AppRiver Blog

Need a little migration help? We got you

Has your domain been migrated to the Exchange 2016 platform yet? Need help getting your mobile devices connected to the new server?

We can help.

Read More

Salted Hash: Want to know what frightens admins?

On this week's episode, CSO's Salted Hash security writer Steve Ragan talks with CSO's Michael Nadeau to talk about things that keep IT administrators awake at night. Hint: Ransomware is not the only thing.

The items in the episode were pitched to CSO by AppRiver.  The data in the list was sourced from working security...

Read More

Tech News World: Risky Scripts Pose Threat to Web Surfers, Researchers Say

A new study from researchers at Princeton's Center for Information Technology Policy has found that observing keystrokes, mouse movements and scrolling behavior of visitors on Web pages could be loaded with risk.

Read More

KRACK Attack: Major Wi-Fi Vulnerabilities Disclosed

What is KRACK?

Welcome to another manic Monday! Some might say, "welcome to the next dumpster fire." In any case, if you follow InfoSec security news feeds, you have probably heard of a newly released set of vulnerabilities in the WPA2 wireless authentication protocol. These collectively are know as the Key Reinstallation...

Read More

Equifax Data Breach - 143 million Americans affected

Data Breach Image
 Equifax Breach Overview

While not the largest breach, it's one of the most severe because of the data compromised.  Equifax, Experian, and TransUnion compiles the most sensitive financial information and safeguards it.  No company is immune to an attack, however, this garnered 143 million...

Read More

Could Your Phone Be Vulnerable to Hackers Over WiFi?

Last week researcher Nitay Artenstein of Exodus Intelligence published a proof of concept for a self-replicating worm that could spread autonomously between mobile devices, needing only the device’s WiFi network address to infect the device.

If infected, the device’s WiFi chip would be completely under the attacker’s...

Read More

Keep Your Business Safe from Ransomware and Malware

Read More

Extortion Emails Threaten DDOS Attacks

Attackers are currently sending personalized emails attempting to extort money from website owners across the net. The sender promises to commit a distributed denial of service - DDOS - attack, to the tune of 1Tbps, against the recipients website unless they make a one-time payment of .1 Bitcoins. The recipient is...

Read More

iOS 10 Adds HTML Email Signatures to Mail

Part 3 of 3: New Mail Features in iOS 10 include Draft Folder Synchronization, HTML Signatures, and Updated Settings Menu

Read More

New Mail Features in iOS 10 include Updated Settings Menu, Draft Folder Synchronization, HTML Signatures

With the September 13, 2016 of iOS 10 and subsequent updates - up to iOS 10.1.1 - the latest software is available and in use for many iPhone, iPad, and iPad users. If you don't already have the latest update you can check here to determine if your mobile device is compatible. You can also check for the software update...

Read More