email security

RSS
  • Microsoft’s Security Intelligence Report Highlights Email Threats

    Posted November 10, 2008 - 5:29 am

    Microsoft released its Security Intelligence Report this week, providing some interesting insights into vulnerabilities and security trends. According to the report, several common operating systems have dropped.
  • Magic Quadrant for Email Security

    Posted November 5, 2008 - 10:19 am

    There have been a rash of press releases recently from companies listed in Gartner’s Magic Quadrant for Email Security Boundaries. The twenty vendors mentioned are categorized as either leaders, challengers, visionaries or niche players.
  • Educate your email users about phishing

    Posted November 4, 2008 - 8:04 am

    Last week one of my clients received the resurfaced American Express phishing email. And yesterday an associate told me a dastardly story about being fleeced out of $2,700 from his Citibank account. This was the result of responding to a phishing email.
  • ICANN Lowers Boom On EstDomains

    Posted October 30, 2008 - 11:55 am

    ICANN, the organization charged with overseeing the address system of the internet, has revoked the right of notorious registrar EstDomains to sell domain names. EstDomains is known as a registrar that caters to phishers, spammers, and other cybercriminals. ICANN handed down its decision after the company’s president was convicted of fraud.
  • How can scammers obtain your passwords?

    Posted October 28, 2008 - 4:35 am

    Pass the Password Crackers Please Say that ten times! Ouch – someone pass the chapstick! I thought I’d devote some time to how people break into your systems. I’ll give you some information and methods that you can use to test the security of your own systems and passwords.
  • Aberdeen Group: The 2008 Email Security Report

    Posted October 27, 2008 - 4:25 pm

    With 130 billion email messages sent daily – at least 100 billion of which are spam, likely carrying malware that could deploy a botnet or spyware on your machine – are you feeling safe?
  • How to deploy a Physical Honeypot

    Posted October 27, 2008 - 7:02 am

    The first step for deploying a Honeypot is finding a machine that you are willing to sacrifice for the cause of being exploited, hacked and potentially purged of all data. This can be any computer capable of running the software for data capture and control.

  • Pass the Password Crackers Please

    Posted October 27, 2008 - 6:56 am

    Pass the Password Crackers Please Say that ten times! Ouch – someone pass the chapstick! I thought I’d devote some time to how people break into your systems. I’ll give you some information and methods that you can use yourself to test the security of your own systems and passwords.
  • Virus Cracks Open Email Scam

    Posted October 23, 2008 - 11:13 am

    This story is near and dear to me. One day I went into a frenzy, because a good friend sent me an email that she was stranded in Ghana and needed me to send her some money. She never mentioned she was going to Ghana. I was taken off guard at first, because I had a couple of other friends who had gone to Ghana to work, about the same time.
  • Spammer Hiding Techniques

    Posted October 23, 2008 - 4:18 am

    Escaping: This technique uses legal URL formatting to hide the address. Escaping encodes the URL with a percent sign followed by a hexidecimal code. An escaped URL can look like “http://%2E%2E%2E%48%20%18%32%2F%48…”. You can easily decode this by copying it into the location bar of your browser and hitting return.
  • The state of information security

    Posted October 23, 2008 - 4:12 am

    CSO’s annual “Global State of Information Security” survey brings to light a few of the failures of how people approach information security, and in particular, focuses on the current economic crisis and the impact that it is having on security technology.
  • Remove the IT Department from the e-Discovery Process

    Posted October 23, 2008 - 4:08 am

    More businesses are becoming subject to regulatory compliance. This could be either very formal stringent regulations such as the Sarbanes-Oxley Act or less strict regulations, such as the Federal Rules on Civil Procedure (FRCP).
  • New law requiring email encryption takes effect

    Posted October 22, 2008 - 5:01 am

    The Nevada law that requires businesses to encrypt data that is transmitted to customers took effect this month, and is expected to have an impact far beyond the state’s borders. An article in today’s Wall Street Journal highlighted some of the challenges of the bill, to which all companies doing business with people in Arizona must comply.
  • Digital Signatures

    Posted October 20, 2008 - 5:44 am

    I’ve spoken about Certificate Authorities and Certificates already. Remember that Certificates include: a public key, the owner and a digital signature. Well you’ve probably asked “what is a digital signature” and how do you “digitally sign” a certificate?
  • Spam business is booming despite legislation

    Posted October 16, 2008 - 6:26 am

    Ferris Research recently predicted that there would be 40 trillion spam messages sent this year. It would seem then, that we have a continuing problem on our hands, especially since spam has morphed from simple, but annoying, advertisements to Trojan horses and links to malware-infected web sites. The focus of spam has changed.
  • Email Administrator Career Risk Management

    Posted October 16, 2008 - 6:11 am

    The best server hardware configuration is in place for SMTP mail routing. Back up building generators are available in the office building. Uninterruptible power supplies, with UPS monitoring software, are connected to the email servers. So brown outs, electrical spikes and blackouts are in place to maintain server functionality.
  • What to do about email when traveling?

    Posted October 16, 2008 - 6:03 am

    Most of us take our laptops with us when we travel, and we use them to check and send email while on the road. Of course, it’s a risk. Besides outright theft of the device, there could be Wi-Fi data thieves sitting across from us at the airport looking through our files, compromised networks, and all manner of threats.
  • Obtaining Public Keys

    Posted October 16, 2008 - 5:56 am

    Last time I talked about Pretty Good Privacy or PGP. PGP you remember is a way to secure your email by using Public and Private keys. Well now I’m going to tell you how to exchange those Public keys.
  • Single Email Opens a Bank Account

    Posted October 16, 2008 - 5:53 am

    According to information recently released by the United States Department of Justice, a single email left a company wide open for bank fraud. This is an excellent example for administrators to provide continuous reminders to email users.
  • Palin’s email debacle highlights security risks

    Posted October 16, 2008 - 5:46 am

    Sarah Palin’s Yahoo email was hacked by a group calling itself “Anonymous”, which depending on your point of view, are either a group of “hacktivists” or self-righteous cyber-vigilantes with too much time on their hands. Her emails were posted on Wikileaks.
  • Encryption Standards and RC Ciphers

    Posted October 16, 2008 - 5:40 am

    In my last post I discussed the Advanced Encryption Standard (AES). Another encryption standard is known as RC6. Its predecessors were RC4 and RC5. RC6 is a fast block cipher (cryptographic algorithm) designed by Ronald Rivest for RSA Data Security (now RSA Security) in 1994. RC by the way stands for Ron’s Code and/or Rivest’s Ciphers.
  • Importance of state security laws go beyond borders

    Posted October 14, 2008 - 5:42 am

    Sometimes an individual state law becomes de facto national legislation, as was the case with California’s SB1386. This law requires any company that maintains personal data about a resident of California, provide notification in the event of a breach.
  • E-Mail Hacking Sarah Palin

    Posted October 14, 2008 - 5:39 am

    So it happened again. Another email account broken into. This time it wasn’t the glitterati – read Paris Hilton - that got stung. Nor was it an office staffer such as what Kenneth Kwak did at the Department of Education a couple years ago.
  • Phishing Email Trends Reported by the APWG

    Posted October 14, 2008 - 5:35 am

    The Anti-Phishing Working Group (APWG) is the global pan-industrial and law enforcement association focused on eliminating the fraud and identity theft that result from phishing, pharming and email spoofing of all types.
  • Spam Filter Blamed For Fouling Up Lawsuit

    Posted October 14, 2008 - 5:32 am

    A federal judge dismissed a Pennsylvania woman’s lawsuit, claiming her attorney ignored both a dismissal motion and an order to respond to it. The attorney is appealing, saying the judge’s emails got caught in his spam folder.
Join us:
Facebook

Twitter

Pinterest

Tumblr

LinkedIn

Google+

Join today!

See more content
Ask a Question
randomness