Home phishing
 

Keywords :   


Tag: phishing

Google Adds Malware, Phishing Stats to Transparency Report

2013-06-25 22:34:07| PC Magazine Software Product Guide

Google is boosting its online transparency reports by adding details about sources of malware and phishing attacks.

Tags: report google stats adds

 

Google Outs Iran for Pre-Election Phishing Expedition

2013-06-13 20:09:26| TechNewsWorld

Google announced it has been tracking and disrupting "multiple email-based phishing campaigns" in Iran. The campaigns, which have been going on for nearly three weeks, are targeting the accounts of tens of thousands of Iranian users. Google posits that the phishing is related to the Iranian presidential elections, which will be held Friday.

Tags: google iran outs expedition

 
 

Google uncovers phishing campaign targeting Iranians

2013-06-13 08:49:28| CNET News.com

Web giant says it has identified a significant spike in phishing activity originating from within the country just days ahead of presidential elections. [Read more]    

Tags: google campaign targeting phishing

 

Hackers increasingly target shared Web hosting servers for use in mass phishing attacks

2013-04-26 17:12:11| InfoWorld: Top News

Cyber criminals increasingly hack into shared Web hosting servers in order to use the domains hosted on them in large phishing campaigns, according to a report from the Anti-Phishing Working Group (APWG). Forty-seven percent of all phishing attacks recorded worldwide during the second half of 2012 involved such mass break-ins, APWG said in the latest edition of its Global Phishing Survey report published Thursday.

Tags: web target hosting mass

 

How to blunt spear phishing attacks

2013-03-07 12:00:00| InfoWorld: Top News

According to Allen Paller, director of research at the SANS Institute, 95 percent of all attacks on enterprise networks are the result of successful spear phishing. In other words, somebody received an email and either clicked on a link or opened a file that they weren't supposed to. For example, Chinese hackers successfully broke into computers at The New York Times through spear phishing. So what are the steps that IT execs can take to protect enterprise networks from spear phishing?

Tags: attacks blunt spear phishing

 

Sites : [1] [2] [3] [4] [5] [6] [7] [8] [9] next »