Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
User Journal

Journal blue234's Journal: Protecting Yourself From Fraudulent E-Mails

How do you Protect Yourself From Fraudulent E-Mails Unfortunately, the standard method of E-Mail communication over the Internet uses the Simple Mail Transfer Protocol (SMTP). This protocol was designed to transmit 7-bit ASCII character data between two IP hosts using the simplest and most efficient method possible. Security was an afterthought and security systems are almost never implemented by default in an SMTP-based mail system. Threats against an E-Mail system and its users have emerged just as quickly as the growth of the number of mailboxes. That brings us to a well-known E-Mail topic called "Phishing". Phishing schemes have emerged as one of the biggest threats to users personally. Phishing comes from the idea that you toss out a line and see who will grab it. The messages usually look reasonably legitimate and may actually appear to come from an organization from which you do business.
This discussion has been archived. No new comments can be posted.

Protecting Yourself From Fraudulent E-Mails

Comments Filter:

Know Thy User.

Working...