Email

Email | News, how-tos, features, reviews, and videos


template c100.00 03 35 22.still001
video

An introduction to Kit Hunter, a phishing kit detector | Salted Hash Ep 40

Kit Hunter, a basic Python script written by host Steve Ragan, searches on common tag elements to find hidden phishing kits on a web server.

salted hash thumbnail multi final
video

Conversation hijacking attacks | Salted Hash Ep 38

Troy Gill, manager of security research at AppRiver, explains conversation hijacking attacks, or CHAs, with host Steve Ragan, including who is typically targeted and how to prevent them.

salted hash thumbnail multi final
video

Phishing problems: 3.2M emails blocked in a month | Salted Hash Ep 37

Asaf Cidon, vice president of email security at Barracuda Networks, talks with host Steve Ragan about a recent uptick in phishing attacks, including a spike in business email compromise (BEC) attacks.

ipad at the beach

We can rebuild vacations – we have the technology

Email may be hurting our ability to take a stress-free vacation, especially for millennials and women. Cloud collaboration helps keep projects moving forward, even when vital team members are disconnected.

gmaillogo

Gmail as a productivity tool for small businesses

The popularity of Gmail has spawned a host of third party tools that help small business owners up their productivity and increase business. As a small business owner, here are a few productivity areas you must consider investing in.

CSO slideshow - Insider Security Breaches - Spam email identified

What to look for when choosing an email service provider for your small- or medium-sized business

As a CIO, it is important to weigh in the technological and operational perspectives before you choose the right provider for your organization.

tin can phone thinkstockphotos 76756624

Follow the 'no scroll' rule with email

Here are some rules to follow when using email to communicate at work. Rule No. 1: Be concise; email messages should fit on a single screen.

spear fishing

How to stop spear-phishing cold

By now, the shape of many major hacks is apparent. They start with a targeted attack on an individual email account, and, once inside, spread to the rest of the organization. Current standards vouch only for the sending email server,...

Load More
You Might Also Like