|How do you perform on a test that examines your vulnerability to phishing? |
How are we testing?:
This test checks to see if your computer is able to access one of the latest validated phishing sites uncovered by Phishtank.com. It covers all vectors of approach, including mobile traffic, which criminals have started to take advantage of as a key weakness area in many current security solutions. This test does not attempt to download actual malware.
Why is this test important?:
Criminals typically target phishing attacks at employees to steal corporate credentials or sensitive personal data such as banking account or password information. Links received in spam email or shared on social networks are often the main culprit.
Use reputation-based filtering to block Phishing sites
Every week hundreds of thousands of new unsafe websites are discovered. An unsafe website may contain code used to install malicious software onto users’ computers without their knowledge (malware) or pose as a legitimate site trying to trick users into sharing their username and password or other sensitive information (phishing). Many unsafe websites are actually legitimate websites that have been compromised.
|In the News:|
23 Mar 2017
Customers of online poker rooms on the Winning Poker Network (WPN) were the targets of a phishing scam this week, receiving an e-mail that falsely confirmed ...
20 Mar 2017
This is a bad generalization, which may lead users to believe a phishing site is real if it is using SSL. In addition, Chrome's new UI displays “Secure” next to every site with a valid SSL certificate and HTTPS configuration. What's the chance that a ...
26 Feb 2017
However, it is evident a lot of less tech-savvy users may fall for this phishing trick, as everything looks to be as legitimate as it possibly can. It takes some knowledge to figure out this phishing site is hosted by a free web hosting service ...