BeyondTrust

Security in Context: The BeyondTrust Blog

Welcome to Security in Context

Bringing you news and commentary on solutions and strategies for protecting critical IT infrastructure in the context of your business.

NBC Chicago Interviews Marc Maiffret on Email Security

Posted May 1, 2012    Sarah Lieber

Recently, Marc Maiffret was interviewed on NBC Chicago about the security risks involved when unsubscribing from emails and how to best avoid being compromised by email spam (it does make up 80% of all email traffic in the United States, after all). Below is that interview and an excerpt from the article. Read the entire article.

[…]

Marc Maiffret is a former hacker who was once profiled on reality TV for his years as a teenage hacker. These days he works for the other side as a security consultant, and tells his clients never to click unsubscribe if they do not know the sender.

“It’s the wrong instinct cause of what ends up happening,” Maiffret said. “As soon as you hit unsubscribe, you’re essentially saying x, y, z email address that had received it … is active, there’s actually somebody there.”

Before you answer, in most cases the spammers are just guessing at email addresses. Fill out the ‘unsubscribe” line, and the guesswork is over: they know they have a live one.

Worse, said Maiffret

Continue reading the entire interview on NBCChicago.com.

Tags:
, , , , , ,

Leave a Reply

Additional articles

flash-logo

Adobe Patches Zero-Day Flaw Being Exploited in the Wild

Posted January 22, 2015    BeyondTrust Research Team

Earlier this week, French malware researcher Kafeine reported on a new Adobe Flash zero-day vulnerability that was being exploited in the wild using the latest versions of the Angler Exploit Toolkit. “Any version of Internet Explorer or Firefox with any version of Windows will get owned if Flash up to 16.0.0.287 (included) is installed and enabled”…

Tags:
, , , , ,

Your Data Security Strategy Starts with Deploying a Least Privilege Model (part 2 of 2)

Posted January 22, 2015    Scott Lang

In last week’s blog, we talked about how controls and accountability must be put into place so that only the right folks can access data and the systems on which that data resides, and that employing a least privilege model helps to achieve that and more. We’re using conclusions and data from a recent report…

Tags:
, , , ,
Larry-Brock-CISO

Basic Blocking and Tackling for Defending Against Advanced Targeted Attacks

Posted January 22, 2015    Larry Brock

With football season at its pinnacle at both the college and professional levels, the best teams continually focus on the fundamentals that make them successful. In security, we need to do the same.  It is okay for us to have a few key plays, especially in certain industries where we have to focus on unique…

Tags:
, , , , ,