Phishing E-mail

Dealing with a Spoof mail attacks and Phishing mail attacks | A little story with a sad end | Part 1#9 5/5 (4)

Post Views: 5,266 In the current article, I would like to review the chain of events that occurs every time, again and again, in a scenario in which an attacker manages to execute a Phishing mail attack successfully. The reaction of the involved persons is known in advance, and the sad end of the story…

What are the possible damages of Phishing and spoofing mail attacks? | Part 2#9 5/5 (3)

Post Views: 6,893 We are living in a dangerous world that produces many types of threats and risks to our organizational mail infrastructure, to our users and us. In the current article, I would like to review some of the possible damages that we can experience in a scenario, in which Spoof or Phishing mail…

Why our mail system is exposed to Spoof and Phishing mail attacks |Part 5#9 5/5 (1)

Post Views: 4,391 Let’s start with a declaration about a strange phenomenon: Spoof mail attacks and Phishing mail attacks, are well-known attacks, and consider as a popular attack among the “hostile elements.” Most of the existing organizations, do not have effective defense mechanisms against the above attacks, and there is a high chance, at some…

Dealing with the threat of Spoof and Phishing mail attacks |Part 6#9 5/5 (2)

Post Views: 4,986 In the following article, we will review the solution and the methods that we can use for dealing with the threat of – Phishing mail attacks and his derivative Spoof mail attack. What are the Ingredients that needed for successfully dealing with the threat of attacks and Phishing and spoofing mail attacks?…