Filter

My recent searches
Filter by:
Budget
to
to
to
Type
Skills
Languages
    Job State
    1,438 phishing jobs found, pricing in USD

    I have a back end code for a project of phishing website detection…it is a CNN vs LSTM comparative study …but I want a person who can develop a UI for that project as well as who can explain that code to us

    $16 (Avg Bid)
    $16 Avg Bid
    2 bids

    I'm in need of a professional who can help me set up an intermediate level phishing environment. The purpose is for security training, so the focus is on creating realistic simulations of phishing attacks. Key Requirements: - Simulating Email, Spear, and Direct Phishing Attacks: I aim to cover a wide range of scenarios to better prepare my team for potential threats. - Intermediate Level Difficulty: The environment should challenge my team without being too overwhelming, ensuring effective learning outcomes. Skills and Experience: - Prior experience in setting up phishing environments; specifically, experience in creating intermediate level simulations would be a plus. - In-depth knowledge of different types of phishing attacks and their characteri...

    $63 (Avg Bid)
    $63 Avg Bid
    5 bids

    I am seeking a highly skilled Machine Learning (ML) professional who will work...looking forward to meticulous, results-oriented work. Regarding the objective, three classifiers showed the best results: FilteredClassifier, J-48, and RandomForest. Considering the second objective, InfoGainAttributeEval method showed the best performance. Hence, it is highly recommended to build an ensemble model that consists of the three best classifiers to solve the problem of website phishing. Metaheuristic algorithms can be used to design feature selection algorithms with greater performance. Remember, your ability to interpret categorical data and convert it into actionable information through a Python-based machine learning model is crucial. Apply now and let’s create something g...

    $61 (Avg Bid)
    $61 Avg Bid
    11 bids

    I'm in need of a skilled professional who can help me set up SPF (Sender Policy Framework) and DKIM (DomainKeys Identified Mail) for my Gmail account. Key Tasks: - Set up SPF: I need you to authenticate my emails using SPF to prevent spoofing and phishing attacks. - Configure DKIM: Implementing DKIM will ensure that my emails are not tampered with in transit and that my domain is not being abused by spammers. Requirements: - Proficient in email authentication protocols. - Experience with DNS settings and domain authentication. - Familiarity with Gmail's email authentication systems. - Ability to explain the process clearly and concisely. Please provide a brief overview of your relevant experience in the field.

    $113 (Avg Bid)
    $113 Avg Bid
    30 bids

    ...showcasing the attacker's frustration. Target Audience: The book is aimed at Cybersecurity & IT professionals, business leaders, and students studying in technical & business fields]. The cover should appeal to this audience without overly childish visuals. Concept: Frustrated Hacker vs. Robust Security I will provide the image/s to be used. Foiled Attacks: Depict common threats being repelled: A phishing email bouncing off a shield marked "MFA" A malicious bug labeled "Malware" squashed by a "Software Update" patch Other clever visualizations of vulnerabilities failing to be exploited... Background: Simple, perhaps a subtle tech-inspired pattern to avoid distraction Title/Tagline: Space for a bold title like "Hackers Hate This...

    $28 (Avg Bid)
    $28 Avg Bid
    80 bids

    I am looking for a skilled web developer who can create a robust and secure web application. The primary aim of this tool is to provide crucial security features to users. Key Features: - Password Strength: The app should be able to evaluate the strength of the passwords users choose. - Phishing Email Checker: It should have a feature that can determine if an email is a potential phishing attempt. - Secure Password Storage: The application needs to securely store user passwords. The web application will also need to have the following features: - User Authentication: - Username and Password - Two-factor Authentication

    $17 / hr (Avg Bid)
    $17 / hr Avg Bid
    47 bids

    I urgently require an banking expert in the field o...bank SWIFT transfer disputes specializing in fraudulent activity and, more specifically, email-based phishing scams. Key Tasks: - Investigating and assessing the scope of the fraudulent activities. - Providing comprehensive solutions to protect sensitive financial information. Ideal Candidate Skills and Experience: - Extensive experience in understanding SWIFT documentation and online financial fraud. - In-depth understanding the working of corresponding bank protocols - Proven previous experience in handling bank transfer disputes. - Proficiency in devising strategies for mitigating online phishing scams. Let's connect if you have implemented fraud prevention strategies for phishing scams before and are ...

