So, in the past couple of posts, I’ve talked about how email authentication is not that great against phishing attacks that use random parameters in the sender, but is well-designed t… Read More
One of the reasons I just wrote that four part series on where email authentication is helpful against phishing, and where it is not-so-helpful, is because I wanted to examine the John Pode… Read More
This is a rough description of how the Phishing Confidence Level (PCL) works in Office 365.
Way back in the olden days - 2007 or so - Exchange server used to have its own spam filter, Smart… Read More
In the 2008 and 2012 U.S. Presidential Elections, the Democrats outgunned their rivals. In 2016, the Republicans fought back, using Big-Data Analytics and Micro-Targeting of Online Ads to he… Read More
The Maine Referendum Petition to save Ranked-Choice Voting (RCV) now has 55,000 Signatures. It needs 61,123 Valid Signatures, which are due in Three weeks.
In November 2016, Maine Voters ov… Read More
Earlier tonight, someone decided to change their Twitter handle and display name to impersonate a furry and solicit money to the scammer’s PayPal account.
DO NOT SEND MONEY TO THIS… Read More