OUCH! is the world’s leading, free security awareness newsletter designed for the common computer user. Published every month and in multiple languages, each edition is carefully researched and developed by the SANS Securing The Human team, SANS instructor subject matter experts and team members of the community. Each issue focuses on and explains a specific topic and actionable steps people can take to protect themselves, their family and their organization. OUCH! is distributed under the Creative Commons BY-NC-ND 4.0 license. You are free to distribute OUCH! within your organization or to your customers as part of your security awareness program, or share OUCH! with your family, friends and coworkers. The only limitation is you cannot modify nor sell OUCH!.
Click the link below to see the current Cyber Security Awareness Newsletter and Newsletter Archive.
An Ars Technica article asserts, “Parsing email headers needs care and knowledge—but it requires no special tools.” The author says that figuring out where an email message comes from can be especially important for “someone who has been impersonated—or whose child has been impersonated—via email.”
Even when you know how to “view headers” or “view source” in your email client, the spew of diagnostic wharrgarbl can be pretty overwhelming if you don’t know what you’re looking at. Today, we’re going to step through a real-world set of (anonymized) email headers and describe the process of figuring out what’s what.
Before we get started with the actual headers, though, we’re going to take a quick detour through an overview of what the overall path of an email message looks like….
The article may be intimidating in its discussion of the components involved in sending and receiving email. But if you take your time to follow the step-by-step explanations you will learn what goes on behind the scenes, how email can be compromised by hackers, and how email systems try to maintain security against hacking.
As always, your best defense against hacking via email is to be very careful. Never click on a link in an email message — or reply to a message — if you have the slightest suspicion that something is wrong. If the message appears to be from a friend or from your financial institution, call them to confirm before taking any other action.
With that basic caveat in mind, read the article to see the guts of how email works.
Achieving middle-mile route diversity and redundancy. Towns can work together to develop regional networks and make internet service more reliable for their constituents even if their last-mile builds occur at different times. Case in point: Leverett and Shutesbury, Massachusetts.