WhatIs definition: Whaling

Email and Messaging Threats (spam, phishing, instant messaging)

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • How effective are phishing links that refer to FTP sites?

    The vast majority of phishing emails still include HTTP links, but there has been a recent smattering that refer to FTP sites. In this SearchSecurity.com Q&A, Ed Skoudis explains how to be ready for the malicious messages. 

  • What security issues can arise from unsynchronized system clocks?

    Network administrators don't always pay enough attention to the issues of system clock accuracy and time synchronization. Michael Cobb explains why that can lead to security problems. 

  • How can copying file and exchanging memory tokens spread malware?

    Ed Skoudis explains the malware-related risks of copying files, exchanging memory sticks and downloading emails. 

  • Are challenge-response technologies the best way to stop spam?

    Challenge-response spam technology intercepts incoming emails and sends a challenge to the sender, asking him or her to confirm the message's validity. Though the antispam mechanism has gained popularity, there may be more secure alternatives, says e... 

  • Will only allowing whitelist email messages stop image spam?

    Some organizations automatically delete email messages that contain images that are not from whitelist senders. That technique can combat image spam to a certain degree, says Michael Cobb. In this AtE, the application security expert explains what el... 

  • Investigating phone phishing calls

    Will phishing calls ever be stopped? Maybe not, but it is possible to do a little detective work. In this expert Q&A, Ed Skoudis explains how to get some information on phishers and their "important messages." 

  • Does SMS spoofing require as much effort as email spoofing?

    SMS text message spoofing demands a little more technical knowledge than email spoofing. But not much, says information security threat expert Ed Skoudis. In this Q&A, Skoudis explains how that technical know-how has now been embedded in easy-to-use,... 

  • Is the Storm worm virus still a serious threat?

    Today, attackers continue to have success with the Storm worm and its many variations, using the malware to strengthen their nasty botnets. In this SearchSecurity.com Q&A, expert Ed Skoudis explains why these rather run-of-the-mill attacks are still ... 

  • Should a rise in text message spam be expected?

    According to a Ferris Research study, consumers this year are expected to receive a total of about 1 billion cell phone spam messages. Yet, compared to other countries, text message spam hasn't hit the United States very hard. In this SearchSecurity.... 

  • How can header information track down an email spoofer?

    Spammers can use spoofed headers to hide the true origin of unwanted email. In this SearchSecurity.com Q&A, application security expert Michael Cobb explains how to trust where a message is coming from.