2019/20’s 10 biggest, boldest, and most brazen business email compromise scams

Understand how email scams work to know how they can be avoided

whitepaper

Telling the difference between authentic emails and an impostor’s scam is not always easy. That’s because business email compromise (BEC) attacks prey on human nature, the innate psychological traits shared by everyone. 

This whitepaper offers a roundup of the most high-profile (and low-minded) BEC and email account compromise (EAC) attacks of the last 12 months.

Download it now to understand how email scams work and know how they can be avoided.

Most Popular

Citrix buys Slack competitor Wrike in record $2.25bn deal
collaboration

Citrix buys Slack competitor Wrike in record $2.25bn deal

19 Jan 2021
How to recover deleted emails in Gmail
email delivery

How to recover deleted emails in Gmail

6 Jan 2021
SolarWinds hackers hit Malwarebytes through Microsoft exploit
hacking

SolarWinds hackers hit Malwarebytes through Microsoft exploit

20 Jan 2021
What is a 502 bad gateway and how do you fix it?
web hosting

What is a 502 bad gateway and how do you fix it?

12 Jan 2021