Profile cover photo
Profile photo
TZ- Security
About
Posts

Phishing, Spear phishing, Whaling, Voice Phishing, SMiShing

http://tz-security.com/phishing-spear-phishing-whaling/


#Phishing #Malware #CyberSecurity

First part of analyzing phishing pages was more in technical nature. This part will be more diverse, with screenshots taken during research and comments explaining some findings.
http://tz-security.com/analyzing-phishing-pages-part-2/

#cybersecurity #Phishing #Malware

http://tz-security.com/analyzing-phishing-pages/

Last few days I am analyzing a lot of phishing pages and phish-packs, in order to find the most used keywords, functions, emails used by phishers and other stuff useful for my scanners. I have acquired various phishing pages and packs from various places and what is interesting (but not surprising) – almost all of them are backdoored. Here is a part of my findings, hopefully useful for non-technical people who need to deal with their hacked servers and recognize similar codes and backdoors.

#Phishing #Malware #CyberSecurity
Wait while more posts are being loaded