je.st
news
Tag: phishing
Google Adds Malware, Phishing Stats to Transparency Report
2013-06-25 22:34:07| PC Magazine Software Product Guide
Google is boosting its online transparency reports by adding details about sources of malware and phishing attacks.
Tags: report
google
stats
adds
Google Outs Iran for Pre-Election Phishing Expedition
2013-06-13 20:09:26| TechNewsWorld
Google announced it has been tracking and disrupting "multiple email-based phishing campaigns" in Iran. The campaigns, which have been going on for nearly three weeks, are targeting the accounts of tens of thousands of Iranian users. Google posits that the phishing is related to the Iranian presidential elections, which will be held Friday.
Tags: google
iran
outs
expedition
Google uncovers phishing campaign targeting Iranians
2013-06-13 08:49:28| CNET News.com
Web giant says it has identified a significant spike in phishing activity originating from within the country just days ahead of presidential elections. [Read more]
Tags: google
campaign
targeting
phishing
Hackers increasingly target shared Web hosting servers for use in mass phishing attacks
2013-04-26 17:12:11| InfoWorld: Top News
Cyber criminals increasingly hack into shared Web hosting servers in order to use the domains hosted on them in large phishing campaigns, according to a report from the Anti-Phishing Working Group (APWG). Forty-seven percent of all phishing attacks recorded worldwide during the second half of 2012 involved such mass break-ins, APWG said in the latest edition of its Global Phishing Survey report published Thursday.
How to blunt spear phishing attacks
2013-03-07 12:00:00| InfoWorld: Top News
According to Allen Paller, director of research at the SANS Institute, 95 percent of all attacks on enterprise networks are the result of successful spear phishing. In other words, somebody received an email and either clicked on a link or opened a file that they weren't supposed to. For example, Chinese hackers successfully broke into computers at The New York Times through spear phishing. So what are the steps that IT execs can take to protect enterprise networks from spear phishing?
Tags: attacks
blunt
spear
phishing