IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >  

Spear Phishing

RSS Feed    Add to Google    Add to My Yahoo!
Spear PhishingReports
 
Information security breaches survey 2012
sponsored by ComputerWeekly.com
IT BRIEFING: Rising security breaches cost UK billions over the last 12 months as cyber attacks reached record levels, according to the 2012 Information Security Breaches survey.
Posted: 24 Apr 2012 | Published: 24 Apr 2012

ComputerWeekly.com

The Deloitte Consumer Review: A more secure customer
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This report from Deloitte assesses the impact of cybercrime on consumers and offers advice to businesses on how to respond.
Posted: 12 Mar 2013 | Published: 12 Mar 2013

ComputerWeekly.com

Mobile Security Strategies
sponsored by ComputerWeekly.com
ANALYST REPORT: This exclusive report for Computer Weekly members explains the security risks and challenges of using mobile devices in the enterprise.
Posted: 09 Nov 2012 | Published: 09 Nov 2012

ComputerWeekly.com

Kaspersky Internet Security 7.0
sponsored by Kaspersky Lab
TRIAL SOFTWARE: Try this free trial download today and see how Kaspersky Internet Security 7.0 features triple threat protection that defends against identity theft, confidential data leakage and all Internet threats.
Posted: 16 Nov 2007 | Premiered: 01 Nov 2007

Kaspersky Lab

August Technical Guide on Authentication
sponsored by SearchSecurity.com
WHITE PAPER: This white paper can help you discover why attackers can target the token vendor to take advantage of the security of the authentication system as a whole and how you can replace the ubiquitous authenticator in your business.
Posted: 06 Aug 2012 | Published: 06 Aug 2012

SearchSecurity.com

Types of DNS Attacks Reveal DNS Defense Tactics
sponsored by Verisign, Inc.
EGUIDE: This E-Guide from SearchSecurity.com details different types of common domain name system (DNS) attacks, the unusual behaviors they invoke, and which defense tactics work best in the given scenario. View now to learn more!
Posted: 21 Mar 2013 | Published: 21 Mar 2013

Verisign, Inc.

Anti-Phishing Best Practices: Keys to Aggressively and Effectively Protecting Your Organization from Phishing Attacks
sponsored by Cyveillance
WHITE PAPER: Phishing has become one of the most common and effective online scams and can cost your company thousands of dollars. Download this new white paper and discover seven key objectives of an effective phishing protection and response plan.
Posted: 14 Nov 2006 | Published: 01 Apr 2006

Cyveillance

Symantec Intelligence Report - June 2013
sponsored by Symantec Corporation
WHITE PAPER: This Symantec Intelligence Report outlines the latest need-to-know security information on vulnerabilities, spam, phish, malware, and data breaches.
Posted: 13 Aug 2013 | Published: 28 Jun 2013

Symantec Corporation

Access Accounts More Securely with Intel® Identity Protection Technology
sponsored by Intel
PRODUCT OVERVIEW: This technology brief takes a closer look at today's threat landscape and presents key findings from a recent security survey. Discover the threats your clients are most vulnerable to as well as how they can develop an effective defense strategy against them.
Posted: 03 Aug 2011 | Published: 02 Aug 2011

Intel

A Monthly Online Fraud Report from the RSA Anti-Fraud Command Center Phishing Repository
sponsored by RSA, The Security Division of EMC
ANALYST REPORT: Each month the RSA Anti-Fraud Command Center (AFCC) - a 24x7 war room that detects, monitors, tracks and shuts down phishing, pharming and Trojan attacks worldwide - issues an intelligence report that spotlights a new trend in online fraud and also provides the latest statistics and analyses of global phishing trends.
Posted: 20 Feb 2009 | Published: 19 Feb 2009

RSA, The Security Division of EMC
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement