
DKIM is a widely used method for the authentication of emails. But when DKIM is not used correctly, it is not effective and can offer a false sense of security. For this reason, here we have summarize...
DKIM is a widely used method for the authentication of emails. But when DKIM is not used correctly, it is not effective and can offer a false sense of security. For this reason, here we have summarize...
1. Background DKIM is a widely used method for the authentication of emails. But when DKIM is not used correctly, it is not effective and can offer a false sense of security. For this reason, here we...
In the first place, what is phishing? Phishing is an invented word cobbled out of the two words “password” and “fishing”. Criminals use fake emails to try to obtain personal data – in particular ...
In the first place, what is phishing? Phishing is an invented word cobbled out of the two words “password” and “fishing”. Criminals use fake emails to try to obtain personal data – in particular logi...
Bounce management or bounce handling refers to the processing of returns, also known as non-delivery notification or non-delivery report (NDN or NDR), in email transmission. The aim is to remove unrea...
The European General Data Protection Regulation (GDPR) will introduce numerous changes, with implications for the widest range of sectors. You can gain an overview of some of the possible consequences...
The European General Data Protection Regulation (GDPR) will introduce numerous changes, with implications for the widest range of sectors. You can gain an overview of some of the possible consequences...
Commissioning a mail server is initially not terribly complicated, but at the latest when it comes to keeping an eye on your reputation, or if you want to implement authentication measures like SPF (S...
The issue in brief Recently, the German Federal High Court of Justice (BGH) looked at the question of whether a pre-formulated declaration of consent was “concrete” enough to serve as permission for ...
Validating an email address is a really hard task. Some tried huge regular expressions to solve this, but they are unreadable and do not cover every case. This leads to the conclusion that, as a sende...