Free Newsletter
Register for our Free Newsletters
Newsletter
Zones
Access Control
LeftNav
Alarms
LeftNav
Biometrics
LeftNav
Detection
LeftNav
Deutsche Zone (German Zone)
LeftNav
Education, Training and Professional Services
LeftNav
Government Programmes
LeftNav
Guarding, Equipment and Enforcement
LeftNav
Industrial Computing Security
LeftNav
IT Security
LeftNav
Physical Security
LeftNav
Surveillance
LeftNav
View All
Other Carouselweb publications
Carousel Web
Defense File
New Materials
Pro Health Zone
Pro Manufacturing Zone
Pro Security Zone
Web Lec
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
 
News

Websense defines the latest malware terminology.

Forcepoint : 19 June, 2007  (Technical Article)
As computer security jargon changes as fast as the threats themselves, Websense takes a tongue-in-cheek look at the latest terms for today and the future.
The 9th edition of the Collins English Dictionary was released earlier this month and included definitions of terms such as WAG and size zero. These phrases are so commonly used that they are now deemed part of the official, ever-changing English language.

So when will 'phishing' gain that formal dictionary status? Given that phishing has become widely recognised by the general public as an IT security threat, a dictionary definition can't be far away, says content security expert, Websense.

New types of phishing techniques are emerging all the time, and it's becoming more complex to navigate and understand the different types of attacks. Websense Security Labs have come up with descriptions for some of these new iterations of phishing.

Websense Security Labs has seen this type of phishing technique used in recent scams such as the Better Business Bureau:

Wishing: short for Whale Phishing, this is a highly targeted phishing attack very similar to "spear phishing". This does not go after groups or companies but rather specific individuals who match pre-determined criteria, e.g. high ranking government officials, corporate officers and IT administrators.

While these techniques are ones which we could see in the future:

Sishing: (Search Engine Phishing) an attack that targets advertisers within search engines. The aim is to entice users to click on links for high-ticket items such as cars, vacation homes and even loans. This method can also be applied to auction sites and combined with Whale Phishing.

Hishing: (Hardware Phishing) where the data capture software is embedded into an item of hardware before the end user receives it. With hardware devices such as phones, keyboards and mp3 players readily available on sites like eBay they can easily be pre-loaded with malware. This is an expensive form attack but has the potential to gain greater access to more information.

Blow Phishing: malicious code today that steals banking information from users keeps the credentials on the server usually unencrypted. This allows researchers to grab 'drop box' information and may allow law enforcement and, potentially other hackers, access to the information. Blow Phishing is when the attackers start to use PKI techniques to encrypt and therefore disguise the data so you cannot see it, gather it, or steal it from them.
Bookmark and Share
 
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
 
   © 2012 ProSecurityZone.com
Netgains Logo