Business Email Compromise (BEC) is a serious matter. This email-borne hacking technique presents a radically more sophisticated version of the age-old “Nigerian Prince” scam. BEC targets businesses that regularly perform wire transfer payments to foreign entities. According to the FBI, the attacker uses a phishing approach, “Compromising legitimate business e-mail accounts through social engineering or [...]
Spear phishing is deadly, from a security perspective. With the stakes so high, see how the use of heuristics can help to assess whether an email is a spear phishing attack or just another harmless work-related communication.
The problem of inbox clutter is eternal. Various solutions on the market today don’t solve this problem, and according to Gartner, 82% of users are not satisfied with the solutions they have installed. 5 Tips on How to Keep Your Inbox Clutter-Free Inbox statistics of residential account - Love Your Emails Vade Secure [...]