Stopping Forged Email 4: Your Last Resorts
Wednesday, March 4th, 2015 In previous posts we have examined how hackers and spammers can send forged email and how it can be extremely difficult to differentiate these messages from legitimate messages.  We have looked at the various common techniques for anti-fraud such as SPF, DKIM, and DMARC and seen that, while these technologies can help a lot, they all have limitations; they all require strict and proper setup by the owner of the purported sender’s domain, and they must be well supported by your own spam filtering system.
In previous posts we have examined how hackers and spammers can send forged email and how it can be extremely difficult to differentiate these messages from legitimate messages.  We have looked at the various common techniques for anti-fraud such as SPF, DKIM, and DMARC and seen that, while these technologies can help a lot, they all have limitations; they all require strict and proper setup by the owner of the purported sender’s domain, and they must be well supported by your own spam filtering system.
Yet even with these technologies, it’s not hard in many cases for a determined attacker to send you a forged, fraudulent email message that still looks and feels legitimate.
What else can you do to validate email messages and protect yourself from phishing or social engineering attacks?
Read the rest of this post »
 Email and other data are either being “transmitted” or “processed” or are “at rest.” I.e., it is moving from one computer to another, stored/at rest on a computer, or preparing to be transmitted or stored.
Email and other data are either being “transmitted” or “processed” or are “at rest.” I.e., it is moving from one computer to another, stored/at rest on a computer, or preparing to be transmitted or stored. You are proactive and security conscious.  You use end-to-end encryption software, like PGP or S/MIME or LuxSci
You are proactive and security conscious.  You use end-to-end encryption software, like PGP or S/MIME or LuxSci  LuxSci offers many options for email security. Whether it is PGP, S/MIME, LuxSci’s SecureLine end-to-end email encryption, or forced secure logins over SSL, LuxSci can guide you in making the best choices for
LuxSci offers many options for email security. Whether it is PGP, S/MIME, LuxSci’s SecureLine end-to-end email encryption, or forced secure logins over SSL, LuxSci can guide you in making the best choices for  While most people might not know what PGP encryption is, almost everyone with access to an email account uses it regularly. It’s one of the most popular ways to digitally sign, encrypt or decrypt emailed documents, adding an additional level of security of email communications. But what might sound like a fairly dry and mundane tool has a history fraught with intrigue, peril, spy agencies and very real threats to the creator, a computer scientist named Phil Zimmerman.
While most people might not know what PGP encryption is, almost everyone with access to an email account uses it regularly. It’s one of the most popular ways to digitally sign, encrypt or decrypt emailed documents, adding an additional level of security of email communications. But what might sound like a fairly dry and mundane tool has a history fraught with intrigue, peril, spy agencies and very real threats to the creator, a computer scientist named Phil Zimmerman. 


