WhatIs definition: Whaling

Email and Messaging Threats (spam, phishing, instant messaging)

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Can email header information be used to track down spoofers?

    Expert Mike Cobb explains how to use your received headers to trace unwanted emails. 

  • How can I prevent spammers from populating my mailing list?

    SearchSecurity.com's information security threats expert, Ed Skoudis, explains the workings of a spambot and teaches the strategies you need to counter spammers and clean up your mailing lists. 

  • One-time password tokens: Best practices for two-factor authentication

    In this tip, Joel Dubin examines how to physically secure one-time password tokens and how to properly implement them to provide effective two-factor authentication. 

  • Security Bytes: Hackers target the Terminator

    In other news, Symantec upgrades its Norton product line and the Anti-Phishing Working Group says phishing activity soared this summer. 

  • Security Blog Log: Word doc scam evades spam filters

    Also this week: A researcher gets a harsh reward after flagging a University of Southern California Web site flaw, and more blogs are keeping an eye on the latest security breaches. 

  • Online crime as ugly as ever

    At this year's Conference on Email and Antispam, one expert said that despite the increasing complexity of online scams and attacks, digital criminals are less about the technology and more about the crime. 

  • Battling image spam

    The threat environment is changing once again as spammers investigate new technologies in an effort to stay one step ahead of spam filters. Their latest technique: image spam. In this tip, Mike Chapple provides an example of image spam and explains h... 

  • How to prevent VoIP phishing

    Don't fall prey to a VoIP phishing scam. In this Information Security Threats Ask the Expert Q&A, Ed Skoudis explains why end-to-end encrypted VoIP phones cannot prevent VoIP scams and how to protect against them. 

  • Combating phishing scams

    In this Information Security Threats Ask the Expert Q&A, Ed Skoudis reviews what to do if you've been phished and identifies the phishing coalitions that can help combat this email threat 

  • Security Bytes: ISS warns of new Microsoft Windows flaw

    Attackers could exploit the latest Microsoft Windows flaw to crash vulnerable machines. Meanwhile, Symantec fixes a Brightmail AntiSpam flaw.