In a recent campaign stemming from compromised Yahoo! accounts, users to visited the spammed link via a PC would see health-product related spam. For those who access the link on an Android device, are hit with the "NotCompatible Trojan".
Sendmail's Sentrion Rogue Email Application Control (REAC) appliance is designed to address the security and compliance needs of organizations migrating email-generating systems and applications to the cloud.
The Messaging, Malware and Mobile Anti-Abuse Working Group (M3AAWG ) has recommended that organizations using DomainKeys Identified Mail verification (DKIM) keys switch 512-bit and 718-bit encryption keys with keys 1024-bits or higher.
DKIM (DomainKeys Identified Mail) was created as an Internet standard method of instilling trust back in email. These best practices around DKIM verification outline what organizations should consider in order to trust email and prevent phishing.
Email is a primary mode of communication in business today and consequently is a mission critical enterprise application. A well-designed corporate email infrastructure should have a security architecture built on the bastion host principle.
The past two years have seen significant rise in the adoption of cloud computing and Software-as-a-Service (SaaS), however the ever-present concern over security has greatly impacted its growth within email security.
Social Media Use Policy - The consumerization of IT is affecting all aspects of the way we work. As Web 2.0 technologies continue to gain popularity amongst employees, IT departments are struggling to understand and manage the challenges.