- 12 iPhones Apps That Will Make You a Networking Star
- 10 Careers Robots Are Taking From You
- Big Data Gold Isn't Always Where You Would Expect It
- 6 Tips to Build Your Social Media Strategy
Page 2 of 2
"This gives us information to try and shut down phishing operations," Adkins says. So-called "takedown vendors" which Adkins declined to specify work on behalf of Facebook around the world to get in touch with hosting providers, for example, that are hosting any identified phishing pages.
Unfortunately, many of these phishing pages have been inserted into legitimate web sites owned by unwary businesses, sometimes by hacking these business servers. However, there are also dedicated servers for phishing, too.
Some hosting providers are more responsive than others and move quickly to remove phishing content, Adkins points out. All in all, DMARC and processes such as phishing takedown efforts are needed in the constant battle to keep the billions of phishing e-mail messages circulating out of the mailboxes of their intended targets.
Ellen Messmer is senior editor at Network World, an IDG publication and website, where she covers news and technology trends related to information security. Twitter: MessmerE. E-mail: firstname.lastname@example.org.
Read more about security in Network World's Security section.