The new attack strategy marks the latest escalation in the perpetual cat-and-mouse game being played by hackers and the security software developers trying to stay one step ahead of them. “The method of phishing is by an attachment of an email; the attachment is disguised as a printer output, and it contains a script inside an archive file,” said Fatih Orhan, vice president of Comodo Threat Research Labs.
Read full news article on Talkin’ Cloud