|How do you perform on a test that examines your vulnerability to phishing? |
How are we testing?:
This test checks to see if your computer is able to access one of the latest validated phishing sites uncovered by Phishtank.com. It covers all vectors of approach, including mobile traffic, which criminals have started to take advantage of as a key weakness area in many current security solutions. This test does not attempt to download actual malware.
Why is this test important?:
Criminals typically target phishing attacks at employees to steal corporate credentials or sensitive personal data such as banking account or password information. Links received in spam email or shared on social networks are often the main culprit.
Use reputation-based filtering to block Phishing sites
Every week hundreds of thousands of new unsafe websites are discovered. An unsafe website may contain code used to install malicious software onto users’ computers without their knowledge (malware) or pose as a legitimate site trying to trick users into sharing their username and password or other sensitive information (phishing). Many unsafe websites are actually legitimate websites that have been compromised.
|In the News:|
27 Apr 2017
Antivirus softwares are supposed to protect our computers from malicious programs that would compromise our personal information. But what happens when the supposed protector flags your operating system as malicious software? Webroot antivirus ...
21 Apr 2017
For its part, Apple is aware of the danger posed by all phishing attacks, not just this particular one. Like other big tech companies, Apple works hard to alert its customer to the dangers of phishing and provide them with protection. You can find a ...
18 Apr 2017
Case in point: A cunning new exploit makes malicious phishing websites appear to have the same URL as known and trusted destinations. You know by now to check your browser while visiting a site to be sure it sports the little green padlock indicating ...