Questions tagged [email]
Related to email protocols, clients, servers, content, and message format.
1,800
questions
1
vote
0
answers
28
views
Why can't I receive a confirmaiton email for my registration on a website in Italy? [closed]
I am trying to register for the Italian Museum website so that I can purchase tickets to the Pantheon and other sites. However, to complete my registration the site sends me a confirmation email that ...
1
vote
0
answers
21
views
In WHM/cPanel > Exim Config, how to prevent SendGrid API key from being breached?
Running a WHM/cPanel system on CentOS v7.9.2009 (STANDARD kvm) and cPanel Version 110.0.34.
We use WHM Exim Config with SendGrid for email forwarding.
In the last 3 months, our SendGrid account has ...
2
votes
0
answers
20
views
In MS Purview DLP, how do I prevent inline (in body) images when sending Exchange EMail?
In Microsoft Purview DLP (Data Loss Prevention), how do I prevent inline (in body) images when sending Exchange EMail?
My last attempt at a DLP Rule, summary:
Header contains words or phrases: Content-...
1
vote
1
answer
55
views
What are the risk of using http when capturing open events on an email
I want to configure a custom domain for open and click tracking in Amazon Simple Email Service (SES). However, I've encountered a limitation where Amazon SES only allows HTTPS domains for tracking ...
0
votes
0
answers
51
views
Best Practices re: changing email address post fraud
Scenario: Successful fraud attempt via phone call. Victim speaks to fraudster and gets tricked into email transfer of funds due to some situation i.e. falsified family emergency (grandson is injured ...
0
votes
1
answer
62
views
Mails in my iCloud mailbox with a foreign mail address as recipient
How is it possible that my iCloud address is not the recipient but has been spoofed in some way?
I don't have any forwarding active and I don't know the sender or recipient addresses.
0
votes
0
answers
59
views
Locating Spambot
My mail server (IP, not domains) was recently flagged as a spam source by Spamhaus and I'm looking for help at tracking down the source.
First, I verified the forward and reverse DNS records, SPF ...
33
votes
6
answers
7k
views
Is .txt the only email attachment type that can always be opened without risk?
Is .txt the only email attachment type that can always be opened without risk?
Source of the claim: Training program on phishing at my company
1
vote
3
answers
214
views
Can my phone got infected if visit my mail inbox without opening any mail attachments?
I've found some articles saying some viruses/malware can attack your device by just opening an email without downloading or opening any attachments.
Is this true?
If yes, how risky for ordinary mail ...
0
votes
1
answer
192
views
What are forms of "hidden tracking links" in email messages that collect data; activated by simply opening email?
The US Dept of Justice on Monday, March 25, 2024 announced Seven Hackers Associated with Chinese Government Charged with Computer Intrusions Targeting Perceived Critics of China and U.S. Businesses ...
0
votes
1
answer
127
views
Can I use multiple email providers with my website's DKIM, DMARC and SPF?
I'm a software developer, with limited Mail server setup experience, running a little side SAAS on the side where I send emails to my customers. My domain has SPF, DMARC and DKIM setup and I use ...
2
votes
1
answer
136
views
Does the school have access to email content of my personal email if logged into Chrome with my school account?
I sent an email to somebody with my personal email account (not my school email account). However, when using my personal email, I am doing it with a Chrome browser that I am logged in to using my ...
0
votes
0
answers
153
views
How can email-tracking services track emails in Google
Some email-tracking services use tracking pixels to detect whether an email was opened. The idea is to add an HTML img tag with an src attribute that links to a 1x1 or 0x0 pixel image to the email ...
0
votes
0
answers
134
views
What is the correct way to implement a change-of-email request flow?
I am currently implementing a change-of-email request flow for a web service without MFA. My initial approach is to consult the current OWASP Guide for such a flow. In reading the document, I've ...
0
votes
0
answers
137
views
Is this a safe setup to prevent email account hack?
I would like to protect a Gmail account from being hacked.
Suppose I use the following approach for login/authentication:
Username, Password
2FA via security stick
the stick is in a place that is not ...