4 ways attackers target humans to gain network access

From csoonline.com

One avatar is uniquely identified among others at the center of a target in a digital environment.

Every day, I see the failure in our technology. I’m sure you see it as well. Since the day we started receiving email, we have failed at protecting recipients from scams, phishes and other email messages that they don’t want. I remember the infamous email-based computer worm, the “ILOVEYOU virus,” that infected fellow IT friends back in 2000.

Read more…