December 2018
Beginner
208 pages
5h 45m
English
After web browsing, e-mail is probably the next most common use most of us have for our computers, especially at work. But e-mail can be a power for malice, as well as for good. Just as our coworkers and friends use e-mail to easily stay in touch with us, attackers can use e-mail to get to us as well. In fact, most enterprises consider e-mail to be the most common and dangerous technique attackers use to conduct cyberattacks.
In addition to being a path for attackers to target us, our e-mail accounts may also be the cornerstone of our online identities, as well. Websites use e-mail to notify us of account expirations, renewals, password changes, suspicious activity, and e-commerce transactions. ...