Is your email vulnerable? Join us to find out

clock • 1 min read

Silent malware, remote capture, social engineering - email can let them all in

Email is an important business tool, but it's also ground zero for a huge number of cyber attacks. As a major touch point with the outside world, your email is vulnerable - and the criminals know it.

The majority of cyber intrusions start with a phishing email, but email attacks are about much more than phishing and malware. 

In an upcoming web seminar on the 7th July, Computing's Tom Allen and KnowBe4's Javaad Malik will discuss a wide variety of prominent email attacks, including silent malware, remote password hash capture and rogue rules - and why social engineering sits at the top of all of them.

We won't just be talking about the types of attack, though - we'll look at real-life examples of every type, and talk about the best ways to defend against them. This is an event you can't afford to miss.

Click here to register now.

To hear more from Javvad, click here to access on-demand sessions from day one of Computing's Cybersecurity Festival, where he presented a session on avoiding fallout from the ransomware epidemic

You may also like
Trump campaign reports email hack

Hacking

Suggests Iranian involvement as 2024 election heats up

clock 12 August 2024 • 3 min read
Tories self-refer to ICO over data breach

Security

Revealed hundreds of personal email addresses by forgetting to BCC

clock 15 May 2024 • 2 min read
Dell confirms data breach affecting 49m people

Hacking

No financial info stolen, but names and addresses were leaked

clock 10 May 2024 • 2 min read
Most read
01
03

Asian Tech Roundup: India threatens Wikipedia

06 September 2024 • 4 min read
04

CMA clears Microsoft's deal with Inflection AI

05 September 2024 • 3 min read
05

Veeam patches critical flaws, urges users to update

06 September 2024 • 2 min read

Sign up to our newsletter

The best news, stories, features and photos from the day in one perfectly formed email.

More on Security

Microsoft offers advice on avoiding another CrowdStrike-style outage

Microsoft offers advice on avoiding another CrowdStrike-style outage

Vendors should minimise use of kernel mode, customers should make full use of integrated Windows security features

John Leonard
clock 29 July 2024 • 3 min read
'Gay furry hackers' breach conservative US think tank behind Project 2025

'Gay furry hackers' breach conservative US think tank behind Project 2025

Heritage Foundation calls group "degenerate perverts"

Tom Allen
clock 11 July 2024 • 2 min read
Why 'change' for the UK must include cybersecurity

Why 'change' for the UK must include cybersecurity

Labour needs to to get ahead and demonstrate a commitment to security from the outset

Rick Jones
clock 11 July 2024 • 4 min read