Remove tag email
article thumbnail

Electronic bag tags are ready for take-off: Here’s what we learned on multiple flights with one

GeekWire

Alaska Airlines has made electronic bag tags available to elite Mileage Plan members, with a broader rollout planned in the first half of this year. Walking into Sea-Tac Airport for a Friday afternoon flight, I glanced smugly at the people huddled around the Alaska Airlines self-serve kiosks to print bag tags. Alaska is the first U.S.

Airlines 101
article thumbnail

Microsoft vet lands $10M for new startup that watermarks documents to identify leakers

GeekWire

EchoMark, led by CEO and founder Troy Batterberry, raised $10 million for its digital document and email watermarking tool. based startup gives customers a way to place both visible and invisible forensic markings on documents and emails to help identify leakers, or individuals who release secret information to the public.

Microsoft 118
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

CIOs Have To Treat Social Media With Care

The Accidental Successful CIO

One way that they could do this would be to craft an email tailored to your interests (“Hello fellow cat lover!”) For example, a hacker might find out personal histories from your social media, then send a phishing email that says things like: “I’m sorry about your brother’s passing. Don’t tag images. across accounts.

Media 130
article thumbnail

Ingenious Phishing Tactics in the Modern Scammer's Toolbox

SecureWorld News

From a cybercriminal's perspective, the rationale behind prioritizing these attacks is that they are both lucrative and fairly easy to execute, even more so if the theme of a fraudulent email pulls the right strings in a recipient's mind. The would-be victim then receives a notification over email asking them to respond to the comment.

Google 94
article thumbnail

Washington state tracks down another Asian giant hornet nest, with plans to eradicate it soon

GeekWire

An Asian giant hornet tagged with a radio tracker. WSDA tweeted a photo of one of the insects (above), sometimes referred to as “murder hornets,” tagged with a radio tracker. WSDA tweeted a photo of one of the insects (above), sometimes referred to as “murder hornets,” tagged with a radio tracker.

.Net 130
article thumbnail

Smooth Cybercriminals: Google Warns of Iran-Backed APT Hackers

SecureWorld News

One notorious hacking group from Iran uses particularly dirty schemes to fleece users, according to Google's Threat Analysis Group (TAG). According to Google’s TAG blog, APT35 have been active since at least 2017, including attacks on the 2020 U.S. When they did, attackers sent them phishing links in follow-on correspondence.".

Google 70
article thumbnail

Web 2.0 is Collapsing Under its Own Weight

Phil Windley

More and more of the email I receive seems to be simply directing me to log into some bespoke system to retrieve a message or engage in some workflow. There's certainly nothing about them that's more convenient, timely, or better than email for their customers 1. Email can be insecure. Cogito Ergo Sum.

Banking 50