Global DMARC adoption still slow, it’s open season for phishers

92 percent of U.S. Fortune 500 companies have left their customers, partners and brand names vulnerable to domain name spoofing, one of the most common digital deception attack vectors, according to Agari. “It is unconscionable that only eight percent of the Fortune 500, and even fewer government organizations, are protecting the public against domain name spoofing,” said Patrick Peterson, founder and executive chairman, Agari. “Phishing and other forms of digital deception are preventable, and the … More Continue reading Global DMARC adoption still slow, it’s open season for phishers

Most large companies don’t use standard email security to combat spoofing

Only a third of Fortune 500 companies deploy DMARC, a widely-backed best-practice security measure to defeat spoofing — forged emails sent by hackers — and fewer than one-in-10 switch it on, according to a new survey. The survey, carried out by email security company Agari via an exhaustive search of public Internet records, measured the use of Domain-based Message Authentication, Reporting and Conformance, or DMARC. “It is unconscionable that only eight percent of the Fortune 500, and even fewer [U.S.] government organizations, are protecting the public against email domain spoofing,” said Patrick Peterson, founder and executive chairman, Agari. A similar survey of federal government agencies earlier this month, by the Global Cyber Alliance, found fewer than five percent of federal domains were protected by switched-on DMARC. The Agari survey found adoption rates similarly low among companies in the United Kingdom’s FTSE and Australia’s ASX 100. DMARC is the industry standard measure to prevent hackers from spoofing emails […]

The post Most large companies don’t use standard email security to combat spoofing appeared first on Cyberscoop.

Continue reading Most large companies don’t use standard email security to combat spoofing

Ransomworm: The birth of a monster

The last few weeks have seen two substantial attacks: one massive phishing attack that leveraged Google Apps and which tricked recipients to give OAuth access to their email accounts, and a large-scale ransomware attack that blanketed almost 100 countries a week later. Now, consider the likely marriage of these two attacks, and the monster that would result from this unholy matrimony: the ransomworm. You can predict the future – at least in cases relating to … More Continue reading Ransomworm: The birth of a monster

Know your enemy: Defining the new taxonomy of malicious emails

Just as it is the default tool for most businesses, email’s capacity for rapid, mass communication has made it a favourite instrument of criminals. As a result, malicious emails have become a common occurrence in most consumer and business inboxes. Although chances are that most people will correctly identify the most common malicious emails as fraudulent, many will fail to correctly identify sophisticated email attacks as unsafe. Familiarity can breed contempt, and all users are … More Continue reading Know your enemy: Defining the new taxonomy of malicious emails