MDaemon Technologies Blog

10 Tips to Identify a Phishing Email

By Brad Wyro posted in Email How To, Email Security, Malware, Security, Anti-Spam, Spear Phishing, Phishing, Best Practices

0 Comments

Don’t Risk Losing your Life Savings to Scammers. Follow these 10 Tips to Identify a Phishing Email.

 

Whether you run a Fortune-500 organization or a small boutique, by now you should be aware of the threats posed by cyber criminals to trick you into clicking a link, downloading an attachment, or parting ways with your money.

Read More

Another day, another attempt to scam me - but I know a phishing attempt when I see one!

By Brad Wyro posted in BEC, CEO Fraud, Email Security, Security, Spam, Phishing

0 Comments

OhNo-I-clicked-2 (1)It's just a fact of life: If there's email, there will always be spam. Now, how much spam you have to deal with will depend on how good your spam filtering solution is. Here at MDaemon Technologies, we use our own products - MDaemon and Security Gateway, to filter out spam, malware, phishing attempts, and all of the other junk that often floods inboxes of users whose email server or hosted service isn't as effective.

Read More

Best Practices to Avoid Business Email Compromise & CEO Fraud Attacks

By Brad Wyro posted in Email Best Practices, Email Security

0 Comments

 

In part one of our three-part series on Business Email Compromise (BEC), I explained what a BEC attack is and provided examples and statistics. As you’ll recall from the examples discussed, businesses have suffered staggering losses to these attacks, and while users are becoming more aware of them, their own human nature dictates that these threats will continue. In fact, a recent report by Get Safe Online indicated that over a third (37%) of employees don’t know what to look for to identify common email scams. The report also stated that one in 20 email fraud victims were so ashamed that they hid their mistakes from their colleagues.

Read More

Four-Step Swindle: The Anatomy of a Business Email Compromise Attack

By Brad Wyro posted in BEC, Business Email Compromise, CEO Fraud, Email Security, Spear Phishing, Phishing, Trending

0 Comments

This week, we continue our series on Business Email Compromise. Click here to read Part 1, which includes an overview and various statistics on this growing threat.

Read More

10 Ways to Reduce Spam in Your Inbox

By Brad Wyro posted in Email Security, Reduce Spam, Spam, Spam Management, Spambot

0 Comments

 

Before the invention of email, mail that arrived in your physical mailbox often contained pamphlets, sales brochures, credit card offers, and product catalogs. Much of this waste was thrown away and ended up in a landfill somewhere. Today, the equivalent and often more annoying nuisance is spam. Spam comes in many forms, and has evolved from dubious product claims, miracle supplements, conspiracy theories, and offers of easy money to more malicious threats such as ransomware attacks and targeted spear-phishing.

Read More

Encrypting vs. Signing with OpenPGP. What’s the Difference?

By Brad Wyro posted in Email Gateway, Email How To, Email Security, Encryption, OpenPGP, Email Encryption

2 Comments

 

Many businesses are responsible for maintaining large amounts of confidential data, including customer records, medical records, financial reports, legal documents, and much more. It’s very common for these types of information to be transmitted via email. So how can you ensure confidential data transmitted via email is kept private? How can you ensure the integrity of transmitted data?

Read More

Avoid Being a Victim in New Massive Ransomware Outbreak

By Brad Wyro posted in DKIM, Email Security, Malware, Security, Anti-Spam, Phishing, Best Practices

0 Comments

 

As I was coaxing myself awake this morning with my usual jolt of strong coffee, I checked my favorite news sites & was informed of yet another ransomware attack. This one, which is believed to have originated from Ukraine, was first thought to be a variation of last year's Petya ransomware outbreak, but upon further investigation, it appears that today's malware is a new type - a worm that some computer experts are referring to as "NotPetya". This attack demands a smaller ransom (in comparison to other attacks) of approximately $300, and then begins to serve its primary purpose - to wipe files on the computer. According to researchers at Symantec, this attack used the same National Security Agency hacking tool, Eternal Blue, that was used in the WannaCry outbreak, as well as two other methods to spread the attack. According to information provided by this article on CNN, if you've installed all of the latest Windows patches, you should be safe from this particular strain of malware, however, by no means is this a reason to be complacent. Administrators and end users must still be mindful of safety precautions.

Read More

Steps to Track Spam Sent Out From a Local Machine on Your Network

By Brad Wyro posted in Email How To, Email Security, Security, Anti-Spam, How-To, Tutorial, Spampot, Trending

0 Comments

 

Has this happened to you? Let’s say you’re the MDaemon administrator for your company, and you’ve noticed that somewhere, somehow, spam messages are being sent from within your network. Perhaps one of your PCs has been compromised. What do you do? Here are some tips to help you track the issue down.

Read More

18 Email Safety Tips Every User Should Know

By Brad Wyro posted in Email Best Practices, Email Security

0 Comments

Read More

Follow These 13 Tips to Avoid Being Blacklisted

By Brad Wyro posted in Email Best Practices, Email Security, Trending

0 Comments

 

With the prevalence of spam circulating the globe in massive amounts, it becomes increasingly important for administrators to understand the potential causes of their IP address ending up on a blacklist. Spammers employ all kinds of tricks to try to send out as many spam messages as possible without revealing their identities. They do this through various techniques such as social engineering, employing malware, botnets, forging of message headers, and exploiting weaknesses in email systems or network infrastructures. For the spammer, it’s basically a numbers game. It costs next to nothing to send out thousands of spam messages, and if even a small handful of people click on a link or purchase a product advertised in a spam message, the spammer can profit.

If your email infrastructure is not properly secured, then you risk being infected with malware and becoming part of a spam botnet. Even if your server is not infected with malware, if your firewall and mail server security settings are not configured properly, your IP address could wind up on a blacklist. To protect yourself from being blacklisted, consider the following recommendations:

 

Read More
BACK TO ALL ARTICLES

Subscribe to Email Updates

Lists by Topic

Posts by Topic