Communications Security

Communications Security | News, how-tos, features, reviews, and videos

Cybersecurity
Zoom video conferencing  >  One user connected via laptop showing a grid of remote participants.

Microsoft Office logo within an environment of abstract binary code with shield and lock.

Attacks using Office macros decline in wake of Microsoft action

Researchers see 66% decline in attacks over eight months since Microsoft turned off macros by default.

pharming  >  faudulent website redirect

Office 365 phishing campaign that can bypass MFA targets 10,000 organizations

The phishing web pages that this adversary-in-the-middle phishing campaign uses act as a proxy and pull content from the legitimate Office 365 login page.

cisco logo fit

Cisco reports vulnerabilities in products including email and web manager

New vulnerabilities found in Cisco internal testing allow remote access and scripting that could lead to the loss of sensitive user data.

5G mobile wireless network

U.S. government proposals spell out 5G security advancements

A joint proposal from federal cybersecurity and defense agencies defines a process for ensuring the security of 5G networks.

Cybersecurity  >  Email security threats, such as phishing

A formula for measuring real-world email security efficacy

You have the data needed to assess the efficacy of your email security tools. Here's how to use it.

email security risk - phishing / malware

Microsoft help files repurposed to contain Vidar malware in new campaign

A new email malware campaign hides a malicious payload in what appears to be a Microsoft Compiled HTML Help file.

incoming emails / DNS security / locked server / parked domain

Cloudflare unveils email security tools, free WAF ruleset, and API gateway

Cloudflare has announced a slew of new products, including a suite of email security tools for phishing and malware detection, a free WAF ruleset and a machine-learning powered API gateway.

Cybersecurity  >  Email security threats, such as phishing

INTERPOL and Nigerian Police bust business email compromise ring, arrest 11

Operation Falcon II focused on malware skills and knowledge to track suspects thought to be members of the SilverTerrier BEC network that has harmed thousands of companies globally.

business travel / airport terminal walkway / traveller

CISOs, what's in your travel security program?

It's time to review (or create) your travel security program now that more people are traveling for work and pleasure. Here's what it should include.

video conferencing / remote work

9 video chat apps compared: Which is best for security?

Zoom, Microsoft Teams, Google Meet, Cisco Webex, FaceTime, Tauria, Signal, Wire and WhatsApp. What does their encryption look like? What are the trade-offs?

email security lock breach protocol by microstockhub getty

9 cloud and on-premises email security suites compared

These email security suites have evolved to keep pace with email-enabled threats.

emergency disaster recovery business continuity binary by dsgpro getty images 182712891

Microsoft Exchange Emergency Mitigation: What admins need to know

The Emergency Mitigation service adds protections to Exchange Server in the wake of recent zero-day compromises.

Cybersecurity  >  Email security threats, such as phishing

4 steps to protect the C-suite from business email compromise attacks

Preventing top executives from becoming BEC victims requires a different approach. Putting the risk in business terms is key.

cso security hack breach water leak gettyimages 466029458 by firmafotografen 2400x1600px

Exchange Autodiscover feature can cause Outlook to leak credentials

A design issue in the Microsoft Exchange Autodiscover feature can cause Outlook and other third-party Exchange client applications to leak plaintext Windows domain credentials to external servers. Here’s what companies can do now to...

Cybersecurity  >  Email security threats, such as phishing

Unpatched Exchange Servers an overlooked risk

Attackers are targeting older, unpatched Microsoft Exchange Servers with much success because organizations don't properly assess the risk.

Cybersecurity  >  Email security threats, such as phishing

Business email compromise (BEC) attacks take phishing to the next level

Business email compromise (BEC) is a highly targeted, email-based attack that tricks victims into exposing company information, handing over money, or getting them to perform other acts that negatively impact the business.

A hook is cast at laptop email with fishing lures amid abstract data.
Tip

4 steps to prevent spear phishing

Your users are in the crosshairs of the best attackers out there. Follow these steps to better protect them.

CSO > Invalidated cyber insurance

17 cyber insurance application questions you'll need to answer

Recent high-profile security incidents have tightened requirements to qualify for cyber insurance. These are the tougher questions insurance carriers are now asking.

Load More
You Might Also Like