<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"><channel><title>Netvouz / lillymark / tag / targeted</title>
<link>http://netvouz.com/lillymark/tag/targeted?feed=rss</link>
<description>lillymark&#39;s bookmarks tagged &quot;targeted&quot; on Netvouz</description>
<item><title>Anti Phishing Software to protect against Sophisticated Phishing Attacks</title>
<link>http://www.articlesbase.com/technology-articles/anti-phishing-software-to-protect-against-sophisticated-phishing-attacks-6774999.html</link>
<description>A recent survey conducted by Verizon communications found that phishing attacks are growing in sophistication. According to them in all the incidents of online espionage that happened in 2012, there occurred some degree of phishing attacks.</description>
<category domain="http://netvouz.com/lillymark?category=5038404302206526589"></category>
<author>lillymark</author>
<pubDate>Wed, 09 Oct 2013 04:25:24 GMT</pubDate>
</item><item><title>Avoid Serious Repercussions by Effectively Combating Enterprise Spear Phishing</title>
<link>http://www.articlesnatch.com/Article/Avoid-Serious-Repercussions-by-Effectively-Combating-Enterprise-Spear-Phishing/6181883</link>
<description>Spear-phishing isn&#39;t going anywhere, for as long as people use social networks and email continues to be a key workplace communication channel, spear-phishing will be a weapon of choice for cybercrime, and tacklingtargeted spear phishing attacks is a major challenge for corporations as it is aimed at people and not at the technology.</description>
<category domain="http://netvouz.com/lillymark?category=5038404302206526589"></category>
<author>lillymark</author>
<pubDate>Wed, 30 Oct 2013 06:15:52 GMT</pubDate>
</item><item><title>Ensure Protection against Email Phishing Fraud with Social Engineering Software</title>
<link>http://www.amazines.com/article_detail.cfm?articleid=6052820</link>
<description>Phishing, which refers to the activity of acquiring confidential information such as usernames, passwords and credit card details fraudulently, is a serious issue capable of causing irreparable damage.</description>
<category domain="http://netvouz.com/lillymark?category=5038404302206526589"></category>
<author>lillymark</author>
<pubDate>Wed, 16 Oct 2013 06:16:02 GMT</pubDate>
</item><item><title>How to Combat Enterprise Spear Phishing Attacks?</title>
<link>http://www.scribd.com/doc/198306442/How-to-Combat-Enterprise-Spear-Phishing-Attacks</link>
<description>It generally does not take much time for rising trends in business IT safety to reach a certain point at which where a new name is often attributed to it. A recent phenomena noted today are the e-mail Phishing scams that targets the small units within a certain enterprise than several people.</description>
<category domain="http://netvouz.com/lillymark?category=5038404302206526589"></category>
<author>lillymark</author>
<pubDate>Thu, 16 Jan 2014 11:24:52 GMT</pubDate>
</item><item><title>How to Combat the Increase In Spear Phishing Attacks?</title>
<link>http://www.slideshare.net/Phishnix/how-to-combat-the-increase-in-spear-phishing-attacks</link>
<description>It has been observed by the IT analysts, that the cybercriminals today have been fine-tuning strategies to target not just certain industries and enterprise’s, but also influencing individuals.</description>
<category domain="http://netvouz.com/lillymark?category=5038404302206526589"></category>
<author>lillymark</author>
<pubDate>Thu, 05 Dec 2013 11:05:33 GMT</pubDate>
</item><item><title>Protection from Phishing Attacks Can be Simple</title>
<link>http://www.docstoc.com/docs/163237232/Protection-from-Phishing-Attacks-Can-be-Simple?</link>
<description>Phishing threats and social engineering are growing in sophistication and it continues to be one of the biggest threats to online privacy &amp; security across the world.</description>
<category domain="http://netvouz.com/lillymark?category=5038404302206526589"></category>
<author>lillymark</author>
<pubDate>Mon, 11 Nov 2013 06:19:49 GMT</pubDate>
</item><item><title>Target Customer Profiling</title>
<link>http://www.extendedpresence.com/target-customer-profiling.html</link>
<description>Extended Presence understands the challenge. Which is why we offer custom list development services, utilizing a proven and highly effective approach to create contact lists, confirm titles and conduct survey work. Through our outreach, we glean valuable insight and pertinent information about your targets.</description>
<category domain="http://netvouz.com/lillymark?category=5038404302206526589"></category>
<author>lillymark</author>
<pubDate>Mon, 07 Jan 2013 09:44:06 GMT</pubDate>
</item><item><title>Trends in Phishing Attacks &amp; Ways to Curb It</title>
<link>http://www.zimbio.com/Technology+Access/articles/R-0ZCwYztWh/Trends+Phishing+Attacks+Ways+Curb?add=True</link>
<description>Computer security is the major IT concern for majority of enterprises. This is because of the recurring.</description>
<category domain="http://netvouz.com/lillymark?category=5038404302206526589"></category>
<author>lillymark</author>
<pubDate>Mon, 11 Nov 2013 06:01:53 GMT</pubDate>
</item></channel></rss>