

<!DOCTYPE html>

<html xmlns="http://www.w3.org/1999/xhtml">
<head><title>
	Phishers Plumb the Depths of Hurricane Harvey's Floods - Infosecurity Magazine
</title>
    <link rel="dns-prefetch" href="//res.infosecurity-magazine.com" />
    <link rel="dns-prefetch" href="//assets.infosecurity-magazine.com" />
    <meta name="viewport" content="width=device-width,initial-scale=1,maximum-scale=1"/>
    <meta name="format-detection" content="telephone=no"/>
    <meta name="HandheldFriendly" content="True"/>
    <meta name="theme-color" content="#dc5c64"/>
    <link rel="canonical" href="https://www.infosecurity-magazine.com:443/news/phishers-plumb-hurricane-harvey/" />
    <meta property="og:url" content="https://www.infosecurity-magazine.com:443/news/phishers-plumb-hurricane-harvey/"/>
    <meta property="og:title" content="Phishers Plumb the Depths of Hurricane Harvey's Floods"/>
    <meta property="twitter:title" content="Phishers Plumb the Depths of Hurricane Harvey's Floods"/>
    <meta property="og:description" content="Don’t be afraid to donate—but do your homework first."/>
    <meta property="twitter:description" content="Don’t be afraid to donate—but do your homework first."/>
    <meta property="og:site_name" content="Infosecurity Magazine"/>
    <meta property="twitter:site" content="@InfosecurityMag"/>
    <meta property="twitter:card" content="summary_large_image"/>
    <link rel="publisher" href="https://plus.google.com/+InfosecurityMagazine" />
    <link rel="shortcut icon" href="https://www.infosecurity-magazine.com:443/favicon.ico" type="image/x-icon"/>
    <link rel="apple-touch-icon" href="https://www.infosecurity-magazine.com:443/_common/img/icons/152x152.png" sizes="152x152"/>
    <link rel="apple-touch-icon" href="https://www.infosecurity-magazine.com:443/_common/img/icons/144x144.png" sizes="144x144"/>
    <link rel="apple-touch-icon" href="https://www.infosecurity-magazine.com:443/_common/img/icons/120x120.png" sizes="120x120"/>
    <link rel="apple-touch-icon" href="https://www.infosecurity-magazine.com:443/_common/img/icons/114x114.png" sizes="114x114"/>
    <link rel="apple-touch-icon" href="https://www.infosecurity-magazine.com:443/_common/img/icons/72x72.png" sizes="72x72"/>
    <meta name="application-name" content="Infosecurity Magazine"/>
    <meta name="msapplication-TileColor" content="#000000"/>
    <meta name="msapplication-TileImage" content="https://www.infosecurity-magazine.com:443/_common/img/icons/528x528.png"/>
    <meta name="description" content="Don’t be afraid to donate—but do your homework first."/>
    <meta property="og:image" content="https://assets.infosecurity-magazine.com/webpage/og/267a56cc-0598-4115-87ba-0d717a73f5c8.jpg"/>
    <meta property="twitter:image:src" content="https://assets.infosecurity-magazine.com/webpage/tw/267a56cc-0598-4115-87ba-0d717a73f5c8.jpg"/>
    <meta property="og:type" content="article"/>
    <meta property="article:publisher" content="https://www.facebook.com/pages/Infosecurity-Magazine/210560332330063"/>
    <meta property="article:published_time" content="2017-08-29T18:59:00"/>
    <meta name="author" content="Tara Seals"/>
    <meta property="article:author" content="https://www.infosecurity-magazine.com:443/profile/tara-seals-1/"/>
    <meta property="article:author:first_name" content="Tara"/>
    <meta property="article:author:last_name" content="Seals"/>
    <link rel="stylesheet" type="text/css" href="//fonts.googleapis.com/css?family=Bitter:400,400italic,700%7cOpen+Sans:400italic,800"/>
    <link rel="stylesheet" type="text/css" href="//fonts.googleapis.com/css?family=Lato"/>
    <link rel="stylesheet" type="text/css" href="//res.infosecurity-magazine.com/css-0039/base.css"/>
    <link rel="stylesheet" type="text/css" href="//res.infosecurity-magazine.com/css-0039/colour-codes.css"/>
    <link rel="stylesheet" type="text/css" href="//res.infosecurity-magazine.com/css-0039/article.css"/>
    <link rel="stylesheet" type="text/css" href="//res.infosecurity-magazine.com/css-0039/whats-hot.css"/>
    <!--[if IE 8]>
    <style>.mega-drop{border: 2px solid #f7f7f7;}.form-panel .textbox.password{font-family: serif;}</style>
    <![endif]-->
    
    <script type="text/javascript" src="//ajax.googleapis.com/ajax/libs/jquery/1.11.0/jquery.min.js"></script>
    <script type="text/javascript" src="//nexus.ensighten.com/reedexpo/infosec-mag/Bootstrap.js"></script>
    <script type="text/javascript" src="//res.infosecurity-magazine.com/js-0039/modernizr.js"></script>
    <!--[if (gte IE 6)&(lte IE 8)]>
    <script type="text/javascript" src="//res.infosecurity-magazine.com/js-0039/selectivizr.min.js"></script>
    <![endif]--> 

    <script type="text/javascript">
        var googletag = googletag || {};
        googletag.cmd = googletag.cmd || [];

        (function () {
            var gads = document.createElement("script");
            gads.async = true;
            gads.type = "text/javascript";
            var useSSL = "https:" === document.location.protocol;
            gads.src = (useSSL ? "https:" : "http:") + "//www.googletagservices.com/tag/js/gpt.js";
            var node = document.getElementsByTagName("script")[0];
            node.parentNode.insertBefore(gads, node);
        })();
    </script>

    <script>
        (function() {
            var cx = '013025419539759983845:qhnrzazqj0o';
            var gcse = document.createElement('script');
            gcse.type = 'text/javascript';
            gcse.async = true;
            gcse.src = (document.location.protocol == 'https:' ? 'https:' : 'http:') +
                '//www.google.com/cse/cse.js?cx=' + cx;
            var s = document.getElementsByTagName('script')[0];
            s.parentNode.insertBefore(gcse, s);
        })();
    </script>
    <script type="text/javascript">
        (function () {
            var date = new Date(); date.setTime(date.getTime() + (5 * 24 * 60 * 60 * 1000));
            document.cookie = 'ISM.ScreenSize=' + screen.width + ';expires=' + date.toGMTString + ';';
            
            document.createElement('header');
            document.createElement('nav');
            document.createElement('footer');
        }());
    </script>
    <script type="text/javascript">
        (function(i,s,o,g,r,a,m){i['GoogleAnalyticsObject']=r;i[r]=i[r]||function(){
            (i[r].q=i[r].q||[]).push(arguments)},i[r].l=1*new Date();a=s.createElement(o),
            m=s.getElementsByTagName(o)[0];a.async=1;a.src=g;m.parentNode.insertBefore(a,m)
        })(window,document,'script','//www.google-analytics.com/analytics.js','ga');

        ga('create', 'UA-7632735-1', 'infosecurity-magazine.com');
        ga('require', 'localHitSender');
        ga('require', 'displayfeatures');
        ga('send', 'pageview');
        setTimeout(function() { ga('send','event','Profitable Engagement','time on page more than 180 seconds') },180000);
        
    </script>
</head>
<body itemscope itemtype="http://schema.org/WebPage">
    


<div class="global-header" style="">
    <div class="container">
        <a href="javascript:;" id="gh-mobile-toggle" class="global-header__mobile-toggle">Infosecurity Group Websites</a>

        <div style="">
            <ul class="global-header__nav" style="">
                <li class="global-header__nav-item global-header__nav-item--group"><img src="/_common/img/infosecurity-group.svg" style="" /></li>
                <li class="global-header__nav-item global-header__nav-item--current">Magazine</li>
                <li class="global-header__nav-item">
                    <a href="javascript:;" class="global-header__nav-link global-header__nav-link--dropdown">Events</a>

                    <ul class="global-sub-nav">
                        <li class="global-sub-nav__item"><a href="http://www.infosecurityeurope.com/" target="_blank" class="global-sub-nav__link">Infosecurity Europe</a></li>
                        <li class="global-sub-nav__item"><a href="http://www.infosecurityleadersnetwork.com/en/Leadership-Summit1/" target="_blank" class="global-sub-nav__link">Infosecurity Leadership Summit</a></li>
                        <li class="global-sub-nav__item"><a href="http://www.infosecurity-magazine.com/conferences/boston-agile-cybersecurity/" target="_blank" class="global-sub-nav__link">Infosecurity Magazine Conferences</a></li>
                        <li class="global-sub-nav__item"><a href="http://www.infosecuritynorthamerica.com/" target="_blank" class="global-sub-nav__link">Infosecurity North America</a></li>
                        <li class="global-sub-nav__item"><a href="http://www.infosecurity.nl/" target="_blank" class="global-sub-nav__link">Infosecurity Netherlands</a></li>
                        <li class="global-sub-nav__item"><a href="http://www.infosecurity.be/" target="_blank" class="global-sub-nav__link">Infosecurity Belgium</a></li>
                        <li class="global-sub-nav__item"><a href="http://www.infosecurityrussia.ru/" target="_blank" class="global-sub-nav__link">Infosecurity Russia</a></li>
                        <li class="global-sub-nav__item"><a href="http://www.infosecuritymexico.com/" target="_blank" class="global-sub-nav__link">Infosecurity Mexico</a></li>
                        <li class="global-sub-nav__item"><a href="http://www.infosecurityme.com/" target="_blank" class="global-sub-nav__link">Infosecurity Middle East</a></li>
                    </ul>
                </li>
                <li class="global-header__nav-item"><a href="http://www.infosecurityleadersnetwork.com/" target="_blank" class="global-header__nav-link">Leaders Network</a></li>
                <li class="global-header__nav-item">
                    <a href="javascript:;" class="global-header__nav-link global-header__nav-link--dropdown">Insight</a>

                    <ul class="global-sub-nav">
                        <li class="global-sub-nav__item"><a href="http://www.infosecurity-magazine.com/webinars/" target="_blank" class="global-sub-nav__link">Infosecurity Webinars</a></li>
                        <li class="global-sub-nav__item"><a href="http://www.infosecurity-magazine.com/white-papers/" target="_blank" class="global-sub-nav__link">Infosecurity Whitepapers</a></li>
                        <li class="global-sub-nav__item"><a href="http://www.infosecurity-magazine.com/virtual-conferences/" target="_blank" class="global-sub-nav__link">Infosecurity Virtual Conferences</a></li>
                    </ul>
                </li>
            </ul>
        </div>
    </div>
</div>

<script>
    $(function () {
        $('#gh-mobile-toggle').on('click', function () {
            var global_header = $('.global-header'),
                global_header_nav = $('.global-header__nav'),
                class_gh_open = 'global-header--open',
                class_ghn_open = 'global-header__nav--open';

            if (global_header.hasClass(class_gh_open)) {
                global_header_nav.removeClass(class_ghn_open)
                global_header.removeClass(class_gh_open);
            } else {
                global_header.addClass(class_gh_open);
                global_header_nav.addClass(class_ghn_open)
            }
        });

        $('.global-header__nav-link--dropdown').on('click', function () {
            var subNav = $(this).siblings('ul'),
                parentItem = $(this).parent('li'),
                class_gsn_open = 'global-sub-nav--open',
                class_ghni_open = 'global-header__nav-item--open',
                isOpen = $(this).siblings('ul').hasClass(class_gsn_open);

            $('.global-sub-nav').removeClass(class_gsn_open);
            $('.global-header__nav-item').removeClass(class_ghni_open);

            if (isOpen) {
                subNav.removeClass(class_gsn_open);
                parentItem.removeClass(class_ghni_open);
            } else {
                subNav.addClass(class_gsn_open);
                parentItem.addClass(class_ghni_open);
            }
        });
    });
</script>

    <div class="site-wrapper">
        <div class="cookieNotice">
            <div class="cookieNoticeInner">
                <h4>Our website uses cookies</h4>
                <p>Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing Infosecurity Magazine, you agree to our use of cookies.</p>
                <a href="#" class="cookieAccept">Okay, I understand</a>
                <a href="https://www.infosecurity-magazine.com:443/cookies/" class="cookieDecline">Learn more</a>
            </div>
        </div>
        <div class="pullout-overlay"></div>
    
        <div class="page">
            
                <div class="pullout-menu">
                    <ul class="search-box">
                        <li>
                            <div class="gcse-searchbox-only" data-enableAutoComplete="false" data-resultsUrl="https://www.infosecurity-magazine.com:443/search/"></div>
                        </li>
                    </ul>
                    <div id="mobile-links">

                    </div>
                </div>
            

            <div class="page-wrapper">
                
                    <header>
                        <div class="container">
                            <div class="header-ad-row">
                                <div class="dfp leaderboard" id="dfp-ad-90f079b8-2bcb-4285-b6d7-fbfe1f2fe662" data-ad-sizes="[728,90]" style="display: none;"></div>

                                <div class="links-container">
                                    <div class="sec-menu"></div>
                                    <div class="header-social-links">
                                        <a href="https://www.facebook.com/pages/Infosecurity-Magazine/210560332330063" target="_blank" class="fb"><i class="spricon-fb"></i></a>
                                        <a href="https://twitter.com/InfosecurityMag" target="_blank" class="tw"><i class="spricon-tw"></i></a>
                                        <a href="https://plus.google.com/+InfosecurityMagazine/posts" target="_blank" class="gp"><i class="spricon-gp"></i></a>
                                        <a href="http://www.linkedin.com/groups?gid=2035794&amp;trk=myg_ugrp_ovr" target="_blank" class="li"><i class="spricon-li"></i></a>
                                    </div>
                                </div>
                            </div>

                            <div class="header-logo-row">
                                <div class="flyout-controls">
                                    <a href="#" class="menu"><i class="spricon-menu"></i></a>
                                </div>

                                <a href="https://www.infosecurity-magazine.com:443/" class="infosec-logo"><i class="spricon-infosec"></i></a>

                                <div class="ticker-panel">
                                    <div class="ticker-controls">
                                        <span class="ticker-item-label">Latest</span>
                                    </div>

                                    
                                            <ul class="ticker">
                                        
                                            <li><a href="https://www.infosecurity-magazine.com:443/news/bec-attacks-jumped-17-last-year/">BEC Attacks Jumped 17% Last Year</a>
                                        
                                            <li><a href="https://www.infosecurity-magazine.com:443/news/euro-smbs-paid-out-98m-for/">Euro SMBs Paid Out $98m for Ransomware Decryption Last Year</a>
                                        
                                            <li><a href="https://www.infosecurity-magazine.com:443/news/cryptowars-bitgrail-hits-back-at/">Crypto-Wars: Bitgrail Hits Back at Dev Team After $170m &#39;Theft&#39;</a>
                                        
                                            <li><a href="https://www.infosecurity-magazine.com:443/opinions/social-engineering-biggest-threat/">Never Mind Malware - Social Engineering Will Be Your Biggest Threat This Year</a>
                                        
                                            <li><a href="https://www.infosecurity-magazine.com:443/news/necurs-fuels-massive-valentines/">Necurs Fuels Massive Valentine&#39;s Day Spam Campaign</a>
                                        
                                            </ul>
                                        
                                    <div class="clear"></div>
                                </div>
                                <div class="clear"></div>
                            </div>
                        </div>

                        <nav>
                            <div class="nav-row container">
                                <ul>
                                    <li class="home"><a href="https://www.infosecurity-magazine.com:443/"><i class="spricon-home"></i>&nbsp;</a></li>
                                    <li><a href="https://www.infosecurity-magazine.com:443/news/" class="nav-bar-link colour-news">News</a></li>
                                    <li>
                                        <a href="https://www.infosecurity-magazine.com:443/nav/topics/" class="nav-bar-link colour-topics">Topics</a>
                                        <ul class="mega-drop mega-drop-topics" id="nav-topics" style=""></ul>
                                    </li>
                                    <li>
                                        <a href="https://www.infosecurity-magazine.com:443/nav/features/" class="nav-bar-link colour-features">Features</a>
                                        <ul class="mega-drop mega-drop-features" id="nav-features"></ul>
                                    </li>
                                    <li><a href="https://www.infosecurity-magazine.com:443/webinars/" class="nav-bar-link colour-webinars">Webinars</a></li>
                                    <li><a href="https://www.infosecurity-magazine.com:443/white-papers/" class="nav-bar-link colour-whitepapers">White Papers</a></li>
                                    
                                    <li>
                                        <a href="https://www.infosecurity-magazine.com:443/nav/events/" class="nav-bar-link colour-events">Events &amp; Conferences</a>
                                        <ul class="mega-drop mega-drop-features" id="nav-events"></ul>
                                    </li>
                                    <li><a href="https://www.infosecurity-magazine.com:443/directory/" class="nav-bar-link colour-directory">Directory</a></li>
                                    <li id="nav-search-li">
                                        <a href="javascript:;" class="nav-bar-link">Search<i class="spricon-search"></i></a>

                                        <ul class="mega-drop mega-drop-search" id="nav-search">
                                            <li>
                                                <div class="gcse-searchbox-only" data-resultsurl="https://www.infosecurity-magazine.com:443/search/"></div>
                                            </li>
                                        </ul>
                                    </li>
                                </ul>
                                <div class="clear"></div>
                            </div>
                        </nav>
                    </header>
                

                <div id="pnlBreadcrumb" class="breadcrumb">
	
                    <div class="container" itemprop="breadcrumb">
                        <a href="https://www.infosecurity-magazine.com:443/">Infosecurity Magazine Home</a> » <a href="https://www.infosecurity-magazine.com:443/news/">News</a> » <a href="https://www.infosecurity-magazine.com:443/news/phishers-plumb-hurricane-harvey/">Phishers Plumb the Depths of Hurricane Harvey&#39;s Floods</a>
                    </div>
                
</div>

                <div id="pnlMainContent" class="main-content">
	
                    

    <div id="cphContent_pnlArticle" itemscope="" itemtype="http://schema.org/NewsArticle">
		
        <div id="cphContent_pnlArticleHeader" class="article-header article-header-image" style="background-image:url(//assets.infosecurity-magazine.com/webpage/feat/14df5cf7-c4dc-4f07-bcc6-f564f3bbd0bf.jpg);">
			
            

            <div class="container">
                <div class="overlay">
                    <div>
                        

                        <div id="cphContent_pnlArticleTitlebar" class="article-title-bar colour-news">
				
                            <div class="article-meta">
                                <time datetime="2017-08-29T17:59:00" itemprop="datePublished">29 Aug 2017</time> 
                                <a id="cphContent_lnkContentType" class="content-type" href="https://www.infosecurity-magazine.com:443/news/">News</a>
                            </div>
                            
                            <h1 itemProp="name">Phishers Plumb the Depths of Hurricane Harvey&#39;s Floods</h1>
                        
			</div>
                    </div>
                </div>
            </div>
        
		</div>

        <div class="container">
            

            <div id="cphContent_pnlMainContent" class="col-2-3 col-left">
			
                
                        <div class="author" itemprop="author" itemscope itemtype="http://schema.org/Person"><div class="author-image"><img src="//assets.infosecurity-magazine.com/profile/thumb/2b82445e-497e-4028-b7d7-eaa0d4ef5227.JPG" alt="Tara Seals" itemprop="image" /></div><h4 class="author-name"><a href="https://www.infosecurity-magazine.com:443/profile/tara-seals-1/" itemprop="url name" rel="author">Tara Seals</a><span class="author-title"> <span itemprop="jobTitle">US/North America News Reporter</span>, <span itemprop="worksFor">Infosecurity Magazine</span></span></h4><ul class="author-contacts"><li><a href="mailto:sealstara@gmail.com?subject=Email from Infosecurity Magazine website">Email Tara</a></li></ul><div class="clear"></div></div>
                    

                <div class="article-body">
                    <div class="sticky-share">
                        <div class="addthis_toolbox">
                        <a class="addthis_button_facebook"><i class="spricon-facebook"></i></a>
                        <a class="addthis_button_twitter"><i class="spricon-twitter"></i></a>
                        <a class="addthis_button_compact"><i class="spricon-share"></i></a>
                        </div>
                    </div>

                    

                    
                    
                    

                    
                    
                    <div class="min-height" itemprop="articleBody"><div id="layout-" class="content-module " data-layout-id="2" data-edit-folder-name="text" data-index="0" ><p><strong>As the United States reels from the effects of Hurricane Harvey&mdash;a devastation that as of this writing is far from being over&mdash;cyber-criminals are bringing a flood of their own, in the form of phishing and scam attempts. Don&rsquo;t be afraid to donate&mdash;but do your homework first.</strong></p>

<p>Looking to capitalize on the goodwill of people wanting to help the victims in Houston and the Gulf Coast, bad actors have registered hundreds of new domains containing the term &ldquo;Harvey.&rdquo;</p>

<p>SurfWatch Labs noted in <a href="https://blog.surfwatchlabs.com/2017/08/29/scammers-already-taking-advantage-of-hurricane-harvey-registering-domains/">a blog</a> that these domains are being used to send phishing emails with bogus donation lures; set up fake websites and crowdfunding pages; and support in-person and telephone &ldquo;giving&rdquo; scams, social media posts and more.</p>

<p>Meanwhile, US-CERT is <a href="https://www.us-cert.gov/ncas/current-activity/2017/08/28/Potential-Hurricane-Harvey-Phishing-Scams">warning</a> users &ldquo;to remain vigilant for malicious cyber-activity seeking to capitalize on interest in Hurricane Harvey.&rdquo;</p>

<p>Dan Lohrmann, chief security officer at Security Mentor, offered <em>Infosecurity</em> the following advice to avoid being scammed: &ldquo;Watch out for Facebook pages or bogus &lsquo;Go Fund Me&rsquo; accounts that try to attract emotional support with pictures,&rdquo; he said. &ldquo;They typically will use actual disaster photos from the storm to make them look official. The best advice is to give to the Red Cross using well-known and trusted channels. Also, be aware that personal appeals for money on crowdsourcing sites typically are not tax deductible, unlike the American Red Cross and Salvation Army.&rdquo;</p>

<p>SurfWatch noted that tips to prevent falling victim to Harvey phishing attempts include the usual protections: Never click on links or open attachments unless you know who sent it and what it is; never reply to emails, text messages or pop-ups that ask for personal information; and always verify that a communication is valid by contacting the organization directly before providing any sensitive information.</p>

<p>Importantly, don&rsquo;t let the fear of cyberattack dissuade giving.</p>

<p>&ldquo;We all want to be sure that our donations actually go to the people, and charities who need them,&rdquo; Steve Durbin, managing director of the <a href="http://www.securityforum.org/">Information Security Forum</a>, said via email. &ldquo;Just be sure you pay close attention to <a href="https://www.nytimes.com/2017/08/28/us/donate-harvey-charities-scams.html?mcubz=1&amp;_r=0">who you are donating to</a> so that you don&rsquo;t end up becoming another victim.&rdquo;</p>

<p>The support is greatly needed: President Trump has declared a federal state of emergency for both Texas and Louisiana, as Harvey leaves tens of thousands evacuated from their (likely destroyed) homes along the Gulf Coast. In Houston, the fourth largest city in the US, catastrophic flooding continues as the waters continue to rise, and <a href="http://www.disasterrecovery.org/">search and rescue operations</a> are struggling to keep up with those stranded and in danger. Meanwhile, Harvey has made its way back out to sea, is strengthening, and is expected to soon make another landfall in Louisiana.</p>

<p><strong><em>In the United States, you can donate $10 to the American Red Cross by texting &ldquo;Harvey&rdquo; to 90999. Other verified sources for charitable giving for the relief effort <a href="http://www.texasmonthly.com/the-daily-post/ways-can-help-people-hurricane-harvey/?utm_source=Facebook&amp;utm_medium=Social&amp;utm_campaign=Web Social&amp;utm_content=Harvey Help">can be found here</a>, and people can visit <a href="http://give.org/" target="_blank">give.org</a></em></strong><strong><em>&nbsp;to review&nbsp;the Better Business Bureau Charity Report to verify that a charity meets bureau&nbsp;standards for accountability.</em></strong> <strong><em>The FTC also recommends checking out charities via the Better Business Bureau&rsquo;s Wise Giving Alliance, Charity Navigator, Charity Watch or GuideStar.</em></strong></p>
</div></div>
                    
                </div>

                

                <div class="article-margin">
                    
                    
                    <div class="addthis_recommended_horizontal"></div>
                    <div id="disqus_thread"></div>
                </div>
            
		</div>

            <div id="cphContent_pnlAdditionalInfo" class="col-1-3 col-right">
			
                <div class="dfp " id="dfp-ad-970e31ce-d024-410f-be31-f7f4286d9299" data-ad-sizes="[300,250]" style="display: none;"></div>

                

                

                
<div class="why-not-watch">
    <h2>Why Not Watch?</h2>
    <div class="webinar  wnw-webinar" data-height-group="suggested-webinar"><a class="wrapper-link" href="https://www.infosecurity-magazine.com:443/webinars/understanding-and-combating-threats/"><span><img src="//assets.infosecurity-magazine.com/webpage/rect/58d3567e-36c9-4d59-939f-2af147c5b91a.jpg" alt="How Outsiders Become Insiders: Understanding and Combating Today's Threats" /></span><div class="content-meta"><time datetime="2015-07-09T14:00:00">9 Jul 2015</time><time datetime="2015-07-09T15:00:00"></time></div><span class="title-link">How Outsiders Become Insiders: Understanding and Combating Today's Threats</span></a></div><div class="webinar webinar-right wnw-webinar" data-height-group="suggested-webinar"><a class="wrapper-link" href="https://www.infosecurity-magazine.com:443/webinars/understanding-advanced-persistent/"><span><img src="//assets.infosecurity-magazine.com/webpage/rect/c8494fdd-7aa1-47b9-b5df-b7649ea65d45.jpg" alt="Understanding and Responding to Advanced Persistent Threats " /></span><div class="content-meta"><time datetime="2015-02-26T15:00:00">26 Feb 2015</time><time datetime="2015-02-26T16:00:00"></time></div><span class="title-link">Understanding and Responding to Advanced Persistent Threats </span></a></div><div class="webinar  wnw-webinar" data-height-group="suggested-webinar"><a class="wrapper-link" href="https://www.infosecurity-magazine.com:443/webinars/discover-hidden-threats-with-uba/"><span><img src="//assets.infosecurity-magazine.com/webpage/rect/b0773b3e-b472-46cf-83aa-b863ecc5256a.jpg" alt="Discover Hidden Threats with User Behaviour Analytics (UBA)" /></span><div class="content-meta"><time datetime="2016-05-26T14:00:00">26 May 2016</time><time datetime="2016-05-26T15:00:00"></time></div><span class="title-link">Discover Hidden Threats with User Behaviour Analytics (UBA)</span></a></div><div class="webinar webinar-right wnw-webinar" data-height-group="suggested-webinar"><a class="wrapper-link" href="https://www.infosecurity-magazine.com:443/webinars/unexpected-phishing/"><span><img src="//assets.infosecurity-magazine.com/webpage/rect/52629089-5046-4117-a6f4-75cc18461ab3.jpg" alt="Don't Let Unexpected Phishing Give you the Fright of your Life!" /></span><div class="content-meta"><time datetime="2017-10-31T18:00:00">31 Oct 2017</time><time datetime="2017-10-31T19:00:00"></time></div><span class="title-link">Don't Let Unexpected Phishing Give you the Fright of your Life!</span></a></div>
    <div class="clear"></div>
</div>

                
                        <div class="related-links">
                            <div class="heading">Related to This Story</div>

                            <ul>
                    
                        <li>
                            <a href="https://www.infosecurity-magazine.com:443/news/us-cert-zero-day-phishing-campaign/">US CERT: Zero-Day-based Phishing Campaign Rampages</a>
                        </li>
                    
                        <li>
                            <a href="https://www.infosecurity-magazine.com:443/news/new-approach-to-online-banking-takes/">New approach to online banking takes authentication out of the browser</a>
                        </li>
                    
                        <li>
                            <a href="https://www.infosecurity-magazine.com:443/news/facebook-fan-page-phishing-scam-aims-to-hijack/">Facebook Fan Page phishing scam aims to hijack accounts</a>
                        </li>
                    
                        <li>
                            <a href="https://www.infosecurity-magazine.com:443/news/irs-warns-taxpayers-about-latest-phishing-scams/">IRS warns taxpayers about latest phishing scams</a>
                        </li>
                    
                        <li>
                            <a href="https://www.infosecurity-magazine.com:443/news/december-vipre-report-suggests-that-old-phishing/">December VIPRE Report suggests that old phishing tactics are best</a>
                        </li>
                    
