
Journal blue234's Journal: Protecting Yourself From Fraudulent E-Mails
How do you Protect Yourself From Fraudulent E-Mails
Unfortunately, the standard method of E-Mail communication over the Internet uses the Simple Mail Transfer Protocol (SMTP). This protocol was designed to transmit 7-bit ASCII character data between two IP hosts using the simplest and most efficient method possible. Security was an afterthought and security systems are almost never implemented by default in an SMTP-based mail system. Threats against an E-Mail system and its users have emerged just as quickly as the growth of the number of mailboxes. That brings us to a well-known E-Mail topic called "Phishing".
Phishing schemes have emerged as one of the biggest threats to users personally. Phishing comes from the idea that you toss out a line and see who will grab it. The messages usually look reasonably legitimate and may actually appear to come from an organization from which you do business.
Protecting Yourself From Fraudulent E-Mails More Login
Protecting Yourself From Fraudulent E-Mails
Slashdot Top Deals