The Latest in IT Security

1

Brute force email attacks and account takeover attempts against businesses have increased a whopping 671%, as attackers find novel ways for phishing credentials, according to new data. In its Q3 2021 email threat report, cloud-native email security platform Abnormal Security revealed a significant increase in attacks that are often used as launchpads for more significant […]

Read more ...

1

Simple Mail Transfer Protocol or SMTP has easily exploitable security loopholes. Email routing protocols were designed in a time when cryptographic technology was at a nascent stage (e.g., the de-facto protocol for email transfer, SMTP, is nearly 40 years old now), and therefore security was not an important consideration. As a result, in most email […]

Read more ...

1

When a conversation touches on credential theft, e-mail messages with phishing links tend to come up first. However, those messages represent just one means of obtaining user names and passwords for various online services. Scammers still mail links to spyware regularly, too. One trick they use to disguise those links is including an image that […]

Read more ...


Categories

FRIDAY, SEPTEMBER 17, 2021
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments