Email

Email | News, how-tos, features, reviews, and videos


template c100.00 03 35 22.still001
video

An introduction to Kit Hunter, a phishing kit detector | Salted Hash Ep 40

Kit Hunter, a basic Python script written by host Steve Ragan, searches on common tag elements to find hidden phishing kits on a web server.

salted hash thumbnail multi final
video

Conversation hijacking attacks | Salted Hash Ep 38

Troy Gill, manager of security research at AppRiver, explains conversation hijacking attacks, or CHAs, with host Steve Ragan, including who is typically targeted and how to prevent them.

salted hash thumbnail multi final
video

Phishing problems: 3.2M emails blocked in a month | Salted Hash Ep 37

Asaf Cidon, vice president of email security at Barracuda Networks, talks with host Steve Ragan about a recent uptick in phishing attacks, including a spike in business email compromise (BEC) attacks.

email security risk - phishing / malware

Cybercriminals impersonate popular file sharing services to take over email accounts

Email account takeover attacks are growing, and attackers are impersonating OneDrive and other popular web services to steal credentials from employees.

email iot internet security

The life and death of a document: where did it really go?

As the Moody Blues would say, what became of that letter you never meant to send?

laptop security breach password identity theft hacker

Cybercriminals impersonate Outlook and DocuSign to steal your identity

Attackers are now impersonating popular web services like Microsoft Outlook, DocuSign and Google Docs to trick you to freely give up your credentials.

email iot internet security

Email security in 2018

Things are going to get even crazier...

hacker person using laptop

Train your employees — before someone else does

Slashing overhead often means cutting training budgets, but unintended side effects often include employee attrition, poor performance, or even breach of your organization and loss of intellectual property.

email virus threat attack

Business email fraud – financial scams under the guise of authority

A 1,300% increase in losses resulting from business email compromise is nothing short of an epidemic.

phishing threat

Is all fair in simulated phishing?

We’ve all heard the saying “all is fair in love and war,” but what about when it comes to simulated phishing?

Man pointing to security icon for email

Implementing DMARC: why email security should be the No. 1 priority

How implementing the email authentication protocol DMARC can secure your organization.

email cloud

How is your email security hygiene?

With the ongoing hacks of major corporations, many employees still don’t understand that when writing an email, there are security and hygiene issues that need to be considered before they hit the send button.

Man pointing to security icon for email

The incredible success – and utter failure – of email

Security is always a balance between convenience and openness, versus risk. In that respect, email is no exception.

cian 002
video

How to minimize the risks of phishing scams

Employees are often the weakest link in your company's security chain. But with a little knowledge and foresight you can mitigate the risks. In this video, CIO.com senior writer Sharon Florentine explains the anatomy of a phishing...

shadowy figure reaching out of blurred background

How CIOs can fight the rise in shadow email

One feature of today’s cloud-centric landscape is just how many different services may be sending email on your company’s behalf. We call this “shadow email,” and like shadow IT, it lurks in the dark corners of your domain, making...

key metal home security encryption

Can Google’s Key Transparency make encrypted email ubiquitous?

The open nature of email makes implementing encryption complex. Google hopes to change that with its Key Transparency initiative.

nyse terminal stocks

The economics of cyber is going in the wrong direction

We have overlooked many legacy security problems like spam. Spam is a constant problem and cost to both enterprises and users. Based on the number of spam messages sent each day and the potential for harm it deserves more recognition....

Tattered US flag

Admin of anonymous, Tor-friendly email service has electronics seized at U.S. border

Should running an anonymous email service mostly used by 4chan or attending hacker conferences mean you should be detained by customs and have your electronic devices seized?

Load More