Follow Slashdot blog updates by subscribing to our blog RSS feed


Forgot your password?

Slashdot videos: Now with more Slashdot!

  • View

  • Discuss

  • Share

We've improved Slashdot's video section; now you can view our video interviews, product close-ups and site visits with all the usual Slashdot options to comment, share, etc. No more walled garden! It's a work in progress -- we hope you'll check it out (Learn more about the recent updates).

Crime Privacy Security The Internet IT Your Rights Online

The Golden Hour of Phishing Attacks 59

Posted by CmdrTaco
from the get-the-camera dept.
Orome1 writes "Trusteer conducted research into the attack potency and time-to-infection of email phishing attacks. One of their findings was that 50 per cent of phishing victims' credentials are harvested by cyber criminals within the first 60 minutes of phishing emails being received. Given that a typical phishing campaign takes at least one hour to be identified by IT security vendors, which doesn't include the time required to take down the phishing Web site, they've dubbed the first 60 minutes of a phishing site's existence is the critical 'golden hour.'"
This discussion has been archived. No new comments can be posted.

The Golden Hour of Phishing Attacks

Comments Filter:
  • by Anonymous Coward on Thursday December 02, 2010 @10:40AM (#34416850)

    I'm pretty well convinced that google already does this with spam but they don't have a "report scam" button (unfortunately.)

    Gmail does, in fact, have a "report scam" button. Click the menu button to the right of "Reply" in any message to "Report phishing." Done.

The universe is an island, surrounded by whatever it is that surrounds universes.