SecuMail-Blog

Archives

BCC

How can it be that I receive an e-mail even though I am not listed as a recipient? How does BCC work …

Mehr lesenBCC

Blacklist

A blacklist is used to defend against spam. On this list are undesirable ones: IP Addresses Email addresses Domains Web Addresses (URL) …

Mehr lesenBlacklist

CEO Fraud

Scam, CEO=”Chief Executive Officer”, German board member or managing director, Fraud=Fraud The attackers first research the managing directors and accounting staff. By …

Mehr lesenCEO Fraud

DANE

DANE stands for “DNS-based Authentication of Name Entries” and is a protocol based on DNSSEC. What do you need DANE for? TLS …

Mehr lesenDANE

DKIM

DomainKeys Identified Mail (DKIM for short) is used to secure the message header and the body of an email. In addition to …

Mehr lesenDKIM

DMARC

Domain-based Message Authentication, Reporting & Conformance, or DMARC for short, is an extension for existing SPF and DKIM records. With the DMARC …

Mehr lesenDMARC

DNS

What is the Domain Name Service (DNS) and what does it do for email services? The DNS is a fundamental Internet service …

Mehr lesenDNS

DNSSEC

DNSSEC stands for “Domain Name System Security Extensions” and is an extension of DNS. The standard is defined in several RFCs (including …

Mehr lesenDNSSEC

Encryption

Conversion of a plaintext into a ciphertext by means of a key. Encryption can be used to sign or keep messages secret. …

Mehr lesenEncryption

Google Safe Browsing

Database of characteristics of fraudulent websites. Powered by Google. Read our blog post: https://www.secumail.de/2019/02/18/besserer-schutz-vor-phishing-angriffen-mit-google-safe-browsing/

JSON

JavaScript Object Notation is a language-independent, human- and machine-readable and very compact format for serialized data exchange via ASCII. JSON includes a …

Mehr lesenJSON

Lettering

The background to the signing is, on the one hand, the verifiability of the sender. On the other hand, it serves as …

Mehr lesenLettering

Malware

What is malware? How can I protect myself and what helps if my computer is infected? The term malware refers to different …

Mehr lesenMalware

Markup language

ML (Markup Language): In this language, texts are described as such and enriched with information about layout and font properties. Example: <h1>heading</h1> …

Mehr lesenMarkup language

MIME

MIME: (Multipurpose Internet Mail Extension) MIME is a standard set out in RFC 1341 and 1342 . It is an extension of …

Mehr lesenMIME

MTA-STS

What is MTA-STS? MTA-STS stands for “Mail Transfer Agent – Strict Transport Security” and is a protocol that is intended to ensure …

Mehr lesenMTA-STS

MX

The MX record controls the delivery of the mail to your mail server. Imagine sending an email to someone outside your company. …

Mehr lesenMX

Payment method

For e-mail scams and extortion attempts, the fraudsters depend on a secure money transfer. Safe for the fraudsters means fast, irreversible and …

Mehr lesenPayment method

Phishing

Phishing stands for “password fishing” and is a method of social engineering. Through a made-up story such as “Your account has been …

Mehr lesenPhishing

Ransomware

Ransomware is a malware distributed via spam for the purpose of extortion (“ransom”) of the recipient. This is usually done by encrypting …

Mehr lesenRansomware

S/MIME

S/MIME (Secure/ Multipurpose Internet Mail Extensions) is a standard for encrypting and signing e-mails specified in RFC 8551 . You need a …

Mehr lesenS/MIME

Scams

Fraudulent e-mails can target your computer, but especially the person in front of the computer. Attack target: Computer Viruses Trojan Keylogger Malware …

Mehr lesenScams

Scareware

Fraudulently sent spam email that attempts to put pressure on the recipient and get them to take action. No malicious code is …

Mehr lesenScareware

SMTP

SMTP Simple Mail Transfer Protocol. Standard protocol for e-mail transmission between client and mail server as well as between mail servers. The …

Mehr lesenSMTP

Spam

Unsolicited and mass-sent e-mail. These account for more than 85% of the total e-mail volume and hinder productive communication via e-mail. Depending …

Mehr lesenSpam

SPF

The SPF record is an entry in the DNS of the mail domain that determines which mail servers are allowed to send …

Mehr lesenSPF

Spoofing

Spoofing is English for “deception, swindle” and means making a fake message look real. Spoofing is used in fraudulent emails to swindle …

Mehr lesenSpoofing

SSL

Secure Socket Layer SSL is a protocol that encrypts the communication between your computer and a server. Common areas of application are …

Mehr lesenSSL

TLS

What is TLS? TLS stands for “Transport Layer Security”. It is a protocol that is responsible for encrypted communication between a client …

Mehr lesenTLS

VBA

VBA (Visual Basic for Applications) is a scripting language and was originally integrated for Microsoft Office. It is intended to control processes …

Mehr lesenVBA

XML

XML stands for Extensible Markup Language and is a markup language. XML serves as a ‘set of rules’ for encoding documents in …

Mehr lesenXML

GDPR Cookie Consent with Real Cookie Banner