Email Alerts
-
Black Hat 2012: Social engineering training benefits IT teams, end users
James Philput of Information Assurance Professionals will explain how social engineering training can instill security awareness into end users. News
-
Social engineering penetration testing: Four effective techniques
Social engineering penetration testing is now a must for enterprises. Learn about the four methods your pen tests should use. Tip
-
Spear phishing attacks target defense contractors, security firms
A spear phishing campaign contains a message about industrial control systems security and a malicious .pdf file that downloads malware to steal data. News
-
Using social engineering testing to foster anti-social engineering training
Worried your users could easily be pwned? Learn about improving social engineering testing to foster anti-social engineering training. Answer
-
Webmail forensics: Investigating issues with email forwarding security
Expert Mike Cobb discusses webmail forensics possibilities for dealing with the aftermath of an issue involving an email forwarding security breach. Answer
-
Email providers push DMARC email authentication to combat phishing
DMARC creates an authentication loop that could help people determine the legitimacy of an email. News
-
Readiness team warns of spoofed US-CERT email addresses in phishing campaign
A phishing email campaign is targeting private and public sector organizations with phony US-CERT email addresses. News
-
Curb the spam virus threat via information security awareness training
Information security awareness training doesn't always protect users from the ongoing spam virus threat. Nick Lewis offers additional measures that may help. Answer
-
Information security podcasts: 2010 and 2011 archive
Download information security podcasts from SearchSecurity's 2010 and 2011 podcast archive. Podcast
-
The fight against phishing: Utilizing SPF and DKIM authentication technology
The fight against phishing has been waging for years. Expert Michael Cobb explains how SPF and DKIM authentication technologies could turn the tide. Answer
Security Management Strategies for the CIO