Phishing and Email Fraud Protection

Email Alerts

Register now to receive SearchExchange.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • A more secure Exchange Server is within reach

    Securing Exchange Server is crucial for maintaining the end-user experience and protecting the enterprise. 

  • Guide: Tightening Exchange Server security

    Exchange Server is susceptible to a range of different security threats. We’ve compiled our top tips to help protect you from these vulnerabilities and risks. 

  • Microsoft Outlook and Exchange Server 2003 Email Security Guide

    Protect Microsoft Outlook and Exchange Server 2003 from threats like spam, viruses, phishing and hackers with this email security guide for administrators. 

  • A Microsoft Outlook email security tutorial -- 8 tips in 8 minutes

    Become a Microsoft Outlook security expert! Excerpted from "Secure Messaging with Microsoft Exchange 2003," by Paul Robichaux, this tutorial will teach you how to use a wide range of Microsoft Outlook email security features, including the Outlook se... 

  • Phishing protection primer

    Don't let your company fall victim to phishing scams. Learn about the latest techniques phishers are using to steal business data and dollars. Also discover how you can minimize the risk of phishing attacks on Exchange Server and Microsoft Outlook cl... 

  • Phishing exposed -- 10 tips in 10 minutes

    A must read for programmers and administrators responsible for system security, this collection of 10 tips from Phishing Exposed, by Lance James, will teach you how to prepare for and defend against phishers and spammers. You'll learn tricks o... 

  • Fake Microsoft patch email sends users to Trojan Horse

    A bogus patch update claiming to be from Microsoft is the latest phishing scam to keep IT managers on their toes. 

  • IETF approves new weapon to fight spam, phish

    DomainKeys Identified Mail specification (DKIM) gained approval as an official IETF standard. The approval is seen as a major step in the fight against spam and phishing attacks. 

  • Phishing risk seen in new IE 7 flaw

    Microsoft said it is investigating a flaw in Internet Explorer 7 (IE 7) attackers could exploit to launch phishing expeditions. 

  • Phishing: A whale of a problem for enterprises

    Phishing is no longer just a consumer problem, say experts. The scams are hurting companies' reputations and bottom lines. 

  • Three ways phishers are hooking you

    Researchers say the bad guys are getting a lot better at catching users on the phishing hook. Three methods are of particular concern. 

  • New phishing threat outpaces Netsky-P

    A new phishing threat targeting clients of a German-based bank is surpassing global detections of the prolific Netsky-P malware. 

  • PhishTank casts its net for malicious email

    PhishTank, a new information clearinghose for phishing attack data, not only archives suspected and confirmed phishing emails, but also enables contributors submit and access data. 

  • Phishing secrets revealed

    Get an overview of how phishing threatens Exchange Server from a leading authority on phishing technology, and learn what you need to do to protect your data. 

  • SMS phishing is here

    Phishing attacks are no longer limited to email. Recently, researchers uncovered phishing scams using SMS, and mobile experts say enterprises should be wary of these so-called SMiShing scams. 

  • Online crime as ugly as ever

    At this year's Conference on Email and Antispam, one expert said that despite the increasing complexity of online scams and attacks, digital criminals are less about the technology and more about the crime. 

  • See more News on Phishing and Email Fraud Protection
  • Vouch by Reference (VBR)

    Vouch By Reference (VBR) is a protocol for adding third-party certification to email. The first part of the protocol requires the sender to add information to their email header by creating a field called VBR-Info. 

  • greylist (or graylist)

    A greylist (also spelled graylist) is a list of e-mail addresses or domain names that a spam filter uses to identify suspected spam. If a message arrives from an address or domain on the list, it will be quarantined and then delivered to the subscri... 

  • Sender ID

    Sender ID is Microsoft's proposed e-mail sender authentication protocol designed to protect against domain spoofing and phishing exploits. 

About Phishing and Email Fraud Protection

Phishing threats continue to rise and the scams are getting more sophisticated. Learn how to prevent phishing attacks and protect yourself from email fraud with these tips and antiphishing software tools.