RSS feed Get our RSS feed

News by Topic

phishing and spam

Results 1 - 14 of 14Sort Results By: Published Date | Title | Company Name
By: Symantec     Published Date: Jul 30, 2014
This paper analyses the emerging trends, malicious code activity, phishing and spam to help present essential information to help you secure your systems.
Tags : website security threat report, emerging security trends, malicious activity, essential security, security
     Symantec
By: Symantec     Published Date: Jul 30, 2014
This paper analyses the emerging trends, malicious code activity, phishing and spam to help present essential information to help you secure your systems.
Tags : website security threat report, emerging security trends, malicious activity, essential security, security
     Symantec
By: Symantec     Published Date: Jul 30, 2014
This paper analyses the emerging trends, malicious code activity, phishing and spam to help present essential information to help you secure your systems.
Tags : website security threat report, emerging security trends, malicious activity, essential security, security
     Symantec
By: Symantec     Published Date: Jul 30, 2014
This paper analyses the emerging trends, malicious code activity, phishing and spam to help present essential information to help you secure your systems.
Tags : website security threat report, emerging security trends, malicious activity, essential security, security
     Symantec
By: Symantec     Published Date: Jul 30, 2014
This paper analyses the emerging trends, malicious code activity, phishing and spam to help present essential information to help you secure your systems.
Tags : website security threat report, emerging security trends, malicious activity, essential security, security
     Symantec
By: Symantec     Published Date: Jul 30, 2014
This paper analyses the emerging trends, malicious code activity, phishing and spam to help present essential information to help you secure your systems.
Tags : website security threat report, emerging security trends, malicious activity, essential security, security
     Symantec
By: Symantec     Published Date: Jul 28, 2014
This paper analyses the emerging trends, malicious code activity, phishing and spam to help present essential information to help you secure your systems.
Tags : website security threat report, emerging security trends, malicious activity, essential security, security
     Symantec
By: IBM     Published Date: Sep 10, 2009
Read this Trend and Risk report from IBM® ISS X-Force® to learn statistical information about all aspects of threats that affect Internet security, including software vulnerabilities and public exploitation, malware, spam, phishing, web-based threats, and more!
Tags : ibm iss x-force threat and risk report, ibm, web-related security threats, spam and phishing, malware, cvss, top vendor list, web application vulnerabilities
     IBM
By: GFI     Published Date: Jul 20, 2009
GFI MailEssentials for Exchange/SMTP/Lotus is a server based anti-spam, anti-phishing and email management solution, which is used by 80,000 customers worldwide. The latest version uses two anti-spam engines, along with advanced spam filtering techniques, to give administrators a high spam capture rate straight out-of-the-box, with minimal configuration. GFI MailEssentials also minimizes false positives, so you do not need to worry about important emails being marked as spam.
Tags : gfi, anti-spam, spam, lotus, gfi mailessentials, e-mail security, anti-phishing, phishing
     GFI
By: Thawte     Published Date: Oct 06, 2015
The cost of cybercrime in the UK has reached a staggering £27bn – but what’s the actual threat to your business? From data breaches, phishing and spam, to identity theft, malware and vulnerabilities - learn how they can damage your business and the steps you can take to protect yourself.
Tags : cybercrime, business threats, phishing and spam, identity theft, security
     Thawte
By: Thawte     Published Date: Oct 06, 2015
40% der deutschen Unternehmen sind in den vergangenen zwei Jahren Opfer von Internetkriminalität geworden. Doch wie genau wird Ihr Unternehmen bedroht? Von Datenlecks, Phishing und Spam bis hin zu Identitätsdiebstahl, Malware und Schwachstellen: Informieren Sie sich über die möglichen Auswirkungen dieser Bedrohungen auf Ihr Unternehmen und geeignete Schutzmaßnahmen in unserem neuen Leitfaden von Thawte.
Tags : cybercrime, business threats, phishing and spam, identity theft, security
     Thawte
By: Thawte     Published Date: Oct 06, 2015
Au Royaume-Uni, le coût de la cybercriminalité a atteint le chiffre record de 27 milliards de livres. Mais quelle est la menace réelle pour votre entreprise? Violations de données, usurpation d’identité, phishing, spams, malwares, vulnérabilités... découvrez l’ampleur du risque et les mesures à prendre pour vous protéger.
Tags : cybercrime, business threats, phishing and spam, identity theft, security
     Thawte
By: Cyveillance     Published Date: Jun 20, 2014
Phishing is defined by the Financial Services Technology Consortium (FSTC) as a broadly launched social engineering attack in which an electronic identity is misrepresented in an attempt to trick individuals into revealing personal credentials that can be used fraudulently against them. In short, it’s online fraud to the highest degree. Although it’s been around for years, phishing is still one of the most common and effective online scams. The schemes are varied, typically involving some combination of spoofed email (spam), malicious software (malware), and fake websites to harvest personal information from unwitting consumers. The explosive rise of mobile devices, mobile applications, and social media networks has given phishers new vectors to exploit, along with access to volumes of personal data that can be used in more targeted attacks or spear phishing. The fact that phishing attacks are still so common highlights their efficacy and reinforces the need to implement comprehensive phishing and response plans to protect organizations. An effective phishing protection plan should focus on four primary areas: Prevention, Detection, Response, and Recovery. High-level recommendations for each of the four areas are outlined in this whitepaper.
Tags : cyveillance, phishing, security, cyberattacks, cybercriminals, threats
     Cyveillance
By: Symantec     Published Date: Jul 29, 2014
This paper analyses the emerging trends, malicious code activity, phishing and spam to help present essential information to help you secure your systems.
Tags : website security, website protection, website threats, symantec, norton
     Symantec
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics