Since Trump’s victory, the number of new users signing up for the Switzerland-based encrypted email service provider, ProtonMail, has doubled compared to the previous week, the company reported. more
The National Cybersecurity Center of Excellence (NCCoE) has invited comments on a draft practice guide to help organizations improve email security and defend against phishing, man-in-the-middle, and other types of email-based attacks. more
A new report from SecureWorks Counter Threat Unit has revealed a hacking group operating from the Russian Federation, implemented spearphishing techniques involving use of look-alike Google login pages to gain access to DNC emails and other data. more
Cloud-based interest in email infrastructure trended up this past quarter. Port25, a Message Systems Company, tracks cloud-based interest (CBIs) among large volume senders based on evaluation and purchase requests received, in conjunction with overall site engagement. In Q3, CBIs on Port25's website grew by 34.97% over Q2, to a total of 48.2% of unique evaluation and purchase requests. more
It was revealed yesterday that Yahoo has been scanning people's email for the federal government. This activity was, apparently, authorized by Yahoo CEO Marissa Meyer but not the former CSO Alex Stamos. Mr. Stamos left Yahoo in June 2015. He also publicly disagreed with the director of the NSA back in February 2015 about the NSA having access to encrypted data. more
"Massive Email Bombs Target .Gov Addresses," Brian Krebs writes in Krebs on Security: "Over the weekend, unknown assailants launched a massive cyber attack aimed at flooding targeted dot-gov (.gov) email inboxes with subscription requests to thousands of email lists." more
It's a wild election season here in the US. In the past few presidential elections, email has played a bigger and bigger role in messaging and fundraising. President Obama's campaign used email effectively, but sent huge volumes. In fact, the volume was so heavy, it led to a joke on the Daily Show... This year there is a stark difference in how the candidates are using email. more
According to a recent report by Akamai, an analysis of massive Account Takeover (ATO) attack campaigns, targeting two of its customers, revealed 1,127,818 different IPs were involved in the attacks. more
Total number of Business Email Compromise (BEC) related crimes have reached epidemic levels, at nearly $3.1 billion in losses and involving 22,143 victims worldwide since January 2015, according to a new FBI report. more
Between September of 2015 and May 2016, (last 8 months) Port25 saw almost a 30 percent jump in new cloud-based email infrastructure interest outside the United States... While most of the influential senders are not abandoning on-premises mail transfer agent (MTA) solutions, many are looking to cloud infrastructure for managing higher-volumes by bifurcating individual email streams to the cloud. more
Data solutions provider Return Path has released a new report highlighting 20 visionary ideas for brands to "futureproof" their email program. Among various insights, the report warns brands that adoption of IPv6 will result in rising dependency on domain-based reputation. more
Happy Early Memorial Day. Once an ESP or marketing automation company declares itself for sale, there seems to be a mass exodus by investors, which sends up a red flag, (well in this case, a red & white striped flag). This past week there were rumblings about the potential suitors for Marketo. While it is rumored that German company SAP is the front-runner, there are many other potential suitors circling the marketing automation software company. more
The latest discovery came while researchers at a security firm found a young Russian hacker bragging in an online forum that he had collected and was ready to give away a far larger number of stolen credentials that ended up totalling 1.17 billion records, Reuters reports. more
The U.S. House of Representatives voted unanimously today to pass H.R. 699, the Email Privacy Act, closing a loophole that allowed law enforcement authorities to obtain old email and other digital communications without a warrant from the court. more
The Internet Infrastructure Coalition (i2Coalition) has joined the Messaging, Malware and Mobile Anti-Abuse Working Group (M3AAWG) to continue efforts on developing best practices for hosting and cloud service companies as well as sharing other information that will protect end-users. more