Find link

language:

jump to random article

Find link is a tool written by Edward Betts.

Longer titles found: Avalanche (phishing group) (view), Voice phishing (view), Anti-phishing software (view), SMS phishing (view), Anti-Phishing Working Group (view), Simulated phishing (view), In-session phishing (view), Anti-Phishing Act of 2005 (view)

searching for Phishing 118 found (744 total)

alternate case: phishing

Google Forms (477 words) [view diff] exact match in snippet view article find links to article

always collecting email addresses. Google Forms has been used recently for phishing by stealing users' passwords, presumably by imitating the Google Account
Phishheads (1,015 words) [view diff] exact match in snippet view article find links to article
have written multiple books on the subject of Phish. Dean Budnick's The Phishing Manual presents cultural, historical, and intellectual analysis from a
China Internet Network Information Center (803 words) [view diff] exact match in snippet view article find links to article
and verify various phishing reports, and add the confirmed phishing URLs to Netcraft's phishing site feed and Maxthon's phishing blacklist. In 2015 Google
Jamtara (574 words) [view diff] exact match in snippet view article find links to article
also nick named as phishing capital of India. It got this title because of the fact that there were numerous incidents of phishing across country whose
Data URI scheme (1,117 words) [view diff] exact match in snippet view article find links to article
Generic Syntax". Internet Engineering Task Force. Retrieved 31 August 2015. Phishing without a webpage – researcher reveals how a link itself can be malicious
KidZui (1,269 words) [view diff] exact match in snippet view article find links to article
WARNING - KidZui has ceased to exist and links may lead to a phishing site. KidZui was a web browser designed for children developed by KidZui, Inc. The
3-D Secure (3,248 words) [view diff] exact match in snippet view article find links to article
issues that affect the consumer, including a greater surface area for phishing and a shift of liability in the case of fraudulent payments. The basic
Sender ID (868 words) [view diff] exact match in snippet view article find links to article
phishing or spam, however, the pra may be based on Resent-* header fields that are often not displayed to the user. To be an effective anti-phishing tool
Trusteer (2,064 words) [view diff] exact match in snippet view article find links to article
transparently detecting and protecting against financial malware infections, phishing attacks and account takeover. It provides a more comprehensive security
Avast Secure Browser (581 words) [view diff] exact match in snippet view article find links to article
be used to build a profile of the user. Anti-Phishing: A module analyzes internet traffic for phishing attempts before malicious software is executed
National Cyber Security Alliance (245 words) [view diff] exact match in snippet view article find links to article
Connect. campaign for broader public cyber security awareness (the Anti-Phishing Working Group and the Department of Homeland Security are also involved)
Crime forum (209 words) [view diff] exact match in snippet view article find links to article
and Internet fraud activities such as hacking, Online Identity Theft, Phishing, Pharming, Malware Attacks or spamming. During the early days of the Internet
MLT (hacktivist) (1,982 words) [view diff] exact match in snippet view article
In early 2016, MLT released a blog post titled "An intro to advanced Phishing techniques" which appears to have contained the first ever publicly documented
OAuth (2,355 words) [view diff] exact match in snippet view article find links to article
(less than 0.1% of users as of May 2017) were targeted by an OAuth-based phishing attack, receiving an email purporting to be from a colleague, employer
Microsoft Exchange Hosted Services (193 words) [view diff] exact match in snippet view article find links to article
actively help protect inbound and outbound e-mail from spam, viruses, phishing scams and e-mail policy violations. EHS Archive Message archiving system
Public recursive name server (606 words) [view diff] exact match in snippet view article find links to article
privacy-oriented DNS resolution system that blocks tracking, ads and phishing. dns-family.adguard.com 176.103.130.132 176.103.130.134 2a00:5a60::bad1:0ff
Dick Hardt (462 words) [view diff] exact match in snippet view article find links to article
PICNIC, International World Wide Web Conference (WWW2007), ISOC, Anti-Phishing Working Group, at New York University (NYU), Harvard and many other locales
Njrat (364 words) [view diff] exact match in snippet view article find links to article
often used against targets in the Middle East. It can be spread through phishing and infected drives. It is rated "severe" by the Microsoft Malware Protection
WebUSB (142 words) [view diff] exact match in snippet view article find links to article
data off your phone". MWR Labs. "Google disables WebUSB in Chrome amidst phishing concerns". XDA Developers. 7 March 2018. Tiwari, Aditya (6 September 2017)
VoIP vulnerabilities (491 words) [view diff] no match in snippet view article find links to article
VoIP is vulnerable to similar types of attacks that Web connection and emails are prone to. VoIP attractiveness, because of its low fixed cost and numerous
DNS blocking (714 words) [view diff] exact match in snippet view article find links to article
filters are part of their DNS. Quad9, for example, blocks access to known phishing and malicious domains. CleanBrowsing filters out adult content in their
TeleBarbados (252 words) [view diff] exact match in snippet view article find links to article
in the country of Barbados gradually gaining a reputation for malicious phishing activity from their association with the Freemotion webmail domains accessible
InfoSec Institute (110 words) [view diff] exact match in snippet view article find links to article
for security professionals and enterprise-grade security awareness and phishing training for businesses, agencies and technology professionals. The company's
London Action Plan (146 words) [view diff] exact match in snippet view article find links to article
unnecessary email-related problems, such as online fraud and deception, phishing, and distribution of internet viruses. The members also start the Action
Naftali Bennett (4,294 words) [view diff] exact match in snippet view article find links to article
anti-fraud space, focused on online banking fraud, e-commerce fraud, and phishing. The company was sold in 2005 for $145 million. He has also served as CEO
Lorrie Cranor (817 words) [view diff] exact match in snippet view article find links to article
University. She has authored over 110 research papers on online privacy, phishing and semantic attacks, spam, electronic voting, anonymous publishing, usable
CleanBrowsing (249 words) [view diff] exact match in snippet view article find links to article
blocks access to adult content and malicious/phishing domains. Blocks access to malicious and phishing domains. DNS over TLS Public recursive name servers
Rombertik (321 words) [view diff] exact match in snippet view article find links to article
strong key can be nearly impossible to recover. Promoted via spam and phishing emails, once Rombertik is installed, it injects code into running processes
Jigsaw (company) (1,998 words) [view diff] exact match in snippet view article
extension and on The Washington Post. Password Alert helps protect against phishing attacks; according to WIRED, "the company developed it for Syrian activists
Webroot Internet Security Complete (1,073 words) [view diff] exact match in snippet view article find links to article
capabilities, a registry cleaner, email antispam, secure browsing, anti-phishing and a password management service. The suite was initially released on
Mailroute (146 words) [view diff] exact match in snippet view article find links to article
email threats such as viruses including ransomware and malware, spam like phishing and spoofing, and debilitating downtime. MailRoute's Business Continuity
Booking.com (1,818 words) [view diff] exact match in snippet view article find links to article
the hotel's server. Its teams have also worked to "take down" dozens of phishing sites, as well as working with some banks to freeze the money mule bank
.mail (308 words) [view diff] exact match in snippet view article find links to article
provide important information to law enforcement addressing crimes such as phishing, and a host of other Internet-based crimes. It could make it easier for
Ethereum Classic (825 words) [view diff] exact match in snippet view article find links to article
Cloudflare to place a warning on the compromised domain warning users of the phishing attack. In January 2019, Ethereum Classic was subject to double-spending
Comparison of DNS blacklists (442 words) [view diff] exact match in snippet view article find links to article
List of IP addresses that sends spam or causing troubles with botnets or phishing Until delisting requested. Removal requests will be investigated and processed
Hacker Croll (716 words) [view diff] exact match in snippet view article find links to article
d’une protection efficace contre les virus, attaques extérieures, spam, phishing… Mettre à jour le système d’exploitation, les logiciels fréquemment utilisés…
Alliance Data (1,651 words) [view diff] exact match in snippet view article find links to article
Retrieved 3 March 2012. "Epsilon Data Breach: Expect a Surge in Spear Phishing Attacks". PC World. 5 April 2011. Retrieved 3 March 2012. "Epsilon email
Rocket Kitten (596 words) [view diff] exact match in snippet view article find links to article
They discovered an application that was able to generate personalized phishing pages and contained a list of over 1,842 individual targets. Among Rocket
Yahoo!Xtra (620 words) [view diff] exact match in snippet view article find links to article
service, which came under criticism in early 2013 following a spam and phishing attack described as the biggest to have ever hit New Zealand. Telecom automatically
Strong Girl Bong-soon (1,771 words) [view diff] exact match in snippet view article find links to article
as Charles Go (Ep. 8) Lee Soo-ji [ko] as Voice Phishing specialist Jung Chan-min [ko] as Voice Phishing specialist Jang Sung-gyu [ko] as JTVC announcer
Features of Firefox (3,988 words) [view diff] exact match in snippet view article find links to article
test". Retrieved 2006-12-08. "Phishing and Malware Protection". Mozilla Corp. Retrieved 2009-02-27. (section "How does Phishing and Malware Protection work
Barracuda Networks (2,167 words) [view diff] exact match in snippet view article find links to article
Barracuda launched an artificial intelligence service to prevent spear phishing and cyber fraud. Barracuda Mobile Device Manager end-of-life was announced
Firefox (13,140 words) [view diff] exact match in snippet view article find links to article
on June 28, 2018. Retrieved July 6, 2018. "Phishing and Malware Protection". Mozilla Corp. How does Phishing and Malware Protection work in Firefox?. Retrieved
AhnLab, Inc. (773 words) [view diff] exact match in snippet view article find links to article
PC (security for PC) AhnLab SiteGuard (Web filtering, protects against phishing websites and infected pages) AhnLab TrusGuard UTM for LTAD (for securing
Kaspersky Lab (5,733 words) [view diff] exact match in snippet view article find links to article
Internet Security software adds privacy features, parental controls, anti-phishing tools. Total Security adds parental controls, adult website filters, diagnostic
Cathy Yan (492 words) [view diff] exact match in snippet view article find links to article
Year Title Notes 2010 Phishing Short films 2014 Dinosaur Rider Entropy Of Tooth and Time 2015 Humpty 2016 Sky Ladder: The Art of Cai Guo-Qiang Documentary
Bitdefender (837 words) [view diff] exact match in snippet view article find links to article
filter raw online content and are applicable and used in antispam, anti-phishing, web filtering, scanning of spam and social networks. They facilitate the
Telecommunications in Barbados (1,052 words) [view diff] exact match in snippet view article find links to article
(CaribSurf), TeleBarbados/Freemotion.bb (frequently reported for malicious phishing practices by users accessing their webmail domain found via mail.free.bb)
List of visual novel engines (1,094 words) [view diff] exact match in snippet view article find links to article
Content-Making System for Information Security (ELSEC) and its Application to Anti-phishing Education". International Conference on e-Education, e-Business, e-Management
Essential Phone (4,189 words) [view diff] exact match in snippet view article find links to article
2017. Retrieved August 16, 2017. "Essential customers hit with deceptive phishing emails". Engadget. Archived from the original on August 30, 2017. Retrieved
CUPS (CMU) (423 words) [view diff] exact match in snippet view article
examining trends in phishing attacks as well as users' perceptions of these attacks to develop better methods of detecting and reporting phishing messages. Lorrie
Twitter bomb (957 words) [view diff] exact match in snippet view article find links to article
offended by spamming, or trolling. Spammers have several goals, which are phishing, advertising, or malware distribution. Unlike traditional online spamming
Adware (1,876 words) [view diff] exact match in snippet view article find links to article
2013. Retrieved 4 December 2012. online threats, such as spyware, spam, phishing, adware, viruses and other malware... Copy available at Bloomberg. Stern
Tom Van Vleck (367 words) [view diff] exact match in snippet view article find links to article
LeBlanc, Report #03-015, Network Associates Laboratories, June 2003. Anti-Phishing: Best Practices for Institutions and Consumers; Tally, Gregg; Thomas, Roshan;
Comodo Internet Security (1,311 words) [view diff] exact match in snippet view article find links to article
value for price but criticized its behavior blocker and its poor anti-phishing capabilities. Reubenking concluded "The biggest win for Comodo Internet
Hangul (word processor) (783 words) [view diff] exact match in snippet view article
to infect South Korean computers with a trojan dubbed NavRAT. The spear phishing messages reference the possible US-North Korean summit and attach a document
Vundo (1,024 words) [view diff] exact match in snippet view article find links to article
turn uses it to spread the infection. Norton will show prompts to enable phishing filter, all by itself. Upon pressing OK, it will try to connect to real-av
George Akerlof (1,805 words) [view diff] exact match in snippet view article find links to article
" pp. 3–8, and preview. George A. Akerlof and Robert J. Shiller. 2015. Phishing for Phools: The Economics of Manipulation and Deception, Princeton University
Israel Boy and Girl Scouts Federation (770 words) [view diff] exact match in snippet view article find links to article
150 Lira's (penny and a half) who contravenes the provisions, including phishing (selling or wearing Scouts uniforms or badges) or exercise of authority
Mendota, Minnesota (1,006 words) [view diff] exact match in snippet view article find links to article
http://www.cityofmendota.org/donations.html current link to ref. # 8 is a phishing scam for verizon wireless City of Mendota, MN – Official Website Coordinates:
Open Computer Network (290 words) [view diff] exact match in snippet view article find links to article
communications OCN known as ocn.ad.jp is also the source of a large number of phishing spam emails and Malware distribution activity Discussion regarding ocn
Misha Glenny (712 words) [view diff] exact match in snippet view article find links to article
DarkMarket (2011) concerns cybercrime and the activities of hackers involved in phishing and other activities. Nemesis: One Man and the Battle for Rio (2015) about
Ericom Software (769 words) [view diff] exact match in snippet view article find links to article
its isolation technology as a way to safely browse the internet, prevent phishing attacks, and stop credential theft. Ericom Blaze is also available as a
AnnualCreditReport.com (744 words) [view diff] exact match in snippet view article find links to article
Retrieved 2016-05-22. https://www.rentprep.com/tenant-screening-news/free-credit-report-phishing/ Official website Form to request credit report by mail
Yandex (2,681 words) [view diff] exact match in snippet view article find links to article
a food delivery service. In 2017, within the framework of a joint anti-phishing project of the Bank of Russia and search engine Yandex, a special check
OWASP (994 words) [view diff] exact match in snippet view article find links to article
application-level security issues, from SQL injection through modern concerns such as phishing, credit card handling, session fixation, cross-site request forgeries,
X.500 (2,015 words) [view diff] exact match in snippet view article find links to article
authorities. Simple homographic matching of domain names has resulted in phishing attacks where a domain can appear to be legitimate, but is not. If a X
Ten Commandments of Computer Ethics (1,427 words) [view diff] exact match in snippet view article find links to article
other users' data. Being involved in practices like hacking, spamming, phishing or cyber bullying does not conform to computer ethics. Commandment 2 Simply
Office 365 (4,229 words) [view diff] exact match in snippet view article find links to article
created a detailed guide on how to protect Microsoft Office 365 against phishing attempts and any data breaches. In July 2019, Hesse has outlawed the use
PureMessage (59 words) [view diff] exact match in snippet view article find links to article
Email Security and Data Protection — blocks spam, viruses, spyware and phishing. Scanning all inbound, outbound and internal email and Exchange message
SURBL (357 words) [view diff] exact match in snippet view article find links to article
SURBL provides lists of different types: ABUSE - spam and abuse sites PH - phishing sites MW - malware sites CR - cracked sites All lists are gathered into
Kayako (565 words) [view diff] exact match in snippet view article find links to article
Elaine (24 July 2017). "Syrian Electronic Army hacks Viber following phishing attack". Silicon Republic. Silicon Republic. Retrieved 19 April 2017. "Kayako
Psystar Corporation (2,069 words) [view diff] exact match in snippet view article find links to article
June 25, 2016. Koman, Richard (2008-04-17). "Psystar mystery adds up to phishing scam". ZDNet Government. ZDNet. Retrieved June 25, 2016. Koman, Richard
English in computing (1,947 words) [view diff] exact match in snippet view article find links to article
more formally courrier électronique pourriel – spam hameçonnage, phishingphishing télécharger – to download site web – website lien, hyperlien – website
Kim Seul-gi (728 words) [view diff] exact match in snippet view article find links to article
with its main cast Lee Beom-soo Manager Kim Mi-yeong (김미영 팀장), on Voice Phishing Korea, a parody of Mnet's The Voice of Korea Woman No. 1, as Congressperson's
Media of Syria (2,098 words) [view diff] exact match in snippet view article find links to article
activity through the hacking of emails and social networking accounts and phishing. Simultaneously, the government releases pro-Assad propaganda and false
Evil twin (disambiguation) (98 words) [view diff] exact match in snippet view article
from the video game Crash Twinsanity Evil twin (wireless networks), a method used to facilitate phishing Evil Twin Brewing, a gypsy brewery in Denmark
Internet Explorer Mobile (1,649 words) [view diff] exact match in snippet view article find links to article
tablets. IE10 Mobile will be faster and more secure, with advanced anti-phishing features like SmartScreen Filter to block dangerous websites and malware
Shamoon (1,919 words) [view diff] exact match in snippet view article find links to article
for Aramco Overseas, the attack was well-staged. It was initiated by a phishing email attack that an unnamed Saudi Aramco Information Technology employee
Dan Boneh (991 words) [view diff] exact match in snippet view article find links to article
Extensions Usenix security 2005 "Security experts unveil defense against phishing". 2005-07-27. Dan Boneh's Home Page Dan Boneh's Stanford Research Group
SIGDOC (1,271 words) [view diff] exact match in snippet view article find links to article
Carolina State University Actions and Strategies: A Verbal Data Analysis of Phishing Emails. 2018 Graduate 2 Jason Tham University of Minnesota Learning from
William Genovese (562 words) [view diff] exact match in snippet view article find links to article
involved in the computer security industry, doing penetration testing, phishing, OSINT threat intel, mitigation. He is also a contributor to the Metasploit
Myspace (5,962 words) [view diff] exact match in snippet view article find links to article
as well. In addition, Myspace had particular problems with vandalism, phishing, malware, and spam which it failed to curtail, making the site seem inhospitable
Part-Time Spy (274 words) [view diff] exact match in snippet view article find links to article
works with an undercover policewoman to recover stolen money from a voice phishing syndicate. Kang Ye-won as Jang Young-shil Han Chae-ah as Na Jung-an Namkoong
POLi Payments (1,527 words) [view diff] exact match in snippet view article find links to article
anymore genuine, and the POLi script anymore trustworthy than the average phishing email?" "Not only is this an opportunity to phish people's bank details
Favicon (2,380 words) [view diff] exact match in snippet view article find links to article
accepted by the user agent. Favicons are often manipulated as part of phishing or eavesdropping attacks against HTTPS webpages. Many web browsers display
Net-C (291 words) [view diff] exact match in snippet view article find links to article
(iOS, Android et Windows Phone). Protection against malware, spam and phishing attempts is offered through an partnership with specialist company Vade
Proofpoint, Inc. (2,339 words) [view diff] exact match in snippet view article find links to article
engineered attacks—such as business email compromise (BEC) and credential phishing—that do not use malware. It uses a blend of sandbox analysis, reputational
CryptoLocker (2,029 words) [view diff] exact match in snippet view article find links to article
Retrieved 18 January 2014. "TorrentLocker now targets UK with Royal Mail phishing". ESET. Retrieved 22 October 2014. "Scammers use Australia Post to mask
Central Bank of Russia (1,617 words) [view diff] exact match in snippet view article find links to article
constructing the Crimean Bridge. In 2017, within the framework of a joint anti-phishing project of the Bank of Russia and search engine Yandex, a special check
Jon Fishman (1,116 words) [view diff] exact match in snippet view article find links to article
Vol. 10 Vol. 11 Vol. 12) Books The Phish Companion The Phish Book The Phishing Manual The Pharmer's Almanac Run Like an Antelope Side projects and related
Browser hijacking (4,044 words) [view diff] exact match in snippet view article find links to article
redirections to conduit.com have also reported that they have been attacked by phishing attempts and have received unwanted email spam, junk mail, other messages
Kraken (company) (2,708 words) [view diff] exact match in snippet view article
be responsible. The company attributed affected users’ missing funds to phishing and man-in-the-middle attacks, and stressed the importance of enabling
McAfee SiteAdvisor (913 words) [view diff] exact match in snippet view article find links to article
users to safely shorten URLs when sharing links Alerts users to possible phishing and identity theft scams Redirects you away from red and yellow sites (if
ESET NOD32 (2,228 words) [view diff] exact match in snippet view article find links to article
same level, about 94%, but was noted for its ability to block spam and phishing, earning an award, an award only 19 other antivirus companies were able
Operation Onymous (1,611 words) [view diff] exact match in snippet view article find links to article
based on a crawl of all onion sites, of which 153 were scam, clone or phishing sites. The number of sites initially claimed to have been infiltrated led
WannaCry ransomware attack (7,015 words) [view diff] exact match in snippet view article find links to article
infection was likely through an exposed vulnerable SMB port, rather than email phishing as initially assumed. Within a day the code was reported to have infected
Venezuelan presidential crisis (19,636 words) [view diff] exact match in snippet view article find links to article
for personal information: names, ID, address and telephone numbers. The phishing website used the .ve domain controlled by Conatel. This manipulation was
Arena Flowers (502 words) [view diff] exact match in snippet view article find links to article
approach to social media. Arena was falsely identified as sending out phishing emails by MessageLabs. Valentine's 2013: Arena failed to deliver a reported
PerSay (442 words) [view diff] exact match in snippet view article find links to article
Retrieved 9 August 2011. Dar, Zuri (15 February 2005). "Persay wins BT anti-phishing tender". Haaretz. Retrieved 9 August 2011. PR Newswire (3 December 2009)
Tagged (3,544 words) [view diff] exact match in snippet view article find links to article
Retrieved 2009-12-13. "Tagged.com Email Scam - "Your Friend Tagged You" - Phishing for Your Identity". Consumerfraudreporting.org. Retrieved 2009-06-09. Larry
CrowdStrike (2,212 words) [view diff] exact match in snippet view article find links to article
SecureWorks discovered a list of email addresses targeted by Fancy Bear in phishing attacks. The list included the email address of Yaroslav Sherstyuk, the
Mastercard (5,827 words) [view diff] exact match in snippet view article find links to article
thousands of credit cards was compromised during that attack due to a phishing-site set up by the attackers. However, Mastercard denied this, stating
CrowdStrike (2,212 words) [view diff] exact match in snippet view article find links to article
SecureWorks discovered a list of email addresses targeted by Fancy Bear in phishing attacks. The list included the email address of Yaroslav Sherstyuk, the
Hong Seok-jae (341 words) [view diff] exact match in snippet view article find links to article
screenwriter, script editor Heart Vibrator (short film, 2012) - actor The Phishing (short film, 2012) - assistant director LOVE FEE for last month (short
Mastercard (5,827 words) [view diff] exact match in snippet view article find links to article
thousands of credit cards was compromised during that attack due to a phishing-site set up by the attackers. However, Mastercard denied this, stating
AV-Comparatives (521 words) [view diff] exact match in snippet view article find links to article
Behaviour Test False Alarm Test PerformanceTest Malware Removal Test Anti-Phishing Test Parental Control Test Mac Security Reviews / Tests Mobile Security
Windows Live OneCare (1,864 words) [view diff] exact match in snippet view article find links to article
settings and ensures that the automatic website checking feature of the Phishing Filter is enabled. Windows Live OneCare Performance Plus is the component
Internet censorship in Tunisia (2,529 words) [view diff] exact match in snippet view article find links to article
along with login details of their Facebook pages had been targeted by phishing scripts put in place by the government. There were increasing incidences
Naukowa i Akademicka Sieć Komputerowa (833 words) [view diff] exact match in snippet view article find links to article
abuse teams, Abuse FORUM, was created. In 2010 CERT Polska joined the Anti-Phishing Working Group, an association of companies and institutions which actively
Macau Computer Emergency Response Team Coordination Centre (294 words) [view diff] exact match in snippet view article find links to article
MOCERT accepts reports on computer security related incidents, for example, phishing, malware, malicious website, phoney emails and their attachments, and other
Xtra (ISP) (1,448 words) [view diff] exact match in snippet view article
000 affected) to mid April 2013. The symptoms were suspicious spam and phishing types of email. Telecom advised customers to delete any suspicious emails
Write-only memory (engineering) (1,157 words) [view diff] exact match in snippet view article
1007/s11047-011-9270-0. Markus Jakobsson; Steven Myers (5 December 2006). Phishing and Countermeasures: Understanding the Increasing Problem of Electronic
Robert J. Shiller (2,924 words) [view diff] exact match in snippet view article find links to article
Robert J. Shiller, Princeton University Press (2019), ISBN 978-0691182292. Phishing for Phools: The Economics of Manipulation and Deception, George A. Akerlof
The Inspectors (634 words) [view diff] exact match in snippet view article find links to article
 2016 (2016-04-16) 19 19 "The Great Pretenders" April 23, 2016 (2016-04-23) 20 20 "Gone Phishing" April 30, 2016 (2016-04-30) 21 21 "Psychic Rabbit" May 7, 2016 (2016-05-07)
Christopher Boyd (IT security) (993 words) [view diff] exact match in snippet view article
Against BitTorrent". "P2P Downloads Fuel Spyware". "Fake Google Toolbars Go Phishing". "AIM Rootkit Attack Traced to Middle East". "Botnet Uses BitTorrent to
FireEye (2,759 words) [view diff] exact match in snippet view article find links to article
Microsoft. In 2015, the FireEye as a Service team in Singapore uncovered a phishing campaign exploiting an Adobe Flash Player zero-day vulnerability (CVE-2015-3113)
WebAuthn (2,531 words) [view diff] exact match in snippet view article find links to article
2018. Retrieved 11 March 2019. Kan, Michael (March 7, 2019). "Google: Phishing Attacks That Can Beat Two-Factor Are on the Rise". PC Magazine. Retrieved