                            </ul>
                        </div>
                    

                
<div class="whats-hot">
    <h2>What&rsquo;s Hot on Infosecurity Magazine?</h2>
    <ul class="whats-hot-tabs">
        <li id="cphContent_WhatsHot_liRead" data-tab-value="read" class="active"><a href="javascript:;">Read</a></li>
        <li id="cphContent_WhatsHot_liShared" data-tab-value="shared"><a href="javascript:;" >Shared</a></li>
        <li id="cphContent_WhatsHot_liWatched" data-tab-value="watched"><a href="javascript:;">Watched</a></li>
        <li id="cphContent_WhatsHot_liEditors" data-tab-value="editors"><a href="javascript:;">Editor's Choice</a></li>
    </ul>
    <div class="whats-hot-stories">
        <div class="tab-panel active" data-tab-value="read" style="display: block;">
            <div class="col-1-3 col-left"><div class="content-item content-sml whats-hot-item colour-news"><a class="wrapper-link" href="https://www.infosecurity-magazine.com:443/news/ibm-patches-spectre-meltdown-power/"><span class="calendar-date"><span class="day">1</span></span><div class="content-info"><div class="content-meta"><time datetime="2018-02-12T11:17:00">12 Feb 2018</time> <span class="content-type">News</span></div><h3 class="content-headline">IBM Patches Spectre and Meltdown for Power Servers</h3></div><div class="clear"></div></a></div><div class="content-item content-sml whats-hot-item colour-news"><a class="wrapper-link" href="https://www.infosecurity-magazine.com:443/news/cryptomining-malware-found-on-4000/"><span class="calendar-date"><span class="day">2</span></span><div class="content-info"><div class="content-meta"><time datetime="2018-02-12T11:01:00">12 Feb 2018</time> <span class="content-type">News</span></div><h3 class="content-headline">Crypto-Mining Malware Found on 4000+ Sites</h3></div><div class="clear"></div></a></div><div class="content-item content-sml whats-hot-item colour-news"><a class="wrapper-link" href="https://www.infosecurity-magazine.com:443/news/shurl0ckr-ransomware-evades/"><span class="calendar-date"><span class="day">3</span></span><div class="content-info"><div class="content-meta"><time datetime="2018-02-07T13:55:00">7 Feb 2018</time> <span class="content-type">News</span></div><h3 class="content-headline">ShurL0ckr Ransomware Evades Malware Detection in Google Drive, O365</h3></div><div class="clear"></div></a></div></div><div class="col-1-3 col-right"><div class="content-item content-sml whats-hot-item colour-news"><a class="wrapper-link" href="https://www.infosecurity-magazine.com:443/news/winter-olympics-site-taken-out-for/"><span class="calendar-date"><span class="day">4</span></span><div class="content-info"><div class="content-meta"><time datetime="2018-02-12T10:04:00">12 Feb 2018</time> <span class="content-type">News</span></div><h3 class="content-headline">Winter Olympics Site Taken Out for 12 Hours</h3></div><div class="clear"></div></a></div><div class="content-item content-sml whats-hot-item colour-features"><a class="wrapper-link" href="https://www.infosecurity-magazine.com:443/opinions/cyber-intelligence-sharing/"><span class="calendar-date"><span class="day">5</span></span><div class="content-info"><div class="content-meta"><time datetime="2018-02-12T10:20:00">12 Feb 2018</time> <span class="content-type">Opinion</span></div><h3 class="content-headline">Why is Cyber Threat Intelligence Sharing Important?</h3></div><div class="clear"></div></a></div><div class="content-item content-sml whats-hot-item colour-news"><a class="wrapper-link" href="https://www.infosecurity-magazine.com:443/news/lazarus-rises-again-with/"><span class="calendar-date"><span class="day">6</span></span><div class="content-info"><div class="content-meta"><time datetime="2018-02-12T20:17:00">12 Feb 2018</time> <span class="content-type">News</span></div><h3 class="content-headline">Lazarus Rises Again with Aggressive Bitcoin-Stealing Campaign</h3></div><div class="clear"></div></a></div></div>
            <div class="clear"></div>
        </div>
        <div class="tab-panel" data-tab-value="shared">
            <div class="col-1-3 col-left"><div class="content-item content-sml whats-hot-item colour-news"><a class="wrapper-link" href="https://www.infosecurity-magazine.com:443/news/bec-attacks-jumped-17-last-year/"><span class="calendar-date"><span class="day">1</span></span><div class="content-info"><div class="content-meta"><time datetime="2018-02-13T11:18:00">13 Feb 2018</time> <span class="content-type">News</span></div><h3 class="content-headline">BEC Attacks Jumped 17% Last Year</h3></div><div class="clear"></div></a></div><div class="content-item content-sml whats-hot-item colour-news"><a class="wrapper-link" href="https://www.infosecurity-magazine.com:443/news/euro-smbs-paid-out-98m-for/"><span class="calendar-date"><span class="day">2</span></span><div class="content-info"><div class="content-meta"><time datetime="2018-02-13T10:36:00">13 Feb 2018</time> <span class="content-type">News</span></div><h3 class="content-headline">Euro SMBs Paid Out $98m for Ransomware Decryption Last Year</h3></div><div class="clear"></div></a></div><div class="content-item content-sml whats-hot-item colour-news"><a class="wrapper-link" href="https://www.infosecurity-magazine.com:443/news/cryptowars-bitgrail-hits-back-at/"><span class="calendar-date"><span class="day">3</span></span><div class="content-info"><div class="content-meta"><time datetime="2018-02-13T10:03:00">13 Feb 2018</time> <span class="content-type">News</span></div><h3 class="content-headline">Crypto-Wars: Bitgrail Hits Back at Dev Team After $170m &#39;Theft&#39;</h3></div><div class="clear"></div></a></div></div><div class="col-1-3 col-right"><div class="content-item content-sml whats-hot-item colour-features"><a class="wrapper-link" href="https://www.infosecurity-magazine.com:443/opinions/social-engineering-biggest-threat/"><span class="calendar-date"><span class="day">4</span></span><div class="content-info"><div class="content-meta"><time datetime="2018-02-13T09:30:00">13 Feb 2018</time> <span class="content-type">Opinion</span></div><h3 class="content-headline">Never Mind Malware - Social Engineering Will Be Your Biggest Threat This Year</h3></div><div class="clear"></div></a></div><div class="content-item content-sml whats-hot-item colour-news"><a class="wrapper-link" href="https://www.infosecurity-magazine.com:443/news/necurs-fuels-massive-valentines/"><span class="calendar-date"><span class="day">5</span></span><div class="content-info"><div class="content-meta"><time datetime="2018-02-12T20:30:00">12 Feb 2018</time> <span class="content-type">News</span></div><h3 class="content-headline">Necurs Fuels Massive Valentine&#39;s Day Spam Campaign</h3></div><div class="clear"></div></a></div><div class="content-item content-sml whats-hot-item colour-news"><a class="wrapper-link" href="https://www.infosecurity-magazine.com:443/news/mssps-waste-hours-of-time-on-false/"><span class="calendar-date"><span class="day">6</span></span><div class="content-info"><div class="content-meta"><time datetime="2018-02-12T20:25:00">12 Feb 2018</time> <span class="content-type">News</span></div><h3 class="content-headline">MSSPs Waste Hours of Time on False Alerts</h3></div><div class="clear"></div></a></div></div>
            <div class="clear"></div>
        </div>
        <div class="tab-panel" data-tab-value="watched">
            <div class="col-1-3 col-left"><div class="content-item content-sml whats-hot-item colour-webinars"><a class="wrapper-link" href="https://www.infosecurity-magazine.com:443/webinars/patch-fix-or-replace-flaws-bugs/"><span class="calendar-date"><span class="day">1</span></span><div class="content-info"><div class="content-meta"><time datetime="2018-02-15T16:00:00">15 Feb 2018, 16:00 GMT, 11:00 EST</time><time datetime="2018-02-15T17:00:00"></time> <span class="content-type">Webinar</span></div><h3 class="content-headline">Beyond the Hype of Meltdown &amp; Spectre: How to Patch, Fix or Replace Flaws &amp; Bugs</h3></div><div class="clear"></div></a></div><div class="content-item content-sml whats-hot-item colour-webinars"><a class="wrapper-link" href="https://www.infosecurity-magazine.com:443/webinars/most-modern-browsers-are/"><span class="calendar-date"><span class="day">2</span></span><div class="content-info"><div class="content-meta"><time datetime="2018-03-15T18:00:00">15 Mar 2018, 14:00 EDT, 11:00 PDT</time><time datetime="2018-03-15T19:00:00"></time> <span class="content-type">Webinar</span></div><h3 class="content-headline">Why Many Websites are still Insecure (and How to Fix Them)</h3></div><div class="clear"></div></a></div><div class="content-item content-sml whats-hot-item colour-webinars"><a class="wrapper-link" href="https://www.infosecurity-magazine.com:443/webinars/prevent-impersonation-attacks/"><span class="calendar-date"><span class="day">3</span></span><div class="content-info"><div class="content-meta"><time datetime="2018-01-18T18:00:00">18 Jan 2018</time><time datetime="2018-01-18T19:00:00"></time> <span class="content-type">Webinar</span></div><h3 class="content-headline">Why Is Everyone Talking about Email Authentication and Why Should I Care?</h3></div><div class="clear"></div></a></div></div><div class="col-1-3 col-right"><div class="content-item content-sml whats-hot-item colour-webinars"><a class="wrapper-link" href="https://www.infosecurity-magazine.com:443/webinars/long-live-it-security/"><span class="calendar-date"><span class="day">4</span></span><div class="content-info"><div class="content-meta"><time datetime="2018-01-18T15:00:00">18 Jan 2018</time><time datetime="2018-01-18T16:00:00"></time> <span class="content-type">Webinar</span></div><h3 class="content-headline">IT Security is Dead - Long Live IT Security!</h3></div><div class="clear"></div></a></div><div class="content-item content-sml whats-hot-item colour-webinars"><a class="wrapper-link" href="https://www.infosecurity-magazine.com:443/webinars/security-evangelist/"><span class="calendar-date"><span class="day">5</span></span><div class="content-info"><div class="content-meta"><time datetime="2018-01-11T15:00:00">11 Jan 2018</time><time datetime="2018-01-11T16:00:00"></time> <span class="content-type">Webinar</span></div><h3 class="content-headline">How to be a Security Evangelist, Now and in the Future</h3></div><div class="clear"></div></a></div><div class="content-item content-sml whats-hot-item colour-webinars"><a class="wrapper-link" href="https://www.infosecurity-magazine.com:443/webinars/six-months-until-gdpr/"><span class="calendar-date"><span class="day">6</span></span><div class="content-info"><div class="content-meta"><time datetime="2017-11-30T15:00:00">30 Nov 2017</time><time datetime="2017-11-30T16:00:00"></time> <span class="content-type">Webinar</span></div><h3 class="content-headline">Six Months until GDPR, Final Steps to Compliance</h3></div><div class="clear"></div></a></div></div>
            <div class="clear"></div>
        </div>
        <div class="tab-panel" data-tab-value="editors">
            <div class="col-1-3 col-left"><div class="content-item content-sml whats-hot-item colour-features"><a class="wrapper-link" href="https://www.infosecurity-magazine.com:443/news-features/cybersecurity-predictions-2018-one/"><span class="calendar-date"><span class="day">1</span></span><div class="content-info"><div class="content-meta"><time datetime="2018-01-09T09:30:00">9 Jan 2018</time> <span class="content-type">News Feature</span></div><h3 class="content-headline">Cybersecurity Predictions for 2018 - Part One</h3></div><div class="clear"></div></a></div><div class="content-item content-sml whats-hot-item colour-features"><a class="wrapper-link" href="https://www.infosecurity-magazine.com:443/opinions/2017-email-data-breaches/"><span class="calendar-date"><span class="day">2</span></span><div class="content-info"><div class="content-meta"><time datetime="2018-01-23T09:30:00">23 Jan 2018</time> <span class="content-type">Opinion</span></div><h3 class="content-headline">2017: The Year of Email Data Breaches </h3></div><div class="clear"></div></a></div><div class="content-item content-sml whats-hot-item colour-features"><a class="wrapper-link" href="https://www.infosecurity-magazine.com:443/news-features/cybersecurity-predictions-2018-two/"><span class="calendar-date"><span class="day">3</span></span><div class="content-info"><div class="content-meta"><time datetime="2018-01-10T11:30:00">10 Jan 2018</time> <span class="content-type">News Feature</span></div><h3 class="content-headline">Cybersecurity Predictions for 2018 - Part Two</h3></div><div class="clear"></div></a></div></div><div class="col-1-3 col-right"><div class="content-item content-sml whats-hot-item colour-nextgen"><a class="wrapper-link" href="https://www.infosecurity-magazine.com:443/next-gen-infosec/search-engines-penetration-testing/"><span class="calendar-date"><span class="day">4</span></span><div class="content-info"><div class="content-meta"><time datetime="2018-01-17T12:30:00">17 Jan 2018</time> <span class="content-type">Next-Gen</span></div><h3 class="content-headline">Using Search Engines as Penetration Testing Tools</h3></div><div class="clear"></div></a></div><div class="content-item content-sml whats-hot-item colour-features"><a class="wrapper-link" href="https://www.infosecurity-magazine.com:443/blogs/underworld-learn-1980s/"><span class="calendar-date"><span class="day">5</span></span><div class="content-info"><div class="content-meta"><time datetime="2018-01-15T15:30:00">15 Jan 2018</time> <span class="content-type">Blog</span></div><h3 class="content-headline">&quot;In the Underworld&quot; - What can Cybersecurity learn from the World of 1980s&#39; Professional Crime?</h3></div><div class="clear"></div></a></div><div class="content-item content-sml whats-hot-item colour-news"><a class="wrapper-link" href="https://www.infosecurity-magazine.com:443/news/uk-nation-for-gdpr/"><span class="calendar-date"><span class="day">6</span></span><div class="content-info"><div class="content-meta"><time datetime="2018-01-22T13:08:00">22 Jan 2018</time> <span class="content-type">News</span></div><h3 class="content-headline">UK &#39;Most Well-Prepared&#39; European Nation for GDPR</h3></div><div class="clear"></div></a></div></div>
            <div class="clear"></div>
        </div>
    </div>
    
</div>
<input type="hidden" id="whatsHotActiveTab" value="read" />

            
		</div>
            <div class="clear"></div>
        </div>
    
	</div>

    <script type="text/javascript">
        var stickySharing = $('.sticky-share');
        var isStickySharing = false;

        $(function () {
            $(window).on('scroll', function () {
                var offsetStickySharing = $('.article-body').offset().top;
                var scrollTop = $(window).scrollTop();

                if (isStickySharing === true && scrollTop < offsetStickySharing) {
                    var currentOffset = scrollTop;
                    var newOffset = offsetStickySharing - scrollTop;
                    var distanceToMove = Math.abs(offsetStickySharing);

                    isStickySharing = false;
                    stickySharing.css('position', '').css('top', '0');
                }

                if (isStickySharing === false && scrollTop >= offsetStickySharing) {
                    var currentOffset = offsetStickySharing - scrollTop;
                    var distanceToMove = Math.abs(currentOffset);

                    isStickySharing = true;
                    stickySharing
                        .css('position', 'fixed')
                        .css('top', currentOffset)
                        .animate({ 'top': 0 }, (distanceToMove * 2));
                }
            });
        });
    </script>

    <script type="text/javascript">
        var webpageId = 117478;
        var prevalErrors = null;

        $('.preval-message').remove();
        if (prevalErrors !== null) {
            for (var obj in prevalErrors) {
                var error = prevalErrors[obj],
                    control = $('[data-property-name="' + prevalErrors[obj].PropertyName + '"]');

                if (control.length > 0)
                {
                    control.addClass('has-preval');
                }
            }
        }
    </script>

    <script type="text/javascript">
        $(function(){
            $('.js-download').on('click', function(){
                $.ajax({
                    type: 'POST',
                    dataType: 'json',
                    url: '/adv-download/',
                    data: {
                        id: $(this).data('layout')
                    },
                    success: function(response, status){
                        if(status === "success") {
                            window.location = response.RedirectUrl;
                        }
                    }
                });
            });
        });
    </script>

    
        <script type="text/javascript">
            var disqus_config = function () {
                this.page.remote_auth_s3 = disqus_remote_auth;
                this.page.api_key = 'bmQJhm7DWK8yGdGdgMsDlxalVRzAoUeU44hhpTqsPWyxVkLVAFj5CxRHo2GRIl9a';
                this.sso = {
                    name: sso_name,
                    url: sso_url,
                    button: 'https://www.infosecurity-magazine.com:443/_common/img/disqus-login.png',
                    logout: sso_logout,
                    width: sso_width,
                    height: sso_height
                };
            };

            var disqus_remote_auth = '({})';
            var disqus_shortname = 'infosecuritymagazine';
            var disqus_identifier = '';
            var disqus_title = '';
            var disqus_url = ''
            var sso_url = '';
            var sso_name = 'Infosecurity Magazine';
            var sso_logout = '';
            var sso_width = '';
            var sso_height = '';

