New & Notable
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
Email and messaging threats News
February 23, 2018
News roundup: Hackers once again used SWIFT-based attacks to steal millions from Russian and Indian banks. Plus, hackers used an L.A. Times website for cryptojacking, and more.
February 14, 2018
Kaspersky Lab disclosed a zero-day vulnerability in Telegram that the security vendor says was abused by Russian cybercriminals in a cryptomining malware campaign.
August 31, 2017
An email leak containing 711 million records was found in a breach of a spambot list stored in the Netherlands and included both addresses and passwords used to access email accounts.
July 27, 2017
Karla Burnett of Stripe presented sobering results of phishing research from her company at Black Hat 2017, suggesting phishing training is ineffective against today's threats.
Email and messaging threats Get Started
Bring yourself up to speed with our introductory content
The best email security policy requires a holistic approach of the issue, understanding both the problem's scope and the most likely threats. Continue Reading
Phishing is a form of fraud in which an attacker masquerades as a reputable entity or person in email or other communication channels. Continue Reading
In this excerpt from chapter four of The Basics of Cyber Safety, authors John Sammons and Michael Cross discuss basic email security. Continue Reading
Evaluate Email and messaging threats Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
The latest iterations of ransomware aim to undercut backups as an effective method for recovering from attacks. Learn how to overcome this vulnerability. Continue Reading
Botnets are evolving and will continue to plague organizations. There is no one tool that will be sufficient, so it’s time to layer your anti-botnet defenses. Continue Reading
Enterprise anti-botnet defenses, to be effective, must be added in multiple layers. No single security product will do the trick, but the right combo of tools can. Continue Reading
Manage Email and messaging threats
Learn to apply best practices and optimize your operations.
Zyklon malware targets three previously patched Microsoft Office vulnerabilities. Learn how attackers can access passwords and cryptocurrency wallet data with expert Judith Myerson. Continue Reading
As cyberattackers continue to find new ways to hold data for ransom, the onus is on healthcare organizations to prevent ransomware before it can infect users' machines. Continue Reading
SpoofGuard monitors network traffic to identify malicious activity and prevent phishing attacks. Before you enable SpoofGuard in NSX, there are a few things you should know. Continue Reading
Problem Solve Email and messaging threats Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Threat actors are using phishing email campaigns to fool users with tech support scams and fake Blue Screens of Death. Learn how these campaigns work with expert Nick Lewis. Continue Reading
The accidental publication of an Adobe private key could have put the company in jeopardy. Matt Pascucci explains how it happened and how to better protect PGP keys. Continue Reading
The libpurple library contains a code execution vulnerability that affects the IM clients that were developed using it. Expert Michael Cobb explains how the flaw works. Continue Reading