MDaemon Technologies Blog

Phishing Email Uses Google Drive to Get Past Microsoft Security

By Brad Wyro posted in Business Email Compromise, Email Security, Stop Spam Email, Spear Phishing, Phishing

0 Comments

This week, Threatpost reported on a new spear-phishing attack that uses email sent via Google Drive claiming to be the CEO of the targeted company sharing important information with the recipients.  The email came from Google Drive, but the sender address didn't match the company's standard naming convention for email addresses.

Read More

Not Today, Scammer! Today's Phishing Attempt

By Brad Wyro posted in Email Security, Cybersecurity, Stop Spam Email, Phishing

0 Comments

A brief glance through my Spam folder in MDaemon Webmail today reminded me of the need for on-going education on the topic of phishing and Business Email Compromise (BEC) scams. Because businesses have already lost millions of dollars to these scams and continue to fall victim every day, it bears repeating that, while spam filters and secure email gateways continue to improve, no solution is 100% fool-proof.

Read More

10 Tips to Identify a Phishing Email

By Brad Wyro posted in Email How To, Email Security, Cybersecurity, Stop Spam Email, Spear Phishing, Phishing, Email Security Best Practices

0 Comments

Don’t Risk Losing your Life Savings to Scammers. Follow these 10 Tips to Identify a Phishing Email.

 

Whether you run a Fortune-500 organization or a small boutique, by now you should be aware of the threats posed by cyber criminals to trick you into clicking a link, downloading an attachment, or parting ways with your money.

Read More

Another day, another attempt to scam me - but I know a phishing attempt when I see one!

By Brad Wyro posted in Business Email Compromise, Email Security, Cybersecurity, Stop Spam Email, Phishing

0 Comments

OhNo-I-clicked-2 (1)It's just a fact of life: If there's email, there will always be spam. Now, how much spam you have to deal with will depend on how good your spam filtering solution is. Here at MDaemon Technologies, we use our own products - MDaemon and Security Gateway, to filter out spam, malware, phishing attempts, and all of the other junk that often floods inboxes of users whose email server or hosted service isn't as effective.

Read More

Four-Step Swindle: The Anatomy of a Business Email Compromise Attack

By Brad Wyro posted in Business Email Compromise, Email Security, Spear Phishing, Phishing, Email Security Trends

0 Comments

This week, we continue our series on Business Email Compromise. Click here to read Part 1, which includes an overview and various statistics on this growing threat.

Read More
BACK TO ALL ARTICLES

Subscribe to Email Updates