recommended reading

How to Avoid Getting Spear-Phished by China's Hackers Who Cracked Apple

Ivelin Radkov/

The tidal wave of Chinese hack attacks on the U.S. in recent weeks, from The New York Times and the Defense Department to Facebook and now even Apple, have one increasingly common and sophisticated type of malware trick in common: "spear-phishing." The tech giants seem to be the victim of a site called iPhonedevSdk, while WikiLeaks and a new cyber-espionage report appear to connect hacked Cabinet-level emails with a Chinese army-linked group known as "Comment Crew." But beyond the initial paranoia that we may be on the brink of "an asymmetrical digital with China," you'd be forgiven for asking: If tech giants and the government can fall prey to a bad link in an email, why can't I? As some have quipped, targeted spear-phishing emails are "not a terribly sophisticated attack" — it's advance spam, really — but just because the more complex spear-phishing schemes make up a fraction of basic phishing scams doesn't mean you and your company can't avoid embarrassment. Spear-fishing does pay off for hackers 40-to-1, after all. This new round of attacks may be more sophisticated than that, as Facebook has insistedsince it unveiled its internal vulnerability on Friday, but here's a starter guide on how not to be that guy, just in case the Chinese hacker war hits your inbox next:

Step 1: Understand the Difference Between Phishing and Spear-Phishing

Phishing attacks are the more blatantly malicious ones — they come from big organizations sending generic emails from generic addresses to thousands of inboxes, hoping that just some of the malware recipients will click a malicious link or download an infected file. A common phishing scam is a fake version of your bank asking you for your online banking login, but it gets worse than that

Spear-phishing, on the other hand, targets a small group of specific users, as ComputerWorld's Gregg Keizer explained in a 2011 post. And instead of coming from a big company or social-media network, these emails come from senders who appear to be colleagues or friends. They also tend to include personalized touches, as security firm Norton explains on its site:

The salutation on the email message is likely to be personalized: "Hi Bob" instead of "Dear Sir." The email may make reference to a "mutual friend." Or to a recent online purchase you've made. Because the email seems to come from someone you know, you may be less vigilant and give them the information they ask for.

Read more at The Atlantic Wire

(Image via Ivelin Radkov/

Threatwatch Alert

Thousands of cyber attacks occur each day

See the latest threats


Close [ x ] More from Nextgov

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security


When you download a report, your information may be shared with the underwriters of that document.