Koogle d*EPiC SWYNme BITLYme EmailMarketingTipps

Articles



antispam DKIM: Using Cryptography to Protect Your Brand From Fraud

Have you ever received an email that appeared to come from your bank, colleague, or company you've done business with, only to discover that it was spam? Even to the most discerning eyes, some of these fraudulent emails can look nearly identical to their genuine counterparts. For cybercriminals, masquerading as recognizable individuals and organizations is a tactic that makes profiteering from email scams a very lucrative venture. [...] [more]
aweber.com    Spam, Deliverability

antispam Four cents to deanonymize: Companies reverse hashed email addresses

Datafinder – Reverse email hashes for $0.04 per email: Datafinder, a company that combines online and offline consumer data, charges $0.04 per email to reverse hashed email addresses. The company promises 70% recovery rate and for a nominal fee will provide additional information along with the reversed email, including: name, address, city, state, zip and phone number. Datafinder is accredited by Better Business Bureau with an A+ rating, and its clients include T-Mobile. [...] [more]
freedom-to-tinker.com    Law, Spam

antispam Exploiting Browsers' Autofill Feature to Steal Email Addresses

Researchers at Princeton have discovered a pair of marketing firms using a browser exploit to steal email addresses across 1,100 different websites. [...] [more]
thesslstore.com    Listbuilding, Spam

antispam Is Email Tracking The Next Big Privacy Concern?

Wired magazine has come out with a damning piece on a widely used but little studied email capability: Tracking. Author Brian Merchant subscribed to the tracking service Streak, and was astounded when it told him when an email he sent was opened, and on what kind of device. "I glanced at my inbox, privy to details that gave me maybe a little too much information," he writes. [...] [more]
mediapost.com    Law, Spam

antispam How Email Open Tracking Quietly Took Over the Web

"I just came across this email," began the message, a long overdue reply. But I knew the sender was lying. He’d opened my email nearly six months ago. On a Mac. In Palo Alto. At night. I knew this because I was running the email tracking service Streak, which notified me as soon as my message had been opened. It told me where, when, and on what kind of device it was read. With Streak enabled, I felt like an inside trader whenever I glanced at my inbox, privy to details that gave me maybe a little too [...] [more]
wired.com    Spam

antispam Blogpost: Privacy implications of email tracking

What happens when you open an email and allow it to display embedded images and pixels? You may expect the sender to learn that you’ve read the email, and which device you used to read it. But in a new paper we find that privacy risks of email tracking extend far beyond senders knowing when emails are viewed. Opening an email can trigger requests to tens of third parties, and many of these requests contain your email address. This allows those third parties to track you across the web and connect you [...] [more]
freedom-to-tinker.com    Spam, Study

 antispam Study: Privacy implications of email tracking [PDF]

We show that the simple act of viewing emails contains privacy pitfalls for the unwary. We assembled a corpus of commercial mailing-list emails, and find a network of hundreds of third parties that track email recipients via methods such as embedded pixels. About 30% of emails leak the recipient’s email address to one or more of these third parties when they are viewed. In the majority of cases, these leaks are intentional on the part of email senders, and further leaks occur if the recipient click [...] [more] 
senglehardt.com    Study

antispam "Mailsploit" Lets Hackers Forge Perfect Email Spoofs

Pretending to be someone you're not in an email has never been quite hard enough—hence phishing, that eternal scourge of internet security. But now one researcher has dug up a new collection of bugs in email programs that in many cases strip away even the existing, imperfect protections against email impersonation, allowing anyone to undetectably spoof a message with no hint at all to the recipient. [...] [more]
wired.com    Study

antispam About that DMARC "exploit"

A security researcher has identified a rendering flaw that allows for “perfect” phishing emails. From his website: Mailsploit is a collection of bugs in email clients that allow effective sender spoofing and code injection attacks. The spoofing is not detected by Mail Transfer Agents (MTA) aka email servers, therefore circumventing spoofing protection mechanisms such as [...] [more]
wordtothewise.com    Spam, Deliverability

antispam Mailsploit - bugs in email clients that allow sender spoofing & code injection

Mailsploit is a new way to easily spoof email addresses. It allows the attacker to display an arbitrary sender email address to the email recipient. In the following demo I use potus@whitehouse.gov but any other email address could be used. And this is how it works: In an email, all headers must only contain ASCII characters, including the “From” header. [...] [more]
mailsploit.com    Spam

antispam Why we no longer ask for SPF records

The way most ESP's have been doing SPF is outdated. With a recent update, we've decided to remove the burden of adding SPF records for our customers. [...] [more]
postmarkapp.com    Deliverability

antispam Keeping your company data safe with new security updates to Gmail

Our detection models integrate with Google Safe Browsing machine learning technologies for finding and flagging phishy and suspicious URLs. These new models combine a variety of techniques such as reputation and similarity analysis on URLs, allowing us to generate new URL click-time warnings for phishing and malware links. As we find new patterns, our models adapt more quickly than manual systems ever could, and get better with time. [...] [more]
blog.google    Spam, Deliverability

antispam French government provides spam lists

It is not always easy to maintain a good, clean bulk emailing list, but legitimate bulk senders do it routinely. Anybody can do it if they learn how and follow best practice. France might be attempting to use such a "list rental" model. Both the examples we encountered were sent from SendinBlue's network. SendinBlue is an established ESP in France. It has the capability to properly manage a list rental service. France and SendinBlue, please take this hint that the list you are providing to your [...] [more]
spamhaus.org    Spam

antispam How the Outlook.com Spam Fighters program works

In order for Smartscreen to be both predictive and effective, it has to learn on a corpus of good and bad email. While we can always find sources of spam (through honeypots and user feedback reports), it can be difficult to acquire a corpus of good email. That’s where the Spam Fighters program comes in. The Spam Fighters program asks a random sample of users in Outlook.com if they’d like to volunteer to help fighting spam. These invitations are sent periodically, and they are randomly sampled in [more]
microsoft.com    Intelligence, Spam, Deliverability

antispam CSA Summit 2017 Recap

After giving an overview of how the CSA has developed over recent years (e.g. from 9 certification criteria in 2004 to 9 pages outlining the certification criteria in 2017), Ivanov formally handed over to the new Director of the Certified Senders Alliance, Julia Janßen-Holldiek. In a touching scene, Julia thanked Ivo for his work and leadership over the last years and presented him with a compass to symbolize his new role in the background guiding the overall direction of the CSA. The CSA team, the [...] [more]
certified-senders.eu    Event, Spam, Deliverability
Page 1 | older