
What not to keep in your mailbox
Getting e-mail through a Web interface may be convenient, but attackers are after corporate mailboxes, and one day they may visit yours.
104 articles
Getting e-mail through a Web interface may be convenient, but attackers are after corporate mailboxes, and one day they may visit yours.
Attackers are trying to steal credentials from corporate mail by sending lists of quarantined spam e-mails.
If you receive an e-mail of dubious authenticity, analyze it yourself. Here’s how.
One click on a phishing link can cost a company both money and reputation. Here’s how to protect your company from phishing.
Why using a corporate mail account for personal matters is not a good idea
Spam and phishing e-mails are not the only threats you might find in your mailbox. Cybercriminals are still using good old links to malware.
Scammers are using redirects through Google Apps Script to prevent mail servers from blocking phishing links.
Attackers claiming to represent Adobe online services are sending fake notifications to obtain corporate e-mail credentials.
To bypass text-analysis mechanisms, attackers are distributing phishing letters in images. How to avoid the danger.
Phishers are using Google online services to take over Microsoft online service accounts.
If an incoming message asks you to sign in to your MS Office account, here’s what to do.
Cybercriminals are sending phishing e-mails to hijack access to ESP accounts.
Why the computers in human resources are especially vulnerable, and how to protect them.
Our method for training models to filter out spam lets you maintain privacy without losing efficiency.
To bypass antiphishing technologies, malefactors can use legitimate e-mail service providers, or ESPs — but dangerous letters aren’t unstoppable.
Phishing links in e-mails to company employees often become active after initial scanning. But they still can and must be caught.
Cybercriminals are trying to extort money from companies by threatening to bomb their offices.
Cybercriminals have adopted the marketing tool for information collection.
The DMARC mechanism has its drawbacks, but we have developed a technology to fix them.
A detailed look at a phishing site masquerading as an e-mail scanner and its attempts to snag victims.