RBI New Guidelines for Banks: 5 ways to help you comply

The Reserve Bank of India (RBI) released a comprehensive cyber security framework for primary (urban) cooperative banks (UCBs). The RBI new guidelines are aimed at ensuring the safety of customer data and transactions, and protecting UCBs from cyberattacks. The framework is expected to help UCBs to take proactive steps to protect their networks and systems, […]

Wisdom – DMARC Deployment

Deploy SLOWLY, We strongly recommend ramping up DMARC use slowly by employing these policies in this order. First, monitor your traffic and look for anomalies in the reports, such as messages that are not yet being signed or are perhaps being spoofed. Then, when you’re comfortable with the results, change the TXT record policy setting […]

What is DMARC and what are its advantages?

This article is part of Explained Simply Series, A series that aims to explain complex terminologies in a short & concise manner. DMARC, which stands for “Domain-based Message Authentication, Reporting & Conformance”, is an email authentication protocol. It builds on the widely deployed SPF and DKIM protocols, adding a reporting function that allows senders and receivers […]

What is Email abuse ?

Anyone can send an email to anyone else, within seconds, at zero apparent cost. That is the greatest strength of the Internet mail system. It is also its greatest weakness. Because the system is biased in favor of delivery, it is prone to abuse in the form of spam, viruses, and phishing scams. The very […]

Why DMARC?

People and companies around the world suffer from the high volume of spam and phishing on the Internet. Over the years several methods have been introduced to try and identify when mail from (for example) myrealcompany.com really is, or really isn’t coming from myrealcompany.com. However: These mechanisms all work separately and  isolated from each other Each […]

DMARC – Usage, and limitation

DMARC is a great solution for preventing direct domain spoofing. When an email is sent by an unauthorized sender (whether it is sent by a malicious user, or even an unauthorized user of a department of the company that owns/operates the domain), DMARC can be used to detect the unauthorized activity and (if so configured) request […]

What is SPF ?

Sender Policy Framework (SPF) is an email validation system designed to detect and block forged or spoofed emails. This is done by verifying the sender’s email server before delivering all legitimate email to a recipient’s inbox. but How ?This is achieved when the network owner creates an SPF entry in the Domain Name System (DNS) record for […]

How can I tell if DMARC is making a difference?

A day or two after a domain owner publishes the simplest monitoring-mode DMARC record in DNS, they will begin to receive reports from DMARC receivers with statistics about email sent to them using the domain owner’s domain. In other words, if you own or operate example.com and publish a DMARC record requesting reports, you will […]

Fixes for Spoofing

Even the most optimistic experts accept that the problem will persist, though much progress is being made on technical solutions. No amount of training, it seems, will stop computer-users clicking on malicious links or opening booby-trapped attachments in fake emails, so a technical solution is needed to defeat phishing — a tactic that still provides the baseline method of network […]

4 Tips to secure yourself against being hacked

Following to our article ‘Do you know how they hacked your account? ‘, we are spotting easy to apply tips to save you against being the next victim. Antivirus Software    Antivirus software, sometimes called an anti-malware program (you can also call it AV if you want to show off), is computer software used to prevent, […]

Scroll to top