<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"><channel><title>Netvouz / lillymark / tag / against</title>
<link>http://netvouz.com/lillymark/tag/against?feed=rss&amp;pg=1</link>
<description>lillymark&#39;s bookmarks tagged &quot;against&quot; on Netvouz</description>
<item><title>Stop Hunger Now Partners with Estuate to package 10,000 Meals</title>
<link>http://www.estuate.com/news-room/stop-hunger-now-partners-with-estuate-to-package-10-000-meals</link>
<description>Stop Hunger Now and Estuate are joining forces in the fight against hunger. More than 30 employees will package meals for the world’s hungry on September 28, 2013 in Sunnyvale, CA at 10:00 AM.</description>
<category domain="http://netvouz.com/lillymark?category=5038404302206526589"></category>
<author>lillymark</author>
<pubDate>Fri, 27 Sep 2013 09:57:10 GMT</pubDate>
</item><item><title>Technology Created Specifically to Protect against Phishing Attacks</title>
<link>http://mywikibiz.com/Technology_Created_Specifically_to_Protect_against_Phishing_Attacks</link>
<description>Phishing refers to the “act of attempting to acquire information such as usernames, passwords, and credit card details (and sometimes, indirectly, money) by masquerading as a trustworthy entity in an electronic communication.” However, most of the people do not consider phishing as a real threat.</description>
<category domain="http://netvouz.com/lillymark?category=5038404302206526589"></category>
<author>lillymark</author>
<pubDate>Wed, 04 Sep 2013 04:29:10 GMT</pubDate>
</item><item><title>Understanding Phishing Attacks and Solutions</title>
<link>http://www.slideshare.net/Phishnix/understanding-phishing-attacks-and-solutions</link>
<description>Technological growth in the form of networked environment, data centers, software applications smartphones and hand held devices that enable access to the critical data has changed today&#39;s corporate landscape.</description>
<category domain="http://netvouz.com/lillymark?category=5038404302206526589"></category>
<author>lillymark</author>
<pubDate>Wed, 16 Oct 2013 05:56:56 GMT</pubDate>
</item><item><title>10 Tips to Prevent Phishing Attacks and Scams</title>
<link>http://www.zimbio.com/Technology+Access/articles/JNX_Xvb-ndB/10+Tips+Prevent+Phishing+Attacks+Scams?success=Your+edit+was+saved.</link>
<description>With the phishers employing sophisticated techniques to steal personal information and credit card details, users need to implement foolproof security measures to plug in leaks. But how to protect against phishing scams which are growing at an alarming rate.</description>
<category domain="http://netvouz.com/lillymark?category=5038404302206526589"></category>
<author>lillymark</author>
<pubDate>Thu, 16 Jan 2014 11:12:25 GMT</pubDate>
</item><item><title>Advanced Anti-Phishing Tools to Combat Phishing</title>
<link>http://goarticles.com/article/Advanced-Anti-Phishing-Tools-to-Combat-Phishing/7989821/</link>
<description>Identity theft is a recurring phenomenon in today’s world. However, Phishing and identity theft have certain things in common, especially with regards to the fact that hackers resort to Phishing mails as a tool to rob an individual’s identity.</description>
<category domain="http://netvouz.com/lillymark?category=5038404302206526589"></category>
<author>lillymark</author>
<pubDate>Fri, 15 Nov 2013 05:27:52 GMT</pubDate>
</item><item><title>How Can Enterprise’s Successfully Identify and Fight Phishing</title>
<link>http://www.slideshare.net/Phishnix/phishnix-how-can-enterprises-successfully-identify-and-fight-phishing-attacksdocx</link>
<description>The world of technology and internet advancement today is dominated by an acute concern in the name of malware and Phishing attacks. Simply put, Phishing scams are mostly fraudulent email messages that only appears to come from legal companies such as a bank, internet search engine, academic university and many more.</description>
<category domain="http://netvouz.com/lillymark?category=5038404302206526589"></category>
<author>lillymark</author>
<pubDate>Mon, 30 Dec 2013 06:51:06 GMT</pubDate>
</item><item><title>How to Combat Enterprise Spear Phishing Attacks?</title>
<link>http://www.scribd.com/doc/198306442/How-to-Combat-Enterprise-Spear-Phishing-Attacks</link>
<description>It generally does not take much time for rising trends in business IT safety to reach a certain point at which where a new name is often attributed to it. A recent phenomena noted today are the e-mail Phishing scams that targets the small units within a certain enterprise than several people.</description>
<category domain="http://netvouz.com/lillymark?category=5038404302206526589"></category>
<author>lillymark</author>
<pubDate>Thu, 16 Jan 2014 11:24:52 GMT</pubDate>
</item><item><title>How to Combat the Increase In Spear Phishing Attacks?</title>
<link>http://www.slideshare.net/Phishnix/how-to-combat-the-increase-in-spear-phishing-attacks</link>
<description>It has been observed by the IT analysts, that the cybercriminals today have been fine-tuning strategies to target not just certain industries and enterprise’s, but also influencing individuals.</description>
<category domain="http://netvouz.com/lillymark?category=5038404302206526589"></category>
<author>lillymark</author>
<pubDate>Thu, 05 Dec 2013 11:05:33 GMT</pubDate>
</item><item><title>India’s New Sexual Harassment Law for the Workplace</title>
<link>http://www.nair-co.com/NairCo-PR-IndiaNewSexualHarassmentLaw-20140116.aspx</link>
<description>A new law for the protection of women against sexual harassment at the workplace recently entered into force in India.</description>
<category domain="http://netvouz.com/lillymark?category=5038404302206526589"></category>
<author>lillymark</author>
<pubDate>Fri, 17 Jan 2014 08:22:35 GMT</pubDate>
</item><item><title>Keep Your Company Free From Phishing Attacks</title>
<link>http://goarticles.com/article/Keep-Your-Company-Free-From-Phishing-Attacks/8191612/</link>
<description>Technological advance and the advent of the Internet has enabled easy access to information irrespective of the location and advice. However, along with the convenience also comes in threats to the security of vital information as accessiblity from any device gives in scope for cyber intrusions.</description>
<category domain="http://netvouz.com/lillymark?category=5038404302206526589"></category>
<author>lillymark</author>
<pubDate>Mon, 06 Jan 2014 08:40:42 GMT</pubDate>
</item></channel></rss>