March 05, 2014
Finding fraudsters, LifeData and the four C's of data quality: The Data Mill reports.
January 24, 2014
A report from CrowdStrike shows spear phishing remains popular in targeted attacks, but that watering hole attacks are gaining favor.
Phishing Get Started
Bring yourself up to speed with our introductory content
Whaling is a type of fraud that targets high-profile end users such as C-level corporate executives, politicians and celebrities. Continue Reading
Spear phishing is an e-mail spoofing fraud attempt that targets a specific organization, seeking unauthorized access to confidential data. As with the e-mail messages used in regular phishing expeditions, spear phishing messages appear to come from a trusted source... (Continued) Continue Reading
Phishing is an e-mail fraud method in which the perpetrator sends out legitimate-looking email in an attempt to gather personal and financial information from recipients. Continue Reading
Evaluate Phishing Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
To combat social engineering techniques, know thy data and how to protect it against exfiltration by malicious actors. Continue Reading
There's no place to hide as new cyberthreats and tried-and-true hacking techniques test security teams. Continue Reading
Learn to apply best practices and optimize your operations.
Email addresses are prime targets of phishing schemes. Uncover how to mitigate these risks and learn tips for ensuring email address security. Continue Reading
Problem Solve Phishing Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Social engineering penetration testing is now a must for enterprises. Learn about the four methods your pen tests should use. Continue Reading
A thorough understanding of the types of DNS attacks, including DoS, reflector attacks and DNS cache poisoning, reveal key DNS defense tactics. Continue Reading
In this expert tip, David Sherry describes how a combination of technical controls and user awareness training can help put a dent in phishers’ attempts at spear phishing. Continue Reading