IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >  


RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Email Spoofing, e-Mail Fraud, Spear Phishing, Password Phishing, Brand Spoofing, Email Fraud, e-Mail Spoofing, Social Engineering, Internet Phishing, Carding, Password Cracking, Spear-phishing
DEFINITION: Rock Phish is both a phishing toolkit and the entity that publishes the toolkit. Phishing is an email fraud method in which the perpetrator sends out legitimate-looking email in an attempt to gather personal and financial information from recipients. While the authors of the kit remain anonymous, Rock Phish has become the most popular phishing kit available online, with some estimates suggesting that  … 
Definition continues below.
Phishing Reports
26 - 50 of 123 Matches Previous Page  |  Next Page
8 Security Issues to Avoid in Mobile App Development
sponsored by Kony
WHITE PAPER: This resource divulges the top 8 security issues that app developers need to watch in order to protect their users from phishing, malware, and more.
Posted: 22 Jul 2015 | Published: 22 Jul 2015


Bridging the BYOD security and UX gap
sponsored by HID
WHITE PAPER: This white paper explores the top security challenges of today and presents a holistic strategy to bridge the gap between mobile data security and user experience.
Posted: 21 Jul 2015 | Published: 24 Jun 2015


The Impact of Social Media On Information Security: What Every Company Needs To Know
sponsored by Cyveillance, Inc.
WHITE PAPER: This white paper can show you why security professionals need to pay attention to social media, and what you can do to implement secure social media practices in your organization.
Posted: 17 Jul 2015 | Published: 17 Jul 2015

Cyveillance, Inc.

2015 Information Security Trends: What's Next?
sponsored by Cyveillance, Inc.
WEBCAST: This webinar examines what information security and threat analysts can expect in 2015. Topics will include using threat intelligence before and after data breaches, information sharing, the Internet of Things, and the role of the CISO.
Posted: 15 Jul 2015 | Premiered: Feb 26, 2015

Cyveillance, Inc.

Website Security Threat Report Part 3
sponsored by Symantec Corporation
WHITE PAPER: Download part 3 of this Website Security Threat Report to discover how the public made criminal's lives easier in falling for the latest social media attacks and online scams. Plus, take an invaluable look ahead and benefit from our security recommendations and best practices.
Posted: 07 Jul 2015 | Published: 07 Jul 2015

Symantec Corporation

Countdown to Compromise: The Timeline of a Spear-Phishing Attack
sponsored by Mimecast
WHITE PAPER: This white paper uses a typical spear-phishing scenario to demonstrate the dangers spear-phishing poses.
Posted: 07 Jul 2015 | Published: 07 Jul 2015


Preventing Attackers from Getting What They Want
sponsored by SecureAuth
WHITE PAPER: This white paper explores the danger of a modern attack and discusses why traditional security tools, such as basic authentication, are insufficient.
Posted: 11 May 2015 | Published: 25 Mar 2015


2015 Cyberthreat Defense Report
sponsored by Blue Coat Systems
WHITE PAPER: This report, which focuses specifically on IT security management, uses research to reveal what areas of security you should turn your attention to.
Posted: 08 Apr 2015 | Published: 08 Apr 2015

Blue Coat Systems

The state of email trust in 2014
sponsored by
RESEARCH CONTENT: Email security improved in 2014 but most companies still haven't done enough to protect their customers from phishing attacks, this study from Agari reveals.
Posted: 26 Feb 2015 | Published: 26 Feb 2015

Mitigating Web Security Risk with SSL Certificates: Benefits and Best Practices
sponsored by Symantec Corporation
WHITE PAPER: This white paper highlights several benefits and best practices when using Secure Sockets Layer (SSL) applications to authenticate users, applications and Web services.
Posted: 01 Aug 2014 | Published: 31 Dec 2013

Symantec Corporation

Sharing knowledge to tackle online banking fraud
sponsored by
ESSENTIAL GUIDE: This article in our Royal Holloway Security Series argues that an information sharing service between national banking systems and law enforcement agencies could counteract online fraud.
Posted: 22 Jul 2014 | Published: 22 Jul 2014

The Social Enterprise: Tips for Helping Enterprises Collaborate Securely
sponsored by IBM
VIDEO: Join Caleb Barlow, Director of Data and Mobile Security at IBM, as he reveals from a security perspective, what users need to do to protect your own person and business against malicious phishing attacks. Also learn about the strategies and policies you can put in place to secure your business and social devices.
Posted: 14 Mar 2014 | Premiered: 14 Mar 2014


