BeyondTrust

Security in Context: The BeyondTrust Blog

Welcome to Security in Context

Bringing you news and commentary on solutions and strategies for protecting critical IT infrastructure in the context of your business.

NBC Chicago Interviews Marc Maiffret on Email Security

Posted May 1, 2012    Sarah Lieber

Recently, Marc Maiffret was interviewed on NBC Chicago about the security risks involved when unsubscribing from emails and how to best avoid being compromised by email spam (it does make up 80% of all email traffic in the United States, after all). Below is that interview and an excerpt from the article. Read the entire article.

[…]

Marc Maiffret is a former hacker who was once profiled on reality TV for his years as a teenage hacker. These days he works for the other side as a security consultant, and tells his clients never to click unsubscribe if they do not know the sender.

“It’s the wrong instinct cause of what ends up happening,” Maiffret said. “As soon as you hit unsubscribe, you’re essentially saying x, y, z email address that had received it … is active, there’s actually somebody there.”

Before you answer, in most cases the spammers are just guessing at email addresses. Fill out the ‘unsubscribe” line, and the guesswork is over: they know they have a live one.

Worse, said Maiffret

Continue reading the entire interview on NBCChicago.com.

Tags:
, , , , , ,

Leave a Reply

Additional articles

dave-shackleford-headshot

Privileged Passwords: The Bane of Security Professionals Everywhere

Posted February 19, 2015    Dave Shackleford

Passwords have been with us since ancient times. Known as “watchwords”, ancient Roman military guards would pass a wooden tablet with a daily secret word engraved from one shift to the next, with each guard position marking the tablet to indicate it had been received. The military has been using passwords, counter-passwords, and even sound…

Tags:
, , ,
Privileged Account Management Process

In Vulnerability Management, Process is King

Posted February 18, 2015    Morey Haber

You have a vulnerability scanner, but where’s your process? Most organizations are rightly concerned about possible vulnerabilities in their systems, applications, networked devices, and other digital assets and infrastructure components. Identifying vulnerabilities is indeed important, and most security professionals have some kind of scanning solution in place. But what is most essential to understand is…

Tags:
, , , , ,
bank theft img

The Vulnerabilities and Privileges of Carbanak Bank Thieves

Posted February 17, 2015    BeyondTrust Research Team

Recently Kaspersky released analysis of a series of significant breaches against financial institutions by a group they have dubbed Carbanak. The attacks go back over 2 years and estimates are that potentially $1 billion dollars in total were stolen from more than 100 financial institutions. In some cases the attackers were active in victim organizations between…

Tags:
, , ,