Phishing & BotNets Mode:
(Page 4 of 8)  < Prev  1 2 3 4 5 6 7 8  Next >
Anti-phishing Toolbars Evaluation 2006-07-24
Abhishek Kumar (abhishek kumar paladion net) (1 replies)
Hi All,

Recently I carried out an evaluation of some of the popular Anti-phishing
toolbars. The toolbars were tested on a number of parameters such as,
accuracy in detecting phishing URLs, alerting mechanism, detailed analysis
of websites, help information provided to users etc. The results obtaine

[ more ]  [ reply ]
Re: Anti-phishing Toolbars Evaluation 2006-07-24
Paul Laudanski (paul castlecops com) (1 replies)
Re: Anti-phishing Toolbars Evaluation 2006-07-24
Paul Laudanski (paul castlecops com)
RE: Newslist about security conference 2006-07-20
Michael Yelland (myelland brotherhoodbank com)


-----Original Message-----
From: newslist (at) security-briefings (dot) com [email concealed]
[mailto:newslist (at) security-briefings (dot) com [email concealed]]
Sent: Sunday, April 23, 2006 9:20 AM
To: framework (at) metasploit (dot) com [email concealed]; bs7799 (at) securityfocus (dot) com [email concealed];
binaryanalysis (at) securityfocus (dot) com [email concealed]; wifisec (at) securityfocus (dot) com [email concealed];
focus-linux (at) securityfocus (dot) com [email concealed]; pen-te

[ more ]  [ reply ]
Dangerous Clever Scammer Online 2006-07-21
spammeanddie msn com
I live in Turkey.. I interest in computer programming & web security .. 2 days before I received interesting mail received. With ?Urgent Business Partner!!!? topic?

Who send the mail shows himself as a bank manager? Part of mail

==============================================================

[ more ]  [ reply ]
FW: [Phish-Track] Phishing Loss Trends For June 2006 (compared againstMar, Apr, May) 2006-07-11
Lance James (lancej securescience net)

Secure Science Corporation is releasing a statistical graph detailing
approximate loss via the average phishing/carding group.

This graph displays recovered stolen credit cards through IntelliFound
Identity Surveillance.

Listed are the top 10 Financial Institution's in regards to number of
debit

[ more ]  [ reply ]
CastleCops June Phishing Trends 2006-07-10
Paul Laudanski (paul castlecops com)
Src: http://www.castlecops.com/a6624-June_Phishing_Trends.html

For June 2006, CastleCops PIRT has collected a full list of brands
(extending our Top 20 list) that have been used in phishing attacks against
consumers. Each phish report has been manually verified by our handlers, and
each is then

[ more ]  [ reply ]
May 2006 Top 20 Phished Brands 2006-07-04
Paul Laudanski (paul castlecops com)
The PIRT squad for the month of May 2006 had confirmed many phish
submissions. We have compiled a Top 20 list for the most phished brands in
that month. Our handlers work a queue system that is typically 24 to 48
hours behind real time -- we are still working towards a real time
implementation.

[ more ]  [ reply ]
Live Phishing XML Feed 2006-07-04
Paul Laudanski (paul castlecops com)
http://www.castlecops.com/article-6619-nested-0-0.html

As of right now, we provide a free XML feed service into our phish database.
Authorization is required so please drop me an email at paul (at) castlecops (dot) com. [email concealed]
It is a thirty day rolling window showing both confirmed and terminated
report URLs alo

[ more ]  [ reply ]
Re: Sitekey Phishing 2006-06-05
skyler hushmail com (1 replies)
I do agree it doesn't stop phishing, it does help to prevent
phishing because the amount of effort required is increazed, in
this particular case, most people who enter this type of
information can't remember which question they chose, so that only
if they are asked the correct question are they

[ more ]  [ reply ]
Re: Sitekey Phishing 2006-06-06
Lance James (phishing securescience net)
Sitekey Phishing 2006-05-28
Lance James (phishing securescience net) (1 replies)
As we all know, Bank of America uses PassMark (now RSA's) Sitekey image
technology. The trick is, if you don't know the image, or if you look
suspicious you get a bunch of questions. Well included in the recent
Bank of America phish I saw today, was the sitekey questionaire sheet.

