Resolutions' Cloud Antivirus Security was designed from the ground up to be a modular security product. It goes far beyond typical...
Showing results 1 to 20 of 22
Windows 10 will build in standards-based two-factor authentication to every device, effectively neutering most phishing attacks and password database breaches. The company also announced new features aimed at securing corporate machines from malware attacks and data leaks.
ThreatData essentially pools data related to malware, phishing, and other online risks across the Internet for both real-time and long-term analysis.
Banks in India regularly send their customers e-mail messages about phishing and vishing scams--how not to reveal your Web identity and personal data and fall prey to fraudulent e-mail. But at the same time, they regularly peep into the bank accounts of its customers in the name of customer relationship.
Researchers have discovered what they say is a design flaw in Android that could be used by criminals to steal data via phishing or by advertisers to bring annoying pop-up ads to phones.
Phishers are using Google-hosted spreadsheets in identity-stealing social engineering attacks, according to security firm F-Secure
Authenticates mail from Message Level Network users, Mail Reputation provided by Sender Score for each message and Anti-Phishing Data...
In need of a good reason not to click on links found in spam or phishing emails? A currently ongoing Facebook phishing campaign is not only attempting to phish fresh Facebook accounting data, but is also serving client-side exploits.
iPhone users beware - an ongoing phishing campaign impersonating Apple.com, attempts to trick users into submitting sensitive device information that could potentially lead to the cloning of the device.
Delphish is a free extension for MS Outlook / Outlook Express which assists you in detecting Phishing attacks. It's absolutely free...
U.S. and Egyptian authorities have charged almost 100 people involved in a phishing scam designed to swipe personal information and use the data to defraud banks.
The FBI and Egyptian authorities have charged almost 100 people involved in a phishing scam designed to swipe personal information and use the data to defraud banks
The Federal Bureau of Investigation on Wednesday charged almost 100 people in Operation Phish Phry, the largest cyber fraud phishing case to date.The FBI said it uncovered a sophisticated phishing operation that was designed to swipe personal information and then use the data to defraud banks.
The recently leaked accounting data of thousands of Hotmail users -- Gmail has also been affected -- obtained through what appears to be a badly executed phishing campaign, once again puts the spotlight on the how bad password management practices remain an inseparable part of the user-friendly ecosystem.
Smartphone users are more worried about losing their phones or personal data than Web infections or phishing software, survey by Trend Micro finds.
A survey released by Internet security firm Trend Micro today found that smartphone users are more worried about losing their phones or the personal data on them is more alarming than the threat of Web infections or phishing software. (Full Report Powerpoint)Consider these findings from the survey:44 percent said that surfing the Internet on a smartphone (which may not be equipped with security software) is just as safe, if not safer, as surfing on a PC.
Skilled identity thieves can pilfer user names, passwords and other sensitive data for banking sites without using e-mail lures and other other social engineering tactics.According to a security advisory from Trusteer, hackers can launch what is described as "in-session phishing attacks" using pop-up messages during an active browser session.
With the exact number of end users interacting with phishing emails by submitting bogus data still unknown, phishers are on the other hand continuing to apply basic quality assurance processes ensuring that they will be collecting only validated credit card details, and limiting the opportunity for researchers and end users to poison their campaigns.
To share phishing URLs, or not to share? That's the rhetorical question, since sharing ultimately serves the final customer and ensures a lower average time for a phishing site to remain online.
A security company claims to have uncovered an online exchange for credit-card data that has been obtained by fraudulent means — most likely phishing.
Phishing-based breach of salesforce.com customer data is more evidence of industry's need to act on spam. Now.
Last night, in a notice urging vigilance and a series of best practices, salesforce.com sent an e-mail to its customers notifying them that a variety of recent phishing attacks -- both against salesforce.
Tool automatically creates dynamic phishing sites that pull in data from the target Web site, RSA says.