Email Fraud Reports

Cyber threat on the rise: Why enterprises need to be on red alert with text and mobile phishing
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Last year's Verizon data breaches report found that 80% of all cyber security attacks started with a phishing email. In this e-guide, we take a look at how phishing can affect an enterprise, why text-based phishing is a growing threat and how to prevent and minimize mobile phishing attacks.
Posted: 06 Apr 2022 | Published: 06 Apr 2022

TechTarget ComputerWeekly.com

Infographic: Business email compromise red flags
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC: Business Email Compromise (BEC) attacks typically target individuals with access to financial records and other sensitive information. However, BEC prevention involves making everyone more aware of email security risks and social engineering red flags. Here are 7 things to look out for when identifying a BEC attack.
Posted: 06 Mar 2023 | Published: 07 Mar 2023

TechTarget ComputerWeekly.com

9 Common Cryptocurrency Scams in 2023
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC: Even though cryptocurrency is a newer trend, thieves are using old methods to steal. Here are some of the common cryptocurrency scams to watch out for.
Posted: 14 Sep 2022 | Published: 14 Sep 2022

TechTarget ComputerWeekly.com

MicroScope – November 2020: Simplify the path to partner programmes
sponsored by MicroScope
EZINE: In this issue, discover how to navigate the complexity of channel partner programmes to best foster relationships, how business intelligence software is helping companies look beyond Covid-19, and why leaders are looking forward to 2021
Posted: 08 Feb 2021 | Published: 06 Nov 2020

MicroScope

Improving Enterprise Email Security: Systems and Tips
sponsored by Agari
EGUIDE: This expert e-guide details systems that can help improve your email security and tips on how to keep it secure.
Posted: 04 Oct 2013 | Published: 04 Oct 2013

Agari

How Global Threat Intelligence Fits into a Security Strategy
sponsored by IBM
EGUIDE: Before considering global threat intelligence services, there are some critical dangers that you may need to address closer to home. In this e-guide, Rob Shapland shares his advice on how simple tools like staff training and awareness can help prevent breaches from phishing attacks and more.
Posted: 05 Oct 2016 | Published: 03 Oct 2016

IBM

Who Is Fighting Phishing: An Overview of the Phishing Lifecycle and the Entities Involved
sponsored by MarkMonitor
WHITE PAPER: This white paper addresses the lifecycle of a phishing attack and how different entities--including third-party take down services and law enforcement--are involved in the process of disabling phishing sites.
Posted: 10 Oct 2008 | Published: 09 Oct 2008

MarkMonitor

Measuring End User Susceptibility and Defenses Against Phishing Attacks with CORE Insight
sponsored by Core Security Technologies
WHITE PAPER: This white paper contains critical information about spear phishing and how to prepare your users and systems from falling for these targeted attacks being masked as trustworthy content.
Posted: 11 Oct 2013 | Published: 11 Oct 2013

Core Security Technologies

Nationwide Foils Phishers with Markmonitor: Financial Services Giant Achieves ROI with Antiphishing Solutions in Three Months
sponsored by MarkMonitor
CASE STUDY: Nationwide Building Society, a leading financial institution, has seen a dramatic increase in phishing attacks. By using MarkMonito's AntiPhishing solutions they've been able to quickly shut down phishing sites, saving thousands of pounds per month.
Posted: 10 Oct 2008 | Published: 09 Oct 2008

MarkMonitor

The Custom Defense - Your Answer to APTs
sponsored by Trend Micro
VIDEO: Explore an innovative new technology available to help your organization combat potentially disastrous advanced persistent threats (APTs).
Posted: 17 Apr 2013 | Premiered: 17 Apr 2013

Trend Micro