Searching all of TechTarget| 2,745 results for "phishing"

phishing: Phishing is a form of fraud in which the attacker tries to learn information -- such as login ...

See all definition search results provided by


Manage Nov 25, 2015


By Nick Lewis Manage Sep 17, 2015

How can phishing emails spoofing TLDs be avoided?

Attackers have found a loophole in SPF verification and are using the .gov top-level domain to trick users with phishing emails. Expert Nick Lewis explains how to defend against the threat. Continue Reading


By Kevin Beaver Get Started Jun 09, 2015

What to include in an Exchange Server phishing test

Use these guidelines to test how secure your Exchange Server setups actually are. Continue Reading


By Peter Loshin News Oct 23, 2015

Google to adopt strictest DMARC policy to fight spam, phishing

News roundup: Google to implement strictest DMARC policy in anti-phishing campaign. Plus: CISA is coming, the health care industry is lagging and SHA-1 is failing. Continue Reading


By Michael Heller News Aug 27, 2015

Report: phishing training could cut damage costs by $1.8M

A new report breaks down the potential costs associated with a phishing breach and claims that phishing training could cut those costs by as much as $1.8 million. Continue Reading


By Warwick Ashford Apr 24, 2015

Users should not take the rap for phishing attacks, says expert

End users and security awareness training should not be blamed for successful phishing attacks, says security awareness expert Continue Reading


By Kevin Beaver Evaluate Apr 22, 2015

Stop attackers from catching you in a phishing hack

Exchange admins can use the recent State Department hack as a lesson in the importance of consistent security protocols. Continue Reading


By Joseph Granneman Manage Mar 05, 2015

Should enterprises enforce harsher penalties for phishing victims?

The consequences of phishing attacks could fall on the victims as enterprises start to punish employees who fall for this age-old scam. Expert Joseph Granneman discusses why this approach may have merit. Continue Reading


By Nick Lewis Evaluate Jun 01, 2015

How can phishing attacks that use proxy programs be stopped?

Phishing attacks are adopting new functionality to avoid detection, including the use of proxy programs to simplify the attack process. Learn how to defend against this type of risk. Continue Reading


By Warwick Ashford Sep 23, 2014

Ebay under fire for inaction over phishing attacks

Auction site eBay is under fire after saying it has no plans to disallow active content in listings, despite the risk to users Continue Reading