IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >  

Phishing

RSS Feed   
ALSO CALLED: Email Spoofing, e-Mail Fraud, Spear Phishing, Password Phishing, Brand Spoofing, Email Fraud, e-Mail Spoofing, Social Engineering, Internet Phishing, Carding, Password Cracking, Spear-phishing
DEFINITION: Rock Phish is both a phishing toolkit and the entity that publishes the toolkit. Phishing is an email fraud method in which the perpetrator sends out legitimate-looking email in an attempt to gather personal and financial information from recipients. While the authors of the kit remain anonymous, Rock Phish has become the most popular phishing kit available online, with some estimates suggesting that  … 

Phishing definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Phishing Reports
1 - 25 of 137 Matches Previous Page  |  Next Page
2020 SonicWall Cyber Threat Report
sponsored by SonicWall
WHITE PAPER: Each year is a constant struggle between cybercriminals attempting to conduct successful attacks and organizations defending their users and data. 2019 was a good year for organizations as malware attacks dropped by 6%. Read on to uncover key statistics and insights about last year’s cyberattack trends.
Posted: 04 Jun 2020 | Published: 04 Jun 2020

SonicWall

Successfully Scaling Cybersecurity for Remote Work: Keep the Cloud Your Safe Place
sponsored by Crosskey Cyber Security
RESOURCE: As organizations work to enable and secure remote workers, it’s critical to keep in mind that having people work remotely can mean an increase in security threats. So, how can IT and security teams protect users and data without hurting productivity or morale? Read this article to find out.
Posted: 03 Jun 2020 | Published: 03 Jun 2020

Crosskey Cyber Security

Successfully Scaling Cybersecurity for Remote Work: Protect Your People
sponsored by Forcepoint
RESOURCE: One of the key directives for today’s IT and security teams is to safeguard the users and data within their distributed environment and implement cyber defenses that can protect those users—regardless of their location or device. Read on to learn how to keep your remote workers secure against today’s internal and external threats.
Posted: 03 Jun 2020 | Published: 03 Jun 2020

Forcepoint

Executive Guide to the 2020 Global Threat Intelligence Report
sponsored by NTT
WHITE PAPER: COVID-19 has been a major disruption to nearly every aspect of life, and work environments are no exception. Organizations have had to adjust to a dramatic shift towards remote work and address the cyberattacks that ensue. To learn more about these cyberattacks, download this 2020 Global Threat Intelligence Report.
Posted: 02 Jun 2020 | Published: 02 Jun 2020

NTT

Current Cybersecurity Market Strong: What’s Driving It?
sponsored by Acunetix
RESOURCE: Each year, cybercriminals develop more elaborate ways to conduct attacks. And each year, organizations turn towards cybersecurity methods and tools to protect their sensitive data against cyberattacks. But when is enough security enough? Where is the cybersecurity market expected to go? Read this article to find out.
Posted: 02 Jun 2020 | Published: 24 Jun 2019

Acunetix

Spear Phishing: Top Threats and Trends
sponsored by Barracuda
WHITE PAPER: Business email compromise (BEC) is an emerging cybersecurity threat that targets user inboxes. While BEC makes up just 7% of spear-phishing attacks, it’s responsible for over $26 billion in losses in the last four years. In this report, explore the latest BEC tactics used by scammers and best practices for protecting your organization.
Posted: 18 May 2020 | Published: 30 Nov 2019

Barracuda

How to Combat Spear Phishing
sponsored by VMware International Unlimited Company
WHITE PAPER: Learn what spear phishing is, how it works, and find an example of how VMware Carbon Black’s cloud-native endpoint protection platform (EPP) constantly monitors and records what is happening on your endpoints—offering total visibility into malicious activities.
Posted: 11 May 2020 | Published: 11 May 2020

VMware International Unlimited Company

13 Email Threat Types to Know about Right Now
sponsored by Barracuda
RESOURCE: As email grows into an increasingly critical aspect of the communication infrastructure, it becomes a more attractive target to cyberattackers. This e-book overviews some key email threats to keep an eye on, and explores how to defend against them.
Posted: 07 May 2020 | Published: 01 May 2020

Barracuda

Evolution of Email Security
sponsored by Barracuda
WEBCAST: Ever since it became a critical tool for business communications, email has been the target of increasingly sophisticated cyberattacks. In this webinar, join Barracuda security experts as they overview the evolution of email security from early inbox threats to campaigns taking advantage of the current pandemic.
Posted: 04 May 2020 | Premiered: May 4, 2020

Barracuda

Barracuda Forensics and Incident Response
sponsored by Barracuda
VIDEO: When it comes to email-based threats, incident response is traditionally a manual process that costs time and money. In this short video, take a closer look at the key features of Barracuda Forensics and Incident Response, which is designed to replace outdated methods with an automated, data-driven approach.
Posted: 24 Apr 2020 | Premiered: 24 Apr 2020

Barracuda

Five Security Priorities to Consider with a Remote Workforce
sponsored by Ivanti SEA
RESOURCE: Network security is just one of the countless business operation areas affected by the spread of COVID-19. Email-based cyberattacks are on the rise, and networks have never been more vulnerable. In this article, discover 5 strategic recommendations for how to prioritize security in these trying times.
Posted: 21 Apr 2020 | Published: 26 Mar 2020

Ivanti SEA

Beyond the Headlines: How is the Pandemic Really Changing Cyberattacks?
sponsored by CI Security
WEBCAST: The spread of the Coronavirus has affected nearly every aspect of our lives, so it should come as no surprise that cyberattackers are taking full advantage. In this webinar, leverage the expertise of an industry expert as they highlight vulnerable areas hackers target most often and offer best practices for mitigating these threats.
Posted: 20 Apr 2020 | Premiered: Apr 20, 2020

CI Security

Shore up your cybersecurity resilience: A guide for ANZ businesses
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide, read about the next steps in Australia's cyber security blueprint, the state of data breaches in the county and what the whole region can do to prepare for new forms of cyber threats.
Posted: 20 Apr 2020 | Published: 20 Apr 2020

ComputerWeekly.com

Cloud App Security Report Infographic
sponsored by Trend Micro
RESOURCE: Although less than 400,000 business email compromise (BEC) attacks were recorded in 2019, they accounted for half of all cybercrime losses in 2019 ($1.7 billion). Download this email security threats infographic to learn more about the prevalence of BEC attacks in 2019, as well as phishing and other malware attacks.
Posted: 13 Apr 2020 | Published: 13 Apr 2020

Trend Micro

Coronavirus Credential Phishing
sponsored by Armorblox
WHITE PAPER: As the spread of the Coronavirus continues to create a sense of uncertainty, cyberattackers have been pushing their efforts to capitalize on people’s doubts and fears. In this white paper, dissect an example of a credential phishing attack: what theses attacks consist of, why it got through & how it was detected.
Posted: 13 Apr 2020 | Published: 13 Apr 2020

Armorblox

Boosting Cybersecurity Immunity: Confronting Risks in Today’s Work-From-Home world
sponsored by Capgemini
WHITE PAPER: The spread of COVID-19 has led to a massive and dramatic shift towards working from home and a major increase in email attacks. Learn how you can address the heightened cybersecurity risks that come with the shift towards remote workers and mobile devices.
Posted: 09 Apr 2020 | Published: 09 Apr 2020

Capgemini

Augmenting Native Office 365 Email Security to Stop Targeted Email Attacks
sponsored by Armorblox
WHITE PAPER: Email remains the top communication method within and among businesses. In order to take advantage of this, cyberattackers develop targeted campaigns that focus on tricking users into clicking on malware. In this white paper, learn how to complement your existing Office 365 security features with third-party services to stop email attacks.
Posted: 09 Apr 2020 | Published: 09 Apr 2020

Armorblox

Creating a Security Culture at Your Business
sponsored by TechData - Microsoft
VIDEO: The most persistent threat to the security of an organization is its own employees. 2/3 of employees use the same password everywhere, and too few can recognize a genuine email from a phishing scam. In this video, learn how Microsoft may be able to address these challenges and help you form a security culture.
Posted: 08 Apr 2020 | Premiered: 24 Jan 2020

TechData - Microsoft

How to Protect Data with Microsoft 365 Business
sponsored by TechData - Microsoft
RESOURCE: 52% of today’s data leaks are the result of human error – from bad password practices to email scams. In order to overcome these challenges, organizations should equip employees with the knowledge and tools to better understand threats. This infographic illustrates how Microsoft 365 Business can help your organization protect its data.
Posted: 08 Apr 2020 | Published: 08 Apr 2020

TechData - Microsoft

How to Secure Your Devices with Microsoft 365 Business
sponsored by TechData - Microsoft
RESOURCE: Breached or corrupted devices account for roughly 60% of today’s cyberattacks. Although this statistic is alarming, it allows for a clear area for IT security teams to focus their efforts. In this infographic, look at the high-level benefits of Microsoft 365 Business and see how it can help your organization secure its devices.
Posted: 07 Apr 2020 | Published: 07 Apr 2020

TechData - Microsoft

Secure Mobility for Remote Workers
sponsored by Lookout Inc.
CASE STUDY: Organizational culture is shifting to enable distributed workforces. However, there are significant challenges to consider when it comes to securing remote users and devices. In this case study, explore the key features of Lookout various services and discover if the capabilities are a good fit for your remote worker security needs.
Posted: 06 Apr 2020 | Published: 20 Mar 2020

Lookout Inc.

Third-Party Security Controls Needed to Close Gaps in Native Email Security
sponsored by Armorblox
ANALYST REPORT: With the move to cloud-delivered email solutions and an expanding email threat landscape, email security is in a state of transformation and organizations are reconsidering their current email security controls. Tap into this ESG report to learn what 403 IT and security professionals have to say about their email security concerns.
Posted: 03 Apr 2020 | Published: 03 Apr 2020

Armorblox

Trends in Email Security
sponsored by Armorblox
RESEARCH CONTENT: Phishing attacks are on the rise this year and this ESG report has the numbers to prove it. Download the report to uncover email security trends for 2020 and learn how your organization can stay protected from targeted attacks such as business email compromise, account takeover, and impersonation.
Posted: 03 Apr 2020 | Published: 03 Apr 2020

Armorblox

How Microsoft 365 Business Premium Protects Your Data
sponsored by TechData - Microsoft
VIDEO: Monitoring your network for potential risks is a lot like managing a large dam – one small leak can lead to a catastrophic breach. In this video, explore the capabilities of Microsoft Office 365 Business Premium, and discover if this is the right email security tool for your needs.
Posted: 02 Apr 2020 | Premiered: 24 Jan 2020

TechData - Microsoft

SailPoint Identity is Security
sponsored by SailPoint Technologies
VIDEO: Each year, we face worse and more frequent data breaches than the last. Security methods that have worked for years are becoming ineffective against modern attacks. Watch this video and discover how identity management may be able to help address modern threats targeting people.
Posted: 16 Mar 2020 | Premiered: 16 Mar 2020

SailPoint Technologies
1 - 25 of 137 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info