article thumbnail

Smooth Cybercriminals: Google Warns of Iran-Backed APT Hackers

SecureWorld News

One method this group likes to use is to create email messages to target conference goers. One of the most notable characteristics of APT35 is their impersonation of conference officials to conduct phishing attacks. The phishing kit will also ask for second-factor authentication codes sent to devices," reads the TAG blog post.

Google 76
article thumbnail

Cloud Musings by Kevin L. Jackson: IBM Debate Series - What's.

Cloud Musings

Next week I will be participating in the inaugural session of What’s Next in IT Debate Series , a new program of authentic debates and conversations on key technology topics. In addition, David is a frequent keynote presenter at industry conferences, with over 500 presentations given in the last 20 years.

IBM 107