By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
Email and messaging threats News
May 05, 2017
News roundup: Attackers exploit SS7 vulnerability and drain bank accounts. Plus, Trump signs government IT executive order, an Intel AMT flaw threatens millions and more.
May 04, 2017
A Google Docs phishing attack abused OAuth to give malicious actors full access to a victim's Gmail account and contacts, but Google claims to have blocked the attacks.
March 23, 2017
Research shows DV certificates can be a prime target for phishing and malware operators, but experts are unsure how certificate authorities should deal with the issue.
January 17, 2017
Researchers saw a Gmail phishing campaign in the wild using clever tricks to access accounts including a difficult 2FA bypass only possible in real time.
Email and messaging threats Get Started
Bring yourself up to speed with our introductory content
Identity theft, also known as identity fraud, is a crime in which an imposter obtains key pieces of personally identifiable information, such as Social Security or driver's license numbers, in order to impersonate someone else. Continue Reading
Before moving from on-premises Exchange to Office 365, admins can set up a pilot to see if bandwidth, connectivity or incompatibilities will hinder success. Continue Reading
Spear phishing is an email-spoofing attack that targets a specific organization or individual, seeking unauthorized access to sensitive information. Continue Reading
Evaluate Email and messaging threats Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Expert contributor Karen Scarfone examines the best email security gateways to help readers determine which may be best for their organization. Continue Reading
The response to an employee clicking on a malicious link is important for organizations to get right. Expert Matthew Pascucci discusses how to handle the aftermath of an attack. Continue Reading
ZCryptor ransomware can self-replicate through autorun files placed on removable storage devices. Expert Nick Lewis explains how your enterprise can mitigate this risk. Continue Reading
Manage Email and messaging threats
Learn to apply best practices and optimize your operations.
On-premises Exchange Server and Office 365 can make a great team -- if admins pay attention to certain features and adjust management practices accordingly. Continue Reading
Ransomware attacks on healthcare data are on the rise. Expert Ernie Hayden explains why healthcare organizations are a target and the effects of these attacks. Continue Reading
OpenPGP uses asymmetric encryption and symmetric encryption for different parts of its process. Expert Michael Cobb explains the purpose of hybrid encryption in message security. Continue Reading
Problem Solve Email and messaging threats Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
After a remote code execution flaw in PHPMailer was patched, the problem persisted, and had to be repatched. Expert Michael Cobb explains how the critical vulnerability works. Continue Reading
The Nemucod downloader malware is being spread through Facebook Messenger disguised as an image file. Expert Nick Lewis explains the available protections against this attack. Continue Reading
A flaw that allows attackers to load malicious DLL files in Symantec products was labeled as severe. Expert Michael Cobb explains the vulnerability and its classification. Continue Reading