Submitted by M3AAWG Content Manager on Feb 02, 2022
Author: Mobile Committee Chairs
Business email compromise, or BEC, has become an increasingly dangerous and widely used tool for an adversary to get access to a business email account to spoof the identity of an employee. Unfortunately, This technique has moved beyond email to SMS (Short Message Service) using cell phones, in which the attacker gets the target’s phone for attacks or compromises.
Submitted by M3AAWG Content Manager on May 24, 2021
Author: Sam Silberman, M3AAWG Treasurer
Welcome to M3AAWG 5, our video series where we connect with leaders and experts on the most pressing topics and issues in online anti-abuse. Today, we’re joined by Brian Scriber, Co-Chair of the IoT SIG and Ash Wilson, Vice Chair of the IoT SIG, to discuss the latest anti-abuse approaches and initiatives within the IoT space.
Submitted by M3AAWG Content Manager on Apr 01, 2021
Welcome to a new episode of M3AAWG 5, our video series where we interview members and experts on emerging threats and prominent issues across our industry.
In today’s episode, I sit down with Mickey Chandler, Abuse Desk Committee Co-Chair and Director of Privacy and Abuse Management at ExactTarget, and Jess Kaplan, Abuse Desk Committee Vice-Chair and Senior Email Compliance Analyst at ActiveCampaign.
The views expressed in DM3Z are those of the individual authors and do not necessarily reflect M3AAWG policy.
Subscribe to Blog
By subscribing to the M3AAWG Blog and giving us your email address you are giving us permission to send you timely emails with newly posted blog updates. If at any time you do not want to receive these notifications, please follow the info about unsubscribing at the bottom of these emails.