Passwords at risk for users who fall for Eileen’s cousin’s voicemail

Security researchers are warning of a new wave of phishing emails which are using an unusual disguise in their attempt to both bypass scanners at email gateways and dupe unsuspecting users.
Read more in my article on the Tripwire State of Security blog.
Continue reading Passwords at risk for users who fall for Eileen’s cousin’s voicemail

Rendering Suspicious EML Files

Sometimes, a security incident starts with an email. A suspicious email can be provided to a security analyst for further investigation. Most of the time, the mail is provided in EML or “Electronic Mail Format“. EML files store the complete message in a single file: SMTP headers, mail body and all

[The post Rendering Suspicious EML Files has been first published on /dev/random]

Continue reading Rendering Suspicious EML Files