IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >  

e-Mail Spoofing

RSS Feed   
e-Mail Spoofing Reports
 
Spear Phishing Attacks: The #1 Cyberthreat
sponsored by Inky Technology
RESOURCE: Spear phishing is the most popular email fraud and scam method used today. In this blog, learn how a spear phishing attack works and how organizations can prevent it.
Posted: 26 Jun 2019 | Published: 26 Jun 2019

Inky Technology

Top 10 Ransomware from 2017
sponsored by Versa Networks
RESEARCH CONTENT: Discover the top 10 ransomware attacks of 2017 in Versa Network's Threat Research Lab report. This report analyzes the ransomware lifecycle and takes a look at the attacks that negatively impacted businesses worldwide.
Posted: 20 Sep 2018 | Published: 20 Sep 2018

Versa Networks

Email Security Risk Assessment
sponsored by Mimecast
RESEARCH CONTENT: Many email security systems today fall short and do not keep their organizations safe. In fact, the proof is in the numbers. Download the Email Security Risk Assessment to see how Mimecast discovered the number and type of unwanted and dangerous emails missed by incumbent email security systems.
Posted: 12 Apr 2019 | Published: 12 Apr 2019

Mimecast

Corralling Email-Based Threats To Keep Them Out Of Users' Mailboxes
sponsored by Proofpoint
CASE STUDY: When Agri-Marché started seeing more and more email threats in employees' inboxes, the food company needed an email security platform that would secure 5 email domains and protect 300 inboxes. In this case study, learn how Agri-Marché was able to do this by deploying Proofpoint Email Protection and Proofpoint Target Attack Protection.
Posted: 06 Jun 2019 | Published: 06 Jun 2019

Proofpoint

State of the Internet: Financial Services Attack Economy
sponsored by Akamai Technologies
WHITE PAPER: The financial service industry faces a wide area of cybersecurity threats, including password problems, phishing, mobile application attacks, and more. Being aware of the most current attack trends can be critical for the security of sensitive data. This research report breaks down the specific challenges and threats within the industry.
Posted: 27 Dec 2019 | Published: 31 Jul 2019

Akamai Technologies

Mobile Phishing Killchain
sponsored by Lookout Inc.
RESOURCE: To an attacker looking to execute a phishing attack, mobile devices are an easy target. Continue to this infographic, which follows the lifecycle of a mobile phishing attack from inception to data breach and discover the security measures that could’ve been taken.
Posted: 09 Jan 2020 | Published: 09 Jan 2020

Lookout Inc.

How to Handle Phishing Threats That Bypass Email Security Technology
sponsored by PhishLabs
WHITE PAPER: The scope of phishing attacks has evolved beyond email over recent years to malicious attempts within any digital medium. In this white paper, take a closer look at modern phishing tactics, where they’re likely to strike and best practices for mitigating these threats.
Posted: 17 Feb 2020 | Published: 17 Feb 2020

PhishLabs

Understanding Phishing Attacks: Confusable Domains
sponsored by Inky Technology
WHITE PAPER: Phishing scammers are nothing if not clever. There has been a constant stream of devious innovation from attackers. One technique that attackers commonly use is confusable domains. In this white paper, learn how confusable domains work and how INKY Phish Fence can prevent confusable domain attacks at your organization.
Posted: 28 Jun 2019 | Published: 28 Jun 2019

Inky Technology

The Bot Threat
sponsored by Hewlett Packard Enterprise
WHITE PAPER: In this white paper, get vital information about the malicious bot, also known as botnets when in large forces, and explore 4 key features that will help you build a defense-in-depth security system to prevent these attacks from compromising your networks.
Posted: 01 Feb 2015 | Published: 13 Nov 2013

Hewlett Packard Enterprise

Moving Beyond Ad Hoc Mobile Security
sponsored by SearchSecurity.com
EZINE: Is security the missing piece in your enterprise mobile strategy? In this issue of Information Security, we ask CISOs and other security experts about the uncertain path from basic protections to threat management and mature mobile security.
Posted: 01 Jun 2016 | Published: 01 Jun 2016

SearchSecurity.com
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info