Tag

phishing

1 views collected around this technical thread.

DevOps Operations Practice
DevOps Operations Practice
Feb 23, 2025 · Information Security

Understanding Network Attacks: Definitions, Common Types, and Prevention Strategies

This article explains what network attacks are, outlines the most common attack types such as malware, DoS/DDoS, phishing, SQL injection and DNS tunneling, and provides practical prevention measures including regular updates, firewall configuration, VPN use, and security awareness training.

DDoSNetwork SecurityPrevention
0 likes · 6 min read
Understanding Network Attacks: Definitions, Common Types, and Prevention Strategies
AntTech
AntTech
Mar 28, 2024 · Information Security

Web3 Phishing Attacks: Methods, Risks, and Countermeasures

This article examines the rapid rise of Web3 phishing, detailing various attack vectors such as transaction‑based phishing, eth_sign blind signing, modal phishing, approval abuse, address‑poisoning, and zero‑transfer tricks, while presenting detection methods and Ant Group’s multi‑dimensional anti‑money‑laundering platform as a countermeasure.

BlockchainWeb3phishing
0 likes · 16 min read
Web3 Phishing Attacks: Methods, Risks, and Countermeasures
Laravel Tech Community
Laravel Tech Community
Oct 20, 2022 · Information Security

The Importance of Phishing Email Simulations for Organizational Security

Recent research shows that nearly 60% of organizations suffered data loss due to employee email mistakes, highlighting the severe risks of phishing attacks and underscoring the need for realistic phishing simulation exercises to improve security awareness and protect against financial and reputational damage.

email securityinformation securityphishing
0 likes · 3 min read
The Importance of Phishing Email Simulations for Organizational Security
Sohu Tech Products
Sohu Tech Products
Sep 7, 2022 · Information Security

Phishing Techniques: Theory, Classification, and Defense Strategies

The article provides a comprehensive overview of phishing as a social‑engineering attack, detailing its various techniques—including email deception, spear‑phishing, whaling, malware‑based lures, domain spoofing, vishing, SMS and QR‑code scams—and offers practical defense measures such as anti‑phishing tools, multi‑factor authentication, content filtering, and security standards.

Defense StrategiesNetwork Securityemail security
0 likes · 14 min read
Phishing Techniques: Theory, Classification, and Defense Strategies
IT Services Circle
IT Services Circle
Apr 24, 2022 · Information Security

Inno Stealer Malware Disguised as Windows 11 Installer Targets Users

A new Inno Stealer malware campaign masquerades as a legitimate Windows 11 upgrade installer, using a spoofed Microsoft site to distribute an infected ISO that creates hidden scripts, disables security, and steals browser data and cryptocurrency wallets, posing a serious information‑security threat.

Inno StealerWindows 11information security
0 likes · 4 min read
Inno Stealer Malware Disguised as Windows 11 Installer Targets Users
IT Services Circle
IT Services Circle
Apr 9, 2022 · Information Security

How to Identify and Avoid Fake Chrome Browser Downloads

The article explains how counterfeit Chrome browsers proliferate in China, how search engine ads and misleading download pages trick users into installing malicious software, and provides a reliable method to obtain the genuine offline Chrome installer to protect against these security threats.

ChromeDownload SafetyFake Browser
0 likes · 6 min read
How to Identify and Avoid Fake Chrome Browser Downloads
Python Programming Learning Circle
Python Programming Learning Circle
Jun 26, 2021 · Information Security

Security Analysis and Exploitation of a QQ Phishing Website

The article documents a step‑by‑step security investigation of a QQ phishing site, detailing its fake login page, POST endpoint, Python‑based credential flooding, network reconnaissance, port scanning, vulnerability scanning, and discovery of the backend control panel, while discussing the challenges of XSS and brute‑force attacks.

PythonWeb Securityinformation security
0 likes · 7 min read
Security Analysis and Exploitation of a QQ Phishing Website
Efficient Ops
Efficient Ops
Jan 16, 2020 · Information Security

What Are the Top 10 Cybersecurity Threats Predicted for 2020?

The article outlines ten major 2020 cybersecurity forecasts—including surging ransomware, sophisticated phishing, faster threat detection, expanding attack surfaces, emerging IoT security laws, stricter GDPR enforcement, OT security challenges, and the rise of managed security services—to help organizations prepare for the evolving threat landscape.

2020cybersecurityinformation security
0 likes · 13 min read
What Are the Top 10 Cybersecurity Threats Predicted for 2020?