By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
Email and messaging threats News
May 05, 2017
News roundup: Attackers exploit SS7 vulnerability and drain bank accounts. Plus, Trump signs government IT executive order, an Intel AMT flaw threatens millions and more.
May 04, 2017
A Google Docs phishing attack abused OAuth to give malicious actors full access to a victim's Gmail account and contacts, but Google claims to have blocked the attacks.
March 23, 2017
Research shows DV certificates can be a prime target for phishing and malware operators, but experts are unsure how certificate authorities should deal with the issue.
January 17, 2017
Researchers saw a Gmail phishing campaign in the wild using clever tricks to access accounts including a difficult 2FA bypass only possible in real time.
Email and messaging threats Get Started
Bring yourself up to speed with our introductory content
Identity theft, also known as identity fraud, is a crime in which an imposter obtains key pieces of personally identifiable information, such as Social Security or driver's license numbers, in order to impersonate someone else. Continue Reading
Before moving from on-premises Exchange to Office 365, admins can set up a pilot to see if bandwidth, connectivity or incompatibilities will hinder success. Continue Reading
Spear phishing is an email-spoofing attack that targets a specific organization or individual, seeking unauthorized access to sensitive information. Continue Reading
Evaluate Email and messaging threats Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
As enterprises adopt team chat applications, IT leaders should examine security tools. End-to-end encryption, for example, can provide key access to messaging servers. Continue Reading
Expert contributor Karen Scarfone examines the best email security gateways to help readers determine which may be best for their organization. Continue Reading
The response to an employee clicking on a malicious link is important for organizations to get right. Expert Matthew Pascucci discusses how to handle the aftermath of an attack. Continue Reading
Manage Email and messaging threats
Learn to apply best practices and optimize your operations.
Attackers work day and night thinking up new ways to bypass IT security. Educate users on ways to avoid email phishing attacks so you can rest easy. Continue Reading
On-premises Exchange Server and Office 365 can make a great team -- if admins pay attention to certain features and adjust management practices accordingly. Continue Reading
Ransomware attacks on healthcare data are on the rise. Expert Ernie Hayden explains why healthcare organizations are a target and the effects of these attacks. Continue Reading
Problem Solve Email and messaging threats Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
A DocuSign phishing email with a link to a malicious Word document recently targeted the company's users. Expert Judith Myerson outlines six ways to avoid this type of attack. Continue Reading
A Gmail phishing attack brought users to fake login pages designed to look like Google's. Expert Nick Lewis explains how users can prevent similar phishing attacks. Continue Reading
Nation-states have been carrying out attacks using RTF files with embedded malware. Expert Nick Lewis explains how OLE technology is used and how to protect your enterprise. Continue Reading