AOL, which is the biggest American multinational
mass media corporation based in New York, is now imposing a stricter email
validations process to prevent any hacker with harmful intentions to take any
spoof attack. The Email has been sent off to each and every user including all
the clients and third party partners. AOL did a similar move like Yahoo did
before by changing its DMRC policies to “reject” means, a line of text would be
added into its DNS record which instructed mailbox to eliminate any email which
purportedly connected to AOL domain but ain’t coming from the AOL server. This newly
proposed policies have secure the user data because not even a single mail would
be passing from the servers that didn’t originated from AOL server so users don’t
have to worry about any fake mail have AOL logo. The Change into policies had
come after user complaining that they’re receiving mail which looks from AOL
but having links from other malicious sources.
AOL posted a Blogpost “Today we moved to change our DMARC policy
to p=reject. This helps to protect AOL Mail users' addresses from unauthorized use.
It also stops delivery on what previously would have been considered authorized
mail sent on behalf of AOL Mail users via non-AOL servers. If you're a bulk
sender on behalf of AOL addresses that probably includes mail sent from you. Mail sent on
behalf of AOL Mail users to DMARC-compliant domains will be rejected by those
domains unless the mail passes SPF and/or DKIM authentication checks AND the domain(s) used in those checks match
aol.com.”
This policy will make their users to determine which mail is from AOL or which is from a Hacker because just because user don’t understands the technical terms a huge data theft could be done like Michaels Verify Security Hack Compromised Nearly 3M credit cards.
No comments:
Post a Comment