IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >  


RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Email Spoofing, e-Mail Fraud, Spear Phishing, Password Phishing, Brand Spoofing, Email Fraud, e-Mail Spoofing, Social Engineering, Internet Phishing, Carding, Password Cracking, Spear-phishing
DEFINITION: Rock Phish is both a phishing toolkit and the entity that publishes the toolkit. Phishing is an email fraud method in which the perpetrator sends out legitimate-looking email in an attempt to gather personal and financial information from recipients. While the authors of the kit remain anonymous, Rock Phish has become the most popular phishing kit available online, with some estimates suggesting that  … 
Definition continues below.
Phishing Reports
1 - 25 of 108 Matches Previous Page  |  Next Page
Examining the Hacker's Evolution
sponsored by WhiteHat Security
WEBCAST: This webcast examines how hackers are evolving their techniques to achieve their goals faster and undetected and the top 10 attacks they use. Inside, learn how a risk based approach prioritizes vulnerabilities differently than the "high, medium, low" strategy and why it's imperative to make the switch. View now to learn more.
Posted: 01 Oct 2015 | Premiered: May 6, 2015

WhiteHat Security

Enterprise Security in Asia 2015: The Ugly, The Bad & The Good
sponsored by F5 Networks
WHITE PAPER: This white paper reveals the truth about cybersecurity in Asia including a 52% surge in breaches and the emerging sophisticated schemes from hackers. View now to learn which attacks are most popular and how to avoid being the next data breach victim.
Posted: 01 Oct 2015 | Published: 13 Jan 2015

F5 Networks

Operation Clandestine Wolf: A Successful Zero-Day Attack Examined
sponsored by FireEye
WEBCAST: This webcast explores the anatomy of the attack and how APT3 achieved success.
Posted: 25 Sep 2015 | Premiered: Jun 24, 2015


The Art of Cyber War: A Modern Defense Strategy
sponsored by Imprivata
WHITE PAPER: In this white paper, you'll find indispensible tips on maintaining security and winning the battle against cybercrime.
Posted: 25 Sep 2015 | Published: 25 Sep 2015


Enforce Security Policies in the Cloud with CASBS
sponsored by Elastica
EGUIDE: In this white paper, you will learn how cloud access security brokers (CASBs) provide policy-based enforcement points and controls to ensure public cloud apps are being accessed and used properly through authentication, encryption, and device profiling. View now to learn more about how to improve your cloud security strategy.
Posted: 15 Sep 2015 | Published: 08 Sep 2015


The Perils of Phishing
sponsored by IBM
WHITE PAPER: This white paper provides you with essential information on how phishing attacks occur and how you can mitigate these threats.
Posted: 11 Sep 2015 | Published: 31 May 2015


Ransomware: How cyber criminals hold your data hostage
sponsored by IBM
WHITE PAPER: This white paper explores the growing ransomware threat and how you can defend against it.
Posted: 09 Sep 2015 | Published: 30 Jun 2015


Inside the Dyre Wolf Malware Campaign
sponsored by IBM
WHITE PAPER: This white paper gives a step-by-step outline of how the Dyre Wolf attack is accomplished and how organizations can detect and prevent compromise.
Posted: 08 Sep 2015 | Published: 30 Jun 2015


Cyber-Threats in 2015
sponsored by Webroot
WHITE PAPER: This white paper arms you with the most up-to-date web security knowledge that you need to keep your clients safe.
Posted: 02 Sep 2015 | Published: 02 Sep 2015


Ensuring Your Email Strategy Measures Up
sponsored by ControlEmail
WEBCAST: This brief webcast examines how to mitigate the top email threats of today including phishing, malware, spam, and more. View now to learn how to ensure email continuity even when your server is down and the strategies to secure sensitive data.
Posted: 01 Sep 2015 | Premiered: Aug 21, 2015


Bullet-proofing Office 365 Security
sponsored by ControlEmail
WHITE PAPER: In this white paper, you'll learn how to augment cloud-based email security to defend against the top threats such as phishing and malware infection.
Posted: 26 Aug 2015 | Published: 29 Jul 2015


Extracting More Value from SIEM Deployment
sponsored by Splunk
WHITE PAPER: This white paper demonstrates how to you leverage all your machine-generated data for broader views across possible attack vectors. Read on to key into the solutions behind bolstering against potential threats.
Posted: 13 Aug 2015 | Published: 13 Aug 2015


Benefits and Criteria for Selecting an Email Security Gateway Product
sponsored by Mimecast
EGUIDE: This expert e-guide presents the 3 additional benefits that email security gateways bring to the table. Continue reading to learn the 5 criteria for selecting an email security gateway product.
Posted: 30 Jul 2015 | Published: 15 Jul 2015


8 Security Issues to Avoid in Mobile App Development
sponsored by Kony
WHITE PAPER: This resource divulges the top 8 security issues that app developers need to watch in order to protect their users from phishing, malware, and more.
Posted: 22 Jul 2015 | Published: 22 Jul 2015


Bridging the BYOD security and UX gap
sponsored by HID
WHITE PAPER: This white paper explores the top security challenges of today and presents a holistic strategy to bridge the gap between mobile data security and user experience.
Posted: 21 Jul 2015 | Published: 24 Jun 2015


Countdown to Compromise: The Timeline of a Spear-Phishing Attack
sponsored by Mimecast
WHITE PAPER: This white paper uses a typical spear-phishing scenario to demonstrate the dangers spear-phishing poses.
Posted: 07 Jul 2015 | Published: 07 Jul 2015


Preventing Attackers from Getting What They Want
sponsored by SecureAuth
WHITE PAPER: This white paper explores the danger of a modern attack and discusses why traditional security tools, such as basic authentication, are insufficient.
Posted: 11 May 2015 | Published: 25 Mar 2015


The state of email trust in 2014
sponsored by
RESEARCH CONTENT: Email security improved in 2014 but most companies still haven't done enough to protect their customers from phishing attacks, this study from Agari reveals.
Posted: 26 Feb 2015 | Published: 26 Feb 2015

Human Vulnerabilities in Our Current Threat Landscape
sponsored by Global Knowledge
WHITE PAPER: This white paper enables you to educate your employees on security best practices and current human vulnerabilities, helping you to ensure that you're not a part of the many organizations that are breached.
Posted: 10 Feb 2015 | Published: 31 Jan 2015

Global Knowledge

Sharing knowledge to tackle online banking fraud
sponsored by
ESSENTIAL GUIDE: This article in our Royal Holloway Security Series argues that an information sharing service between national banking systems and law enforcement agencies could counteract online fraud.
Posted: 22 Jul 2014 | Published: 22 Jul 2014

The Bot Threat
sponsored by Hewlett-Packard Company
WHITE PAPER: In this white paper, get vital information about the malicious bot, also known as botnets when in large forces, and explore 4 key features that will help you build a defense-in-depth security system to prevent these attacks from compromising your networks.
Posted: 01 Feb 2015 | Published: 13 Nov 2013

Hewlett-Packard Company

What Can You Do Differently to Guard Against Threats from Rapidly Evolving Mobile Malware?
sponsored by IBM
WHITE PAPER: Mobile security is about more than the device: It's also about protecting apps on the device. Learn how IBM can help.
Posted: 09 Oct 2014 | Published: 31 Jan 2014


Malware Analysts Have the Tools to Defend Against Cyber-Attacks, But Challenges Remain
sponsored by Threat Track Security
WHITE PAPER: This informative guide explores today's threat landscape, the role of malware and the threat of internal vulnerabilities.
Posted: 16 Jun 2014 | Published: 16 Jun 2014

Threat Track Security

Phishing: The Latest Tactics And Potential Business Impacts
sponsored by Symantec
WHITE PAPER: This informative guide takes an in-depth look at phishing and how it has become an effective tactic for cybercriminals.
Posted: 14 May 2014 | Published: 14 May 2014


The Bot Threat
sponsored by Hewlett-Packard Limited
WHITE PAPER: In this white paper, get vital information about the malicious bot, also known as botnets when in large forces, and explore 4 key features that will help you build a defence-in-depth security system to prevent these attacks from compromising your networks.
Posted: 13 May 2014 | Published: 30 Nov 2012

Hewlett-Packard Limited
1 - 25 of 108 Matches Previous Page    1 2 3 4    Next Page
PHISHING DEFINITION (continued): …  the kit is used for half of all phishing attempts. The Rock Phish toolkit first surfaced in the hacking community in 2004. Rock Phish is known for pioneering the use of image spam. It has also proven particularly adept at evading the adaptive security measures taken by networking professionals, earning the group grudging respect for their ability to stay on the cutting edge of technology -- and out of the hands of law enforcement. Gartner, the information technology research and advisory firm, has described Rock Phish as the "Keyser Söze" of the phishing world, a reference to the … 
Phishing definition sponsored by, powered by an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement