Phishing Whitepapers


Sort by: Date | Company | Title


The definitive email security ebook
By Proofpoint Pty Ltd | 27/10/2017

The Problem: Attacks are evolving faster than email defenses. Organizations are spending more on cybersecurity than ever, even as losses from data breaches, business disruption, and fraud continue to mount.

Learn how to prevent the top email fraud tactics including:

Business Email Compromise techniques Advanced Malware including Ransomware Outbound Phishing Get the 5 steps to building your email security strategy across the entire attack chain – from prevention through real-time response.

Download the Definitive Email Security Strategy Guide now.

Download this now


Getting Started with DMARC
By Proofpoint Pty Ltd | 19/10/2017

The cost of Business Email Compromise (BEC), and Impostor email has risen to $5.3B and is impacting employees, business partners and customers of organisations around the world.

In order to protect all the groups that are targeted by BEC requires deep visibility into email, and the expertise to build and deploy email authentication policy. Proofpoint Email Fraud Defense (EFD) is designed to block criminals that spoof your trusted domains to trick victims, both inside and outside of your organisation, into sending money and other sensitive information to the attacker. The DMARC (Domain-based Message Authentication Reporting & Conformance) standard is the most powerful weapon to date in the fight against phishing and spoofing.

In this guide, you will learn:

What DMARC is and how it works The benefits of DMARC Key stats and success stories Step-by-step implementation instructions

Download this now


The Mimecast email security risk assessment
By Mimecast | 18/8/2017

Many organizations think their current email security systems are up to the task of protecting them. Unfortunately many email security systems fall short and do not keep their organisations safe. The reality is the entire industry needs to work toward a higher standard of quality, protection and overall email security. The proof is in the numbers, and Mimecast is establishing a standard of transparency for organisations and raising the bar for all security vendors.

Download this now


Strengthen your defenses against cybercrime
By Mimecast | 18/8/2017

Operating and securing a business in the cloud can be hard. The rapid evolution of cyberthreats, inevitability of technical failure, and potential for human error are risk factors that organisations simply can’t ignore. These risk factors can cause irreparable damage like business disruption, lengthy downtime and data loss. Plus, the complexity and cost involved with addressing these

Download this now


Advancing your anti-phishing program: How to be successful against email-borne attacks
By Mimecast | 18/8/2017

There appears to be no end in sight to the reign of phishing as the cyber attacker's number one threat delivery and communication vehicle. No surprise that the Verizon DBR 2017 report dubbed email as the "cyber spy's favored way in". Whether it's a script kiddie just goofing around, a member of one of the world's most sophisticated nation-state-based attacker groups trying to impact global politics, or a cybercriminal focused on turning digital information into digital cash, they all use email in their attack repertoire.

Download this now


Security in a world with no perimeters
By Logicalis & Cisco | 4/9/2015

This practical “how to” guide looks at the fundamentals of securing an enterprise, when the traditional concept of having a perimeter to defend is rapidly losing all relevance. As well as proposing a flexible business-centric security architecture that takes a new approach to securing the enterprise, this guide takes a practical process that applies to organisations of any size.

Download this now


Infographic: Phishing. Who’s being targeted?
By Symantec | 14/10/2014

Targeted phishing attacks are affecting the security in businesses of all sizes. This helpful infographic shows who’s at risk, why data breaches are growing and the layers of defence you can have. • 1 in 2 phishing attacks have been targeted at large enterprises • Attacks on businesses with 1 to 250 employees have increased in the last two years • Most mobile vulnerabilities are on the Apple iOS platform

Download this now


Phishing 2.0 - Why phishing is back as the No. 1 web threat, and how web security can protect your company
By Webroot | 7/1/2014

In this white paper we will: • Summarize the decline of Phishing 1.0. • Discuss how phishing has turned toward business and become more costly. • Outline the structure of new Phishing 2.0 attacks. • Delineate how the new campaigns evade standard antiphishing countermeasures. • Describe how web security services with real-time antiphishing capabilities can protect against Phishing 2.0 attacks.

Download this now


Phishing 2.0
By Webroot | 24/7/2013

At one point, it seemed that phishing was receding to the status of a minor issue threatening only naïve consumers. However new cybercriminals and phishing techniques have lead this to become a greater concern. Download how to find out how phishing became the No. 1 web threat, and which web security solution can best protect your company.

Download this now


Spear-Phishing Email: Most Favored APT Attack Bait
By Trend Micro Australia | 30/11/2012

This research paper presents findings on APT-related spear phishing from February to September 2012. We analysed APT-related spear-phishing emails collected throughout this period to understand and mitigate attacks. The information we gathered not only allowed us to obtain specific details on spear phishing but also on targeted attacks. We found, for instance, that 91% of targeted attacks involve spear-phishing emails, reinforcing the belief that spear phishing is a primary means by which APT attackers infiltrate target networks.

Download this now

Market Place