            $(function () {
                $.get('/session-control/?method=disqus&id=117478', function (data) {
                    if (data.disqus_remote_auth != null) {
                        disqus_remote_auth = data.disqus_remote_auth;
                    }

                    disqus_shortname = data.disqus_shortname;
                    disqus_identifier = data.disqus_identifier;
                    disqus_title = data.disqus_title;
                    disqus_url = data.disqus_url;

                    sso_url = data.sso_url;
                    sso_logout = data.sso_logout;
                    sso_width = data.sso_width;
                    sso_height = data.sso_height;
                    sso_name = data.sso_name;
                }).done(function () {
                    var dsq = document.createElement('script'); dsq.type = 'text/javascript'; dsq.async = true;
                    dsq.src = '//' + disqus_shortname + '.disqus.com/embed.js';
                    (document.getElementsByTagName('head')[0] || document.getElementsByTagName('body')[0]).appendChild(dsq);
                });
            });
        </script>
    


                
</div>

                
                    <footer class="footer">
                        <div class="container">
                            <div class="footer-ad-col">
                                <div class="dfp leaderboard" id="dfp-ad-627ddcfa-8e25-4cf4-9623-1bacbcfa4637" data-ad-sizes="[728,90]" style="display: none;"></div>

                                <div class="footer-social-links">
                                    <a href="https://www.facebook.com/pages/Infosecurity-Magazine/210560332330063" target="_blank" class="fb"><i class="spricon-fb"></i></a>
                                    <a href="https://twitter.com/InfosecurityMag" target="_blank" class="tw"><i class="spricon-tw"></i></a>
                                    <a href="https://plus.google.com/+InfosecurityMagazine/posts" target="_blank" class="gp"><i class="spricon-gp"></i></a>
                                    <a href="http://www.linkedin.com/groups?gid=2035794&amp;trk=myg_ugrp_ovr" target="_blank" class="li"><i class="spricon-li"></i></a>
                                </div>

                                <a href="http://www.infosec.co.uk/en/about/infosecurity-group/" target="_blank" class="infosecurity-group-logo"><i class="spricon-group"></i></a>
                                <div class="clear"></div>
                            </div>

                            <div class="footer-links-col">
                                <div class="left-links">
                                    <ul>
                                        <li class="list-header">The Magazine</li>
                                        <li><a href="https://www.infosecurity-magazine.com:443/the-magazine/">About Infosecurity</a></li>
                                        <li><a href="https://www.infosecurity-magazine.com:443/subscription/">Subscription</a></li>
                                        <li><a href="https://www.infosecurity-magazine.com:443/meet-the-team/">Meet the Team</a></li>
                                        <li><a href="https://www.infosecurity-magazine.com:443/contacts/">Contact Us</a></li>
                                    </ul>
                                </div>

                                <div class="right-links">
                                    <ul>
                                        <li class="list-header">Advertisers</li>
                                        <li><a href="https://www.infosecurity-magazine.com:443/mediapack/">Media Pack</a></li>
                                    </ul>
                                    <ul>
                                        <li class="list-header">Contributors</li>
                                        <li><a href="https://www.infosecurity-magazine.com:443/forward-features/">Forward Features</a></li>
                                        <li><a href="https://www.infosecurity-magazine.com:443/op-ed/">Op-ed</a></li>
                                        <li><a href="https://www.infosecurity-magazine.com:443/nextgen-infosec-submission/">Next-Gen Submission</a></li>
                                    </ul>
                                </div>
                            </div>

                            <div class="copyright-notices">
                                <ul class="copyright-links">
                                    <li class="copyright-info">Copyright &copy; 2018 Reed Exhibitions Ltd.</li>
                                    <li><a href="https://www.infosecurity-magazine.com:443/terms-and-conditions/">Terms and Conditions</a></li>
                                    <li><a href="https://www.infosecurity-magazine.com:443/privacy-policy/">Privacy Policy</a></li>
                                    <li><a href="https://www.infosecurity-magazine.com:443/intellectual-property-statement/">Intellectual property statement</a></li>
                                    <li><a href="https://www.infosecurity-magazine.com:443/cookies/">Use of Cookies</a></li>
                                    <li><a href="https://www.infosecurity-magazine.com:443/sitemap/">Sitemap</a></li>
                                    <li class="reed-expo"><a href="http://www.reedexpo.com/" target="_blank"><i class="spricon-reedex"></i></a></li>
                                </ul>
                            </div>
                        </div>
                    </footer>
                
            </div>
        </div>

        <div style="background: rgba(0,0,0,0.8); width: 100%; height: 100%; position: fixed; z-index: 1000000; top: 0; left: 0; display: none;filter: progid:DXImageTransform.Microsoft.gradient(GradientType=0,startColorstr='#4c000000', endColorstr='#4c000000');" id="loadingPane">
            <div style="width: 240px; position: fixed; background: #000; top: 0; left: 50%; margin-left: -140px; padding: 20px; z-index: 1000001; border: 1px solid #fff; border-top: none; color: #fff; text-align: center; font-size:1.7143em;line-height:1.3333em;">
                Please wait…
            </div>
        </div>

        <div class="refresh-ads"></div>

        <script type="text/javascript">
            var gptZone = 'news/phishers-plumb-hurricane-harvey';
            var gptTopics = ['Cybercrime', 'Human Factor', 'Phishing', 'Social Engineering', 'Security Training and Awareness'];
        </script>

        
    <script type="text/javascript" src="//res.infosecurity-magazine.com/js-0039/underscore.min.js"></script>
    <script type="text/javascript" src="//res.infosecurity-magazine.com/js-0039/unveil.js"></script>
    <script type="text/javascript" src="//res.infosecurity-magazine.com/js-0039/ticker.min.js"></script>
    <script type="text/javascript" src="//res.infosecurity-magazine.com/js-0039/ism.js"></script>
    <script type="text/javascript" src="//s7.addthis.com/js/300/addthis_widget.js#pubid=ra-4d79fed038d59786"></script>
    <script type="text/javascript" src="//res.infosecurity-magazine.com/js-0039/ism/ism.whatshot.js"></script>

        <script type="text/javascript">
            highlightNavigation('colour-news');
        </script>
    </div>
</body>
</html>