Security

Identity Theft: How attackers get hold of your details

Ever wondered how someone got hold of your details? As per recent headlines, it turns out it’s easier than you think… If you haven’t seen the film Identity Thief, spoiler alert! It’s a perfect rainy day movie and stars the ever hilarious Melissa McCarthy in the brilliant but ridiculous story of a guy who gets his…Continue Reading: Identity Theft: How attackers get hold of your details

Mailsploit: is there a problem with DMARC?

Sensationalist articles recently posted in a number of media outlets claim DMARC can be bypassed due to shortcomings in the way that email clients handle the ‘from’ header. However, after examining the evidence given we’d argue that it’s not a DMARC shortcoming, rather a matter of poor implementation by email clients…Continue Reading: Mailsploit: is there a problem with DMARC?

The internet is 50 years old but email scams are still rife

While email turned 50 years old in November 2021, it wasn’t until the commercialization of the internet in the mid-90s that it truly took off as one of the world’s preeminent communications tools. Unfortunately, its rise also spawned meteoric misuse as unscrupulous scammers began peddling unwanted products, bogus deals, and even computer viruses to the masses…Continue Reading: The internet is 50 years old but email scams are still rife

Protecting Charities with DMARC

A simple way for charities to protect themselves from exact domain impersonation and fraud is by implementing a strong DMARC policy. DMARC is an email security protocol that when implemented at p=reject protects your domain from being impersonated by cybercriminals and used in some of the most advanced phishing attacks. …Continue Reading: Protecting Charities with DMARC