WhatIs definition: Whaling

Email and Messaging Threats (spam, phishing, instant messaging)

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Spear phishing: Don't be a target

    Hackers are beginning to use targeted attacks to exploit network vulnerabilities. In this tip, Al Berg introduces a specific targeted attack, spear phishing, and provides tactics information security practitioners can use to protect their organizati... 

  • Scientists band together for TRUST-worthy research

    A group of the nation's top computer scientists and colleges are teaming up to find better ways to protect computing systems from cyberattacks. 

  • Attacks driven by love of money

    Symantec's latest threat report shows digital desperadoes are exploiting Web application flaws and using "modular" malcode to launch lucrative attacks. 

  • CAPTCHA (Completely Automated Public Turing Test to tell Computers and Humans Apart)

    A CAPTCHA (Completely Automated Public Turing test to tell Computers and Humans Apart) is a test, used with challenge-response systems, that's designed to differentiate humans from automated senders. (Continued) 

  • Security Wire Weekly audio downloads

    Get the week's top information security news while you're commuting to work or at the gym -- whenever it's convenient to you! Listen to our Security Wire Weekly audio downloads by SearchSecurity's award-winning news team and stay in the know. 

  • Review: Spam Firewall a 'comfortable mid-sized sedan'

    Barracuda Spam Firewall's per-appliance pricing, clustering capability and centralized administration makes for a solid value proposition. 

  • Enterprise-level spam filters

    Learn whether there a corporate spam filter that allows individual users to add specific e-mail addresses to block or whitelist as needed, in this application security Ask the Expert Q&A. 

  • AV upstarts tout need for speed in zero-day fight

    Data suggests upstart European antivirus firms are reacting more quickly to emerging zero-day threats, but opinions differ on whether speed is an important factor when choosing a vendor. 

  • FTC promotes ID theft awareness

    The government's new quiz aims to highlight the growing problem, but the latest data suggests many consumers still fail to protect their identity. 

  • A Business Guide to Information Security: Threats and Compliance

    In this excerpt from Chapter 1 of A Business Guide to Information Security, author Alan Calder identifies six future risks to information security and explains how they will affect individuals and organizations.