    $600 (Avg Bid)
    $600 Avg Bid
    2 bids

    ...Despite my ads complying with the policies, they're regularly disapproved due to 'circumventing systems policy'. I need a Google Ads expert who understands this error and knows how to resolve it, ensuring my ads comply with Google's policies. • False Compromise Alert I'm getting false warnings of a 'compromised website'. My website is secure without any unauthorized access or signs of malware or phishing attacks. I'm looking for someone with experience in dealing with such false positives who can rectify this issue. Ideal Skills: • Extensive experience with Google Ads • Knowledge of Google's advertising policies • Ability to troubleshoot and resolve conflict errors • Experience dealing with website securi...

    $93 (Avg Bid)
    $93 Avg Bid
    20 bids

    I'm in urgent need of an expert in malware removal to assist me with cleaning up more than 5 of my websites. The affected websites are a mix of e-commerce and blog sites. The malware has caused significant issues on these sites, including: - Phishing attacks - All sites showing a white page and appearing to be disabled Your primary task will be to conduct a thorough clean-up of these sites, ensuring all malware is removed and that the sites are restored to their original state. Ideal Skills and Experience: - Proven experience with malware removal, particularly for multiple websites - Familiarity with e-commerce and blog sites - Ability to conduct a thorough clean-up without causing any additional damage - Knowledge of security best practices to prevent future incidents

    $89 (Avg Bid)
    $89 Avg Bid
    45 bids

    I am seeking a knowledgeable freelancer to deliver a well structured and robust report on Malware, Phishing, and Ransomware cyber attacks that occur prominently in Australia. This report is aimed at the general public and should therefore be written in a comprehensible and digestible manner. The goal is to provide a surveillant scan of key issues, impacts, and potential precautions, giving readers a thoughtful understanding of these cyber threats. To accomplish this project optimally, the required skills and experience include: - Proficiency in Cybersecurity and related topics - Extensive knowledge about Malware, Phishing, and Ransomware attacks - Strong research skills, with a keen focus on Australia - Excellent writing and communication skills, with experience in makin...

    $21 (Avg Bid)
    $21 Avg Bid
    35 bids

    ...organizational leadership was going to result in a critical oversight that would lead to significant downtime or, worse, a catastrophic cybersecurity incident. On more than one occasion, IT staff highlighted specific concerns about a general lack of adequate security controls and policies. Then, just 3 months ago, the worst-case scenario was fully realized. All it took was a single, well-crafted phishing email with an embedded URL that redirected the unsuspecting recipient to the attacker’s website. Once that happened, a malicious executable was automatically installed on the user’s computer and quickly crawled the entire network, encrypting data. By the time the systems administrators discovered the nature of the attack, it was largely too late. Critical files all ac...

    $19 (Avg Bid)
    $19 Avg Bid
    95 bids

    ...implementing a captcha to prevent spam emails, I continue to receive phishing attempts. I'm looking for a professional who can enhance my current captcha system or propose an alternative solution to effectively block these unwanted emails. Key Requirements: - Expertise in web security and spam prevention, particularly against phishing attempts. - Proven experience in implementing and optimizing captcha systems. - Familiarity with various types of captchas, especially text-based ones. - Strong communication skills to explain the solution and potential maintenance requirements. It's important that the chosen solution doesn't disrupt the user experience or the functionality of the contact form, while effectively filtering out phishing emails.

    $136 (Avg Bid)
    $136 Avg Bid
    71 bids

    ...detailed, comprehensive video tutorial on email phishing techniques. The primary aim of this tutorial is to serve as a research resource in the field of email phishing. The ideal candidate for this project should be well-versed in the following areas: - Email phishing: The freelancer should have a comprehensive understanding of various email phishing techniques that are prevalent in the cyber world. - Video tutorial creation: The tutorial should be engaging and easy to follow for users who may not be experts in the field. - Cybersecurity: A general understanding of cybersecurity principles would be beneficial to ensure accurate portrayal of email phishing threats and preventive measures. The video should encompass all aspects of email phishing...

    $38 (Avg Bid)
    $38 Avg Bid
    47 bids

    I am looking for a professional to craft a deceptive phishing email that targets famous people for school. Ideal Skills and Experience: - Proficiency in crafting phishing emails - Experience in targeting specific personas - Creativity in making the email engaging - Awareness of ethical considerations in this type of project Project 1: Craft a Phishing Email Description: Phishing emails are increasingly more accurate and deceptive. In this project, you will do your own research to craft your own. Research what makes a “good” phishing email. Specifically how to manipulate sender information, what subjects are best to use, what type of language is effective, etc Choose your favorite celebrity and write them a phishing email (consider th...

    $16 (Avg Bid)
    $16 Avg Bid
    6 bids

    I need an accomplished Ethical Hacker with expertise in domestic surveillance and more. Key tasks I am looking for include: - Network penetration testing to ensure the security of my local network - Web application testing, to scrutinize and fortify the security of my web applications - Email phishing simulation, to evaluate the resistance and response of my existing systems to phishing attempts The main purpose of this project is to investigate suspected infidelity. Therefore, absolute discretion and professionalism are required. The ideal candidate should have extensive experience with these tasks and demonstrate a keen eye for detail. I want this project to be completed as soon as possible, without compromising on the quality of work.

    $45 / hr (Avg Bid)
    Urgent
    $45 / hr Avg Bid
    8 bids

    I'm seeking a seasoned Evilginx phishlet creator who can craft a custom YAML script for Evilginx 3. This script needs advanced functionalities, such as a custom login page, enhanced phishing email templates, and custom phishing targets to mimic Email service providers. The project's main purpose is to help understand and avert phishing tactics in the context of security research. Your role will involve studying and imitating phishing techniques focused primarily on mimicking email service providers. Existing experience in cybersecurity, knowledge of phishing techniques and the ability to mimic them effectively is crucial for this task. Familiarity with YAML scripts for Evilginx 3 will also be beneficial.

    $109 (Avg Bid)
    $109 Avg Bid
    79 bids

    ...effectively design and create a customized antivirus program. The distinctive features that should be incorporated include: - Real-time Scanning: The antivirus must perform regular checks to detect potential threats in the system. - Firewall Protection: It should incorporate a network security feature that monitors and controls incoming and outgoing network traffic. - Phishing Detection: An essential feature to protect against phishing scams by analyzing and blocking suspicious websites. - Another specific function that's going to be told after hiring, it requires excellent programming skills in the area. Meanwhile, the target operating system for this particular project will be Windows and Android. As for the support for multiple user accounts, a decision is ye...

    $449 (Avg Bid)
    $449 Avg Bid
    85 bids

    ...with expertise in Node.js, React, and the MEAN stack (MongoDB, , Angular, and Node.js) to develop a comprehensive cybersecurity training and phishing simulation web application. This platform aims to enhance organizational cybersecurity awareness and preparedness by providing a wide range of features including user management, training content management, phishing simulation, and comprehensive reporting and analytics. Exmaple of Similar Platform for you to refer- 1)Knowbe4(Includes both phishing and training plaform)- 2) GoPhish( Open source Phishing Simulation coded in go ) - Core Features of the Platform: User Management: Integration with Active Directory (AD), Single Sign-On

    $4592 (Avg Bid)
    $4592 Avg Bid
    72 bids

    I need a knowledgeable freelancer to create dynamic and engaging info-graphics that bring information security awareness to life. These should focus on, but not restrict to: - Cyber attacks and threat mitigation - Privacy laws and data protection - Safe online habits and phishing The target audience will stretch from employees and students to the general public. All designs must be delivered in PDF format. Ideal candidates should have prior experience in graphic design, a keen attention to detail, and a solid understanding of cybersecurity concepts. Previous experience in creating info-graphics for a similar audience will be appreciated. Your ability to translate complex info into easily digestible and visual formats will be crucial for this role.

    $82 (Avg Bid)
    $82 Avg Bid
    137 bids

    I need a skilled content creator to build some riveting videos for an educational course I'm developing. Your rol...developing. Your role will primarily involve: - Creating moderate animation rivaling basic visual effects for approximately 1 minute long videos - Assigning an engaging voiceover to each of the videos, since voiceover provision falls under your responsibility - Focusing on using illustrative infographics as the preferred visual style Given the technical nature of the subject matter, which focuses on phishing scam awareness, it would be a plus if you have previous experience delivering similar projects. The ideal candidate must possess strong animation skills, a keen attention to briefs details, proficiency in infographic design, and an ear for identifying engag...

    $131 (Avg Bid)
    $131 Avg Bid
    53 bids

    I'm seeking an expert in cyber security who can provide a list of over 1000 phishing websites target Saudi Arabia. The list should specifically target websites such as similar domain names to legitimate sites, suspicious URLs, Presence of fake login pages. Your role will be critical in identifying these potentially harmful phishing websites. The perfect freelancer will have a strong background in cyber security, particularly in phishing detection. Experience in website analysis and a keen eye for detail will be highly beneficial.

    $170 (Avg Bid)
    $170 Avg Bid
    13 bids

    Our company is in need of a sophisticated network phishing tool that will be self-installing and fully operational to scrutinize our local network critically. This unique software should have the capability to: - Scour our network for any phishing attempts - Generate inclusive reports concerning any phishing attempts - Detect and alert any sham domains, deceptive email addresses, and counterfeit external links - Validate the security of all emails by identifying any changes made remotely to any links. - Port check octet check (OMFA 419) (Khartun table) protocols GRU IKE SMTC SSH unlicenced products. - Ports 8080 443 etc traffic routing per app per user per port. This network phishing tool is expected to be seamlessly compatible with various operating systems,...

    $12 / hr (Avg Bid)
    $12 / hr Avg Bid
    8 bids

    For this role, I'm seeking a det...maintaining theme and plugin updates is essential. Your tasks would also incorporate daily backups, with each being retained for a month. The specific time frame for this project's completion is ASAP. Although I didn't pinpoint any specific security concerns, a demonstrated ability to evaluate different WordPress vulnerabilities and threats, such as data breaches, malware detection, and spam/phishing optimization, would be beneficial. Ideal Skills: - Wordpress Expertise - Website Usability and Accessibility Knowledge - Proven Security Expertise - Promptness and dependability Your objective would be to ensure robust and smooth website operations. Providing website support in safeguarding our platform offers us peace of mind and ...

    $6 / hr (Avg Bid)
    $6 / hr Avg Bid
    57 bids

    Goal: To Demo red team skills with a modern attack, Recording a video with steps in a power point slides with explains Metodology: • The recording Will not appears names or country about developers. Only Kali Linux in English • Slides with screenshot and explain all steps • Share the virtual machines on the scenary attack Content: • Envarionment: Ataque a "CompanyX". • Techniques: Phishing spearphishing, zero-day vulnerabilities pivoting, privilege escalation, data exfiltration. • Tools: Virtual machines in virtualbox, Kali Linux, latest generation of attack tools. Benefifts: • Deep understanding of Red Team attack techniques. • Practical vision of tools and strategies. • Improvement of the security posture. Student profile &bu...

    $127 (Avg Bid)
    $127 Avg Bid
    11 bids

    ...seeking an experienced cybersecurity consultant to check up DMARC for my domain, leapcg.com. I am currently using Google as my email service provider and already have SPF and DKIM records configured. Your duties will include: - Analyzing my current SPF and DKIM setup to ensure everything is correctly configured. - Check up DMARC with a focus on enhancing email security and reducing the chances of phishing. Solve the problem why my emails go to spam. - Sharing your expertise with my team and training us on how to maintain these configurations. The ideal candidate has experience in Google’s email services, specifically with setting up and managing DMARC, SPF, and DKIM records. You will need to interpret DMARC reports and guide remediation efforts based on findings, so stron...

    $83 (Avg Bid)
    $83 Avg Bid
    22 bids

    ...WordPress malware and fix your hacked WordPress site within 24 hours. I will also do comprehensive security hardening on your site so that it will be protected from future malware attacks and black hat hackers. My service includes: - Removal of malware from hacked WordPress site - Fix website redirecting to other site - Full website and database backup - Removal of backdoors and phishing scripts - Removal of fake admin accounts added by hackers - Updating all plugins and themes - Improving login security - Optimized configuration of security plugins - Protection against malware and improve site security This service is valid for a single WordPress site only. With my WordPress malware removal service, you can focus on your business with peace of min...

    $75 (Avg Bid)
    $75 Avg Bid
    1 bids

    ...Framework Alignment and Compliance Defense in Depth Incident Response and Recovery Continuous Monitoring and Threat Detection Education and Awareness Information Sharing and Collaboration Technology and Process Innovation Legal and Regulatory Compliance Assets to Protect: - IT systems - Industrial control systems - Intellectual property - Customer data Potential Threats/Risks: - Malware attacks - Phishing attacks - Insider threats - Unidentified threats (to be identified through a comprehensive safety dashboard) Ideal candidate should have proven experience in cybersecurity, especially in creating and implementing strategies for large companies. Knowledge of the energy sector and regulatory compliance is a strong advantage. Professional certifications like CISSP or CISM CISSP,...

    $630 (Avg Bid)
    $630 Avg Bid
    14 bids

    ...significantly improve my Shopify store's email deliverability through the correct setup of DKIM, DMARC, and SPF records. Despite utilizing Shopify as my primary email service provider, these critical email authentication measures are currently not configured. The goal is to ensure that emails from my domain arrive reliably in my customers' inboxes, reducing the risk of being flagged as spam or phishing attempts. **Requirements:** - Expertise in Shopify's email system. - Proven experience in configuring DKIM, DMARC, and SPF records. - Ability to analyze and interpret email deliverability metrics. - Knowledge in troubleshooting common email deliverability issues. **Objectives:** - Assess the current email setup in my Shopify store. - Implement DKIM, DMARC, and SP...

    $41 (Avg Bid)
    $41 Avg Bid
    11 bids

    ...server running on a Linux operating system. The aim is to significantly improve the mail server's virus scanning capabilities and overall performance. Your responsibilities will include: - Integrating CLAMAV 0.103.2 with the existing Postfix mail server (User socket:3310 or 3320) - Configuring RSPAMD to enhance email filtering, focusing particularly on virus and phishing threats - Test emails with infected (eicar) attachments and phishing (within the body of the mail) test I'm looking for someone with a deep understanding of Linux and Postfix, as well as experience in setting up and configuring RSPAMD and CLAMAV. This project requires an individual with the capability to make the integration seamless and to improve the overall performance of the mail server t...

    $20 (Avg Bid)
    $20 Avg Bid
    6 bids

    I'm seeking a Perl CGI expert to improve the security of my email script. The task requires integration of both SpamExperts and SMTP Authentication into the existing email script named wel.pl. Skills and Experience: - Familiarity with Perl CGI scripts - Experience in i...ensures that all emails that you send reach their destination and are delivered to the Inbox, not the Spam box of the person you send emails to. To use SpamExperts, the email application must be configured to use SMTP Authentication, presumably through SMTP Plugin. The focus of this project is to prevent unauthorized access to the script and provide extensive protection against email spam and phishing attacks. The project's success will be measured by the enhanced security and smooth operation of the Pe...

    $233 (Avg Bid)
    $233 Avg Bid
    5 bids

    More details: freelancer please send me outlined porposal with time to finish or any suggstions you might comeup with it, list of notes to be taken in consedration to start the developments part. I need a developer who can integrate all securities chrome extension in to one extension. Web of Trust Website Safety Checker URLVoid WOT: Phishing & Malware Protection Anti-Phishing Tool GoPhish Detector Privacy Badger HTTPS Everywhere uBlock Origin user ability to turn on or off any of the extinsion when needed. add any of the open-source software for tuning the pc delete duplicate files free registries or any issue that is related to tuning at same time. All the above extensions get updated in auto mode when developers do any updates to it. All the above in to one extension ...

    $531 (Avg Bid)
    $531 Avg Bid
    26 bids

    I'm seeking an experienced developer to create a sophisticated tool aimed at enhancing our cybersecurity posture by detecting specific types of cyber threats. This project will focus on crafting a solution that effectively identifies phishing attacks, data breaches, including unauthorized access, insider threats, and network attacks. Key features the tool needs to include: - Detection of phishing attacks and various data breaches. - Ability to identify unauthorized access, insider threats, and network attacks. - Collection of specific data during a cyber threat incident, including IP addresses, user account information, and patterns indicating suspicious behavior. Ideal Skills and Experience: - Proficiency in cybersecurity measures and threat detection algorithms. - E...

    $88 (Avg Bid)
    $88 Avg Bid
    3 bids

    I'm seeking an experienced developer to create a sophisticated tool aimed at enhancing our cybersecurity posture by detecting specific types of cyber threats. This project will focus on crafting a solution that effectively identifies phishing attacks, data breaches, including unauthorized access, insider threats, and network attacks. Key features the tool needs to include: - Detection of phishing attacks and various data breaches. - Ability to identify unauthorized access, insider threats, and network attacks. - Collection of specific data during a cyber threat incident, including IP addresses, user account information, and patterns indicating suspicious behavior. Ideal Skills and Experience: - Proficiency in cybersecurity measures and threat detection algorithms. - E...

    $102 (Avg Bid)
    $102 Avg Bid
    2 bids

    Starting to loading, it’s redirected to some weird (phishing) sites.

    $49 (Avg Bid)
    $49 Avg Bid
    39 bids

    I need an experienced freelancer to configure my Proxmox Mail Gateway, ensuring it is secure and utilizes best practices for a single domain. The priority is to create a robust defense against spam and phishing attacks, secure the connections for all inbound and outbound emails, and implement effective email filtering and antivirus scanning without any specific additional requirements. **Key Responsibilities:** - Configure the Proxmox Mail Gateway for one domain. - Implement measures to prevent spam and phishing attacks. - Ensure all inbound and outbound email connections are secure. - Set up effective email filtering and antivirus scanning, following industry best practices. **Ideal Skills and Experience:** - Proven experience with Proxmox VE and Proxmox Mail Gateway. - St...

    $129 (Avg Bid)
    $129 Avg Bid
    3 bids

    I need expert assistance to bolster my email defense mechanisms. My goal is to rapidly integrate top-tier email authentication standards with my Zoho mail to minimize the risk of phishing and spoofing attacks. **Essentials:** - Implement SPF, DKIM, and DMARC protocols. - Expect completion within a week. - Requires basic Zoho configuration. **Skills Needed:** - Proficient in email security protocols. - Experienced with Zoho Suite. - Strong understanding of DNS configurations. Do you have the expertise to tighten my email security without delay? Reach out and let's fortify my Zoho mail system.

    $21 / hr (Avg Bid)
    $21 / hr Avg Bid
    40 bids

    I'm looking for a professional who can adeptly handle Cloudflare and CLAMAV module con...Centos Stream 8 + Centos Web Panel. This will require thorough understanding of CLAMAV, RSPAMD, CWP and Centos platforms. - Optimizing Cloudflare to boost site performance and increase security. You'll demonstrate deep experience with Cloudflare and knowledge of its various features for optimizing performance and enhancing security. - Setting up RSPAMD for email filtering, spam detection, and phishing protection. Any additional experience with improving RSPAMD configurations would be beneficial. The ideal freelancer for this project will have extensive experience working with the aforementioned platforms and a solid understanding of creating robust configurations for increased secur...

    $33 (Avg Bid)
    $33 Avg Bid
    7 bids

    Looking for an experienced cybersecurity professional to conduct urgent penetration testing on an email account, aiming to identify security vulnerabilities. This engagement involves an ethical approach to possibly recover a compromised password or ensure the email's integrity against phishing attempts. Requirements: - Proven experience in ethical hacking and penetration testing - Strong knowledge and application of cybersecurity protocols - Ability to work under pressure and deliver ASAP Responsibilities: - Conduct thorough security assessments - Identify and document vulnerabilities - Suggest measures for strengthening email security Skills: - Cybersecurity - Ethical Hacking - Penetration Testing The successful candidate must have relevant certifications (CEH, OSCP, etc.)...

    $283 (Avg Bid)
    $283 Avg Bid
    14 bids

    ...critical issue on my website that has manifested in the form of persistent error messages appearing across various pages. Following are the specifics of my situation: - Experiencing error messages on: - Homepage - Product pages - Contact page - Error message types that have appeared: - Server error messages (indicating potential malware) - Warnings related to security that suggest phishing or malware presence What I need from you: - An urgent analysis to identify the malware source - Swift removal of any malicious code or backdoors - Harden website security to prevent future intrusions - Restoration of error-free page functionality - Recommendations for best security practices moving forward Ideal Skills & Experience: - Proven malware removal track record - ...

    $195 (Avg Bid)
    $195 Avg Bid
    64 bids

    "I am seeking an ethical hacker specialized in email security. My Outlook email has been compromised, and I have currently lost all access. I suspect it might be the result of unauthorized access, phishing attempts, or email spoofing. Your job is to help me regain control of my email account. Skills and Experience: 1. Email Security: Extensive experience in ethical hacking and email security protocols. 2. Outlook Familiarity: Proficiency in Outlook platform and its security aspects is critical."

    $30 / hr (Avg Bid)
    $30 / hr Avg Bid
    6 bids

    The main objective of this project is to generate valuable lea...cybersecurity sales calls targeted specifically towards small businesses. The skills and experience required for this job would be: - Excellent communication abilities to effectively conduct sales calls. - Comprehensive understanding of cybersecurity solutions, particularly in the areas of network security and phishing prevention. - Proven track record in sales or lead generation, previous experience in cybersecurity is a plus. Our product offerings include robust network security and phishing prevention solutions. Potential freelancers are expected to portray these offerings compellingly to instil trust and interest in our potential clients. As a result, a background in both sales and cybersecurity would be h...

    $120 (Avg Bid)
    $120 Avg Bid
    1 bids

    I'm looking for a social media security expert to reinforce the security of my Instagram and Twitter accounts. I've recently experienced...security expert to reinforce the security of my Instagram and Twitter accounts. I've recently experienced a breach and need a professional to conduct an in-depth audit of potential attack vectors. Your tasks will include: - Investigating the recent breach - Auditing all possible attack vectors While no specific attack vectors are suspected currently, an understanding of common tactics, such as phishing, brute force attacks, and malware injections, would be beneficial. Key skills and experience: - Strong knowledge of Instagram and Twitter security features - Experience with social media account audits - Understanding of co...

    $155 (Avg Bid)
    $155 Avg Bid
    9 bids

    I am looking for someone with an in-depth understanding and experience with social engineering attacks to provide an extensive exploration of effective strategies that can be implemented to mitigate the occurrence of such attacks in an organization. Though the specific domains such as phishing attacks, impersonation attacks and pretexting attacks were not selected, it would be beneficial if the freelancer pools in some knowledge in these areas as well. Notably, the paper should put more emphasis on mitigation strategies as opposed to the exploration of these attacks. Freelancers with relevant experience in similar tasks are highly encouraged to place their bids. Your experience will be critical in understanding the project concept and translating it effectively. Please be sure to ...

    $21 (Avg Bid)
    $21 Avg Bid
    28 bids

    I'm looking for a versatile email and web security expert, who can provide support for both my Zimbra email...Server Security: My foremost priority is securing Zimbra email server. The focus is to protect sensitive information in emails and minimize the risk of email-based attacks. Spam/Phishing Prevention: A crucial need is the identifying and blocking of potential phishing emails. It's imperative to keep our communication channels clear of potential threats. Desired Skills and Experience: The suitable candidate should have a deep understanding of server security, especially Zimbra. Additionally, you should have strong WordPress knowledge, owing to the need for routine website support. A strong grasp of spam/phishing filters and prevention techniques is...

    $23 / hr (Avg Bid)
    $23 / hr Avg Bid
    71 bids

    I am looking for someone who can integrate GoPhish with an open source LMS. I need that when a person is a victim of a phishing campaign, they will be sent an email with a link to the LMS to do the training. The LMS should be able to configure the frequency of the reminders it will send via email (e.g. every day, every other day, etc... if they have not done the training) and should be multilingual. In addition, it must be possible to perform the training without the need to access with username and password, simply by clicking on the link in the email, it will take you directly to the training. User management should be done through GoPhish, without the need to import them into the LMS as well. In addition, a history of the training that each user has taken (or not) should be k...

    $158 (Avg Bid)
    $158 Avg Bid
    46 bids

    I'm currently in need for assistance in the setup of DKIM, DMARC, and SPF records for multiple domains (between 2 to 5), specifically on Office 365. The project's details are as follows: 1. DKIM, DMARC, SPF Setup: A professional who can efficiently set up these email authentication methods, ensuring all our outgoing emails are verified — curtailing email spoofing and phishing attacks. 2. Policy Development: I'm not sure whether there's an existing policy for DKIM, DMARC, and SPF or a new one will need to be created, hence part of your role would involve assessing the current state and subsequently formulate a suitable policy if required. Ideal skills and experience: - Proficiency with Office 365 email service, godaddy, active campaign, wordpress - An u...

    $63 (Avg Bid)
    $63 Avg Bid
    26 bids

    My Wordpress websites are the direct victims of phishing malware and I need professional assistance to restore them back to their functional state. To be specific, both my websites hosted by Bluehost are affected. As for the scope of the malware attack, I am unsure about which specific parts of my sites are impacted. What's clear is that I have full administrator access to my Wordpress accounts that allows unrestricted actions, potentially making the restoration process smoother. Ideal skills for this job include: - High proficiency in handling Wordpress platforms - Deep understanding of phishing malware and its removal techniques - Experience in using Bluehost as a website host - Proven track record in secure website recovery Conclusively, this mission will requir...

    $111 (Avg Bid)
    $111 Avg Bid
    194 bids

    I am working on a project for predicting phishing emails using an ensemble machine learning. It will require the development of an email plugin that will be deployed on Webmail server such that all incoming emails pass through it. It will predict phishing using the built ensemble model and separate phishing from legitimate emails into phishing folder and inbox. If the user wishes to, at the click of a button, the solution will reply selected phishing emails with AI generated, misleading information so as to discourage the attacker from further attacks. This is just what I want done in a nutshell, we can communicate further to refine the requirements if you are sure that this is what you can do.

    $212 (Avg Bid)
    $212 Avg Bid
    22 bids

    This project demands for the identification of phishing websites and subsequently building a dataset for the same. The goal is to advance the understanding and detection of phishing threats. The final product needed is a SQL database, reaching a comprehensive consolidation of data. Curating this dataset will require not just technical knowledge but also a keen eye for identifying phishing tactics. Skills and Experience: - Proficient in HTML, CSS and JSP - Experience in analyzing and identifying phishing websites - Expertise in creating SQL databases - Strong analytical and critical thinking skills - Familiarity with different phishing attack strategies - Ability to work securely and privately, to avoid any data breaches or leaks.

    $92 (Avg Bid)
    $92 Avg Bid
    12 bids

    Top phishing Community Articles