BCC
How can it be that I receive an e-mail even though I am not listed as a recipient? How does BCC work …
How can it be that I receive an e-mail even though I am not listed as a recipient? How does BCC work …
A blacklist is used to defend against spam. On this list are undesirable ones: IP Addresses Email addresses Domains Web Addresses (URL) …
Scam, CEO=”Chief Executive Officer”, German board member or managing director, Fraud=Fraud The attackers first research the managing directors and accounting staff. By …
DANE stands for “DNS-based Authentication of Name Entries” and is a protocol based on DNSSEC. What do you need DANE for? TLS …
DomainKeys Identified Mail (DKIM for short) is used to secure the message header and the body of an email. In addition to …
Domain-based Message Authentication, Reporting & Conformance, or DMARC for short, is an extension for existing SPF and DKIM records. With the DMARC …
What is the Domain Name Service (DNS) and what does it do for email services? The DNS is a fundamental Internet service …
DNSSEC stands for “Domain Name System Security Extensions” and is an extension of DNS. The standard is defined in several RFCs (including …
Conversion of a plaintext into a ciphertext by means of a key. Encryption can be used to sign or keep messages secret. …
Database of characteristics of fraudulent websites. Powered by Google. Read our blog post: https://www.secumail.de/2019/02/18/besserer-schutz-vor-phishing-angriffen-mit-google-safe-browsing/
JavaScript Object Notation is a language-independent, human- and machine-readable and very compact format for serialized data exchange via ASCII. JSON includes a …
The background to the signing is, on the one hand, the verifiability of the sender. On the other hand, it serves as …
What is malware? How can I protect myself and what helps if my computer is infected? The term malware refers to different …
ML (Markup Language): In this language, texts are described as such and enriched with information about layout and font properties. Example: <h1>heading</h1> …
MIME: (Multipurpose Internet Mail Extension) MIME is a standard set out in RFC 1341 and 1342 . It is an extension of …
What is MTA-STS? MTA-STS stands for “Mail Transfer Agent – Strict Transport Security” and is a protocol that is intended to ensure …
The MX record controls the delivery of the mail to your mail server. Imagine sending an email to someone outside your company. …
For e-mail scams and extortion attempts, the fraudsters depend on a secure money transfer. Safe for the fraudsters means fast, irreversible and …
Phishing stands for “password fishing” and is a method of social engineering. Through a made-up story such as “Your account has been …
Ransomware is a malware distributed via spam for the purpose of extortion (“ransom”) of the recipient. This is usually done by encrypting …
S/MIME (Secure/ Multipurpose Internet Mail Extensions) is a standard for encrypting and signing e-mails specified in RFC 8551 . You need a …
Fraudulent e-mails can target your computer, but especially the person in front of the computer. Attack target: Computer Viruses Trojan Keylogger Malware …
Fraudulently sent spam email that attempts to put pressure on the recipient and get them to take action. No malicious code is …
SMTP Simple Mail Transfer Protocol. Standard protocol for e-mail transmission between client and mail server as well as between mail servers. The …
Unsolicited and mass-sent e-mail. These account for more than 85% of the total e-mail volume and hinder productive communication via e-mail. Depending …
The SPF record is an entry in the DNS of the mail domain that determines which mail servers are allowed to send …
Spoofing is English for “deception, swindle” and means making a fake message look real. Spoofing is used in fraudulent emails to swindle …
Secure Socket Layer SSL is a protocol that encrypts the communication between your computer and a server. Common areas of application are …
What is TLS? TLS stands for “Transport Layer Security”. It is a protocol that is responsible for encrypted communication between a client …
VBA (Visual Basic for Applications) is a scripting language and was originally integrated for Microsoft Office. It is intended to control processes …
XML stands for Extensible Markup Language and is a markup language. XML serves as a ‘set of rules’ for encoding documents in …