This resource is no longer available

What E-Mail Hackers Know That You Don't

Cover
E-mail systems such as Microsoft Exchange, Lotus Notes and GroupWise were constructed with a single purpose in mind: accept and send the maximum amount of mail, and route that mail as efficiently as possible. Without question this has succeeded; e-mail is the most commonly utilized business communication tool on the planet, and its use is projected to continue to rise.

However, e-mail's continually burgeoning popularity makes it an attractive target for individuals seeking to do harm, either for their own personal satisfaction, or more likely, for financial gain. Download CipherTrust's free white paper to learn how hackers are exploiting vulnerabilities in e-mail systems, and what widely available hacking tools they use to do it. This white paper is written to educate IT security managers on the security challenges they face.

Vendor:
CipherTrust, Inc.
Posted:
28 Oct 2005
Published:
31 Dec 2005
Format:
PDF
Length:
7 Page(s)
Type:
White Paper
Language:
English

This resource is no longer available.