5 Ways to stop Social Engineering Attacks

What is social engineering, anyway?  Social engineering is when someone deceives someone else into revealing information that can be exploited. Social engineers will convince their target to give them crucial information or access or even send money. Security programs and systems are now stronger than ever, but social engineers have moved towards another target, they […]

Why am I receiving spam mail from my own domain?

Spam Mailing is a form of mischief where one abuses your email address and is only one of many techniques spammers use to throw their bugs into our mailboxes. Since the start of sends, anybody can send email to anybody all throughout the globe, in no time, at zero clear expense. Obviously what appeared to […]

What is BIMI? How it can enhance your brand protection?

With phishing, spoofing, and fraudulent emails on the rise, recipients are increasingly suspicious of messages in their inbox. It has become significant to have more security. To add one more layer of email security (and to construct brand perceivability), that is the place where BIMI bounces in with it’s all new guidelines of insurance and […]

“Mail from” and “From” header

In simple terms MAIL FROM – Mr.Blue used XYZ post office to send a mail envelope to Mr.Red, and if Mr.Red’s post office cant locate Mr. Red then the envelope can be sent back to XYZ Post office to be returned to Mr.BlueFROM – This message is FROM Mr.Blue to Mr. Red (Receiver). Now the technical […]

What is Email abuse ?

Anyone can send an email to anyone else, within seconds, at zero apparent cost. That is the greatest strength of the Internet mail system. It is also its greatest weakness. Because the system is biased in favor of delivery, it is prone to abuse in the form of spam, viruses, and phishing scams. The very […]

Forging the sender address

One of the ways an attacker tries to penetrate an organisation is by emails. An attacker in a remote part of the planet can send a malicious email and start attacking an organisation. For obvious reasons an attacker would not want to be identified, therefore the attacker forges the sender address to cover his/her tracks. […]

Types of E-Mail Abuse where the Sender Address is Forged

Spammers  – As they want to avoid receiving non-delivery notifications (bounces) to their real addresses. Fraudsters  – As they want to cover their tracks and remain anonymous. Computer worms – Worms want to cause confusion or just don’t care about which sender addresses they use. Phishers (password fishers) want to impersonate well-known, trusted identities in order […]

Phishing: The emergence of sinister side of the corporate world

“Success is how high you bounce when you hit bottom.” – General George Patton Well it seems like the youths of India are hitting the “bottom” so hard these days that their desires of bouncing back to the top, has blinded them from scrutinizing whether the opportunities they are getting are genuine or not. The […]

How to Identify a Phishing Email?

Phishing is the malicious way to deceive and take advantage of users using different mediums. Phishing attacks are targeted at stealing important, confidential information such as usernames, passwords, credit card information, network token, and more. Both individuals and organizations are at risk. Virtually any kind of private or corporate information can be targeted, whether for […]

What is SPF? Why use SPF & What are its limitations?

Sender Policy Framework(SPF) is a technological framework that helps to protect email senders and receivers against spam, spoofing, and phishing. In particular, it defines a way to validate the sending of an email message from an authorized mail server to detect forgery and prevent spam. SPF Record: An SPF record is included in the DNS […]

Scroll to top