Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

phishing schemes

Results 1 - 12 of 12Sort Results By: Published Date | Title | Company Name
Published By: Mimecast     Published Date: Jun 15, 2017
Join Howard M. Cohen, Senior Resultant, Tech Channel Partners Results and Orlando Scott-Cowley, Cybersecurity Strategist, Mimecast for this webcast and hear from industry experts regarding the latest email phishing and whaling schemes penetrating the market and the steps needed to protect your employees and organization.
Tags : 
mimecast, phishing, whaling, internet security, email security, cyber attacks, security, enterprise applications
    
Mimecast
Published By: Symantec     Published Date: Jul 30, 2014
This paper highlights the current growth and trends in today’s phishing schemes, the potential impact on companies, and insight into how businesses can apply technology to protect themselves and their customers.
Tags : 
latest phishing schemes, cybercrime, protecting against phishing, impacts of phishing schemes
    
Symantec
Published By: Symantec     Published Date: Jul 30, 2014
This paper highlights the current growth and trends in today’s phishing schemes, the potential impact on companies, and insight into how businesses can apply technology to protect themselves and their customers.
Tags : 
latest phishing schemes, cybercrime, protecting against phishing, impacts of phishing schemes
    
Symantec
Published By: Symantec     Published Date: Jul 30, 2014
This paper highlights the current growth and trends in today’s phishing schemes, the potential impact on companies, and insight into how businesses can apply technology to protect themselves and their customers.
Tags : 
latest phishing schemes, cybercrime, protecting against phishing, impacts of phishing schemes
    
Symantec
Published By: Symantec     Published Date: Jul 30, 2014
This paper highlights the current growth and trends in today’s phishing schemes, the potential impact on companies, and insight into how businesses can apply technology to protect themselves and their customers.
Tags : 
latest phishing schemes, cybercrime, protecting against phishing, impacts of phishing schemes
    
Symantec
Published By: Symantec     Published Date: Jul 30, 2014
This paper highlights the current growth and trends in today’s phishing schemes, the potential impact on companies, and insight into how businesses can apply technology to protect themselves and their customers.
Tags : 
latest phishing schemes, cybercrime, protecting against phishing, impacts of phishing schemes
    
Symantec
Published By: Symantec     Published Date: Jul 30, 2014
This paper highlights the current growth and trends in today’s phishing schemes, the potential impact on companies, and insight into how businesses can apply technology to protect themselves and their customers.
Tags : 
latest phishing schemes, cybercrime, protecting against phishing, impacts of phishing schemes
    
Symantec
Published By: Symantec     Published Date: Jul 28, 2014
This paper highlights the current growth and trends in today’s phishing schemes, the potential impact on companies, and insight into how businesses can apply technology to protect themselves and their customers.
Tags : 
latest phishing schemes, cybercrime, protecting against phishing, impacts of phishing schemes
    
Symantec
Published By: VeriSign Incorp.     Published Date: Apr 15, 2009
Stay on top of the current trends in today's phishing schemes, the potential impact on companies, and insight into how you can apply technology to protect your business and customers.
Tags : 
extended validation, green bar, online security, optimize, sgc, server gated cryptography, phishing, malware
    
VeriSign Incorp.
Published By: Thawte     Published Date: Oct 06, 2014
In this fraud alert paper, we’ll highlight the current trends in today’s phishing schemes, with a particular focus on the latest threats emerging from China. Then we’ll offer some ideas and best practices for applying technology to protect both yourself and your customers.
Tags : 
    
Thawte
Published By: Symantec     Published Date: Dec 04, 2014
As one of the top cyber crime ploys impacting both consumers and businesses, phishing has remained a consistently potent threat over the past several years.
Tags : 
phishing, cyber crime, internet fraud, phishing schemes, hacker, fraud alert, phishing kits, security
    
Symantec
Published By: Cyveillance     Published Date: Jun 20, 2014
Phishing is defined by the Financial Services Technology Consortium (FSTC) as a broadly launched social engineering attack in which an electronic identity is misrepresented in an attempt to trick individuals into revealing personal credentials that can be used fraudulently against them. In short, it’s online fraud to the highest degree. Although it’s been around for years, phishing is still one of the most common and effective online scams. The schemes are varied, typically involving some combination of spoofed email (spam), malicious software (malware), and fake websites to harvest personal information from unwitting consumers. The explosive rise of mobile devices, mobile applications, and social media networks has given phishers new vectors to exploit, along with access to volumes of personal data that can be used in more targeted attacks or spear phishing. The fact that phishing attacks are still so common highlights their efficacy and reinforces the need to implement comprehensive phishing and response plans to protect organizations. An effective phishing protection plan should focus on four primary areas: Prevention, Detection, Response, and Recovery. High-level recommendations for each of the four areas are outlined in this whitepaper.
Tags : 
cyveillance, phishing, security, cyberattacks, cybercriminals, threats
    
Cyveillance
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.