MDaemon Technologies Blog

Phishing Email Uses Google Drive to Get Past Microsoft Security

By Brad Wyro posted in BEC, Business Email Compromise, Email Security, spear phishing, phishing, email security, spam filter

0 Comments

This week, Threatpost reported on a new spear-phishing attack that uses email sent via Google Drive claiming to be the CEO of the targeted company sharing important information with the recipients.  The email came from Google Drive, but the sender address didn't match the company's standard naming convention for email addresses.

Read More

10 Tips to Identify a Phishing Email

By Brad Wyro posted in antispam, Email How To, Email Security, malware, security, anti-spam, spear phishing, phishing, best practices, email security

0 Comments

Don’t Risk Losing your Life Savings to Scammers. Follow these 10 Tips to Identify a Phishing Email.

Whether you run a Fortune-500 organization or a small boutique, by now you should be aware of the threats posed by cyber criminals to trick you into clicking a link, downloading an attachment, or parting ways with your money.

Read More

Another day, another attempt to scam me - but I know a phishing attempt when I see one!

By Brad Wyro posted in BEC, CEO Fraud, Email Security, security, spam, phishing, email security

0 Comments

OhNo-I-clicked-2 (1)It's just a fact of life: If there's email, there will always be spam. Now, how much spam you have to deal with will depend on how good your spam filtering solution is. Here at MDaemon Technologies, we use our own products - MDaemon and Security Gateway, to filter out spam, malware, phishing attempts, and all of the other junk that often floods inboxes of users whose email server or hosted service isn't as effective.

Read More

Avoid Being a Victim in Today's Massive Ransomware Outbreak

By Brad Wyro posted in DKIM, Email Security, malware, security, anti-spam, phishing, best practices, email security

0 Comments

 

As I was coaxing myself awake this morning with my usual jolt of strong coffee, I checked my favorite news sites & was informed of yet another ransomware attack. This one, which is believed to have originated from Ukraine, was first thought to be a variation of last year's Petya ransomware outbreak, but upon further investigation, it appears that today's malware is a new type - a worm that some computer experts are referring to as "NotPetya". This attack demands a smaller ransom (in comparison to other attacks) of approximately $300, and then begins to serve its primary purpose - to wipe files on the computer. According to researchers at Symantec, this attack used the same National Security Agency hacking tool, Eternal Blue, that was used in the WannaCry outbreak, as well as two other methods to spread the attack. According to information provided by this article on CNN, if you've installed all of the latest Windows patches, you should be safe from this particular strain of malware, however, by no means is this a reason to be complacent. Administrators and end users must still be mindful of safety precautions.

Read More

SSL & TLS Best Practices

By Brad Wyro posted in Email Best Practices, Email Security, encryption, cryptography, SSL, best practices, email security, TLS, Trending

0 Comments

You may have heard the terms SSL and TLS, but do you know what they are and how they’re different?

Read More

Server-side Encryption, Decryption & Key Management with OpenPGP

By Brad Wyro posted in email, Email How To, Email Security, encryption, FERPA, pgp, security, OpenPGP, mdpgp, email security, HIPAA

0 Comments

Whether you work in health care, finance, government, or any other field that requires the storage of data, there's always someone out there who would love to gain access to your confidential records. Don't let the bad guys steal your data. Protect it with server-side encryption. Our latest release of MDaemon supports OpenPGP, which allows MDaemon to perform encryption, decryption, and key management tasks. Learn how to enable OpenPGP support in MDaemon, and how to send encrypted mail in our latest video.

Read More

Are You Receiving Replies to Messages you Never Sent?

By Brad Wyro posted in antispam, Email How To, Email Security, security, how-to, mdaemon, spam, email security, Trending

0 Comments

Image "Return to Sender"

Read More
BACK TO ALL ARTICLES

Subscribe to Email Updates