Categories
Computing

How to back up emails in Outlook

Whether you have emails you want to make sure to hang onto because you’re getting a new computer or you’re troubleshooting a problem, you can create a backup in Microsoft Outlook.

By exporting your inbox to an Outlook file format, you can easily import it again later if needed. Alternatively, you can export a CSV file that you can open in Excel to review and analyze. Here, we’ll explain how to back up emails in Outlook using both file types.

Back up emails with an Outlook file

If you want to create a backup of your emails that you can easily import back into Outlook later, the best option is to create a PST file.

Step 1: Open Outlook and select File > Open & export. Then, pick Import/export.

Step 2: When the Import and Export Wizard window opens, select Export to a file and choose Next.

Export to a file in Outlook.

Step 3: In the subsequent window, pick Outlook data file (.pst) and select Next.

Export file selection window.

Step 4: Then, select your Inbox and check the box for Include subfolders to make sure you have all of the folders you created. Optionally, you can choose a different, specific folder if you prefer.

Inbox and folder selection window.

Step 5: If you want particular emails, such as those from a certain sender, during a time frame, or with specific keywords, select Filter. Add the criteria, and pick OK.

Outlook export filter options.

Step 6: Select Next after you pick the inbox, subfolders, and filters.

Step 7: Choose a location to save the file. You can use the Browse button to select the location or enter the full path into the box at the top.

Step 8: Then, pick one of the options to replace duplicates, allow duplicates, or not export duplicates. Select Finish.

You can then visit the location you selected for the file to open it.

File path and duplicate selection for the export.

Back up emails with a CSV file

If you want to back up your emails so that you have a readable file that you can open in Excel if needed, you can create a CSV file instead.

Step 1: Follow the first two steps as above to select Import/export and open the Import and Export Wizard.

Step 2: Select Export to a file and pick Next.

Step 3: This time, pick Comma separated values in the Export to a file box and select Next.

Export file selection window.

Step 4: Choose your Inbox from the list and pick Next.

Inbox and folder selection window.

Step 5: Enter the location and file name using the path, or select the Browse button to pick the location for the file.

If you use the Browse button, navigate to the location, enter the file name you want to use, and select OK.

Browse box for the file location and name.

Step 6: When you have the location and file name in the Save Exported File As box, select Next.

File path field with Browse button.

Step 7: Confirm the inbox you are exporting and select Finish.

You’ll see a brief message as the file is created, and you can then visit the location you picked to access the file and open it in Excel or a similar application.

Export confirmation and finish window.

Backing up your Outlook emails for safekeeping or importing again later takes only a few minutes. And, it’s probably worth your time to make sure you don’t lose any important messages.

For more, look at how to recall an email in Outlook or how to change your Outlook signature.

Editors’ Choice




Repost: Original Source and Author Link

Categories
Security

Plex was compromised, exposing usernames, emails, and passwords

Streaming media platform Plex sent out an email to its customers earlier today notifying them of a security breach that may have compromised account information, including usernames, email addresses, and passwords. While Plex’s message says “all account passwords that could have been accessed were hashed and secured in accordance with best practices,” it is still advising all users to change their passwords immediately.

Plex is one of the largest media server apps available, used by around 20 million people to stream video, audio, and photos they upload themselves in addition to an increasing variety of content the service provides to paid subscribers.

The email states, “Yesterday, we discovered suspicious activity on one of our databases. We immediately began an investigation and it does appear that a third-party was able to access a limited subset of data that includes emails, usernames, and encrypted passwords.” There is no indication any other personal account information has been compromised, and there’s no mention of access to private media libraries (which may or may not include pirated content, private nudes, and other sensitive content) having been accessed in the breach.

Plex’s email also reassures customers that financial information appears to be safe despite the breach, stating, “credit card and other payment data are not stored on our servers at all and were not vulnerable in this incident.”

The cause of the breach has been found, and Plex says it has taken action to prevent others from taking advantage of the same security flaw. “We’ve already addressed the method that this third-party employed to gain access to the system, and we’re doing additional reviews to ensure that the security of all of our systems is further hardened to prevent future incursions.”

