Headline »

April 18, 2014 – 11:07 AM |

Founder and iCEO of WhiteHat Security Jeremiah Grossman to Speak at
ISSA-LA Sixth Annual Information Security Summit on Cybercrime Solutions

Read the full story »
General Security

Information about general information security issues.

Hack
Privacy

Information about items pertaining to information privacy

Windows Security

Information about items pertaining to Windows Security

Mobile Security

Information about items pertaining to mobile security

Home » Archive by Category

Articles in Security Defitions

Phishing Overview in the United States

October 19, 2010 – 2:32 PM |

In United States, phishing is becoming one of the fastest evolving classes of identity theft scams on the Internet, causing both short-term losses and long-term economic damage. In a phishing scam, the identity thief poses as a legitimate person from a reputable company to try to entice people to visit bogus Web sites, where they are asked to reveal important personal information, such as credit card data. Although most phishing attacks target the financial industry, a growing number of phishing incidents target other sectors, such as retailers, online game operators and Internet Service Providers.

Information Security Definitions – Zero Day Attack (0 Zero Attack)

October 19, 2010 – 2:04 PM |

A zero-day attack or threat is a computer threat that tries to exploit unknown, undisclosed or unpatched computer application vulnerabilities. The term Zero Day is also used to describe unknown or Zero day viruses.

Zero-day exploits are released before the vendor patch is released to the public. Zero-day exploits generally circulate through the ranks of attackers until finally being released on public forums. The term derives from the age of the exploit. A zero-day exploit is usually unknown to the public and to the product vendor.