Security Experts:

Email Security
long dotted


Encrypted email provider ProtonMail announced the global availability of its privacy focused email service to the public this week. [Read More]
A vulnerability on’s website exposed the email addresses of volunteers. The bug was exploited by at least one organization [Read More]
Google is boosting the security of its Gmail service in an effort to keep them protected from phishing attacks, malware, and other threats. [Read More]
Cybercriminals behind the Dridex botnet have ramped up their email campaign activity following a short holiday season break, researchers at FireEye Labs say. [Read More]
US spy chief James Clapper's personal online accounts have been hacked, his office confirmed, a few months after CIA director John Brennan suffered a similar attack. [Read More]
23-year-old man from the Bahamas charged for hacking celebrity emails and stealing scripts for movies and TV shows [Read More]
US Defense Secretary Ashton Carter acknowledged making a "mistake" when he used his personal email for government business in the early part of his tenure. [Read More]
Google plans to ramp up security for Gmail by letting users know when messages arrive via unencrypted connections that could be prone to snooping or tampering. [Read More]
Hackers breached the systems of anti-adblocking service PageFair and used the access to deliver malware [Read More]
Intel is pulling the plug on McAfee SaaS Email Protection and Archiving products, and advises customers to switch to Proofpoint solutions. [Read More]

FEATURES, INSIGHTS // Email Security

rss icon

Bill Sweeney's picture
As data moves online, social engineering techniques have become far more personalized, technologically advanced and ultimately successful.
Travis Greene's picture
Yahoo's “Account Key” uses push notifications to their Yahoo Mail app on mobile devices. Will this securely replace passwords and two-factor authentication?
Travis Greene's picture
In the case of Hilary Clinton's personal email server, we know that Top Secret information was transmitted over a network that likely wasn’t equipped to safeguard it. If her server was a target of foreign state actors, the implications are frightening.
Marc Solomon's picture
Today’s email-based attacks don’t occur at a single point in time and use multiple methods to evade detection. To bolster protection, organizations may turn to a set of disparate products that don’t – and can’t – work together.
Marc Solomon's picture
Recent high-profile security breaches at major retailers stem from the fact that in-store networks and their components are evolving and spawning a range of attack vectors.
Marc Solomon's picture
Many continue to click on links or attachments sent via email without taking any steps to verify the origin of the email or the validity of the link or attachment. It only takes one click to for an attacker to establish a foothold in the target’s systems.
Jon-Louis Heimerl's picture
Social engineering attacks can happen at any time. Here are some strategies you can use to help reduce the chances of a successful social engineering/phishing attack you or your organization.
Jon-Louis Heimerl's picture
Was the Mayan Apocalypse was a myth? Since I am a security geek, I just happen to talk about security a lot. What are some security myths I have heard in my conversations with some very bright people?
Tal Be'ery's picture
In this column, Tal analyzes the technical details of the DKIM vulnerability, evaluates possible implications of the exploit, and points to some general lessons.
Alan Wlasuk's picture
Let’s look at what e-mail hacking is really all about and why it could be much more painful than just having to sort through our spouse’s energy drink messages.