IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >  

Email Fraud

RSS Feed   
Email Fraud White Papers (View All Report Types)
 
Understanding Phishing: Text Direction Deception!
sponsored by Inky Technology
WHITE PAPER: Phishing scams continue to evolve, and attackers apply an ever-growing bag of tricks to fool recipients as well as email protection tools. In this edition of Understanding Phishing, the cybersecurity experts at INKY dissect a recently uncovered tactic which uses Cascading Style Sheets (CSS) to bypass security protocols by mixing scripts.
Posted: 30 Sep 2020 | Published: 30 Sep 2020

Inky Technology

The Definitive Email Security Strategy Guide: A People-Centric Approach to Stopping Malware, Phishing, and Email Fraud
sponsored by Proofpoint
WHITE PAPER: With 94% of external cyber threats start with email, organizations need to ensure that their email security strategy can keep pace with this growing threat landscape. This white paper explores a new, people-centric approach to email security and provides you with a comprehensive guide for implementing this approach (including a checklist).
Posted: 05 Jun 2020 | Published: 05 Jun 2020

Proofpoint

Spear Phishing vol3: Top Threats and Trends: Defending against business email compromise attacks
sponsored by Barracuda
WHITE PAPER: Business email compromise (BEC) is an emerging cybersecurity threat that targets user inboxes. While BEC makes up just 7% of spear-phishing attacks, it’s responsible for over $26 billion in losses in the last four years. In this report, explore the latest BEC tactics used by scammers and best practices for protecting your organization.
Posted: 18 May 2020 | Published: 30 Nov 2019

Barracuda

Spear Phishing vol4: Impersonations are increasingly more common, sophisticated and targeted.
sponsored by Barracuda
WHITE PAPER: Spear phishing, alongside other impersonation attacks, are on the rise, and new tactics are making it more difficult to differentiate between an impersonation attempt and a genuine message. Read on to discover the top 3 spear phishing impersonation attacks to keep an eye on.
Posted: 23 Dec 2020 | Published: 23 Dec 2020

Barracuda

Invisible Characters
sponsored by Inky Technology
WHITE PAPER: Similar to hidden text and zero font, invisible characters is a phishing tactic designed to obscure text in order to bypass secure email gateways (SEGs). Read this edition of Understanding Phishing for a full breakdown of invisible text – including real-world examples and best practices for stopping it.
Posted: 06 Oct 2020 | Published: 06 Oct 2020

Inky Technology

Agile software testing pioneer slams the door on C-level email attacks
sponsored by Barracuda
WHITE PAPER: Learn how Tricentis, an automated software testing company, was able to thwart spear-phishing and fraud attacks against senior staff.
Posted: 07 Jun 2019 | Published: 07 Jun 2019

Barracuda

Global Threat Research Report: Russia
sponsored by VeriSign, Inc
WHITE PAPER: This report takes an in-depth look at the security threat the Russian Business Network (RBN) is to North American-based enterprise businesses. Learn more about their current infrastructure, its corruption, and the impact the RBN has on business today.
Posted: 16 Nov 2007 | Published: 10 Jan 2007

VeriSign, Inc

Phishing and Web Security
sponsored by Webroot
WHITE PAPER: This brief whitepaper explores why businesses need to prepare for phishing 2.0 and why this new cybercrime is aiming its sights at your business.
Posted: 29 Apr 2014 | Published: 31 Dec 2013

Webroot

The Trouble Heading for Your Business 2013
sponsored by Trend Micro
WHITE PAPER: This resource details the current state of targeted attacks and explores why putting an effective defensive strategy in place is so critical. View now to uncover the effects of these potentially disastrous attacks and what you can do to stay protected.
Posted: 16 Apr 2013 | Published: 28 Feb 2013

Trend Micro

The Bot Threat
sponsored by Hewlett-Packard Enterprise
WHITE PAPER: In this white paper, get vital information about the malicious bot, also known as botnets when in large forces, and explore 4 key features that will help you build a defence-in-depth security system to prevent these attacks from compromising your networks.
Posted: 13 May 2014 | Published: 30 Nov 2012

Hewlett-Packard Enterprise
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences