<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"><channel><title>Netvouz / lillymark / tag / enterprise-spear-phishing-definition</title>
<link>http://netvouz.com/lillymark/tag/enterprise-spear-phishing-definition?feed=rss</link>
<description>lillymark&#39;s bookmarks tagged &quot;enterprise-spear-phishing-definition&quot; on Netvouz</description>
<item><title>Combating Enterprise Spear Phishing Attacks can Be Easy – Know How</title>
<link>http://www.amazines.com/article_detail.cfm?articleid=5927258</link>
<description>Spear-phishing is on the rise mainly as it is a sure shot means of procuring information from innocent victims. Cyber criminals have moved from broad phishing attacks to advance targeted attacks like spear-phishing.</description>
<category domain="http://netvouz.com/lillymark?category=5038404302206526589"></category>
<author>lillymark</author>
<pubDate>Thu, 22 Aug 2013 05:58:24 GMT</pubDate>
</item><item><title>Phishing Scams &amp; How to Stay Secured From Them</title>
<link>http://www.scribd.com/doc/169594761/Phishing-Scams-How-to-Stay-Secured-From-Them</link>
<description>Cyber criminals and hackers resort to Phishing attacks in order to lure employees to divulge their private data that can be used by Phishers in a negative way. In most cases the email Phishing attacks appear to be a legitimate source asking for some sort of information, financial data and other inputs.</description>
<category domain="http://netvouz.com/lillymark?category=5038404302206526589"></category>
<author>lillymark</author>
<pubDate>Tue, 24 Sep 2013 05:27:06 GMT</pubDate>
</item><item><title>Preventing Phishing Attacks &amp; Loss of Sensitive Data with the Right</title>
<link>http://www.docstoc.com/docs/160561878/Preventing-Phishing-Attacks-and-Loss-of-Sensitive-Data-with-the-Right</link>
<description>The rapid adaptation of mobile devices and wireless networks has increased the grounds for newer and much more sophisticated forms of cybercrime. Today phishing is quite a serious problem as it affects not only people but also the organization that the victims work for and unlike other popular attack vectors; phishing requires very little technological capital.</description>
<category domain="http://netvouz.com/lillymark?category=5038404302206526589"></category>
<author>lillymark</author>
<pubDate>Fri, 13 Sep 2013 06:33:41 GMT</pubDate>
</item><item><title>Social Engineering, the Most Powerful Weapon used in Phishing Attacks</title>
<link>http://www.slideshare.net/Phishnix/social-engineering-the-most-powerful-weapon-used-in-phishing-attacks</link>
<description>Phishing is a criminal strategy that employs both social engineering and technical deception in order to steal personal, identity and financial data. If we look at the examples of phishing attacks, we can see that social engineering schemes usually use hoax emails claiming to be from legitimate organizations and lead recipients to counterfeit websites.</description>
<category domain="http://netvouz.com/lillymark?category=5038404302206526589"></category>
<author>lillymark</author>
<pubDate>Thu, 22 Aug 2013 07:00:45 GMT</pubDate>
</item><item><title>Technology Created Specifically to Protect against Phishing Attacks</title>
<link>http://mywikibiz.com/Technology_Created_Specifically_to_Protect_against_Phishing_Attacks</link>
<description>Phishing refers to the “act of attempting to acquire information such as usernames, passwords, and credit card details (and sometimes, indirectly, money) by masquerading as a trustworthy entity in an electronic communication.” However, most of the people do not consider phishing as a real threat.</description>
<category domain="http://netvouz.com/lillymark?category=5038404302206526589"></category>
<author>lillymark</author>
<pubDate>Wed, 04 Sep 2013 04:26:47 GMT</pubDate>
</item></channel></rss>