Site Network: | | Jongsma & Jongsma

Innovation in Information Security

Coverage of important Information Security and Information Technology news and events from the research team at S?nnet Beskerming.

Username: | Password: Contact us to request an account

Fifty Percent of Valid Phished Data Happens in First 60 Minutes

One interesting area of Information Security research is looking at the vulnerability gap between when a threat emerges and when it is countered effectively. With Information Security being such a broad field, determining when a threat has emerged, and when it has been effectively countered is a realm of study all by itself.

Recent published work has identified that the window of greatest opportunity for phishers is within the first 60 minutes of a phishing campaign beginning. This tends to be based around it taking about an hour for IT security vendors to identify and react to the phishing campaign's presence. Half of the data that is captured by the phishers is captured during this first 60 minute period.

3 December 2010

Social bookmark this page at eKstreme.
Alternatively, Bookmark or Share via AddThis

Do you like how we cover Information Security news? How about checking out our company services, delivered the same way our news is.

Let our Free OS X Screen Saver deliver the latest security alerts and commentary to your desktop when you're not at your system.

Comments will soon be available for registered users.