The Email Security Blog

WannaCry header photo

WannaCry Ransomware – What You Need to Know

WannaCry Ransomware – Update Four days after one of the biggest cybersecurity attacks in recent memory, the WannaCry crisis has begun to slow down. The initial malware is being sinkholed and IT professionals are installing vital patches to their machines … Read More

Featured Post
NHS Ransomware Header Photo

NHS Ransomware Attack – Breaking News [UPDATED]

Ransomware Attack on the NHS Across the UK, hospitals and GPs are experiencing widespread IT failures due to a form of ransomware that has effected the National Health Service (NHS). Tweets by NHS employees and other health officials show screenshots … Read More

Featured Post
Whatsapp outage email continuity importance for business

WhatsApp Outage – The Importance of Continuity in Business

Millions of users were left disappointed Wednesday when they realized that WhatsApp, one of the most popular messaging apps on the market, was down due to an outage. Users of Facebook-owned, WhatsApp, were left upset and message-less on Wednesday when … Read More

Featured Post
Google Docs Phishing Scam Email Header Photo Blog May 4th

How the Google Docs Phishing Scam Bypassed Email Security

The latest phishing scam going around has tricked over a million google users into giving the scammers permission to their Gmail account, contacts, passwords, and emails. On Wednesday evening, reports of a new sophisticated Gmail phishing attack started to flood … Read More

Featured Post
homograph phishing scam browers tricked

The New Phishing Scam Tricking Your Browser

Phishing attacks aim to trick users into giving away their personal information by forging emails from various organizations and individuals. But what happens when it’s not just the user being tricked? Chinese security researcher, Xudong Zheng, recently revealed that popular … Read More

Featured Post
harvard blog buliding email problem spear phishing

Harvard’s Email Problem – Spear Phishing

In late February, Harvard University revealed it had a huge issue; more than 1.4 million emails were open to the public. As one of the most prestigious universities in the world, students and teachers alike had no idea the information they … Read More

Featured Post
24 hour domain name importance

The First 24 Hour hours of a domain and Phishing

This image is from Webroot’s “Threat Report 2017” and the message is obvious. 84% of Phishing sites last less than 24 hours. This information also applies to domains registered to spread new strains of malware and domains used in whaling(targeted … Read More

Featured Post
enisa threat landscape 2016 report

Leading Cyber Threats – ENISA Threat Landscape 2016

ENISA Threat Landscape 2016 As cyber crime continues to grow in both numbers and sophistication, a troubling trend of optimization has emerged over the last year. According to the ENISA Threat Landscape 2016, cyber criminals are no longer content with … Read More

Featured Post
disc-theroy applied email etiquette learn more

William Moulton Marston’s DISC Matrix applied to Email Etiquette

Email Etiquette Preparing an email is something we should all take special care with – especially when the email is for somebody you may not know very well. The pressures of everyday working life stacked with a hectic office environment … Read More

Featured Post