Your search for anti-phishing working group returned 23 results.

Sort results:

Hint: If you don't want the words you enter to be searched for separately, use quotation marks to find people or exact phrases. See our Search Help section for more hints.

News

Study finds hosting providers offer phishing paradise

The Anti-Phishing Working Group found that 47 percent of all phishing attacks involve shared web hosting, like one might find on WordPress or Joomla.

Group Test

Email security/content management

Keeping email secure is a multi-dimensional task, says Technology Editor Peter Stephenson.

News Two-factor authentication may have done little to stop the AP Twitter hijack

Two-factor authentication may have done little to stop the AP Twitter hijack

Ample criticism has been lobbed toward Twitter after Tuesday's false AP tweet that President Obama was injured in an apparent attack on the White House. But could the microblogging service have prevented this?

News

Watering hole attacks are becoming increasingly popular, says study

Fans of spear phishing have begun shifting to watering holes, which is when an attacker targets the computers of visitors to compromised websites.

News

Microsoft releases temporary fix for new IE zero-day exploited in the wild

Microsoft warned that all supported versions of IE may be impacted by the flaw, and that saboteurs could target victims via phishing emails or watering hole attacks.

News

Poison Ivy discovered in ongoing espionage efforts

Along with a report on the latest Poison Ivy-related APT threats, FireEye also released a free package of tools to help organizations identify targeted attacks where the remote access trojan is leveraged.

Feature An academic creates a password-authentication model for the real world

An academic creates a password-authentication model for the real world

Chris Mitchell's creation, Uni-IDM (universal identity management), is a software-based tool that helps users manage the authentication process.

Feature A look ahead: Forecasts for 2014

A look ahead: Forecasts for 2014

A group of prominent security professionals forecast the significant industry shifts in 2014. Greg Masters compiles the responses.

Feature Bank on it: Attacks on financial institutions

Bank on it: Attacks on financial institutions

Risk is with us, whether physical or online, says Doug Johnson, American Bankers Association. James Hale reports.

Product Review DriveLock

DriveLock

DriveLock from CenterTools provides a full set of endpoint security features.

Feature Dollars and sense: Application security

Dollars and sense: Application security

Though it is difficult to quantify ROI for security initiatives, investment in application security is logical for the enterprise, reports Jim Romeo.

Feature

Reboot: In memoriam

We pay tribute to two security pros whose life's work helped evolve the technology and thinking of the IT security industry.

Feature At the ready: Incident response

At the ready: Incident response

Incident response has become a more complex art, says Rusty Agee, the city of Charlotte's security leader. Karen Epper Hoffman reports.

News Scammers bug Nordstrom registers with $40 devices to skim card data

Scammers bug Nordstrom registers with $40 devices to skim card data

Fraudsters boldly entered the store to plant skimming devices.

Feature Botnets 3.0: Global malware

Botnets 3.0: Global malware

Thanks to willing accomplices and easy-to-use technology, the threat from linked computers is expanding, reports Karen Epper Hoffman.

Blog Post The growing importance of security in messaging and email services

The growing importance of security in messaging and email services

While the list of security challenges continues to grow, there are a select number of really critical issues that are center-stage for messaging leaders.

News Fear of prosecution hampers security research

Fear of prosecution hampers security research

As Black Hat and DefCon near, there's a noticeable "chill" in the air due to recent, aggressive legal action taken against security researchers. And the biggest loser of all may be the public.

Feature Fountain of youth: The impact of digital natives

Fountain of youth: The impact of digital natives

Tech-savvy Generation Y workers can be an advantage in the enterprise, says James Beeson, CISO at GE Capital Americas. Marcos Colón reports.

Feature Canada reacts: Consequences of NSA revelations

Canada reacts: Consequences of NSA revelations

How are the latest NSA spying revelations affecting Canadians' use of the internet? Danny Bradbury finds out.

News Canada reacts: Consequences of NSA revelations

Canada reacts: Consequences of NSA revelations

How are the latest NSA spying revelations affecting Canadians' use of the internet? Danny Bradbury finds out.

Page 1 of 2

Sign up to our newsletters

POLL