Checkpoint Email

40% of the World’s Mobile Devices are Inherently Vulnerable. Is your Corporate Data at Risk?

These days you use your smartphone to do your job more than ever before. You might be as careful as one can be, but what if your phone is inherently vulnerable to exploits you are not aware of? In research dubbed “Achilles,” the Check Point Research team has found over 400 vulnerabilities in one of […]

40% of the World’s Mobile Devices are Inherently Vulnerable. Is your Corporate Data at Risk? Read More »

Spotting the threat – 13 types of email threats

1. Account takeover (ATO) Account takeover is a form of identity theft and fraud, where a malicious third party successfully gains access to a user’s account credentials. Cybercriminals use brand impersonation, social engineering, and phishing to steal login credentials and access email accounts. Once the account is compromised, hackers monitor and track activity to learn

Spotting the threat – 13 types of email threats Read More »