By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
Email and messaging threats News
August 31, 2017
An email leak containing 711 million records was found in a breach of a spambot list stored in the Netherlands and included both addresses and passwords used to access email accounts.
July 27, 2017
Karla Burnett of Stripe presented sobering results of phishing research from her company at Black Hat 2017, suggesting phishing training is ineffective against today's threats.
May 05, 2017
News roundup: Attackers exploit SS7 vulnerability and drain bank accounts. Plus, Trump signs government IT executive order, an Intel AMT flaw threatens millions and more.
May 04, 2017
A Google Docs phishing attack abused OAuth to give malicious actors full access to a victim's Gmail account and contacts, but Google claims to have blocked the attacks.
Email and messaging threats Get Started
Bring yourself up to speed with our introductory content
The best email security policy requires a holistic approach of the issue, understanding both the problem's scope and the most likely threats. Continue Reading
Phishing is a form of fraud in which an attacker masquerades as a reputable entity or person in email or other communication channels. Continue Reading
In this excerpt from chapter four of The Basics of Cyber Safety, authors John Sammons and Michael Cross discuss basic email security. Continue Reading
Evaluate Email and messaging threats Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
In this excerpt from chapter five of Deception in the Digital Age, authors Cameron H. Malin, Terry Gudaitis, Thomas J. Holt and Max Kilger discuss phishing and watering hole attacks. Continue Reading
A revamped Poison Ivy RAT campaign has been using new evasion and distribution techniques. Expert Nick Lewis explains the new attack methods that enterprises should look out for. Continue Reading
As enterprises adopt team chat applications, IT leaders should examine security tools. End-to-end encryption, for example, can provide key access to messaging servers. Continue Reading
Manage Email and messaging threats
Learn to apply best practices and optimize your operations.
Effectively tackling email security issues requires infosec pros to address a broad range of areas, including cloud, endpoints, user training and more. Continue Reading
Employees that use unsanctioned apps can jeopardize the business. Cloud App Discovery generates detailed reports on unapproved services to help IT mitigate risk. Continue Reading
Cross-platform malware enables attackers to leverage their attacks using infected Microsoft Word docs. Expert Nick Lewis explains how the attacks work and how to defend against them. Continue Reading
Problem Solve Email and messaging threats Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
The libpurple library contains a code execution vulnerability that affects the IM clients that were developed using it. Expert Michael Cobb explains how the flaw works. Continue Reading
Flaws in WhatsApp and Telegram, popular messaging services, enable attackers to break encryption and take over accounts. Expert Michael Cobb explains how the attacks work. Continue Reading
A DocuSign phishing email with a link to a malicious Word document recently targeted the company's users. Expert Judith Myerson outlines six ways to avoid this type of attack. Continue Reading