Email and Messaging Threats (spam, phishing, instant messaging) News
November 11, 2016
Roundup: Russia-based APT group Pawn Storm expands spear-phishing attacks after Google's disclosure of a Windows zero-day. Plus, OpenSSL updates, IoT security and more.
August 26, 2016
Intel and Kaspersky cooperate with authorities to snuff out Wildfire with a ransomware decryption tool and end the threat from a $79,000 per month campaign with over 5,000 victims.
June 27, 2016
Hit by a ransomware attack, a NASCAR race team paid to restore data worth millions, then called on Malwarebytes to secure their systems -- and Malwarebytes joined up as a sponsor.
June 02, 2016
IBM reports 30 'bug poaching' cyber extortion attacks in the past year, as black hat hackers aim to "help" enterprises by exploiting SQL injection vulnerabilities.
Email and Messaging Threats (spam, phishing, instant messaging) Get Started
Bring yourself up to speed with our introductory content
Email spam, or junk email, is unsolicited bulk messages sent through email with commercial, fraudulent or malicious intent. Continue Reading
Email spoofing is the forgery of an email header so that the message appears to have originated from someone or somewhere other than the actual source. Continue Reading
Phishing is a form of fraud in which the attacker tries to learn information -- such as login credentials or account information -- by masquerading as a reputable entity or person in email, IM, or other communication channels. Continue Reading
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
Evaluate Email and Messaging Threats (spam, phishing, instant messaging) Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
ZCryptor ransomware can self-replicate through autorun files placed on removable storage devices. Expert Nick Lewis explains how your enterprise can mitigate this risk. Continue Reading
The Necurs botnet has been distributing a new variant of Locky ransomware. Expert Nick Lewis explains how to prevent and detect Locky infections in your enterprise. Continue Reading
APT groups have been continuously exploiting a flaw in Microsoft Office, despite it having been patched. Expert Nick Lewis explains how these attacks work and how to prevent them. Continue Reading
Manage Email and Messaging Threats (spam, phishing, instant messaging)
Learn to apply best practices and optimize your operations.
Ransomware attacks on healthcare data are on the rise. Expert Ernie Hayden explains why healthcare organizations are a target and the effects of these attacks. Continue Reading
In this excerpt of Cyber Crime and Cyber Terrorism Investigator's Handbook, authors Babak Akhgar, Andrew Staniforth and Francesca Bosco outline the classification, types and categories of cybercrime. Continue Reading
Attackers have found a loophole in SPF verification and are using the .gov top-level domain to trick users with phishing emails. Expert Nick Lewis explains how to defend against the threat. Continue Reading
Problem Solve Email and Messaging Threats (spam, phishing, instant messaging) Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
A recent version of the iSpy keylogger has the ability to steal passwords and record Skype chats. Expert Nick Lewis explains how it works and how to protect your systems. Continue Reading
A new type of macro malware has the ability to evade the detection of virtual machines and sandbox environments. Expert Nick Lewis explains how to find and remove this malware. Continue Reading
The SWIFT network has increasingly been abused by cybercriminals to carry out bank fraud and theft. Expert Michael Cobb explains possible ways to boost security. Continue Reading