Posts Tagged ‘mc’

What Is SPAM And How Not To Be A SPAMMER

Email spam, also known as junk email or unsolicited bulk email (UBE), is a subset of electronic spam involving nearly identical messages sent to numerous recipients by email.

Share

What Are Email Blacklists

ATTOG Technologies spam stops here image

A DNS-based Blackhole List (DNSBL) or Real-time Blackhole List (RBL) is an effort to stop email spamming. It is a “blacklist” of locations on the Internet reputed to send email spam.

Share

What Is Email Spoofing

ATTOG Technologies What is Spoofing image

Email spoofing is the creation of email messages with a forged sender address. It is easy to do because the core protocols do not have any mechanism for authentication. Spam and phishing emails typically use such spoofing to mislead the recipient about the origin of the message.

Share

Understanding Domain-based Message Authentication, Reporting and Conformance (DMARC)

ATTOG Technologies dmarc email auth flowchart

Domain-based Message Authentication, Reporting and Conformance (DMARC) is an email validation system designed to detect and prevent email spoofing.

Share

Understanding DomainKeys Identified Mail (DKIM)

ATTOG Technologies DomainKeys Identified Mail (DKIM) diagram

DomainKeys Identified Mail (DKIM) is an email authentication method designed to detect email spoofing by providing a mechanism to allow receiving mail exchangers to check that incoming mail from a domain is authorized by that domain’s administrators.

Share

Understanding Sender Policy Framework (SPF)

ATTOG Technologies SPF diagram image

Sender Policy Framework (SPF) is a simple email-validation system designed to detect email spoofing by providing a mechanism to allow receiving mail exchangers to check that incoming mail from a domain comes from a host authorized by that domain’s administrators.

Share

Phishing

Phishing is a scam where Internet fraudsters send spam or pop-up messages to lure unsuspecting victims into providing passphrases, personal, and/or financial information.

Share

Social Engineering

In computer security, social engineering is a term that describes a non-technical kind of intrusion that relies heavily on human interaction and often involves tricking or manipulating other people to divulge confidential information or break normal security procedures.

Share

What Are Phishing Scams And How Can I Avoid Them?

Phishing scams are crude social engineering tools designed to induce panic in the reader. These scams attempt to trick recipients into responding or clicking immediately, by claiming they will lose something.

Share

Encryption Explained

While the process of encrypting information is nothing new, encryption technologies are a hot topic in IT recently — with good reason. This article hopes to explain the various types of encryption as used regularly by IT pros.

Share

Passphrase Vaulting

Think of a passphrase vault as being similar to a bank vault; only with the vault combination (passphrase) can you unlock the protected items inside (other passphrases).

Share

Passwords And Passphrases, Your Most Common Security Measure

The first and most common piece of security everyone is aware of and using is a password or hopefully a passphrase.

Share

Privacy And Security In Uncertain Times

Recently I was at a conference and the subject of computer and Internet security came up.  That, coupled with all that has been in the news lately, helped me decide to do a series of posts covering some of my general security suggestions.

Share