715 Results for:SPAM

  • Sort by: 

Types of ransomware and a timeline of attack examples

By Sharon Shea, Isabella Harford 31 Aug 2023

There are eight main types of ransomware but hundreds of examples of ransomware strains. Learn how the ransomware types work, and review notable ransomware attacks and variants. Read More

Exchange Online post-migration steps for admins

By Helen Searle-Jones 20 Jul 2023

A move to the hosted email platform is an opportunity to streamline how users work with other Microsoft 365 services. But it requires IT to stay current with the product roadmap. Read More

Exploitation of Barracuda ESG appliances linked to Chinese spies

By Alex Scroxton 15 Jun 2023

Intelligence from Mandiant links exploitation of a flaw in a subset of Barracuda ESG appliances to a previously untracked China-nexus threat actor Read More

Top 10 types of information security threats for IT teams

By TechTarget Contributor 29 Jan 2024

Know thine enemy -- and the common security threats that can bring an unprepared organization to its knees. Learn what these threats are and how to prevent them. Read More

How Musk's Twitter takeover could affect business accounts

By Bridget Botelho 28 Oct 2022

Potential changes to Twitter's advertising and security policies are top issues for business owners who rely on the social media platform for brand visibility and sales. Read More

Malware vs. ransomware: What's the difference?

By Andy Patrizio 31 Aug 2023

Ransomware is a type of malware, or malicious software. While all ransomware is malware, not all malware is ransomware. Read More

Emotet tests new tricks to thwart enhanced security

By Alex Scroxton 26 Apr 2022

The operators of the Emotet botnet seem to be trying to find a way to get around recent changes made by Microsoft to better protect its users Read More

Top blockchain attacks, hacks and security issues explained

By Jessica Groopman 07 Jun 2023

Blockchain is an attractive target for malicious actors. From blockchain-specific attacks to human vulnerabilities to lack of regulations, these are the top blockchain issues. Read More

Proofpoint Enterprise Protection: Product overview

By Karen Scarfone 30 Dec 2015

Expert Karen Scarfone examines the Proofpoint Enterprise Protection email security gateway product, which scans inbound and outbound email messages for malware, phishing and spam threats. Read More

Carrier UCaaS services extend cloud communication benefits

By Irwin Lazar 10 Nov 2022

UCaaS is becoming more popular as carriers roll out more sophisticated and integrated packages to users. Learn why it might make sense to consolidate your vendors. Read More