IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >  

e-Mail Fraud

RSS Feed   
e-Mail Fraud Reports
 
Spear Phishing: Top Threats and Trends
sponsored by Barracuda
RESOURCE: This report takes an in-depth look at the three most prevalent types of spear phishing attacks—brand impersonation, business email compromise, and blackmail—and examines 8 defense strategies for preventing these attacks. Read on to learn how to put these strategies to work to protect your company.
Posted: 28 May 2019 | Published: 31 Mar 2019

Barracuda

How Cyberattackers Are Exploiting COVID-19 to Undermine Your Security
sponsored by Fidelis
PODCAST: Since widespread information about COVID-19 first surfaced back at the beginning of the year, there has been a reported uptick of phishing, ransomware and misinformation campaigns designed to prey on people’s fears. Listen to this webcast for insight into attacker objectives and tactics – including specific examples.
Posted: 19 Aug 2020 | Premiered: Aug 19, 2020

Fidelis

The state of email trust in 2014
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Email security improved in 2014 but most companies still haven't done enough to protect their customers from phishing attacks, this study from Agari reveals.
Posted: 26 Feb 2015 | Published: 26 Feb 2015

ComputerWeekly.com

Evolution of Email Security
sponsored by Barracuda
WEBCAST: Ever since it became a critical tool for business communications, email has been the target of increasingly sophisticated cyberattacks. In this webinar, join Barracuda security experts as they overview the evolution of email security from early inbox threats to campaigns taking advantage of the current pandemic.
Posted: 04 May 2020 | Premiered: May 4, 2020

Barracuda

Case Study: Ledn
sponsored by Clearedin
CASE STUDY: In this case study, discover how Ledn, a cryptocurrency company, was able to achieve better email security and industry-specific compliance requirements through a partnership with CleardIn – which equipped them to better identify and prevent email-based threats. Read on for the full story.
Posted: 05 Jan 2021 | Published: 05 Jan 2021

Clearedin

How to Respond Rapidly to Emerging Cyberthreats
sponsored by ThreatQuotient
PRODUCT DEMO: Since the COVID-19 pandemic began, organization’s have had to deal with a growing volume of cyberthreats that look to take advantage of uncertainty and commotion as an entry point for their attacks. Watch this video demo to see how the ThreatQ platform handles these kinds of threats.
Posted: 21 Sep 2020 | Premiered: 21 Sep 2020

ThreatQuotient

Why Privileged Access Management Needs to Be Part of Your Virtualization Strategy
sponsored by Tehama
RESOURCE: As organizations rely more on remote capabilities for ensuring productivity during the new normal, cybercriminals have shifted their tactics to focus on this lucrative new vector. This article highlights emerging cyberthreat tactics and overviews the benefits of incorporating privileged access management (PAM) into virtualization strategies.
Posted: 21 Sep 2020 | Published: 17 Sep 2020

Tehama

Zoom & Doom: How INKY Unraveled a Credential Harvesting Phishing Scam
sponsored by Inky Technology
RESOURCE: Zoom jumped from 10 million daily meeting participants in December 2019 to 300 million this past April. This boom in Zoom use spawned a flurry of fake meeting invitations from cybercriminals attempting to harvest credentials from users. Luckily, INKY was on the case. Read this article to view these fake Zoom meeting invites and more.
Posted: 02 Oct 2020 | Published: 02 Oct 2020

Inky Technology

DNS-Layer Protection & Secure Web Gateway Security Efficacy Test Results
sponsored by Cisco Umbrella
RESOURCE: In 2019, AV-TEST, an independent IT security institute, was commissioned by Cisco to conduct a study comparing Cisco cloud security with similar industry-leading solutions to determine the malware protection and phishing block capabilities of all vendors. Read on to uncover the results.
Posted: 02 Mar 2020 | Published: 18 Feb 2020

Cisco Umbrella

Moving Beyond Ad Hoc Mobile Security
sponsored by SearchSecurity.com
EZINE: Is security the missing piece in your enterprise mobile strategy? In this issue of Information Security, we ask CISOs and other security experts about the uncertain path from basic protections to threat management and mature mobile security.
Posted: 01 Jun 2016 | Published: 01 Jun 2016

SearchSecurity.com
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info