Posts Tagged ‘phishing’

Who's Behind the Gmail Phishing Attack? – NBC News

May 10, 2017


The Gmail phishing attack was 'particularly insidious,' according to experts, who said it was created by someone with considerable skill.
http://www.nbcnews.com/tech/security/who-s-behind-massive-gmail-phishing-attack-n754826

That Gmail phishing attack has taken a bizarre turn

May 9, 2017


A Twitter account from a user named Eugene Pupov took responsibility for the worm.
http://www.kwqc.com/content/news/That-Gmail-phishing-attack-has-taken-a-bizarre-turn-421402234.html

Phishing is Getting Fishier

May 2, 2017


If you are like most of us, you have undoubtedly received an email that has asked you to click on a link. Did you click it? If you did, you [ ]
http://feedproxy.google.com/~r/IdentityTheftExpertSpeakerProtectionPreventionResourceBlog/~3/usejY32MzrI/

Why we’ll never stamp out spear phishing | ATM Marketplace

December 17, 2016


When subjects in a spear phishing study received a link to New Year’s party pictures — and instructions not to share them — nearly half clicked through even though they didn’t know the sender.
http://www.atmmarketplace.com/blogs/why-well-never-stamp-out-spear-phishing/

Phishing Attacks Two-Factor Authentication – Flarrio

August 13, 2016


Phishing Attacks Two-Factor Authentication
http://flarrio.com/phishing-attacks-two-factor-authentication-technology-2016/

Phishing attacks Two-Factor Authentication | Robert Siciliano

July 28, 2016


Hackers bank heavily on tricking people into doing things that they shouldn’t: social engineering. A favorite social engineering ploy is the phishing e-mail
http://robertsiciliano.com/blog/2016/07/28/phishing-attacks-two-factor-authentication/

Phishing attacks Two-Factor Authentication

July 28, 2016


Hackers bank heavily on tricking people into doing things that they shouldn’t: social engineering. A favorite social engineering ploy is the phishing e-mail. How a hacker circumvents two-factor authentication: First [ ]
http://feedproxy.google.com/~r/IdentityTheftExpertSpeakerProtectionPreventionResourceBlog/~3/VztbSFQTBqk/

Computer Security: Phishing, Scareware and Zombies, Oh My!

July 13, 2016


Each browser has set security features that require the attention of the user, and these may or may not be enabled by default
http://idtheft.about.com/od/businessidtheft/fl/Computer-Security-Phishing-Scareware-and-Zombies-Oh-My.htm

Phishing Protection 101 | Robert Siciliano

June 16, 2016


Phishing-type e-mails are designed to trick the recipient into either downloading a virus (which then gives the hacker remote control of the computer) or
http://robertsiciliano.com/blog/2016/06/16/phishing-protection-101/

Phishing Protection 101

June 16, 2016


Phishing-type e-mails are designed to trick the recipient into either downloading a virus (which then gives the hacker remote control of the computer) or revealing enough information for the thief [ ]
http://feedproxy.google.com/~r/IdentityTheftExpertSpeakerProtectionPreventionResourceBlog/~3/vOCw4qsrffQ/