spam-control system can take a lot of the fun and utility out of electronic communications, but at least you can trust e-mail that comes from people you know – except when you can’t. A favorite technique of spammers and other “bad guys” is to “spoof” their return email sender, making it look as if the mail came from someone else. In effect, this is a form of identity theft, as the sender pretends to be someone else in order to persuade the recipient to do something (from simply opening the message to sending money or revealing personal information). In this article, we look at how e-mail spoofing works and what can be done about it, examining such solutions as the Sender Policy Framework (SPF) and Microsoft’s Sender ID, which is based on it. If you receive a snail mail letter, you look to the return address in the top left corner as an indicator of where it originated. However, the sender could write any name and address there; you have no assurance that the letter really is from that person and address. E-mail messages contain return addresses, too – but they can likewise be deliberately misleading, or “spoofed.” Senders do this for various reasons, including: * The e-mail is spam and the sender doesn’t want to be subjected to anti-spam laws * The e-mail constitutes a violation of some other law (for example, it is threatening or harassing) * The e-mail contains a virus or Trojan and the sender believes you are more likely to open it if it appears to be from someone you know * The e-mail requests information that you might be willing to give to the person the sender is pretending to be (for example, a sender might pose as your company’s system administrator and ask for your network password), as part of a “social engineering” attack * The sender is attempting to cause trouble for someone by pretending to be that person (for example, to make it look as though a political rival or personal email sender said something he/she didn’t in an e-mail message) Note: “Phishing” – the practice of attempting to obtain users’ credit card or online banking information, often incorporates e-mail spoofing. For example, a “phisher” may send e-mail that looks as if it comes from the bank’s or credit card’s administrative department, asking the user to log onto a Web page (which purports to be the bank’s or credit card company’s site but really is set up by the “phisher”) and enter passwords, account numbers, and other personal information. Whatever the motivation, the objective of spoofed email sender is to hide the real identity of the sender. This can be done because the Simple Mail Transfer Protocol (SMTP) does not require authentication (unlike some other, more secure protocols). A sender can use a fictitious return address or a valid address that belongs to someone else. Receiving mail from spoofed addresses ranges from annoying to dangerous (if you’re taken in by a “phisher”). Having your own address spoofed can be even worse. If a spammer uses your address as the return address, you may suddenly find yourself inundated with angry complaints from recipients or even have your address added to “spammer” lists that results in your mail being banned from many servers. How Spoofing Works In its simplest (and most easily detected) form, e-mail spoofing involves simply setting the display name or “from” field of outgoing messages to show a name or address other than the actual one from which the message is sent. Most POP e-mail clients allow you to change the text displayed in this field to whatever you want. For example, when you set up a mail account in Outlook Express, you are asked to enter a display name, which can be anything you want, as shown in Figure 1. If your e-mail does not have a Sender ID, Microsoft wants to junk your email sender. Sometime around November, Hotmail and MSN will flag as potential spam those messages that do not have the tag to verify the sender, Craig Spiezle, a director in the technology care and safety group at the software maker said Wednesday. The move is meant to spur adoption of Sender ID, he said.
Top 10 Gadgets Presented In The 2015 Consumer Electronics ShowFollowJangoMail employees sure love their dogs! #NationalPetDay #dogsoftwitter #dogs #dogpeople https://t.co/7vJcz97ya7
Email Marketing (@JangoMail) 11,04,2016FollowRT @adam_meshot: Highly interactive #emailmarketing strategery sesh at @theeec LA. Special thanks to the @edmunds team for hosting! https:/…
Adam Meshot (@adam_meshot) 13,06,2016FollowChaos in den Wahllokalen: 59 Millionen Stimmen pro Brexit... http://spon.de/aeL84
SPIEGEL SPAM (@SPIEGEL_SPAM) 23,06,2016Follow@TedMakovsky We took a stab at a “How to Market to Men” infographic. As a male marketer, what do you think? http://bit.ly/28SwzK5
Ted Makovsky (@TedMakovsky) 24,06,2016