In a world full of spamming, phishing and other fraudulent behavior, even the most battle-tested spam investigators are hard-pressed to assess whos to blame and whos been framed.
Achieving deliverability, otherwise known as getting email delivered to a users inbox in a timely and fully-functional fashion, is both an art and a science.
Undertaking the sometimes daunting task of deploying authentication provides a great excuse for IT managers to begin tackling the sprawling beast that is today's modern corporate email infrastructure.
A new survey shows that more than half of businesses now use an email authentication scheme. Those that dont are starting to lose a competitive advantage.
Certain email snafus can be fatal to the effectiveness of a company's entire email strategy and can tarnish the goodwill associated with their good name.
If you manage email systems and arent familiar with DKIM, you may still have time to learn about it. But you dont have the luxury of ignoring it.
A new security service promises a shorter airport check-in, but an expert user isnt thrilled by it.
What happens in Las Vegas stays in Las Vegas, unless it spotlights how companies are tearing down the last remaining personal data protections.
The author reports on the recent FTC "Spam Summit," and contrasts it with a similar event he attended ten years ago.
A new report claims Google has an entrenched hostility to privacy. Does the search giant need a Chief Privacy Officer?
New recommendations, and some that fall into the should have been done correctly in the first place category.
As the federal government moves more of its tax filing and preparation process online, several dangers loom, argues a security expert.
A security expert argues that in the wake of the HP case, we must face a shocking truth: sometimes invasion of privacy is merely a petty crime.
An endless series of meaningless choices does not equal privacy, argues a security expert. Nor will they equal security for Vista.
Ever wonder what mistakes are in your medical records? Even worse: fraudsters are using these mistaken records to con the healthcare system.
American businesses lobbying for lax security regulations should look at Europes example to see the economic value of tighter rules.
Is your company violating spam laws like Yesmail did? Even an unwitting violation can result in a fine.
In the rush to ride the Web 2.0 wave, too many companies are ignoring the fundamentals of security and privacy.
There always will be executives whose propensity for sniveling pettiness will drive them to do stupid things.
AOL's recent stumble publicly debunks any myths about the protective power of anonymizing search data.
If may seem as if there is more data theft today than ever, but impressions -- and high-profile media coverage -- can be deceiving.
Before consumers and businesses can entrust valuable data to an online service like Google Spreadsheets, privacy and security questions must be answered.
If there are any heroes to emerge from the NSA phone-data case, among them may be Qwest's lawyers for standing firm against government officials.
eSecurityPlanet Columnist Ray Everett-Church says the case against Datran Media serves as a good warning. Knowingly buying an ill-gotten email list could leave you liable.
- Nov 2008
- Sep 2008
- Mar 2008
- Feb 2008
- Dec 2007
- Nov 2007
- Oct 2007
- Sep 2007
- Aug 2007
- Jul 2007
- Jun 2007
- May 2007
- Apr 2007
- Mar 2007
- Feb 2007
- Jan 2007
- Dec 2006
- Nov 2006
- Oct 2006
- Sep 2006
- Aug 2006
- Jul 2006
- Jun 2006
- May 2006
- Apr 2006
- Mar 2006
- Feb 2006
- Jan 2006
- Dec 2005
- Nov 2005
- Oct 2005
- Sep 2005
- Aug 2005
- Jul 2005
- Jun 2005
- May 2005
- Apr 2005
- Mar 2005
- Feb 2005
- Jan 2005
- Dec 2004
- Nov 2004
- Oct 2004
- Sep 2004
- Aug 2004
- Jul 2004
- Jun 2004
- What are the top Android security apps?
- What are the top Android security risks?
- What are today's top cyber threats?
- What's the most secure way to delete data?
- How does hard drive encryption work?
- Is old software inherently insecure?
- Are Macs immune to malware?
- How can BYOD risk be managed?
- Which web browser is the most secure?
- How do I protect my iOS device?
- What are the top iPhone security apps?
- How do I secure my wireless network?
- Are public Wi-Fi hotspots safe?