Email Alerts
-
AT&T email address security breach: Can hackers track a SIM card?
Recently, a security breach at AT&T exposed the email addresses of thousands of its customers, but that may not be the biggest threat. In this expert response, Nick Lewis explains what could be the result of this breach. Ask the Expert
-
How to keep messages secure with an email digital certificate
Using an email digital certificate can help protect important information from being read by anyone except the intended recipient. Ask the Expert
-
Preventing unauthorized email issues from hindering an organization
In this expert response, find out how to prevent your organization from sending out unauthorized emails. Ask the Expert
-
How secure is an email with a .pdf attachment?
Sending sensitive information in an email or as an attachment is unsafe, and depending on your organization's security policies, could land you in a lot of trouble. Michael Cobb explains why. Ask the Expert
-
How to secure a .pdf file
In this expert Q&A, Michael Cobb explains how to avoid malicious content that is embedded into .pdf documents. Ask the Expert
-
Can an IP spoofing tool be used to spam SPF servers?
Michael Cobb explains what the Sender Policy Framework can and cannot protect against, including IP spoofing attacks. Ask the Expert
-
With McColo shut down, has spam decreased?
Expert Michael Cobb explains how the shutdown of the San Jose-based Web hosting service provider actually impacted spam levels. Ask the Expert
-
How to prevent brute force webmail attacks
Expert Sherri Davidoff explains why brute-force attacks on webmail accounts are such a popular hacking technique. Ask the Expert
-
What does 'invoked by uid 78' mean?
Are you seeing a 'uid 78' in your emails? In this expert response, Michael Cobb explains what the message means. Ask the Expert
-
How can 419 scam emails and backscatter spam be stopped?
A 419 scam is just one example of backscatter spam. John Strand explains which long-term solutions can help combat these particular kinds of unwanted messages. Ask the Expert
Security Management Strategies for the CIO