Kaspersky Lab Anti-Phishing Module

October 2007
Database & Network Journal;Oct2007, Vol. 37 Issue 5, p25
The article reflects on Kaspersky Lab's anti-phising module. According to the report, Kaspersky Lab announces that anti-phising databases provided by the Phish Tank service have been incorporated into the Anti-Phishing module of Kaspersky Internet Security 7.0. The system offers a consolidated database of known phising websites which is continually updated by the Open Source community and ordinary users. It also uses data from other sources including security of financial organizations which independently track phising resources.


Related Articles

  • Another Type of Risk: Data Security Isn't Just for IT Anymore. Barron, Jacob // Business Credit;Oct2007, Vol. 109 Issue 9, p14 

    The article reports that the U.S. Congress requires organizations who are involved in the business of personal and private information to be more diligent in protecting their data against identity theft and cyber crime. The Congress has decided to update the Gramm-Leach-Bliley Act (GLBA), which...

  • Spam Wars: The Battle of the Formbots. Breeding, Marshall // Computers in Libraries;Jan2007, Vol. 27 Issue 1, p32 

    The article discusses threats to Internet security, as well as guidelines for protecting computer systems from such threats. Spams have become a tool for phishing and identity theft, causing economic and personal damage to its victims. Advanced strategies used by spammers for fraudulent...

  • IRS, Security Summit Partners, Remind Taxpayers to Protect Themselves online.  // Employee Plans News;2016, Issue 13, p1 

    The article offers information on the reminder made by the U.S. Internal Revenue Service (IRS), the states and the tax industry for taxpayers to protect themselves online and to help fight against identity theft. It discusses some of the best practices that need to follow by taxpayers to protect...

  • Anti-Phishing.  // Network Dictionary;2007, p36 

    A definition of the term "Anti-Phishing" is presented. It refers to a process that identifies phishing contents like websites and electronic mails, usually through the use of software applications. Oftentimes, it is integrated with web browsers and email clients as a toolbar, displaying the real...

  • LinkedIn Letting Sharks Into Corporate Waters.  // OfficePro;Jul2012, Vol. 72 Issue 4, p4 

    The article offers helpful tips to avoid spear phishing attacks in the social networking site LinkedIn. These include using common sense and available tools to avoid being victimized by hackers and connecting only with personally known persons. It also notes avoiding sharing confidential...

  • Avoid Identity Theft; Learn How to Recognize Phishing Scam.  // Employee Plans News;2016, Issue 13, p1 

    The article offers tips from the U.S. Internal Revenue Service (IRS) how to prevent or avoid identity theft. It states that the agency introduced the public awareness campaign called Taxes. Security, Together, as part of its Security Summit effort. Tips to determine and avoid a phishing e-mail...

  • Sobig V 6.0.  // Software World;Sep2003, Vol. 34 Issue 5, p25 

    Reports on Kaspersky Labs experts' belief that the Sobig V6 outbreak is the most serious e-mail epidemic of 2002 and 2003. Ways in which the Sobig.f worm endangers individual users; Total control gained by the author of Sobig.f over infected machines; Reasons why a worm that uses a very simple...

  • Fighting Phishing with Discriminative Keypoint Features. Kuan-Ta Chen; Chun-Rong Huang; Chu-Song Chen; Jau-Yuan Chen // IEEE Internet Computing;May/Jun2009, Vol. 13 Issue 3, p56 

    Phishing is a form of online identity theft associated with both social engineering and technical subterfuge and is a major threat to information security and personal privacy. Here, the authors present an effective image-based antiphishing scheme based on discriminative keypoint features in Web...

  • Towards an Extra Layer of Security: The Cost of Two-Factor Authentication. Hari Om Prakash // Electronics For You;Mar2015, Vol. 3 Issue 11, p72 

    The article discusses the advantages of two-factor authentication (TFA) including the reduction of incidence of online identify theft, phishing expeditions and other online frauds, and increases the level of security. Disadvantages of TFA include the increase inconvenience to the user when...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics