Examples of using Phishing attacks in English and their translations into Russian
{-}
-
Official
-
Colloquial
Guards you from phishing attacks.
Phishing attacks on instant messengers.
How do I protect against phishing attacks?
Phishing attacks and methods of dealing with them.
Protect your customers from phishing attacks.
Refer to the number of phishing attacks, as have been predicted, the leading positions take the social medias.
Protecting your customers from phishing attacks.
Phishing attacks have been largely carried out by criminal groups looking to make a fast buck on the unwary.
According to research conducted by Google involving phishing attacks.
Scans all incoming/outgoing traffic for phishing attacks, malicious URLs and infected attachments.
No single cybersecurity technology can prevent phishing attacks.
Phishing attacks are a constant danger for all businesses in the online payments and e-banking industries.
If the check box is cleared, Kaspersky Security 10.1 for Windows Server does not detect phishing attacks.
Apparently, first the phishing attacks were executed which allows getting the passwords, and then the accounts were defeated.
Passwords are a reality of today's world, andunfortunately so are threats like phishing attacks and data breaches.
The number of users of Internet faced with phishing attacks for the last 12 months grows for 87%- from 19.9 to 37.3 millions.
Block infected websites, drive-by downloads, andbrowser hijackings- not to mention +14 million phishing attacks every month.
Phishing attacks usually involve a fake webpage that replicates the legitimate site of the targeted company.
An RSA study shows we're much more likely to click on phishing attacks on mobile devices than we are on PCs.
Online shopping, meanwhile, may create some problems for the company network, including the risk of spam,viruses, and phishing attacks.
It was found in 2007,till today generally propagates via phishing attacks and via Drive-by download type attacks. .
Besides, the growth of phishing attacks to Bitcoin-sites, in particular, toward digital wallet Blockchain and accounts of Coinbase exchanger».
This app uses Accessibility permission to protect visually impaired and other users against phishing attacks and malicious websites.
For example, phishing attacks can be used as a social engineering lure to convince users to install crimeware on their machines.
The McAfee Secure trustmark is given to websites that are certified by McAfee to be free from malware,viruses, phishing attacks, and malicious links.
Several recent phishing attacks have been directed specifically at senior executives and other high profile targets within businesses, and the term whalinghas been coined for these kinds of attacks. .
Now, according to Provod the search giant has an intention to give the users complete information about the sources of malware and phishing attacks.
According to the researchers within the first 6 months of 2013 in order to perpetrate phishing attacks hackers often used compromised legitimate sites(27% of all malicious resources).
The experts analyzed the spam level, most popular criminal schemes within social media,the number of malware for mobile devices and also phishing attacks.
Security experts stated that the growth of activity of Zeus family Trojans targeted to banks took place,and also phishing attacks with utilization of one of the Google services was observed.