Phishing: Inside the New Attacks

Agari's Markus Jakobsson on How the Attackers are Getting Stealthier

Immediately after the 2016 U.S. presidential election, there was a phishing attack that impressed experts with its ingenuity. Markus Jakobsson of Agari discusses this and other recent attacks - and what we must learn from them.

See Also: The Operationalization of Threat Intelligence Programs

In a video interview at RSA Conference 2017, Jakobsson discusses:

  • The phishing attack that followed the election;
  • Phishing methods that worked so well in the Democratic National Committee breach;
  • How organizations must respond to this new level of social engineering.

Jakobsson, chief scientist at Agari, is a leading researcher studying phishing, crimeware, mobile security and how to protect users against fraud. He specializes in research around applied security, ranging from business email compromise to mobile malware detection and improved user interfaces. Jakobsson has written numerous books and more than 100 peer-reviewed conference and journal articles, and holds more than 50 patents and 100 pending patents. He is a research fellow of the Anti-Phishing Working Group and has served as a technical adviser to the Financial Services Technology Consortium.

Additional Summit Insight:
Hear from more industry influencers, earn CPE credits, and network with leaders of technology at our global events. Learn more at our Fraud & Breach Prevention Events site.


About the Author

Tom Field

Tom Field

Senior Vice President, Editorial, ISMG

Field is responsible for all of ISMG's 28 global media properties and its team of journalists. He also helped to develop and lead ISMG's award-winning summit series that has brought together security practitioners and industry influencers from around the world, as well as ISMG's series of exclusive executive roundtables.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.