If you have a Plex account, you should take steps to secure it immediately, following these instructions provided by the company. You should also enable two-factor authentication if you haven’t already. Plex puts the two-factor authentication option under your Account page.

Additionally, you should be using either a free or paid password manager to easily manage unique, difficult-to-guess passwords and 2FA codes across all your apps, services, and sites. Web browsers such as Google Chrome, Microsoft Edge, and Safari have decent built-in options these days, though dedicated services are also available from the likes of Bitwarden, 1Password, and LastPass. Some password managers will alert you to passwords that have been breached online and autofill passwords when prompted by apps and websites on your desktop and phone.

Update August 24th, 10:14AM ET: Updated clarify that while passwords were included in the data that was potentially accessed, Plex claims they were “hashed and secured in accordance with best practices.”

Repost: Original Source and Author Link

Categories
Security

Stealthy malware shows why you shouldn’t open unknown emails

A new kind of malware was recently discovered that managed to slip past 56 separate antivirus products before finally getting caught.

The malware, when executed, can cause some serious damage to your device — and it seems to be so well made that it might be the product of nation-state actors. Opening an email attachment is all it takes to grant it enough entry to wreak havoc.

EThamPhoto / Getty Images

Unit 42, a threat intelligence team from Palo Alto, has just published a report on a piece of malware that managed to avoid detection from a massive 56 antivirus products. According to the team, the way the malware was built, packaged, and deployed is very similar to various techniques used by the APT29 threat group, also known under the names of Iron Ritual and Cozy Bear. This group has been attributed to Russia’s Foreign Intelligence Service (SVR), which indicates that the malware in question could be a nation-state affair.

According to Unit 42, the malware was first spotted in May 2022, and it was found hidden within a pretty strange file type — ISO, which is a disk image file used to carry the entire contents of an optical disc. The file comes with a malicious payload that Unit 42 believes was created using a tool called Brute Ratel (BRC4). BRC4 prides itself on being hard to detect, citing the fact that the tool’s authors reverse-engineered antivirus software in order to make the tool even stealthier. Brute Ratel is particularly popular with APT29, adding further weight to the claim that this malware could be linked to the Russia-based Cozy Bear group.

The ISO file pretends to be the curriculum vitae (resume) of someone named Roshan Bandara. Upon arrival in the recipient’s email mailbox, it doesn’t do anything, but when clicked, it mounts as a Windows drive and displays a file called “Roshan-Bandara_CV_Dialog”. At that point, it’s easy to get fooled — the file appears to be a typical Microsoft Word file, but if you click it, it executes cmd.exe and proceeds to install BRC4.

When that’s done, any number of things could happen to your PC — it all depends on the attacker’s intentions.

Unit 42 notes that finding this malware is worrying for a number of reasons. For one, there is a high probability that it is linked to APT29. Aside from the reasons listed above, the ISO file was created on the same day as when a new version of BRC4 was made public. This suggests that state-backed cyber attack actors could be timing their attacks to deploy them at the most opportune times. APT29 has also used malicious ISOs in the past, so everything seems to fall in line.

The near-undetectability is worrying in itself. For malware to be that stealthy takes a lot of work, and it suggests that such attacks could pose a real threat when used by the wrong team of people.

How can you stay safe?

A digital security lock.
zf L / Getty Images

Amidst frequent reports that cyber attacks have been on a massive rise in recent years, one can hope that many users are now more conscious of the dangers of trusting random people and their files all too much. However, sometimes these attacks come from unexpected sources and in various forms. Enormous distributed denial-of-service (DDoS) attacks happen all the time, but these are more of a problem for enterprise users. Sometimes, software that we know and trust can be used as a decoy to fool us into trusting the download. How to stay safe when danger seems to be lurking around every corner?

First of all, it’s important to realize that a lot of these large-scale cyberattacks are made to target organizations — it’s unlikely that individuals would be targetted. However, in this particular case where the malware is hidden within an ISO file that poses as a resume, it could plausibly be opened by people in various HR settings, including those in smaller organizations. Bigger businesses often have more robust IT departments that wouldn’t allow the opening of an unexpected ISO file — but you never know when something might slip through the cracks.

With the above in mind, it’s never a bad idea to follow a very simple rule that many of us still forget at times — never open attachments from unknown recipients. This can be difficult for an HR department that’s actively collecting resumes, but you, as an individual, can implement that rule into your daily life and not miss out on anything. It’s also not a bad idea to pick up one of the best antivirus software options available. However, the greatest security can be gained by simply browsing mindfully and not visiting websites that might not seem too legit as well as being cautious about your emails.

Editors’ Choice




Repost: Original Source and Author Link

Categories
Security

They’ve leaked terabytes of Russian emails, but who’s reading?

The city of Blagoveshchensk sits in the far east of Russia, some 3,500 miles from Moscow and further still from Kyiv. Across a river, the Chinese city of Heihe sprawls to the south, joined by the first Sino-Russian road bridge; beside the bridge, there’s little about the city to make the news.

But the public affairs of the city are now laid bare for anyone willing to look in the form of 150GB of emails from the Blagoveshchensk City Administration published online by the transparency collective Distributed Denial of Secrets — just one of many data sets leaked to the organization since the invasion of Ukraine began.

As the war in Ukraine approaches the 60-day mark, leaks from the country have been coming at an unprecedented rate. On April 20th, DDoSecrets co-founder Emma Best tweeted that the collective has published 5.8 terabytes of leaks since the invasion started, with no signs of slowing down.

On the day of that tweet, DDoSecrets published two new leaked email caches: 575,000 emails from property management company Sawatzky and 250,000 emails from Worldwide Invest, a Moscow-based investment firm.

In the “Russia” category, the leaks now include a huge cross-section of Russian society, including banks, oil and gas companies, and the Russian Orthodox Church. Relative to some of the other leaked content sourced by DDoSecrets, the Blagoveshchensk emails represent only a mid-sized leak. The smallest data set (a list of the personal details for 120,000 Russian soldiers in Ukraine) is a mere 22MB while the largest (20 years of emails from a Russian state-owned broadcaster) is a whopping 786GB.

DDoSecrets is not the only place to host leaks coming out of Russia, but it is now indisputably the most active — even though DDoSecrets member Lorax Horne says the organization isn’t explicitly trying to publish information that is pro-Ukraine or anti-Russia.

“For folks who haven’t heard of DDoSecrets before last month, they can be forgiven for assuming we’ve taken a position,” Horne told The Verge. “But really it has to do with the data we receive. If we were getting datasets from the other side, we would also consider that for publication. It just so happens that the majority of the datasets that are coming out are related to Russian entities.”

Still, it’s hard to deny that many of DDoSecret’s leaks are motivated by antiwar sentiment. (In an interview with NBC News, Emma Best described hacktivists who leak to the collective as “screaming in response to the injustice of Russia’s invasion of Ukraine and the inhumanity of the war crimes committed by the invaders.”) The call for hacktivism that came from the Ministry of Defence of Ukraine also helped, Horne says, directing energy toward a defined set of Russian targets. Besides the moral clarity that comes with direction from the Ukrainian government, other experts point toward a hands-off approach from actors who might otherwise curtail hacking activity.

The organization has been labeled as a successor to WikiLeaks, the pioneering leak-sharing platform that seems to have slowly fallen into disarray in the years since founder Julian Assange’s arrest. As the conflict began, almost all of the site’s channels for submitting documents were found to be inoperative, making it all but impossible to share leaks with the original transparency platform and meaning that WikiLeaks has played little role in hosting data related to the Ukraine conflict.

That has given DDoSecrets a newly strategic role, operating as a de facto front-end distribution system for the fruits of hacktivist activity against Russia.

“Traditional hackers were never looked upon fondly from law enforcement or members of the security community, but it seems they have received a free pass in the current conflict to attack all things Russian,” said Jeremiah Fowler, a security researcher who has published research on hacktivism in Ukraine. “Russia has become Anonymous’s biggest recruiter.”

Yet, while the more chronically online among us might long for a world where sharing data can turn the tide of a war, it’s not clear that this is the world we live in.

The leaked data would be most impactful if ordinary Russians had access to it and could browse through the archives for concrete evidence of the elite corruption that is still endemic to the country. But with the information environment in the country being ever more tightly controlled by government censorship, it is unlikely that the vast majority of the leaked information will ever receive mainstream attention domestically.

Bret Schafer, head of the information manipulation research team at the Alliance for Securing Democracy, points to the steady suppression of independent media in Russia as a likely factor in limiting the impact of any incriminating information contained in the recent leaks.

“Using the Pandora Papers as an example, they pointed to clear corruption at very high levels within the Kremlin and it didn’t even really create a ripple domestically in Russia because it wasn’t covered,” Schafer says. “You know, it was covered by a few independent outlets that now no longer exist. So even the limited impact that had domestically probably won’t happen this time around, because independent media has been stifled even further.”

Schafer also points to the crackdown on internet freedom in Russia, exemplified by the blocking of Twitter and Facebook within the country since the invasion began. Though some younger, digitally savvy Russians might be able to circumvent some of these measures, the upshot is that even digital news is increasingly Kremlin-approved.

Long term, changing the Russian public’s understanding of the nature of the invasion will be a prerequisite for bringing the country back into the international order, whether this takes place years or even decades into the future. Leak sites could play some role in this, but so will diplomacy and other measures to support the eventual rebuilding of an independent media.

Whatever the end is here, we can’t kind of come out the other side with 70 percent of Russians thinking that this war was, well, not a war,” Schafer says.



Repost: Original Source and Author Link

Categories
Security

How to stop your emails from being tracked

All of those obnoxious marketing emails that crowd your inbox aren’t just pushing a product. They’re also tracking whether you’ve opened the email, when you opened it, and where you were at the time by using software like Mailchimp to embed tracking software into the message.

How does it work? A single tracking pixel is embedded in the email, usually (but not always) hidden within an image or a link. When the email is opened, code within the pixel sends the info back to the company’s server.

There have been some attempts to restrict the amount of information that can be transmitted this way. For example, since 2014, Google has served all images in Gmail through its own proxy servers, which could hide your location from at least some tracking applications. And extensions such as Ugly Email and PixelBlock have been developed to block trackers on Chrome and Firefox.

There is also a simple, basic step you can take to avoid trackers: stop your email from automatically loading images, since images are where the majority of these pixels hide. You won’t be able to avoid all of the trackers that can hide in your email this way, but you will stop many of them.

Here’s how to disable image autoloading in the major desktop and mobile email apps:

Gmail on the web

  • Click on the gear icon in the upper-right corner to access your settings, and then click on “See all settings.”
  • In the “General” tab (the first one), scroll down to “Images.”
  • Select “Ask before displaying external images.”
  • Scroll down to the bottom of the page and click on “Save Changes.”

Note that this will also turn off Gmail’s dynamic email feature, which makes emails more interactive.

In the “General” tab, scroll down to “Images” and select “Ask before displaying external images.”

In the “General” tab, scroll down to “Images” and select “Ask before displaying external images.”

Microsoft Outlook.com

While the browser-based version of Outlook doesn’t let you stop loading images, you can make it load images through its own service. To enable that:

  • Click on “Settings” (the gear symbol in the upper-right corner). In the column that opens, click on “View all Outlook settings” at the bottom.
  • Select “General” > “Privacy and data.”
  • Scroll down to “External images” and select “Always use the Outlook service to load images.”

Outlook.com can route incoming images through its own service.

Outlook.com can route incoming images through its own service.

Microsoft Outlook (Office 365) for Windows 10

  • Click on “File” > “Options.”
  • In the “Outlook Options” window, select “Trust Center.”
  • Click on the “Trust Center Settings” button.
  • Check the boxes labeled “Don’t download pictures automatically in standard HTML email messages or RSS items” and “Don’t download pictures in encrypted or signed HTML email messages.” You can make a number of exceptions to the first item, if you like, by reviewing the boxes underneath it.

To stop automatic downloads, go to the Trust Center.

To stop automatic downloads, go to the Trust Center.

Microsoft Outlook (Office 365) for Mac

  • Go to “File” > “Preferences” > “Reading.”
  • You can choose to automatically download images only from trusted contacts, or to disable all automatic downloads of images.

Outlook for Mac lets you download images only from contacts.

Outlook for Mac lets you download images only from contacts.

Apple Mail

  • Select “Mail” > “Preferences.”
  • Click on the “Viewing” tab.
  • Uncheck “Load remote content in messages.”

Uncheck “Load remote content in messages.”

Uncheck “Load remote content in messages.”

Gmail for Android

  • Tap on the three lines in the upper-left corner.
  • Scroll down and select “Settings.”
  • Tap on the email account that you want to configure.
  • Scroll down and select “Images.”
  • Tap on “Ask before displaying external images.”

In “Settings,” scroll down to “Images.”

In “Settings,” scroll down to “Images.”

Select “Ask before displaying external images.”

Select “Ask before displaying external images.”

Gmail for iOS

  • Open Gmail for iOS, tap the hamburger menu in the upper left, and scroll down to settings.
  • Tap the account you want to personalize, and tap “Images.”
  • Switch from “Always display external images” to “Ask before displaying external images.”

In your account, tap “Images.”

In your account, tap “Images.”

Select “Ask before displaying external images.”

Select “Ask before displaying external images.”

Apple Mail for iOS

  • Tap on “Settings” > “Mail.”
  • Find the “Messages” section and toggle off “Load Remote Images.”

Start by selecting “Settings” > “Mail.”

Start by selecting “Settings” > “Mail.”

Toggle off “Load Remote Images.”

Toggle off “Load Remote Images.”

Another option is to use an email client such as Thunderbird, which blocks remote images by default; the application allows you to download embedded content on an individual basis, or to allow pictures from contacts that you trust not to send hidden code in their images.

Update July 3rd, 2019, 3:47PM ET: This article has been updated to include additional information about email clients.

Update September 3rd, 2019, 7:35PM ET: This article has been updated to include directions for disabling image autoloading on Gmail for iOS.

Update February 17th, 2021, 5:30PM ET: Instructions for Microsoft Mail have been removed, and a few instructions have been updated.

Update June 11th, 2021, 8:00AM ET: Instructions for Outlook.com and Outlook for Mac have been added, and a few other instructions have been updated.

Repost: Original Source and Author Link

Categories
AI

Walgreens used AI to optimize vaccine outreach emails

Elevate your enterprise data technology and strategy at Transform 2021.


As of May 18, nearly 40% of the U.S. population had been fully vaccinated against COVID-19, with close to 50% having received at least one shot. But outreach remains a major challenge. McKinsey estimated in December that vaccine adoption would require “unprecedented” public and private action and incremental investment of about $10 billion. Highlighting the unevenness in the rollout, a lower percentage of Black Americans than of the general population had been vaccinated by March in every state reporting statistics by race.

Governments at the local, state, and federal levels are involved in distributing and administering vaccines, alongside private-sector partners like pharmacy chains, grocers, and retailers. Among those is Walgreens, which now offers same-day COVID-19 vaccine appointments in most of its U.S. retail locations.

At the beginning of the COVID-19 vaccine rollout, Walgreens aimed to ensure that it had strong customer engagement and high open rates of its email communications on vaccine availability. To meet this goal, the company partnered with Phrasee, an AI-powered copywriting platform, to create a targeted email marketing campaign for customers.

AI-powered marketing

When McKinsey surveyed 1,500 executives across industries and regions in 2018, 66% said addressing skills gaps related to automation and digitization was a “top 10” priority. Forrester predicts that 57% of business-to-business sales leaders will invest more heavily in tools with automation.  And that’s perhaps why Salesforce anticipates the addressable market for customer intelligence will grow to $13.4 billion by 2025, up from several billion today.

According to loyalty and personalization director Brian Tyrrell, Walgreens leveraged Phrasee’s technology to create more engaging subject lines and bodies that reflected the right degree of urgency. “We knew that our largest owned channel in terms of reach was our email channel. We had the opportunity to communicate with 50 million customers there. So when we started rolling out communications about testing, and now the vaccine, it was never more important to ensure that these customers were opening that content,” Tyrrell said in a statement.

Phrasee, which was founded in 2015 by Neil Yager, Parry Malm, and Victoria Peppiatt, offers an email “optimization” product that combines AI and computational linguistics to generate, automate, and analyze language in real time. Phrasee tailors language for email subject lines, in-body copy, and calls-to-action, reminding customers about things like abandoned shopping carts and important sale announcements.

Walgreens tapped the Phrasee platform in March 2020 to change its use of emojis in emails. The goal was to make sure “urgent” emojis, like the red alarm bell, were being used in a way that matched the level of severity covered in the content.

“The folks at Phrasee helped us understand how customers were engaging with different parts of those subject lines, to know where to tone down and where to tone up certain parts of our brand language. We also made everything much more simplified so that customers could digest the content of our emails as easily as possible,” Tyrrell said.

While the platform helped Walgreens simplify its emails, Phrasee’s team also partnered with the retailer to make sure the tone of its campaign was appropriate. Specifically, Walgreens altered some of the “fun” language that felt tone-deaf during the early pandemic.

“One of the most important elements is that we (Walgreens) maintained a very consistent and authentic tone of voice. We take a lot of this feedback loop that we get from Phrasee to roll back up into how we develop brand tone as a brand in its entirety,” Tyrrell said.

Expanded partnership

Walgreens said it saw a 30% increase in email open rates after implementing Phrasee’s suggested changes. This means 30% more customers received info on available vaccine appointments — and potentially up to 30% more customers scheduled a vaccine.

Since March, Walgreens has expanded its partnership with Phrasee beyond optimizing email subject lines. Now, the retailer and Phrasee, along with Adobe, are helping optimize messaging throughout the customer experience.

“Phrasee’s really good at subject lines. But what’s next, how can we use this for app push messaging? How can you power the content within our emails instead of just the subject lines? So we’re really expanding our partnership into other areas,” Tyrrell said. “If we only have one shot to get customers to engage and get a vaccine today, how can we put our best foot forward?”

VentureBeat

VentureBeat’s mission is to be a digital town square for technical decision-makers to gain knowledge about transformative technology and transact.

Our site delivers essential information on data technologies and strategies to guide you as you lead your organizations. We invite you to become a member of our community, to access:

  • up-to-date information on the subjects of interest to you
  • our newsletters
  • gated thought-leader content and discounted access to our prized events, such as Transform 2021: Learn More
  • networking features, and more

Become a member

Repost: Original Source and Author Link

Categories
Tech News

AirDrop leaks users numbers and emails says researchers

Apple has a few enviable features that other platforms, especially Android, still try to implement. The simple convenience and presumed security of AirDrop is one of those and it wasn’t until last year that Android’s Nearby Share finally caught up. Unfortunately, it seems that AirDrop isn’t really that secure after all and the simple act of opening the share sheet in macOS or iOS is enough to have the user’s phone number and email address leak to any hacker within range.

Although now more common, AirDrop uses a once novel technique that employs both ad-hoc Wi-Fi and Bluetooth to scan for devices and establish a connection between them. Users have the option to share only with their contacts or with anyone with a Mac or iPhone or no one at all. Unfortunately, the flaw found by security researchers doesn’t even require actually using AirDrop to trigger the leak of personal information.

All that users need to do is to start the sharing process which brings up the macOS or iOS share sheet. Behind the scenes, AirDrop actually starts scanning for devices by broadcasting an encrypted packet of data containing the sender’s phone and email address. The intention is to check which devices in the vicinity have the sender’s contact also saved to qualify as a recipient.

Unfortunately, that encryption apparently isn’t that strong and it is almost too trivial for hackers to perform a brute-force attack to decrypt numbers and email addresses. More worryingly such hackers only need to sit around, waiting for anyone with a Mac, iPhone, or iPad to start sharing anything to intercept the data. These phone numbers and email addresses can then be used for other attacks like phishing scams.

The researchers reportedly disclosed this vulnerability to Apple in 2019 and even provided an open source reference implementation of a more secure alternative. Apple hasn’t replied to date and it’s probably not that trivial to fix such an integral part of its macOS and iOS experience.

Repost: Original Source and Author Link

Categories
Tech News

Chinese hackers are leveraging flaws in Microsoft Exchange Server to steal emails

Security researchers reported at least 30,000 organizations across the US have been hacked over the past few days by an unusually aggressive Chinese cyber-espionage unit focused on stealing email. The researchers say that many of the organizations targeted in the act include small businesses, cities, and local governments. The group of hackers is exploiting four newly-discovered flaws in Microsoft Exchange Server email software.

The hackers have been able to seed hundreds of thousands of victim organizations worldwide with tools to allow the hackers complete remote control over affected systems. Microsoft is attempting to combat the hackers and, on March 2, released emergency security updates that plugged four security holes in Exchange Server versions 2013 through 2019 being actively exploited. In the days following those security patches, security experts say that the Chinese cyber-espionage group has stepped up attacks on any vulnerable and unpatched Exchange server worldwide.

In each incident, the hackers left behind a web shell, an easy use and password-protected tool that can be accessed over the Internet from any browser. That web shell can give the hackers administrative access to the victim’s computer. According to two unnamed cybersecurity experts who have been part of briefings with US national security advisers, the hackers have seized control over hundreds of thousands of Microsoft Exchange Servers globally.

The group has targeted email systems in various industry sectors ranging from infectious disease researchers to law firms, defense contractors, and others. The attack was first discovered by a company called Volexity. The company says even those who patched their Exchange Server the same day the patches were published have a high likelihood of having a web shell on the server. The researchers say any company running Exchange that hasn’t patched yet is likely already compromised.

Repost: Original Source and Author Link

Categories
Tech News

TrueMail can make sure all of your business emails reach your most engaged customers

TLDR: TrueMail Bulk Email Verifier checks to make sure all the email addresses on your customer’s lists are accurate and up to date, driving up your deliverability and conversion rates.

While it’s tempting to think that everything in marketing hinges around social media these days, the numbers don’t exactly bear that out yet. While 20 percent of online customers say they frequent a brand’s social media channels for important deals and other brand info, that number jumps to 60 percent who say they’ve subscribed to a favored brand’s email list.

Social media matters in the selling game, but email marketing is still the no. 1 method for reaching engaged, activated customers. That’s why it’s so crucial that those focused email marketing campaigns reach those energized fans. The TrueMail Bulk Email Verifier ($49, over 90 percent off, from TNW Deals) makes sure your lists are up to date and offer sellers the best possible chance for success.

From people moving to changing jobs to just providing false information, as much as a quarter of your email list could be riddled with bad information within a year. TrueMail guarantees a 99 percent delivery rate for the emails you send, all by using its arsenal of internal tools to assess each and every email on your list and determine whether it’s working or not.

With a client roster including business titans like Amazon, Google, and Salesforce, TrueMail gets results, using an advanced sweep of a customer’s mail server to verify their identity. Utilizing SMTP and additional proprietary methods, TrueMail sorts all of your customer emails into categories like valid, invalid, unknown and disposable.

Armed with those reports, you can make sure your campaigns only target customers you know are receiving your offers. That leads to fewer bounce backs, higher open rates, and ultimately, higher conversion rates. 

TrueMail’s smart features also clean up common mistakes found in mass email lists, fixing and reverifying addresses that display typical syntax errors and deleting duplicate contact information.

TrueMail is designed to work hand-in-hand with a company’s preferred email service, integrating seamlessly with more than 2,000 apps, including Mailchimp, Hubspot, Active Campaign and more. Their users also enjoy full encryption protection for all their information, securing both customer data and internal company campaign results.

Capable of verifying up to 10,000 different email addresses each month, a lifetime subscription to all of TrueMail Bulk Email Verifier services is a more than $1,000 value. As part of this offer, you can save hundreds off that price, securing full email list peace of mind for just $49.

Prices are subject to change.

Repost: Original Source and Author Link