Security Experts:

Email Security
long dotted

NEWS & INDUSTRY UPDATES

Google has updated Gmail spam filters to block out emails coming from addresses using suspicious combinations of Latin and non-Latin characters, the company said on Tuesday.
Ben Williams, a senior security consultant at global information assurance specialist NCC Group, has showed that while email and Web filtering products and services play an important role in protecting an organization against cyber threats, their flaws can be leveraged in the reconnaissance phase of an attack.
Microsoft said it is scrambling Outlook email messages in transit to thwart spying by governments or others.
IT security professionals aren’t getting the business expertise skills they need at their current companies and positions, and are therefore looking elsewhere.
The minds behind TrueCrypt.ch want to keep TrueCrypt encryption software alive - either by picking up where the original developers left off or building on their code to create a new product.
A new push to encrypt email, keeping messages free from government snooping, is gaining momentum.
AOL said it had launched an investigation with federal authorities into a security breach that allowed hackers to gain access to around two percent of its email accounts.
AT&T is offering a new cloud-based security solution designed to protect customers against malware and malicious websites while offering security policy control across enterprise, web, social and mobile networks.
The 'Darlloz' worm is going after your digital dollars, as well as devices that make up the Internet of Things, according to new research
Google announced that its Gmail service would use added encryption to protect against eavesdropping and keep messages secure.

FEATURES, INSIGHTS // Email Security

rss icon

Marc Solomon's picture
Recent high-profile security breaches at major retailers stem from the fact that in-store networks and their components are evolving and spawning a range of attack vectors.
Marc Solomon's picture
Many continue to click on links or attachments sent via email without taking any steps to verify the origin of the email or the validity of the link or attachment. It only takes one click to for an attacker to establish a foothold in the target’s systems.
Jon-Louis Heimerl's picture
Social engineering attacks can happen at any time. Here are some strategies you can use to help reduce the chances of a successful social engineering/phishing attack you or your organization.
Jon-Louis Heimerl's picture
Was the Mayan Apocalypse was a myth? Since I am a security geek, I just happen to talk about security a lot. What are some security myths I have heard in my conversations with some very bright people?
Tal Be'ery's picture
In this column, Tal analyzes the technical details of the DKIM vulnerability, evaluates possible implications of the exploit, and points to some general lessons.
Alan Wlasuk's picture
Let’s look at what e-mail hacking is really all about and why it could be much more painful than just having to sort through our spouse’s energy drink messages.
Greg Olsen's picture
Transport Layer Security is a means of securing the transmission of email between two MTAs (mail transfer agents). In this column, I’ve highlighted some of the other things that can be done with TLS besides this opportunistic encryption of email.
Greg Olsen's picture
Inbound email to your firm containing important communications related to revenue or customer service could be blocked by your own anti-spam software. How can you prevent against false positives?
Greg Olsen's picture
Interest in Converged Infrastructure solutions has been surging due to the demands of cloud computing. This trend toward Converged Infrastructure has important implications for the email security IT infrastructure.
Greg Olsen's picture
Thinking of migrating mailboxes to a cloud provider? The email backbone is an important architectural tool when dealing with the migration of email mailboxes and maintaining email integrity during the migration process.