Each day more than 100 billion corporate email messages are exchanged1. Who doesn’t need to do a little housekeeping and eliminate unwanted emails? But you need to think twice before you click on “unsubscribe.” As you likely read in the 2015 Cisco
If you read the recently released Cisco Annual Security Report, you will have learned how spammers have adopted a “Snowshoe” strategy, using a large number of IP addresses with a low message volume per IP address, to send spam, preventing some spam
This post is co-authored by Jaeson Schultz and Craig Williams. Every so often, we observe certain spam campaigns that catch our interest. On August 15, we observed a particular spam campaign that caught our attention because it was using
Overview Phishing attacks use social engineering in an attempt to lure victims to fake websites. The websites could allow the attacker to retrieve sensitive or private information such as usernames, passwords, and credit card details. Attacks of this
We in IT are faced with many challenges from our end users. From IT costs to application performance, while always keeping an eye on our network security posture. This reminds me of a sign on the wall of my auto mechanic’s shop: Good, Fast
In recent weeks, the volume of malicious email carrying attachments has increased substantially. To entice recipients into opening those attachments, attackers are employing pitches across a wide range of subjects. In doing so, they are defeating the
Please visit Cisco’s TechEd web site to learn more about what we have going on at the show and visit www.cisco.com/go/microsoft to learn more about Cisco’s Microsoft capabilities. I first attended Microsoft TechEd in 1996 in Los Angeles. What a