You've Got BEC!

You've Got BEC!

It's not hard to see why BEC works. Requests from the appropriate person, requests for wire transfers or sensitive employee information may be part of a normal workday. But when those requests come from someone else, it can be a costly case of mistaken identity.

Falling for an impostor's email is easier than you might think. That's because business email compromise (BEC) attacks prey on human nature, the innate psychological traits shared by everyone.

Here's a roundup of the most high-profile (and low-minded) BEC and EAC attacks of the last 12 months.

Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing, you agree to our use of cookies.