CARVIEW |
- Home
-
Topics
-
Blogs
-
News
-
Community
-
Industry
Email / Recently Commented
Do You Need a License to Look for Spam?
Jay Fink had an interesting little business. If you lived in California, you could give him access to your email account; he'd look through the spam folder for spam that appeared to violate the state anti-spam law and give you a spreadsheet and a file of PDFs. You could then sue the spammers, and if you won, you'd give Fink part of the money as his fee. more
- John Levine
- Comments: 3
- Views: 22,990
Minding Your IP Address Reputation
Network operators rely on guidance from IP address experts because not all IP addresses used on the Internet are the same. The "reputation" of email senders is especially important because some are malicious users of the system. But identifying "senders" based on their email addresses or the individual IP address of a user presents issues that are unnecessarily complex. more
- Lee Howard
- Comments: 1
- Views: 28,112
How the Verified Mark Certificate (VMC) Makes the Mailbox Safer
Nowadays, with increasing digitalization and internet usage, email is a central communication tool. This holds true even despite the high popularity of instant messaging apps and social media. Email remains the favorite means of business communication worldwide, both in B2B and B2C. In 2019, 293.6 billion emails were sent and received. By 2025, this number will grow even more. It is predicted that we will send and receive 376.4 billion emails per day. In this scenario, implementing security features for email communications has become absolutely essential. more
- Simone Catania
- Comments: 3
- Views: 16,837
Universal Acceptance – Making the Internet Work for Everyone
Back in 2014, to foster innovation and to better the choice in domain names, ICANN introduced new generic top-level domains through its New gTLD Program. It was a monumental move that enabled businesses, individuals, and communities across the globe to mark their presence on the Internet. Allowing users to be present digitally in their chosen language (non-ASCII characters and scripts) gave opportunities to local businesses, civil societies, and governments to better serve their communities. more
- Aman Masjide
- Comments: 3
- Views: 19,877
Innovation, Launches and Email: New gTLDs Deliver in Q3 2020
As the third quarter of 2020 winds down, the domain industry continues to show development and progression amid uncertain global economic conditions. From improvements in products and additional TLD launches to growth in .brand email usage and upcoming virtual meetings, the Q3 2020: New gTLD Quarterly Report from our MarkMonitor team has a little something for everyone. more
- Chris Niemi
- Comments: 1
- Views: 9,722
Implementing Natural Language Processing in Your SMB Organization: Now or Never!
If you have already adopted AI in your small or mid-size organization, congratulations. If not, the urgency of adopting should be a top priority. You will become a laggard and most likely obsolete given the supercycle of innovation we are currently in. Implementing AI is quite different from other organization-wide strategies because it involves highly specific characteristics and expert resource pools that SMBs might not be able to access. more
- Fred Tabsharani
- Comments: 3
- Views: 10,316
RIP Don Blumenthal
It is with a heavy heart that we note the passing of a dear friend, colleague and member of the CAUCE board of directors, Don Blumenthal, on September 28, 2019, in Ann Arbor, Michigan. He was 67. Don was an anti-spammer for as long a there was an anti-spam community: he helped design, deploy and maintain the famous 'Spam Fridge,' the repository of junk email maintained by the Federal Trade Commission (FTC). more
- Neil Schwartzman
- Comments: 2
- Views: 18,598
Business Email Compromised (BEC) Scams Explode Under the GDPR Implementation
Business email compromised (BEC) attacks targeting American companies are exploding, with an increase of over 476% in incidents between Q4 2017 and Q4 2018. Up as well is email fraud with companies experiencing an increase of over 226%. These highly targeted attacks use social engineering to identify specific company employees, usually in the finance department and then convince these employees to wire large sums of money to third-party banking accounts owned by the attackers. more
- Frederick Felman
- Comments: 1
- Views: 12,465
What Does It Mean to Deploy DMARC?
The IETF's DMARC working group is thinking about a maintenance update to the DMARC spec, fixing bits that are unclear and perhaps changing it where what mail servers do doesn't exactly agree with what it says. Someone noted that a lot of mailers claim to have "deployed DMARC," and it's not at all clear what that really means. ... I've suggested that we could write a DMARC deployment guide that describes the parts of DMARC, the ways they interact and in what sequence it's useful to deploy them. If you'd find that useful, leave a comment. more
- John Levine
- Comments: 2
- Views: 8,954
Strange Email Used to Inform Marriott Customers About the Massive Data Breach
Millions of email warnings were sent out by Marriot on Friday to warn customers about the massive data breach which has affected close to half a billion guest data. more
- CircleID Reporter
- Comments: 1
- Views: 13,470
Why Foldering Adds Very Little Security
I keep hearing stories of people using "foldering" for covert communications. Foldering is the process of composing a message for another party, but instead of sending it as an email, you leave it in the Drafts folder. The other party then logs in to the same email account and reads the message; they can then reply via the same technique. Foldering has been used for a long time, most famously by then-CIA director David Petraeus and his biographer/lover Paula Broadwell. Why is foldering used? more
- Steven Bellovin
- Comments: 2
- Views: 18,291
GDPR PII Time-Bomb? Kill it With Fire!
