As I’ve mentioned before, one of the chief objectives of the would-be bad guy is to gain access to the “inside” of a network or computing environment. By doing so, access to the desirable systems and information are often eased by lack of internal security mechanisms: most security folks are always worried about the perimeter. Email, by definition, allows for flow of information between the outside world and inside users. Attacking email makes lots of sense when we consider its vulnerabilities from the perspective of the attacker: email is a well-documented tool, popular, and information flows somewhat easily from outside to the inside (and out). …Read Full Article
