DKIM Simplified

DomainKeys Identified Mail (DKIM), is a mechanism that allows verification of the source and contents of email messages. Using DKIM, sending domains can include a cryptographic signature in outgoing email messages. A message’s signature may be verified by any (or all) MTAs (mail servers) during transit and by the Mail User Agent (MUA) upon delivery. […]

The Phishing surge amidst Covid 19

Did you mask your network as well during COVID-19? COVID-19 continues to significantly embolden cybercriminals’ phishing and fraud efforts, and there is a long way to stop it. Almost nine out of 10 believed they might have security gaps as the result of the rapid move to remote working. During the pandemic the cyber-attacks soar […]

What is SPF ?

Sender Policy Framework (SPF) is an email validation system designed to detect and block forged or spoofed emails. This is done by verifying the sender’s email server before delivering all legitimate email to a recipient’s inbox. but How ?This is achieved when the network owner creates an SPF entry in the Domain Name System (DNS) record for […]

Do you know how they hacked your account? Part five: Keylogging

Keylogging  (also called keystroke logging) is a method that cyber criminals use to record (or log) the keys you strike on your keyboard in order to get confidential information about you. Of course they do this in a concealed manner, so that you won’t know you are being monitored while typing passwords, addresses and other […]

How can I tell if DMARC is making a difference?

A day or two after a domain owner publishes the simplest monitoring-mode DMARC record in DNS, they will begin to receive reports from DMARC receivers with statistics about email sent to them using the domain owner’s domain. In other words, if you own or operate example.com and publish a DMARC record requesting reports, you will […]

Fixes for Spoofing

Even the most optimistic experts accept that the problem will persist, though much progress is being made on technical solutions. No amount of training, it seems, will stop computer-users clicking on malicious links or opening booby-trapped attachments in fake emails, so a technical solution is needed to defeat phishing — a tactic that still provides the baseline method of network […]

Do you know how they hacked your account? Part four: Viruses

In this part we will highlight some of the well-known types of computer viruses Trojan A Trojan horse (commonly known as a Trojan) is a type of malware that conceals itself as a normal file or program to trick you into downloading and installing malware.A Trojan can do many dangerous things to your system, like […]

DMARC : Need of enforcement in financial institutes

Is this piece of Email legitimate or just a really good fake mail trying to deceive you? E-mails perpetuate a lot of attacks and are involved in more than 90% of malware and spoofing attacks. When there was no DMARC, organizations found it really tough to figure out if the mail is legit or not […]

4 Tips to secure yourself against being hacked

Following to our article ‘Do you know how they hacked your account? ‘, we are spotting easy to apply tips to save you against being the next victim. Antivirus Software    Antivirus software, sometimes called an anti-malware program (you can also call it AV if you want to show off), is computer software used to prevent, […]

Tips to Be Safe From Phishing Attacks

As you know, phishing is a technique that involves tricking the user to steal confidential information, password ,etc, into thinking you are a confidential site. So far the hackers have used emails to launch this type of attack, but with the widespread use of social media networks and smartphones with internet access, the types of attacking are multiplying. These emails include a link that takes the […]

Scroll to top