Can Amazon’s Sweet Deal on Virtual Machines Free Companies From Phishing Threats?

Hacking has long been thought of as a sort of black magic whose incantations are made using keyboards. That is, until 2016, when the John Podesta email hack made big enough news that hackers’ dirty secret got out: many breaches have less to do with coding skills and much more to do with classic trickery, albeit in digital form. Web users simply get duped into entering their username and passwords onto fake websites. With that information, it doesn’t take any special cleverness to hack a system. The attacker has the keys.

To read the full article: