Email

Email | News, how-tos, features, reviews, and videos

security policy primary
6 handling email phishing

template c100.00 03 57 09.still001
video

An inside look at hybrid Office 365 phishing attacks | Salted Hash Ep 41

In this episode, Steve Ragan shows what a hybrid phishing attack looks like as it starts off on one service, and quickly moves to another.

template c100.00 06 55 04.still001
video

What is a phishing kit? Watch this in-depth explainer | Salted Hash Ep 39

What is a phishing kit? In this video, Steve Ragan offers an answer and a look at some of the kits Salted Hash has collected.

template c100.00 03 35 22.still001
video

An introduction to Kit Hunter, a phishing kit detector | Salted Hash Ep 40

Kit Hunter, a basic Python script written by host Steve Ragan, searches on common tag elements to find hidden phishing kits on a web server.

salted hash thumbnail multi final
video

Conversation hijacking attacks | Salted Hash Ep 38

Troy Gill, manager of security research at AppRiver, explains conversation hijacking attacks, or CHAs, with host Steve Ragan, including who is typically targeted and how to prevent them.

salted hash thumbnail multi final
video

Phishing problems: 3.2M emails blocked in a month | Salted Hash Ep 37

Asaf Cidon, vice president of email security at Barracuda Networks, talks with host Steve Ragan about a recent uptick in phishing attacks, including a spike in business email compromise (BEC) attacks.

email security risk - phishing / malware

Cybercriminals impersonate popular file sharing services to take over email accounts

Email account takeover attacks are growing, and attackers are impersonating OneDrive and other popular web services to steal credentials from employees.

email iot internet security

The life and death of a document: where did it really go?

As the Moody Blues would say, what became of that letter you never meant to send?

laptop security breach password identity theft hacker

Cybercriminals impersonate Outlook and DocuSign to steal your identity

Attackers are now impersonating popular web services like Microsoft Outlook, DocuSign and Google Docs to trick you to freely give up your credentials.

email iot internet security

Email security in 2018

Things are going to get even crazier...

hacker person using laptop

Train your employees — before someone else does

Slashing overhead often means cutting training budgets, but unintended side effects often include employee attrition, poor performance, or even breach of your organization and loss of intellectual property.

email virus threat attack

Business email fraud – financial scams under the guise of authority

A 1,300% increase in losses resulting from business email compromise is nothing short of an epidemic.

phishing threat

Is all fair in simulated phishing?

We’ve all heard the saying “all is fair in love and war,” but what about when it comes to simulated phishing?

Load More