Other technological solutions, such as digitally signed e-mail, with either desktop or gateway verification, have been proposed by such bodies as the Anti-Phishing Working Group.
Whichever mechanism becomes the standard, introducing a technological solution is a step in the right direction that will allow you to know who is sending mail to you, just as the telephone companyís Caller ID allows you to know who is calling.
Posted on 24 November 2014. | Liran Tancman is the CEO of CyActive, a predictive cyber security company. In this interview he talks about fighting malware, emerging threats, artificial intelligence and the cloud.
Posted on 24 November 2014. | Symantec researchers are warning about a new, complex cyber espionage tool that has been around for years and that has likely been created and is wielded by a nation state.
Posted on 21 November 2014. | A new survey revealed that the employers of 40% of those surveyed had suffered a major IT disruption cased by staff visiting questionable and other non-work related web sites with work-issued hardware, resulting in malware infection and other related issues.