{"id":1883,"date":"2006-08-07T00:00:00","date_gmt":"2006-08-07T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2006\/08\/07\/im-attacks-escalate\/"},"modified":"2021-12-30T11:40:12","modified_gmt":"2021-12-30T11:40:12","slug":"im-attacks-escalate","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2006\/08\/07\/im-attacks-escalate\/","title":{"rendered":"IM Attacks Escalate"},"content":{"rendered":"<p>Postini, the global leader in Integrated Message Management, today announced that its Monthly Message Security &#038; Management Update for July confirms a 160 percent increase over June in instant messaging (IM) attacks against corporate networks.  In July, Postini detected and prevented new IM threats including Prokeylogger, which logs the keystrokes typed by the user, captures passwords and screenshots, and sends them to identity thieves.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Postini also noted in July a continuing rise in encrypted email traffic, as organizations around the world increasingly use encryption to protect sensitive communications with their business partners, contractors, regulators and remote employees.<\/p>\n<p>The ability to encrypt email, based on an industry standard called Transport Layer Security (TLS), is built into every modern email server and is easy and free to use.<\/p>\n<p>http:\/\/www.darkreading.com\/document.asp?doc_id=100733&#038;WT.svl=wire_2<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[32],"tags":[],"class_list":["post-1883","post","type-post","status-publish","format-standard","hentry","category-statistics"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1883","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=1883"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1883\/revisions"}],"predecessor-version":[{"id":4370,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1883\/revisions\/4370"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=1883"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=1883"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=1883"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}