The Latest in IT Security

1

It seems like not a day goes by without another ransomware attack making headlines. And where do many of these attacks start? In your users’ email inboxes. By now you know that your users are both your first line of defense and your weakest link and you need to not only add additional spam filtering […]

Read more ...

15
Jun
2021
1

Modern antiphishing and antispam solutions increasingly draw on a variety of machine-learning technologies. Using neural networks to analyze text makes them hard to fool, so attackers have turned to a simple but effective trick: placing the text in a picture. They then embed the image in a message body using Base64 encoding (typically, images in […]

Read more ...

1

In a nutshell, email spoofing is the creation of fake emails that seem legitimate. This article analyzes the spoofing of email addresses through changing the From header, which provides information about the sender’s name and address. SMTP (Simple Mail Transfer Protocol, the main email transmission protocol in TCP/IP networks) offers no protection against spoofing, so […]

Read more ...


Categories

MONDAY, JUNE 21, 2021
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments