Phishing and Outlook Rules

Download this episode

Download Video

Description

Criminals are using Outlook rules to create email box proxies, effectively gaining persistence and stealth. Here's how.

Tag:

Security

Embed

Format

Available formats for this video:

Actual format may change based on video formats available and browser capability.

    The Discussion

    Add Your 2 Cents