To inspect or not to inspect, that is the question.
TLS 1.3 is by far the most secure version of the Transport Layer Security (TLS) protocol, but its use of ephemeral elliptic curve keys--and the deprecation of static RSA keys--means that TLS sessions now offer forward secrecy, a bane to enterprise security administrators who want to maintain visibility into their network traffic.
200-member strong Messaging, Malware and Mobile Anti-Abuse Working Group gathers to discuss online security and privacy best-practices in the wake of attacks taking advantage of COVID-19
The latest hook? The pandemic. Since nearly every individual and organization is impacted by COVID-19, everyone is a potential target for these cyberattacks, especially those without cybersecurity experience, namely small businesses.
Every campaign plan for this cycle has changed dramatically because of COVID. In-person activities are curtailed for the foreseeable future. In their place, candidates and groups are moving to virtual town halls, virtual rallies and relying more on texting, paid media and email.
Domain-based Message Authentication, and Reporting, and Conformance is a policy that adds to SPF and DKIM and gives a receiving set of instructions on what they should do when an email they received fails other authentication checks.
Text messaging isn’t new or trendy, but it’s an increasingly popular medium for political advertisers. That was true before the coronavirus swept the country, and now texting is even more important for candidates to connect with supporters without rallies, events or canvassing teams.
Not as close as you might fear, but quantum encryption cracking is on its way. So, it's time to start getting ready for it
What lessons did you learn from the election? How will they apply ahead of November? [Absentee voting] went from five to 71 percent. It is totally amazing. Wisconsin, Michigan, Pennsylvania, North Carolina, Arizona and Florida all have no-excuse absentee voting.
Microsoft has been working closely with partners through the industry association M3AAWG to solve such limitations throughout the email ecosystem. As a result, we have decided to build and add support for DNSSEC and DANE for SMTP to Exchange Online.
Len Shneyder is co-chair of the election security working group at the Messaging, Malware and Mobile Anti-Abuse Working Group (M3AAWG) where industry comes together to work against botnets, malware, spam, viruses, DoS attacks and other online exploitation to fight online abuse.
Messaging, Malware and Mobile Anti-Abuse Working Group (M3AAWG) Celebrates Jerry Upton's 15 Years as Executive Director at the 48th General Meeting
The Messaging, Malware and Mobile Anti-Abuse Working Group (M3AAWG), the largest global industry consortium developing collaborative approaches to combat online abuse, today announced that Jerry Upton will retire from his role as M3AAWG's Executive Director after 15 years of service. He will be succeeded by Amy Cadagin.
Election security means different things to different people. Cyber security personnel may think of election security as locking down access to voting machines. Other experts in the field may focus their attention on securing systems that are critical to the day to day operations of organizing elections, such as email and other communication channels, as a means of shrinking the attack surface of our elections. Whatever the focus, one thing rings absolutely true: maintaining free, fair and credible elections in democracies around the world is absolutely key to ensuring the survival of those democracies.
Practitioners could develop ostrich syndrome when it comes to cybersecurity. With the drumbeat of concern growing louder, taking the first steps to reduce a campaign or group’s exposure can feel daunting.
At least that’s the concern of Seth Blank, who works on election security for the Messaging, Malware and Mobile Anti-Abuse Working Group (M3AAWG).
You can outsource your email, but a good chunk of securing that email remains in-house. Here's what you need to know.
J.M. Porup includes M3AAWG recommendations on protecting parked domains in an article on the importance of publishing a DMARC record for every domain a business owns.
Steven Harroun to the panel on “Cybersecurity Risks and Realities” at the Telecommunications Media Forum
In a transcribed speech, Steven Harroun, chief compliance and enforcement officer, Canadian Radio-television and Telecommunications Commission (CRTC), describes efforts to protect digital economies and societies. He notes the CRTC’s work with groups like M3AAWG, the Internet Corporation for Assigned Names and Numbers and more.
Seth Blank, co-chair of M3AAWG’s Election Security Special Interest Group, comments on threats to election integrity for cities and states.
Seth Blank, co-chair of M3AAWG’s Election Security Special Interest Group, comments on threats to elections, including SIM jacking, domain spoofing and email hacking.
The Japan Anti-Abuse Working Group (JPAAWG) cooperates with M3AAWG to examine and implement measures against a wide range of email and messaging attacks, such as spam, malware and DDoS.
Tired of getting phony calls from Visa about an alleged abuse of your credit card? Angered about the way your firm’s logo is being used in phishing attacks? There’s a big meeting this week in Montreal among leading industry companies trying to do something about these and similar problems.Industry anti-messaging abuse group meets this week in Montreal