Search for: "dkim" Results 1 - 20 of 22
Sort by Relevance | Sort by Date
RSS Subscribe: 20 results | 100 results
7 Jun 2023, 7:09 am by Benjamin Wanger
Enabling email authentication methods such as DMARC and DKIM on email domains, which generally makes certain forms of email spoofing more difficult. [read post]
15 Nov 2022, 11:26 am by Jonathan Bailey
Though email would get other verification tools, most notably DKIM, SPF and DMARC, they all operated on the server/domain name side and required nothing from the actual user. [read post]
23 Mar 2021, 7:55 am by Kurt Alaybeyoglu, Alan Wehler
Fortunately, initiatives such as DomainKeys Identified Mail (DKIM) offer an example for how new standards can be applied to existing email systems to make them more secure. [read post]
28 Aug 2020, 4:39 pm by INFORRM
The report observes that despite 30% of organisations indicating that they had experienced people fraudulently impersonating the organisation in emails, very few had configured the 3 technical anti-spoofing controls recommended by the NCSC (namely SPF, DKIM and DMARC). [read post]
31 Jan 2019, 12:03 am by Nicholas Moline
Welcome to another installment of our Collaborative Law Firm series, where we cover different technological services used to foster intra-company collaboration and communication. [read post]
4 Dec 2018, 4:51 pm by Nicholas Moline
Domains that implement SPF, DKIM and DMARC make it difficult for spammers to forge the “from” address to be from that domain, and when they try, spam filters are highly likely to catch the spam. [read post]
23 Feb 2018, 1:50 pm by Joona Hoikkala
The impact to mail delivery stems from mail-specific TXT records, namely SPF, DKIM, its extension ADSP and DMARC. [read post]
20 Jun 2017, 6:59 pm by Sabrina I. Pacifici
Use of DKIM (an email authentication standard) at the top-level (corporate) domain grew substantially, from 44% to 56%. [read post]
25 Dec 2016, 5:34 pm by Joseph Bonneau
There are a lot of caveats to these signatures: some of the emails were from outside addresses not supporting DKIM and hence could have been modified, DKIM only asserts that a specific email server sent the messages (and not any individual user) so it's possible the hillaryclinton.com DKIM key was stolen or used by a malicious insider, and it's possible the leaked email caches were modified by omitting some emails (which DKIM evidence would not reveal). [read post]
4 Sep 2016, 2:37 pm by Mark Rosch
Google automatically uses two separate methods to attempt to authenticate a message's sender - Sender Policy Framework (SPF) or the DomainKeys Identified Mail (DKIM) standard. [read post]
1 Aug 2016, 4:51 am by Nicholas Weaver
 Attachments and links should be automatically quarantined unless the sender is known and the communication verified with valid DKIM. [read post]
14 Nov 2015, 7:02 pm by Sabrina I. Pacifici
In this work, we present the first report on global adoption rates of SMTP security extensions, including: STARTTLS, SPF, DKIM, and DMARC. [read post]
30 Oct 2012, 3:30 am by Kim Zetter
The researcher, who asked us to use his hacker handle “Quincy Robertson,” uncovered the DKIM problem with third-party emailers last year after another researcher named John Graham-Cumming found that Facebook was using a weak DKIM key in 2010. [read post]
30 Oct 2012, 3:30 am by Kim Zetter
The researcher, who asked us to use his hacker handle “Quincy Robertson,” uncovered the DKIM problem with third-party e-mailers last year after another researcher named John Graham-Cumming found that Facebook was using a weak DKIM key in 2010. [read post]
30 Oct 2012, 3:30 am by Kim Zetter
The researcher, who asked us to use his hacker handle “Quincy Robertson,” uncovered the DKIM problem with third-party emailers last year after another researcher named John Graham-Cumming found that Facebook was using a weak DKIM key in 2010. [read post]
16 Sep 2012, 8:44 am by David Ma
postfix/dovecot/amavisd-new/clamav/spamassassin/sasl/tls/dkim/horde/imp – we need to talk. i'm leaving you for gmail. # most file sharers are monitored within 3 hours. scary. for filesharers. http://t.co/8ltWG5BY # can't get a tesla? [read post]
15 Feb 2012, 8:48 am by Rob Robinson
 bit.ly/zfBOsG (Douglas Wood) Why eDiscovery Costs Too Much - bit.ly/AlwcAJ (Jason Krause) What Sun Tzu Can Teach Us About eDiscovery - bit.ly/y4RXps (Dave Walton) Reports and Resources A Delicate Balance | Organizational Barriers to Evidence-Based Management - bit.ly/xnjND8 (James Guszcza, Anthony Freda) A Methodology for Internal Web Ethics - bit.ly/wfROUP (Michalis Vafopoulos, Petros Stefaneas, Ioannis Anagnostopoulos, Kieron… [read post]
9 Feb 2011, 12:31 pm by Jonathan Bailey
If you are a Google Apps user, you can learn how to use DKIM here. 6. [read post]
2 Jun 2010, 5:50 pm by emonlinemedia
  As explained by George Bilbrey in his article "The Myths (And Truth) About Domain Reputation," one of the consequences of the trend towards domain-based reputation is that marketers looking to maximize deliverability need to authenticate their domains with Domain Keys (DKIM) in order to take advantage of what domain reputation has to offer. [read post]
17 Feb 2010, 5:50 pm by emonlinemedia
  As explained by George Bilbrey in his article "The Myths (And Truth) About Domain Reputation," one of the consequences of the trend towards domain-based reputation is that marketers looking to maximize deliverability need to authenticate their domains with Domain Keys (DKIM) in order to take advantage of what domain reputation has to offer. [read post]