New & Notable
Email and Messaging Threats (spam, phishing, instant messaging) News
August 09, 2013
Lavabit and Silent Circle, both providers of secure communications for the consumer market, close under threat of U.S. government meddling.
April 16, 2013
Emerging enterprise antiphishing tools use testing, training to help users recognize bogus messages, addressing a long-standing defensive pain point.
November 29, 2012
Malicious file attachments are typically used as the payload, according to a report issued this week by Trend Micro.
October 18, 2012
Spammers have spoofed shortened URLs designed to validate redirects to several states including California, Iowa, Indiana and Vermont.
Email and Messaging Threats (spam, phishing, instant messaging) Get Started
Bring yourself up to speed with our introductory content
Whaling attacks take phishing to the next level with much bigger targets. Enterprise threats expert Nick Lewis explains how to mitigate the risk. Continue Reading
Whaling is a type of fraud that targets high-profile end users such as C-level corporate executives, politicians and celebrities. Continue Reading
Spear phishing is an e-mail spoofing fraud attempt that targets a specific organization, seeking unauthorized access to confidential data. As with the e-mail messages used in regular phishing expeditions, spear phishing messages appear to come from... Continue Reading
Evaluate Email and Messaging Threats (spam, phishing, instant messaging) Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Learn how domain-based messaging authentication, reporting and conformance, or DMARC, can enhance your email security. Continue Reading
BlackBerry's email system logs user credentials and sends them in cleartext to BlackBerry servers. Is it a vendor backdoor? Michael Cobb discusses. Continue Reading
Readers vote on their top email security products in 2013: Antispam, antiphishing, email antivirus, spyware, antimalware filtering through software and appliances. Continue Reading
Manage Email and Messaging Threats (spam, phishing, instant messaging)
Learn to apply best practices and optimize your operations.
Enterprise threats expert Nick Lewis explains how socially engineered malware attacks work and how enterprises can defend against them. Continue Reading
Is Apple iMessage encryption strong enough to mitigate reverse-engineering attacks? Learn more about one of the top iMessage security risks. Continue Reading
Email addresses are prime targets of phishing schemes. Uncover how to mitigate these risks and learn tips for ensuring email address security. Continue Reading
Problem Solve Email and Messaging Threats (spam, phishing, instant messaging) Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Enterprise threats expert Nick Lewis explores emerging techniques being employed in PDF-based malware attacks and tells how to defend against them. Continue Reading
Expert Michael Cobb details how to reduce out-of-office message security risk --and thus targeted attacks -- by limiting personal info given. Continue Reading