A post last week from Geraldine Hunt of SpamTitan Technologies asks if anyone noticed the change in individual Facebook email addresses. She did a quick poll of 50 Facebook users (with technology backgrounds) that regularly use the social network and
According to data compiled by a cloud security team from Druva, an enterprise endpoint backup provider, 92 percent of security breaches are actually avoidable.
After studying recent cloud security and data breaches the team concluded that:
In its Q2 2012 State of the Web report, cloud security company Zscaler discussed web applications most commonly accessed by enterprise employees. Facebook was found to be the most dominant web app.
According to Zscaler ThreatLabZ researchers “Facebo
I had a number of very good conversations with clients yesterday on a trip to the San Francisco Bay Area. In one of those discussions, we focused on email and the fairly blasé attitude that many have toward resolving its problems. Email, after all, i
One of the outcomes of spammers and phishers becoming craftier is the development of tools to keep an eye on network traffic scanning for unusual activity. Intrusion protection systems and intrusion detection systems, once novel are becoming more com
A comprehensive set of best practices covering anti-bot and malware, anti-spam and emerging mobile abuse was jointly released last week by the Messaging, Malware and Mobile Anti-Abuse Working Group (M3AAWG) and the London Action Plan (LAP). The repor
Late last week, an advisory was published by the Online Trust Alliance(OTA) with a “severe / immediate action required” status.
Here is the advisory:
The ability to exploit weak DKIM keys has recently been highlighted in the media. This awareness mea
Most will agree that despite the enormous amounts spent on secure Web gateways, anti-virus software, cloud-based malware filtering and the like, users are still the weak link in the security chain. The primary reason for this is that increasingly the
“I have a data stream that will be sent as daily emails containing temperature and wind speed from a measurement site. Our email system is Outlook…”
“We are a GroupWise 6.5.5 shop. We have a new employee who
I had an interesting discussion last week with AirPatrol, a company coming out of stealth mode, with regard to their solution to address the BYOD problem. Their approach, which they call “Cognitive Mobile Security,” uses location sensors installed wi
Input from over 100 businesses, governmental agencies and thought leaders who have been working to help detect, prevent, remediate and recover from the threats of botnets and cybercrime has resulted in a comprehensive white paper outlining best pract
Most content is not sent or stored with any sort of encryption. For example, attachments sent through email, files sent using many file transfer solutions, form data sent over the Internet, content stored in repositories like file servers, desktop co
Longline fishing is a commercial fishing technique in which a main line of up to several miles in length contains hundreds or thousands of short lines with hooks, each loaded with their own bait. The controversial technique is used to target certain
Domain-based Message Authentication, Reporting and Conformance (DMARC) is a relatively simple authentication method designed to combat the growing problem of spoofed emails, particularly those that are designed to fool receivers who are the targets o
We have contended for some time that many organizations will migrate to a hybrid of on-premises and cloud infrastructure for many of their key systems, such as email, archiving, security, etc. While migrating completely to the cloud for things like
Useful if you occasionally send/request credit card information by email or as text messages. This article was first published on DataScienceCentral.
Originally posted on DataScienceCentral.
With email encryption being targeted by the government as if it was criminal activity (read the story about the Lavabit platform shut down by the government because it was used by Edward Snowden in the recent
Please, subscribe to get an access.