Content filtering and spam in 2022

Content filtering and spam in 2022

Content filtering When people talk spam filtering they normally think Bayesian probability theory or content scanning or spamassassin, using regular expressions or pattern matching to stop annoying email messages. The entire world of UCE and UBE, unsolicited bulk e-mail and unsolicited commercial email traffic, the sort of get rich quick schemes, or 419 Nigerian scams, or viagra or other private organ enhancement schemes have no interest in dying down even in 2022.

Continue reading What are zero day attacks?

What are zero day attacks?

Introduction In the world of E-mail, attacks are not new– they are not old. They are ever-present, sometimes we are aware of it, sometimes not. But they are always around. It is not too often that we have email linked attacks but once they occur it usually raises hell all around. And the Internet is abuzz with various compromises, threats and what not. The recent log4j compromise is one such in which people did not know a vulnerability existed till talk was out.

Continue reading E-mail security recommendations 2022

E-mail security recommendations 2022

Email security recommendations in year 2022 When it comes to how E-mail security can be enforced and attacks avoided, the world has adopted a wide variety of strategies using which we can quite comfortably guard against business email compromise or spearphishing or other forms of attack on our network assets. The ability to safeguard your corporate assets like E-mail often involves a bunch of tools and we can also leverage open source free software as well in case the system admins are technically competent.

Continue reading E-mail threat control techniques

E-mail threat control techniques

Introduction SpamCheetah is an E-mail threat control SEG. Secure E-mail gateway is the way you deploy SpamCheetah in your network and protect yourself from E-mail related attacks. Most of the network annoyances and compromises are initially spread using the medium of mail. So if you can secure mail, then it is battle won most of the time. The threats that exist at the SMTP level are always perpetrated only by humans.

Continue reading