Feeds

Security researchers show how to hook phishers

Sniffing out bad sushi

5 things you didn’t know about cloud backup

Security researchers are cooking up tactics for beating phishing fraudsters at their own game.

Phishers perennially set up fraudulent sites on servers they have compromised. But due to the sheer volume of sites that need to be set up to perform a successful phishing expedition, fraudsters tend to be sloppy.

This allows those fighting phishers to easily identify compromised servers, which are easy to gain access to since fraudsters have already done the grunt work.

Once inside a compromised server, security researchers are able to follow a phisher's trail to find out what information they have extracted on prospective marks.

Nitesh Dhanjani, an application security specialist at management consultant Ernst and Young, and Billy Rios of Microsoft aim to outline how research on compromised servers can expose the tactics and tools used by phishers in a presentation at the Black Hat conference in Amsterdam, The Netherlands, next week.

A walk-through of how compromised hosts were accessed to gain information about phishers will be presented. The talk, entitled Bad Sushi will follow the trail of compromised information from phishing sites to underground message boards. ®

5 things you didn’t know about cloud backup

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
5 things you didn’t know about cloud backup
IT departments are embracing cloud backup, but there’s a lot you need to know before choosing a service provider. Learn all the critical things you need to know.
Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?