Blog Posts Tagged with "Email"

5e402abc3fedaf8927900f014ccc031f

Email Security: It's Every Employee's Business

March 22, 2013 Added by:Allan Pratt, MBA

Email security has become part of the job description for every employee. All it takes is one employee to cause a breach that opens up the entire company.

Comments  (0)

D03c28fd5a80c394905c980ee1ecdc88

E-mailing Passwords - Practice What You Preach

November 19, 2012 Added by:Bill Mathews

That’s right, I got an email with my username and password listed right there. That probably doesn’t anger normal people (let alone drive them to write an article about it), but I have never been accused of being normal so I’m pretty annoyed. Here, in no particular order, are my reasons for the anger and frustration...

Comments  (6)

65be44ae7088566069cc3bef454174a7

Messaging Mishaps Have Collateral Damage

August 21, 2012 Added by:Rebecca Herold

Bottom line for all organizations, from the largest to the smallest: You need to establish messaging policies that clearly communicate that all emails sent through the company email system are subject to monitoring, and that no one using the system should have any expectation of privacy for the messages...

Comments  (1)

4777ea0d573c51027a097399006f228a

Updates: Rumors of Anonymous Hacking th3j35t3r's Accounts Overblown

July 11, 2012 Added by:ʞɔopuooq ʇuıɐs

About the twitter ‘takeover’. I have to say that was clever. Even though my account wasn’t actually breached per se. The folks behind this latest attempt found an auto-RSS/Email to tweet script that uses the Twitter API and worked out a way to post to my account without actually having any physical access. Kudos...

Comments  (0)

D13f77e036666dbd8f93bf5895f47703

Cyber Criminals Hiding Behind Travel Emails

June 17, 2012 Added by:Theresa Payton

Cyber criminals love to be where the action is, and they know this is a peak travel season, so they have found the perfect hiding place: Travel confirmations. They realize that more people are booking travel online and receiving their travel confirmations via email...

Comments  (0)

99edc1997453f90eb5ac1430fd9a7c61

Is Lord Sugar a Member of Anonymous?

May 18, 2012 Added by:Javvad Malik

I’m simply asking the question that if Lord Sugar read something he didn’t agree with, and instead of privately sharing his thoughts or being in any way constructive, why did he expose the email address of Kevin OSullivan and invited 2 million people to DDoS his inbox?

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Microsoft Continues Crusade Against Botnet Masters

May 04, 2012 Added by:Headlines

"Google began alerting the registrants of more than three dozen Gmail accounts that were the subject of Microsoft’s subpoenas... The email addresses were already named in Microsoft’s initial complaint posted at zeuslegalnotice.com, which listed nicknames and other information..."

Comments  (0)

9f19bdb2d175ba86949c352b0cb85572

Five Steps to a Successful Social Attack

April 29, 2012 Added by:Neira Jones

You might not fall for these attacks, but how many members of your family would? How many employees in your organization would, from field staff to C-level execs? Different people will have different thresholds to these attacks. Security education and awareness is key...

Comments  (0)

71d85bb5d111973cb65dfee3d2a7e6c9

Using a Website’s Contact Us Form to Create a Phishing Attack

April 19, 2012 Added by:f8lerror

We all have come across websites that have the forms that say “contact us” or something similar. What’s the big deal? These forms have been around forever, right? When an employee finally gets the message, they are automatically put at ease, and become trusting of the content...

Comments  (0)

7ddc1f3000a13e4dfec28074e9e7b658

UK Proposes Monitoring Every Email, Call, and Text Message

April 10, 2012 Added by:Electronic Frontier Foundation

Law enforcement would have access to IP addresses, email addresses, when you send an email, and corresponding data for phone calls and text messages. The government has claimed this is needed to fight terrorism, but it would be available to law enforcement for all purposes...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Spoofed Email with Keylogger Malware Costs Company $100,000

April 04, 2012 Added by:Headlines

In one complaint received by the IC3, a business claimed their computer was infected with a virus after opening the attachment in the e-mail they received. As a result, the business lost nearly $100,000 when fraudsters successfully wired money from the company's bank account...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Hacker Pleads Guilty to Celebrity Computer Intrusions

March 27, 2012 Added by:Headlines

Chaney admitted he hacked into the e-mail accounts by taking the victims’ e-mail addresses, clicking on the “Forgot your password?” feature, then re-setting the passwords by answering security questions using publicly available information he found on the Internet...

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

Millions of US Government Email Addresses for Sale

March 19, 2012 Added by:Pierluigi Paganini

An underground black market is offering 2,462,935 U.S government email addresses and another 2,178,000 U.S military email addresses for sale. The risks are really serious, as this information could be used by hostile government in cyber attacks and cyber espionage activities...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Spoofed LinkedIn Messages Serving BlackHole Exploit

March 19, 2012 Added by:Headlines

"Be advised that there are fake Linkedin invitation reminders in circulation sending users to a BlackHole exploit which attempts to drop Cridex onto the PC. Cridex is a rather nasty piece of work that does everything from target banks and social networking accounts..."

Comments  (0)

01ceb9281b3fb3dbb90c3efbe327717e

It's Not the Spam Email But What Lies Behind Them

March 15, 2012 Added by:Alan Woodward

The fact that such large proportion of home machines host unknown malware hides a bigger threat. By hijacking so many PCs it is possible to mount a massive probing operation that can seek out high value targets that are susceptible to classic hacking attacks...

Comments  (0)

296634767383f056e82787fcb3b94864

A History of Google's Government Sales

March 14, 2012 Added by:Jeffrey Carr

Every technology company sells to the government, and compared to Microsoft and Apple the google numbers are pretty low. But since Google is more intimate with our search habits and email content than anyone else, these statistics still make me a little uncomfortable...

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »
Most Liked