Who Is Fighting Phishing: An Overview of the Phishing Lifecycle and the Entities Involved

Who Is Fighting Phishing: An Overview of the Phishing Lifecycle and the Entities Involved

Cover
This white paper addresses the lifecycle of a phishing attack and how different entities--including third-party take down services and law enforcement--are involved in the process of disabling phishing sites. We also explain how critical it is for brand owners and third parties to have immediate access to data like domain WHOIS to prevent identity theft from phishing. Last, we provide an overview of current phishing trends and top threats.
Vendor:
MarkMonitor
Posted:
10 Oct 2008
Published:
09 Oct 2008
Format:
PDF
Length:
12 Page(s)
Type:
White Paper
Language:
English
Already a Bitpipe member? Login here

Download this White Paper!

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy