Phishing tackle

Button, Keith
October 2010
Bank Technology News;Oct2010, Vol. 23 Issue 10, p1
Trade Publication
The article reports on the employment of eCert by Financial Services Information Sharing and Analysis Center (FS-ISAC) and Banking Industry Technology Secretariat (BITS) to create a pilot program Trusted Email Registry to bring anti-phising tools to member institutions in the U.S.


Related Articles

  • Shake off the web spies. Irvine, Robert // Web User;1/3/2014, Issue 335, p3 

    An introduction is presented in which the author discusses several articles published within the issue on topics including spying accusations against the social networking website Facebook, encrypting e-mails and mobile application for Android operating system.

  • Spam, Malware, Virus Outbreaks Rise in 2012: Report. Eddy, Nathan // eWeek;7/26/2012, p7 

    The article discusses the results of a study conducted by German electronic-mail security specialist Eleven which showed the rise of unwelcome or dangerous electronic-mail distribution in the first half of 2012. It says that the study revealed 54.8 percent more spam, 90 percent more virus and...

  • Propagation Behavior of Computer Virus in the Framework of SIR Model. Rao, N. Suresh; Avadhani, P. S. // IUP Journal of Computer Sciences;Oct2009, Vol. 3 Issue 4, p37 

    This research paper describes the dynamics of propagation of computer virus in a network of computers based on the mathematical epidemiological model, Susceptible-Infected-Removed (SIR) model. The asymptotic behavior of susceptible, infected and removed nodes is examined. The threshold phenomena...

  • Phishing scammers target middle managers.  // SMB World Asia;9/7/2015, p1 

    The article focuses on the protection from phishing scammers that targets middle managers in business enterprises. Topics disucssed include rise in the server related security events according to the Hong Kong Security Watch Report; rise in phishing events; target of malicious emails being the...

  • How to Solve the Five Biggest Email Security Problems. Spykerman, Mike // Software World;Sep2015, Vol. 46 Issue 5, p20 

    The article discusses ways how to solve the largest problems involving email security facing businesses and organisations. Among the email problems are malware such as ransomware which encrypts files on the systems and demands a ransom to unlock the data, large email attachments which causes...

  • Help! Spammers Hijacked My Email Account. Bradley, Tony // PCWorld;Jun2012, Vol. 30 Issue 6, p35 

    The article looks at spammers hijacking email accounts to bounce spam email to the account holder's contacts. Topics discussed include spammers' use of spoofed email headers to make it appear as though spam messages originated from a hacked account and how to treat a computer infected with a...

  • SPAM -- a thing of the past?  // Multimedia Information & Technology;Aug2011, Vol. 37 Issue 3, p35 

    The article reports on the decline of spam messages since July 2010 from 230 billion spam messages circulated daily into 40 billion. It was when in April 2011 when Microsoft Corp. has launched an attack against Rustock, a botnet responsible for sending 40 percent of all junk email messages,...

  • Botnets by Email.  // Windows IT Pro;Jun2007, Vol. 13 Issue 6, p80 

    The article describes the process by which a botnet malicious software can be spread through e-mail messages. The malicious file was discovered by the author through a regular electronic cards from BlueMountain Greetings which would be linked to an Internet domain name containing the virus. The...

  • Prevent Spear Phishing Attacks with Improved Email Security. Spykerman, Mike // Software World;Jul2015, Vol. 46 Issue 4, p23 

    The article discusses issues of preventing spear phishing attacks by business enterprises by improving electronic mail security. Topics discussed include examples of data hacks and data breaches at retailer Target, insurance company Anthem and electronics manufacturer Sony, scanning e-mails...

  • Protecting email both ways. Stephenson, Peter // SC Magazine: For IT Security Professionals (15476693);Sep2014, Vol. 25 Issue 9, p39 

    The article focuses on protecting e-mails from fishing and malware as well as from interception. Threats for a business enterprise's computer system arising out of an email are discussed. It notes that there are several Internet security products and vendors to offer an email gateway that is...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics