|
Authored by: Mikkel on Friday, July 06 2012 @ 10:10 PM EDT |
The problem is that it is not unusual for there to be false headers that
indicate the mail passed through a couple of servers before the real SPAM
server. It is even worse when it comes from a botnet - the last "good"
IP address is the address of the botnet PC.
[ Reply to This | Parent | # ]
|
|
Authored by: designerfx on Saturday, July 07 2012 @ 12:56 AM EDT |
PJ's last comment sums it up, along with the most recent
article.
http://securitywatch.pcmag.com/none/300005-android-botnet-no-
a-much-simpler-flaw-in-yahoo-mail-s-app
It all boils down to who stands to gain from this behavior.
Hint: microsoft. [ Reply to This | Parent | # ]
|
|
Authored by: jjs on Sunday, July 08 2012 @ 09:28 AM EDT |
It's actually easy to spoof, you insert fake "received by:"
information that goes ABOVE where you inject into the system.
Traditionally e-mail systems do not try and verify all the
"received by:" lines, they assume that the e-mail they
receive has provided correct information.
---
(Note IANAL, I don't play one on TV, etc, consult a practicing attorney, etc,
etc)
[ Reply to This | Parent | # ]
|
|
|
|
|