ComputerWeekly.com Research Library

Powered by Bitpipe.com

All Research Sponsored By:Lookout Inc.

  • Lookout Phishing and Content Protection

    While many organizations have invested into firewalls, gateways and filters to stop email phishing attacks, those methods are ineffective against phishing attacks that target mobile devices. In this data sheet, explore the characteristics of a mobile phishing attack, their impact, and best practices for protecting your network.

  • Mobile Phishing Killchain

    To an attacker looking to execute a phishing attack, mobile devices are an easy target. Continue to this infographic, which follows the lifecycle of a mobile phishing attack from inception to data breach and discover the security measures that could’ve been taken.

  • Mobile Phishing 2018: Myths and Facts Facing Every Modern Enterprise Today

    Mobile devices have opened a profitable new window of opportunity for criminals executing phishing attacks. This white paper explores the common myths and facts around mobile phishing to help your organization identify and remediate threats.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.