Å·±¦ÓéÀÖ

Phishing Quotes

Quotes tagged as "phishing" Showing 1-5 of 5
“Every conceivable layer of the election process is completely riddled with vulnerabilities, so yes, hacking elections is easy!”
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology

“A Nation State or Cyber-Mercenary won’t hack e-voting machines one by one. This takes too long and will have minimal impact. Instead, they’ll take an easier approach like spear phishing the manufacturer with malware and poison the voting machine update pre-election and allow the manufacturer to update each individual machine with a self-deleting payload that will target the tabulation process.”
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology

“Consider all tabulation systems infected by bad actors until a third party, not affiliated with the manufacturer or election officials, proves they are secure.”
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology

“Hackers find more success with organizations where employees are under appreciated, over worked and under paid. Why would anyone in an organization like that care enough to think twice before clicking on a phishing email?”
James Scott, Sr. Fellow, Institute for Critical Infrastructure Technology

“A single spear-phishing email carrying a slightly altered malware can bypass multi-million dollar enterprise security solutions if an adversary deceives a cyber-hygienically apathetic employee into opening the attachment or clicking a malicious link and thereby compromising the entire network.”
James Scott, Senior Fellow, Institute for Critical Infrastructure Technology