Phishing White Papers

In computing, Phishing is a criminal activity using social engineering techniques. Phishers attempt to fraudulently acquire sensitive information, such as passwords and credit card details, by masquerading as a trustworthy person or business in an electronic communication.
Results 1 - 25 of 76Sort Results By: Published Date | Title | Company Name
By: Kaspersky     Published Date: Feb 14, 2014

Cybercriminals today are launching attacks against businesses by copying sophisticated malware and techniques used to target governments and high-profile organizations. Don’t get caught in the crossfire. Read our special report "Who's spying on you?"

Tags : cybersecurity, hackers, virus, malware, phishing, security, internet security, secure network
    
By: Kaspersky     Published Date: Feb 14, 2014

Download our Guide to the Threat Landscape to have access to a wealth of IT security intelligence.

Tags : security intelligence, malware, spam, spyware, firewall, internet security, anti spam, anti spyware
    
By: Websense     Published Date: Jul 08, 2014

A white paper on the shortest path to prevention and risk production.

Tags : protecting ip data, dlp implementation, websense data security suite, anti spam, anti spyware, anti virus, internet security, intrusion detection
    
By: Websense     Published Date: Jul 08, 2014

This paper reports on a independent third party test of Websense Triton Web Security Gateway Anywhere against four competing products.

Tags : websense, wsga, web security, testing of web security, web security products compared, phising, malicious redirects, access control
    
By: Dyn     Published Date: Mar 27, 2014

In a world where we hear about website and email hacks almost daily, implementing security provisions is no longer an option. Not only can phishers hurt your company and customers, but your brand can take a beating too. Find out what you should be implementing to keep your brand safe.

Tags : dyn, email, email security, message, security management, phishing, it management, secure transmission
    
By: Rapid7     Published Date: Mar 19, 2014

In this guide, penetration testers will learn how to evade anti-virus detection on target machines for your Metasploit pen tests. This guide will be most useful to readers who already have some penetration testing experience and are familiar with Metasploit Pro.

Tags : rapid7, security, anti virus, virus protection, antivirus, spam, hackers, internet security
    
By: Symantec     Published Date: Mar 14, 2014

This IDC Executive Brief document analyzes the evolving threat landscape and how the use of security intelligence services can help organizations to defend against advanced persistent threats and targeted attacks. Challenges of current security approaches and benefits of security intelligence services will be discussed.

Tags : symantec, security intelligence, attacks, cyber attacks, hackers, web security, data protection, targeted attacks
    
By: Symantec     Published Date: Jan 15, 2014

This year’s ISTR once again covers the wide-ranging threat landscape, with data collected and analyzed by Symantec’s security experts. In this summary, we call out seven areas that deserve special attention.

Tags : symantec, cyberespionage, mobile security, mobile device security, threat report, cyberattacks, cyber attacks, data protection
    
By: Thawte     Published Date: Dec 20, 2013

Learn how you can build customer confidence around Internet security. This guide will explain the various ways in which your business can benefit if you secure your MSIIS server with a Thawte digital certificate.

Tags : security, ms iis, access control, anti spam, anti spyware, anti virus, application security, auditing
    
By: Bitium     Published Date: Dec 09, 2013

As enterprises large and small shift their information to the cloud, an explosion of SaaS tools are making it easier than ever for employees to collaborate and innovate. Much of this sharing is being done across time zones and physical locations, by workers who are telecommuting, working in shared or public spaces, and from open networks. Information is stored on central, third-party servers that are accessible across the company and the world by anyone with an internet connection. As a result, online security is increasingly being pushed to the forefront as a major corporate expense. Yet, 89% of the global information workforce lack clarity on how security applies to the cloud. “Data is suddenly everywhere, and so are the number of people, access points and administrators who can control – or worse, copy – the data." Please download the white paper to learn more.

Tags : single sign on, sso, identity as a service, idaas, access and identity management, identity access management, password management, password manager
    
By: Rapid7     Published Date: Apr 04, 2013

This whitepaper examines the many different methods employed in phishing attacks and social engineering campaigns, and offers a solution-based approach to mitigating risk from these attack vectors.

Tags : rapid7, protect organization, attacks via phishing, solution based approach, mitigating risks, intrusion detection, intrusion prevention, phishing
    
By: McAfee     Published Date: Mar 07, 2013

McAfee delivers a complete database security solution that protects your entire database environment efficiently and cost effectively, while maintaining optimum system performance and availability.

