Tagged articles
5 articles
Page 1 of 1
Black & White Path
Black & White Path
Apr 20, 2026 · Information Security

How Apple’s Trusted Email System Was Exploited for Phishing Attacks

A sophisticated phishing campaign abused Apple’s account‑change notification template, injecting malicious content into a legitimately signed email, which bypassed SPF, DKIM and DMARC checks and achieved near‑100% delivery, while also evolving into a “telephone‑oriented” social‑engineering variant.

AppleDKIMDMARC
0 likes · 7 min read
How Apple’s Trusted Email System Was Exploited for Phishing Attacks
Open Source Linux
Open Source Linux
Apr 15, 2023 · Information Security

Understanding Phishing: Types, Tactics, and Prevention Strategies

This article explains how phishing exploits human psychology, outlines common phishing variants such as email, spear, whaling, business email compromise, smishing, vishing, social‑media, pharming and evil‑twin attacks, and provides practical measures to recognize and defend against them.

cyberattack preventionemail securityinformation security
0 likes · 10 min read
Understanding Phishing: Types, Tactics, and Prevention Strategies
Laravel Tech Community
Laravel Tech Community
Dec 28, 2022 · Information Security

Apache SpamAssassin 4.0 – New Features and Improvements

Apache SpamAssassin 4.0 introduces comprehensive Unicode support, enhanced geolocation, improved Bayesian filtering for non‑English mail, better SSL client certificate handling, new DKIM/SPF and URL‑expansion plugins, and an ExtractText plugin for attachment analysis, representing a major upgrade over the 3.4 series.

Bayesian FilteringSpamAssassinUTF-8
0 likes · 3 min read
Apache SpamAssassin 4.0 – New Features and Improvements
Laravel Tech Community
Laravel Tech Community
Oct 20, 2022 · Information Security

The Importance of Phishing Email Simulations for Organizational Security

Recent research shows that nearly 60% of organizations suffered data loss due to employee email mistakes, highlighting the severe risks of phishing attacks and underscoring the need for realistic phishing simulation exercises to improve security awareness and protect against financial and reputational damage.

email securityphishingsecurity awareness
0 likes · 3 min read
The Importance of Phishing Email Simulations for Organizational Security
Sohu Tech Products
Sohu Tech Products
Sep 7, 2022 · Information Security

Phishing Techniques: Theory, Classification, and Defense Strategies

The article provides a comprehensive overview of phishing as a social‑engineering attack, detailing its various techniques—including email deception, spear‑phishing, whaling, malware‑based lures, domain spoofing, vishing, SMS and QR‑code scams—and offers practical defense measures such as anti‑phishing tools, multi‑factor authentication, content filtering, and security standards.

Defense Strategiesemail securitymalware
0 likes · 14 min read
Phishing Techniques: Theory, Classification, and Defense Strategies