WhatIs definition: Whaling

Email and Messaging Threats (spam, phishing, instant messaging)

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Security pros glean insight from '06

    Corporate acquisitions, an abundance of spam, and the White House's take on cybersecurity mark 2006. 

  • Report: Spam, phishing attacks growing more sophisticated

    Security researchers at MessageLabs and Symantec are reporting a significant rise in more sophisticated botnet and phishing attacks, putting a stranglehold on corporate communications. 

  • Criminals find safety in cyberspace

    A new report from McAfee shows how criminals are enjoying a sense of safety and anonymity in cyberspace that they never had on the street. And they're making more money. 

  • SpamThru Trojan behind junk mail surge

    A new report from SecureWorks outlines how a Russian spam group used the SpamThru Trojan to engineer a tidal wave of unwanted email traffic. 

  • Is the SANS Top 20 still useful?

    This week in Security Blog Log: Some experts ponder whether the SANS Institute's Top 20 vulnerability list is as valuable than it once was. Others weigh in on the VoIP threat. 

  • SANS: VoIP, zero-day threats surge

    Digital miscreants are using VoIP and a growing pile of zero-day flaws to launch a ferocious wave of targeted, financially-motivated attacks, according to the SANS Institute. 

  • Firefox antiphishing feature beats Internet Explorer in Mozilla test

    A Firefox automated antiphishing feature beat IE 7 in a test conducted by Mozilla, but analysts say large enterprises should focus on spam blocking software. 

  • Trojan poses as Adobe software update

    The Trojan keylogger comes in an email that asks users to download the latest version of Adobe Reader. It then tries to steal the user's confidential information. 

  • Security Blog Log: Sailing a sea of spam

    This week, bloggers struggle to purge their bloated inboxes. Their experiences lend weight to recent studies showing a breathtaking spike in spam. 

  • Spam levels surge to unprecedented levels

    Attackers are using stealth malware and infected images to send spam levels through the roof, according to reports from Postini and Sophos.