Virus Bulletin

Displaying 1-2 of 2 results

  • White Papers // Apr 2009

    Mail Authentication With Domain Keys Identified Mail - Part One

    Message authentication is a promising technique that can be used to help separate wanted email from unwanted email, and Domain Keys Identified Mail (DKIM) is an authentication technique that seems likely to gain wide acceptance. John Levine looks at what message authentication is and how DKIM works. Message authentication is...

    Provided By Virus Bulletin

  • White Papers // Dec 2008

    Fighting Phishing at the Browser Level

    Phishing can no longer be considered a new and emerging phenomenon. Fake websites impersonating both national and international financial institutions appear everywhere, trying to manipulate users into giving away their credentials. This paper describes a method that attempts to deal with the phishing problem at the browser level, by combining...

    Provided By Virus Bulletin

  • White Papers // Dec 2008

    Fighting Phishing at the Browser Level

    Phishing can no longer be considered a new and emerging phenomenon. Fake websites impersonating both national and international financial institutions appear everywhere, trying to manipulate users into giving away their credentials. This paper describes a method that attempts to deal with the phishing problem at the browser level, by combining...

    Provided By Virus Bulletin

  • White Papers // Apr 2009

    Mail Authentication With Domain Keys Identified Mail - Part One

    Message authentication is a promising technique that can be used to help separate wanted email from unwanted email, and Domain Keys Identified Mail (DKIM) is an authentication technique that seems likely to gain wide acceptance. John Levine looks at what message authentication is and how DKIM works. Message authentication is...

    Provided By Virus Bulletin