In conjunction with last week's Infosecurity Europe 2013 show, our UK team put together this really cool infographic that explains how a new class of industrial-scale phishing attacks -- which Proofpoint recently dubbed "longline phishing" attacks -- work, along with tips for avoiding such attacks.

To learn more about this new class of phishing attacks, check out our longer form report, Longline Phishing: Email-borne Threats, Cloud Computing, Big Data, and the Rise of Industrial Phishing Attacks.

Click the infographic image below to view it full size!

Proofpoint-Longline-Phishing-Attacks-InfoSecurity

Comments

Feed You can follow this conversation by subscribing to the comment feed for this post.

Verify your Comment

Previewing your Comment

This is only a preview. Your comment has not yet been posted.

Working...
Your comment could not be posted. Error type:
Your comment has been posted. Post another comment

The letters and numbers you entered did not match the image. Please try again.

As a final step before posting your comment, enter the letters and numbers you see in the image below. This prevents automated programs from posting comments.

Having trouble reading this image? View an alternate.

Working...

Post a comment

Archives

Blog Search

Email Security Gateways, 2012

Magic Quadrant

Tweets

What people are saying right now about us.

©2012 Proofpoint, Inc.
threat protection: Proofpoint Enterprise Protection compliance: Proofpoint Enterprise Privacy governance: Proofpoint Enterprise Archive secure communication: Proofpoint Encryption