Google Tackles Spam with E-mail Authentication

By

According to the Message Anti-Abuse Working Group, spam accounted for nearly 92 percent of e-mail messages sent in the first half of 2010. And Gartner reports that the number of victims who lost money due to phishing scams in 2008 was over five million U.S. consumers. The average loss was approximately $351 per consumer affected. And security company M86 reveals that nearly two percent of all mail is phishing related. That’s a heck of a lot of relatives of high-profile politicians asking you to help them transfer money in exchange for a cut of the profits.

However, Google hopes to put a stop to scamming by allowing Google Apps customers to sign their outgoing e-mail using a technology called DomainKeys Indentified Mail (DKIM). Essentially, DKIM is open-standard, e-mail authentication technology that demonstrates to users when incoming mail really is from a veritable source such as PayPal.

Reads a Google blog posting: “Today, we mark another notch in the spam-fighting belt: we’re making it possible for all Google Apps customers to sign their outgoing messages with DKIM, so their sent mail is less likely to get caught up in recipients’ spam filters. Google Apps is the first major e-mail platform – including on-premises providers – to offer simple DKIM signing at no extra cost. Once again, the power of the cloud has made it possible for us to bring this feature to millions of customers quickly and affordably.

‘We help the most-phished brands on the Internet manage their mail authentication programs, and the Google Apps solution is the simplest that we've encountered. Configuring DKIM for in-house systems requires plug-ins or additional gateway servers, making a company's mail environment more complex and difficult to manage. As a Google Apps customer, this feature took us only a few clicks in the control panel and an update of our DNS,’ said Kelly Wanser, CEO of eCert, an industry leader in providing critical protection against e-mail fraud."




Edited by Tammy Wolf

TechZone360 Contributing Editor

SHARE THIS ARTICLE
Related Articles

Coding and Invention Made Fun

By: Special Guest    10/12/2018

SAM is a series of kits that integrates hardware and software with the Internet. Combining wireless building blocks composed of sensors and actors con…

Read More

Facebook Marketplace Now Leverages AI

By: Paula Bernier    10/3/2018

Artificial intelligence is changing the way businesses interact with customers. Facebook's announcement this week is just another example of how this …

Read More

Oct. 17 Webinar to Address Apache Spark Benefits, Tools

By: Paula Bernier    10/2/2018

In the upcoming webinar "Apache Spark: The New Enterprise Backbone for ETL, Batch and Real-time Streaming," industry experts will offer details on clo…

Read More

It's Black and White: Cybercriminals Are Spending 10x More Than Enterprises to Control, Disrupt and Steal

By: Cynthia S. Artin    9/26/2018

In a stunning new report by Carbon Black, "Hacking, Escalating Attacks and The Role of Threat Hunting" the company revealed that 92% of UK companies s…

Read More

6 Challenges of 5G, and the 9 Pillars of Assurance Strategy

By: Special Guest    9/17/2018

To make 5G possible, everything will change. The 5G network will involve new antennas and chipsets, new architectures, new KPIs, new vendors, cloud di…

Read More