I don't understan

[ more ]  [ reply ]
Re: Sitekey Phishing 2006-06-01
Saqib Ali (docbook xml gmail com)
Re: Bausch & Lomb Phishing attack? 2006-05-18
john fellers gmail com (1 replies)
I have not seen this one. If you are ever unsure about an email I would suggest you always research it first. There are plenty of antiphishing sites you can search for known phishing attacks, or submit new ones. You can look here for further knowledge:

http://www.antiphishing.org

[ more ]  [ reply ]
Re: Bausch & Lomb Phishing attack? 2006-05-18
Jigme Thubten (jigme thubten gmail com)
Bausch & Lomb Phishing attack? 2006-05-17
Jigme Thubten (jigme thubten gmail com) (1 replies)
I'm thinking there maybe a new B&L phish based on the problems with
the solution causing an sickness in the eyes. Here is the email I got
complete with the IP address hyperlinked to a page. They do not ask
for financial info so it doesn't seem that malicious, but I don't like
the way the email look

[ more ]  [ reply ]
Re: Bausch & Lomb Phishing attack? 2006-05-17
Carl Jongsma (info skiifwrald com)
FW: You've got a Yahoo! Greeting 2006-05-17
John Uhlmann (john uhlmann anu edu au) (1 replies)
Try #2. In plain text. I edited the email slightly to make it more
readable.

Date: Wed, 17 May 2006 17:57:36 +1000
From: John Uhlmann <john.uhlmann (at) anu.edu (dot) au [email concealed]>
Subject: FW: You've got a Yahoo! Greeting
To: au-abuse (at) yahoo-inc (dot) com [email concealed]
Cc: mdannatt (at) longmeadowconsulting (dot) com [email concealed], hostmaster (at) startlogic (dot) com [email concealed],

[ more ]  [ reply ]
Re: FW: You've got a Yahoo! Greeting 2006-05-18
Matthew McGlashan (matthew auscert org au)
RE: Internet Email Headers and Outlook 2006-05-12
Scott Gossard (Scott Gossard wal-mart com)
Have them open a new e-mail message and drag the original e-mail into

the message.

-----Original Message-----

From: brian_erdelyi (at) yahoo (dot) com [email concealed] [mailto:brian_erdelyi (at) yahoo (dot) com [email concealed]]

Sent: Friday, May 12, 2006 10:02 AM

To: phishing (at) securityfocus (dot) com [email concealed]

Subject: Internet Email Headers and Outlook

Our

[ more ]  [ reply ]
Re: Internet Email Headers and Outlook 2006-05-12
Null, Corey (Null Corey principal com)
Have them create a new message and drag and drop the suspect email into the new message. This will make the suspect email an attachment and will preserve the headers.

Corey Null

Principal Financial Group

Desk: 515.235.9045

Cell: 515.771.3855

The history of free man is never written by chanc

[ more ]  [ reply ]
Internet Email Headers and Outlook 2006-05-12
brian_erdelyi yahoo com (2 replies)
Our company uses Exchange and Outlook 2003.

I would like to encourage people to report spam and fishing attempts, however, when they forward an email it doesn't include the original email headers.

What can we do?

[ more ]  [ reply ]
Re: Internet Email Headers and Outlook 2006-05-12
Paul Laudanski (paul castlecops com)
Re: Internet Email Headers and Outlook 2006-05-12
Nick Bilogorskiy (nick avresearch net)
RE: Poll: Emerging Threats 2006-05-02
Michael Scheidell (scheidell secnap net)

> -----Original Message-----
> From: Jon R. Kibler [mailto:Jon.Kibler (at) aset (dot) com [email concealed]]
> Sent: Friday, April 28, 2006 4:08 PM
> To: phishing (at) securityfocus (dot) com [email concealed];
> binaryanalysis (at) securityfocus (dot) com [email concealed]; bugtraq (at) securityfocus (dot) com [email concealed];
> forensics (at) securityfocus (dot) com [email concealed]; honeypots (at) securityfocus (dot) com [email concealed];
> incidents@securit

[ more ]  [ reply ]
Re: RE: phishing attack 2006-05-02
anon sumfin de
Actually the security lock was intentional to make it look like an original website. what attacker did was he used a windows 2003 server machine and named it versign.com and used this machine to issue the security certificate. you are talking about the chatrooms, so which chatrooms to go to ? irc ?

[ more ]  [ reply ]
(Page 4 of 8)  < Prev  1 2 3 4 5 6 7 8  Next >


 

Privacy Statement
Copyright 2010, SecurityFocus