WhatIs definition: Whaling

Email and Messaging Threats (spam, phishing, instant messaging)

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • phishing

    Phishing is an e-mail fraud method in which the perpetrator sends out legitimate-looking email in an attempt to gather personal and financial information from recipients. 

  • Top spammer indicted on email fraud, identity theft

    The arrest may reduce the volume of spam in the short-term, say experts and analysts, but the real spam threat comes from criminal gangs based in Asia and Russia. 

  • Sender Policy Framework (SPF)

    Sender Policy Framework (SPF) is an anti-spam approach in which the Internet domain of an e-mail sender can be authenticated for that sender, thereby discouraging spam mailers, who routinely disguise the origin of their e-mail, a practice known as e-... 

  • cloaking

    Cloaking is the masking of the sender's name and address in an e-mail note or distribution. 

  • anonymous email

    Anonymous e-mail is e-mail that has been directed to a recipient through a third-party server that does not identify the originator of the message. 

  • IETF approves new weapon to fight spam, phish

    DomainKeys Identified Mail specification (DKIM) gained approval as an official IETF standard. The approval is seen as a major step in the fight against spam and phishing attacks. 

  • Symantec fixes flaws in Norton, pcAnywhere

    Attackers could exploit flaws in Symantec's Norton AntiVirus and pcAnywhere to launch malicious code or compromise a user's session credentials. 

  • Death threats part of new online scam

    Security experts are warning of a new online scam in which the victim receives an emailed death threat. Such scams are becoming known as a 419 death threat. 

  • Technology making headway in spam battle

    Few people in the world know more about identifying and stopping spam and other unwanted email than Paul Judge. Now the chief technology officer at Secure Computing Inc., Judge spent years at CipherTrust studying spammers, their motives and tactics a... 

  • How can header information track down an email spoofer?

    Spammers can use spoofed headers to hide the true origin of unwanted email. In this SearchSecurity.com Q&A, application security expert Michael Cobb explains how to trust where a message is coming from.