article thumbnail

Protect Yourself Before You Wreck Yourself: Understanding Security Threats

Tech Soup

There was some relief at the end of this presentation, however — the researchers provided some tips for organizations: Be careful of connecting mobile phones to enterprise computers for charging purposes. An article from Symantec's Norton explains this nefarious twist on an old scam: "The spear phisher thrives on familiarity.