Hi! My name is spamfighter. I investigate spam and phish in a post-GDPR dystopia. Recently, I invented Fire, to save you millions of €uros. One day, my Boss suggested I automate some of my processes. I, for one, welcome our Robot Overlords (and a happy boss), but I can be exacting about the tools I use. Perhaps not to the degree of the infamous Van Halen 'no brown M&M's' contractual clause but I have no patience for poorly-designed software, and truly dislike typing when... more
- Neil Schwartzman
- Comments: 3
- Views: 22,561
Why I Want a .PAYPAL New gTLD
I use Paypal, and I am quite satisfied with how it helps me with my business: it is still a little hard to use, and I don't use all functions of the tool, but it is not so expensive, it is fast and efficient, and Paypal does not send so many emails. In one word, Paypal rocks... The only problem that I have with Paypal is the number of fake emails that I receive. Of course, I easily identify them as they come in and luckily, G Suite (Gmail) does an excellent job at blocking all spam and phishing. more
- Jean Guillon
- Comments: 8
- Views: 18,388
I Never Signed Up for This! Privacy Implications of Email Tracking
What happens when you open an email and allow it to display embedded images and pixels? You may expect the sender to learn that you've read the email, and which device you used to read it. But in a new paper we find that privacy risks of email tracking extend far beyond senders knowing when emails are viewed. Opening an email can trigger requests to tens of third parties, and many of these requests contain your email address. more
- Steven Englehardt
- Comments: 1
- Views: 16,361
Universal Acceptance of New Top-Level Domains Reloaded
One challenge for all new top-level domains (TLDs) is the so-called Universal Acceptance. Universal Acceptance is a phenomenon as old as TLDs exist and may strike at many occasions... The effect when universal acceptance hits you is that you cannot send or receive email, get error messages or even worse when it looks like everything works but it does not and you do not even get a notification. more
- Dirk Krischenowski
- Comments: 2
- Views: 15,563
Industry Updates
Probing an Active Digital Trail of Iranian Hackers
- By WhoisXML API
- Oct 04, 2022
Given a Malicious Email Address, What Can You Discover with Maltego’s WhoisXML API Transforms?
- By WhoisXML API
- May 21, 2021
Come April, Nothing Is Certain Except Phishing and Taxes
- By WhoisXML API
- Mar 30, 2021
Business Email Compromise Attacks: The Big Phishing Scam That’s Easily Missed
- By CSC
- Nov 20, 2020
MarkMonitor Releases New gTLD Quarterly Report for Q3 2020
- By MarkMonitor
- Oct 01, 2020
Addressing Business Email Compromise in the Time of Coronavirus with Email Validation
- By WhoisXML API
- May 04, 2020
Using Email Validation Tools to Stop Malspam Campaigns in Their Tracks
- By WhoisXML API
- Mar 17, 2020
Fight Against Phishing: Email Address Verification as a Cybersecurity Process
- By WhoisXML API
- Feb 26, 2020
The Need for Email Address Verification in Light of Subpoena-Themed Phishing Attacks
- By WhoisXML API
- Dec 17, 2019
Common Threats That Can Be Overcome by Email Verification
- By WhoisXML API
- Sep 18, 2019
Why Suspicious Email Addresses Must be Verified
- By WhoisXML API
- Jun 28, 2019
5 Reasons Why Businesses Must Do Email Verification
- By WhoisXML API
- Jun 12, 2019
IP Geolocation: How to Locate and Stop Phishing Threats
- By WhoisXML API
- Jun 11, 2019
How the Best IP Geolocation API Can Support Cybersecurity Efforts
- By WhoisXML API
- May 23, 2019
Port25 Announces Release of PowerMTA V4.5r5
- By Port25
- Jun 16, 2016
SECTIONS: Home | Topics | Featured Blogs | News Briefs | Industry Updates | Community
TERMS OF USE: Codes of Conduct | Privacy Policy | Terms of Use
Copyright © 2002-2025 CircleID. All rights reserved unless where otherwise noted.
Local Time: Monday, July 14, 2025 03:27 PM PDT – Page Load: 2.3598 Sec.