Home Tags Messaging

bots

spam

  • [Author’s note: As I write this in October, the second massive denial of service attack in two weeks threatening to take down significant sections of the internet has just ended. Could full implementation of Operation Safety-Net have prevented this?

  • Had you been in the general vicinity of the Palace Hotel in San Francisco a couple of weeks ago– say, Thursday evening, maybe just before an early dinner time – you might have heard thunderous applause spilling from the open entrance into the evening air. You might have thought an A-list celebrity had just been introduced on stage to the gathered membership of M3AAWG, as our 33rd General Meeting drew to a close.

    Nope. This was a slightly bigger deal.

best practices

encryption

Spam

cybersecurity

Awards

Messaging

hosting best practices

global outreach

pervasive monitoring

DM3Z Blog Posts

Public Policy

malware

botnets

new work

  • Over the past few years, the Pervasive Monitoring SIG within M3AAWG has worked to educate members and the community at large about better practices for message encryption and data privacy.  Messaging abuse, such as Man-in-the-Middle attacks, continues to threaten end-users and make confidential personal and business data more accessible to cybercriminals. After the revelations made by various whistleblowers around the world, we now know that we’re being watched at an ever-increasing rate, and even if we believe we’re innocent, our privacy could be violated without just cause. read more

  • Over the past few years, the Pervasive Monitoring SIG within M3AAWG has worked to educate members and the community at large about better practices for message encryption and data privacy.  Messaging abuse, such as Man-in-the-Middle attacks, continues to threaten end-users and make confidential personal and business data more accessible to cybercriminals. After the revelations made by various whistleblowers around the world, we now know that we’re being watched at an ever-increasing rate, and even if we believe we’re innocent, our privacy could be violated without just cause. read more

SMTP

  • Over the past few years, the Pervasive Monitoring SIG within M3AAWG has worked to educate members and the community at large about better practices for message encryption and data privacy.  Messaging abuse, such as Man-in-the-Middle attacks, continues to threaten end-users and make confidential personal and business data more accessible to cybercriminals. After the revelations made by various whistleblowers around the world, we now know that we’re being watched at an ever-increasing rate, and even if we believe we’re innocent, our privacy could be violated without just cause. read more

  • Ongoing disclosures about the pervasive monitoring of email, voice and other network traffic remain an industry concern and major companies in the online ecosystem have been publicly identified as specific targets for non-consensual eavesdropping activity.  As a result, both the general public and various technical communities have a heightened interest in implementing measures that could protect operational security and customer privacy.

cybersecrity

  • Ongoing disclosures about the pervasive monitoring of email, voice and other network traffic remain an industry concern and major companies in the online ecosystem have been publicly identified as specific targets for non-consensual eavesdropping activity.  As a result, both the general public and various technical communities have a heightened interest in implementing measures that could protect operational security and customer privacy.

anti-abuse

Subscribe to Messaging