Tags : database security, database security compliance, database activity monitoring, virtual patching for databases, database compliance audit, database regulatory compliance, database vulnerability management, database vulnerabilities
    
By: McAfee     Published Date: Feb 12, 2013

AV-TEST preforms a comparative review of McAfee, Microsoft, and Symantec endpoint protection to pro-actively protect against zero-day attacks.

Tags : mcafee, av-test, deep defender, rootkits, detection, network security, email security, intrusion detection
    
By: McAfee     Published Date: Feb 08, 2013

NSS Labs provides overall exploit protection rates for 11 popular enterprise Endpoint Protection Products.

Tags : mcafee, epp, endpoint, protection, threats, malware, nss, hacker detection
    
By: Websense     Published Date: Aug 23, 2012

"Is this email a phish or is it legitimate?" That's the question that employees - and executives in particular - are asking with greater frequency.

Tags : phishing, web security, email security, phishing attacks, internet security, web service security
    
By: Symantec     Published Date: Apr 09, 2012

Download this white paper, to learn how you can reduce the risk of hackers finding your site and attacking it by using automated vulnerability assessments to identify exploitable weaknesses and take corrective action.

Tags : ssl, ssl certificates, internet infrastructure services, trust services, extended validation, two-factor authentication, identity protection, ddos mitigation
    
By: Symantec     Published Date: Apr 09, 2012

This white paper explains the licensing and proper use of Symantec SSL Certificates for securing multiple Web servers and/or multiple domains and subdomains in the network configurations.

Tags : ssl, ssl certificates, internet infrastructure services, trust services, extended validation, two-factor authentication, identity protection, ddos mitigation
    
By: Symantec     Published Date: Apr 09, 2012

This paper examines how recent trends in Internet trust marks can help restore confidence in online shopping, and as concluded by at least one recent study, even induce those who do shop to spend more.

Tags : ssl, ssl certificates, internet infrastructure services, trust services, extended validation, two-factor authentication, identity protection, ddos mitigation
    
By: Symantec     Published Date: Apr 09, 2012

Symantec Extended Validation (EV) SSL Certificates can be a key factor in helping increase customer confidence during online business transactions. More confidence can mean more conversions for customers with EV SSL certificates.

Tags : ssl, ssl certificates, internet infrastructure services, trust services, extended validation, two-factor authentication, identity protection, ddos mitigation
    
By: Thawte     Published Date: Nov 12, 2011

In this guide, you'll learn more about Phishing and how SSL and EV SSL technology can help protect your site, your business and ultimately, your bottom line.

Tags : phishing scams, anti-phishing, social engineering, certificate authority, ssl certificates, ssl security, extended validation, geotrust
    
By: Thawte     Published Date: Nov 08, 2011

Download this paper to better understand where and when to use cloud solutions and the ways in which SSL can help you conduct business in the cloud with confidence.

Tags : cloud computing, computing in the cloud, the cloud, in the cloud, cloud provider, cloud providers, cloud services, cloud storage
    
By: ESET     Published Date: Sep 07, 2011

Protection for small and medium businesses against viruses and cybercrimes.

Tags : eset, black hat conference, hacking the car, malware, protection, security, antivirus, anti virus
    
By: VeriSign, Inc.     Published Date: Aug 03, 2011

Download this white paper to learn about the importance of delivering a secure and trustworthy online experience.

Tags : verisign, security, trustworthy online experience, secure, trust, sensitive data, ssl certificate, authentication
    
By: VeriSign, Inc.     Published Date: Aug 03, 2011

This white paper provides insights into how Extended Validation (EV) SSL can help increase online transactions and sales by alleviating consumer concerns about identity theft and fraud.

Tags : verisign, extended validation, ev ssl, online sales, online transactions, it security policies, phishing, identity theft
    
By: Fortinet, Inc.     Published Date: Jul 27, 2011

In spite of the billions of dollars invested in security, web-borne threats are still on the rise. Enterprises need a security system that can enforce granular web access policies on all devices used to access the web from inside and outside the network perimeter.

Tags : fortinet, content filtering, application filtering, web security, malware, web access control, web filtering solution, anti spam
    
Start   Previous   1 2 3 4    Next    End

Related IT Whitepaper Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.