Cybercrime and warfare: All that matters
sponsored by
BOOK: Peter Warren and Michael Streeter assess  the history, scale and importance of cyber crime this chapter from their book, Cybercrime and warfare: All That Matters.
Posted: 04 Dec 2013 | Published: 04 Dec 2013

The Bot Threat
sponsored by Hewlett Packard Enterprise
WHITE PAPER: In this white paper, get vital information about the malicious bot, also known as botnets when in large forces, and explore 4 key features that will help you build a defense-in-depth security system to prevent these attacks from compromising your networks.
Posted: 01 Feb 2015 | Published: 13 Nov 2013

Hewlett Packard Enterprise

What Can You Do Differently to Guard Against Threats from Rapidly Evolving Mobile Malware?
sponsored by IBM
WHITE PAPER: Mobile security is about more than the device: It's also about protecting apps on the device. Learn how IBM can help.
Posted: 09 Oct 2014 | Published: 31 Jan 2014


Malware Analysts Have the Tools to Defend Against Cyber-Attacks, But Challenges Remain
sponsored by Threat Track Security
WHITE PAPER: This informative guide explores today's threat landscape, the role of malware and the threat of internal vulnerabilities.
Posted: 16 Jun 2014 | Published: 16 Jun 2014

Threat Track Security

Phishing: The Latest Tactics And Potential Business Impacts
sponsored by Symantec
WHITE PAPER: This informative guide takes an in-depth look at phishing and how it has become an effective tactic for cybercriminals.
Posted: 14 May 2014 | Published: 14 May 2014


The Bot Threat
sponsored by Hewlett-Packard Enterprise
WHITE PAPER: In this white paper, get vital information about the malicious bot, also known as botnets when in large forces, and explore 4 key features that will help you build a defence-in-depth security system to prevent these attacks from compromising your networks.
Posted: 13 May 2014 | Published: 30 Nov 2012

Hewlett-Packard Enterprise

Phishing and Web Security
sponsored by Webroot
WHITE PAPER: This brief whitepaper explores why businesses need to prepare for phishing 2.0 and why this new cybercrime is aiming its sights at your business.
Posted: 29 Apr 2014 | Published: 31 Dec 2013


Financial Institutions, Merchants, and the Race Against Cyberthreats
sponsored by RSA
WHITE PAPER: In this white paper, learn about the 4 top forms of cybercrime. Click through to reveal 6 key recommendations to best protect your organization from security breaches.
Posted: 02 Apr 2014 | Published: 31 Oct 2013


IBM X-Force 2013 Mid-Year Trend and Risk Report
sponsored by IBM
WHITE PAPER: In this detailed white paper, explore this year's report on the latest risks and security challenges organizations are facing today, and offers best practices to boost security fundamentals and policies to meet these advanced persistent threats (APTs).
Posted: 06 Nov 2013 | Published: 30 Sep 2013


Measuring End User Susceptibility and Defenses Against Phishing Attacks with CORE Insight
sponsored by Core Security Technologies
WHITE PAPER: This white paper contains critical information about spear phishing and how to prepare your users and systems from falling for these targeted attacks being masked as trustworthy content.
Posted: 11 Oct 2013 | Published: 11 Oct 2013

Core Security Technologies

Improving Enterprise Email Security: Systems and Tips
sponsored by Agari
EGUIDE: This expert e-guide details systems that can help improve your email security and tips on how to keep it secure.
Posted: 04 Oct 2013 | Published: 04 Oct 2013


Thawte in Education
sponsored by Thawte Inc.
WHITE PAPER: Access this white paper to discover a number of trends accelerating the urgency of deploying SSL across distributed campuses and how this approach can ensure safety and security in higher educational networks.
Posted: 30 Sep 2013 | Published: 30 Sep 2013

Thawte Inc.

The Personalisation Challenge: Business Culture and Mobile Security
sponsored by Hewlett Packard Enterprise
WHITE PAPER: This exclusive white paper reveals the truth about mobility in the workforce, including the risks and rewards of bring your own device (BYOD) for businesses.
Posted: 24 Sep 2013 | Published: 24 Sep 2013

Hewlett Packard Enterprise
26 - 50 of 123 Matches Previous Page    1 2 3 4 5    Next Page
PHISHING DEFINITION (continued): …  the kit is used for half of all phishing attempts. The Rock Phish toolkit first surfaced in the hacking community in 2004. Rock Phish is known for pioneering the use of image spam. It has also proven particularly adept at evading the adaptive security measures taken by networking professionals, earning the group grudging respect for their ability to stay on the cutting edge of technology -- and out of the hands of law enforcement. Gartner, the information technology research and advisory firm, has described Rock Phish as the "Keyser Söze" of the phishing world, a reference to the … 
Phishing definition sponsored by, powered by an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement