{"id":62,"date":"2021-02-18T10:41:00","date_gmt":"2021-02-18T05:11:00","guid":{"rendered":"http:\/\/signals.dmarcsonar.com\/?p=62"},"modified":"2021-03-06T11:42:50","modified_gmt":"2021-03-06T06:12:50","slug":"types-of-e-mail-abuse-where-the-sender-address-is-forged","status":"publish","type":"post","link":"https:\/\/www.tikaj.com\/blog\/types-of-e-mail-abuse-where-the-sender-address-is-forged\/","title":{"rendered":"Types of E-Mail Abuse where the Sender Address is Forged"},"content":{"rendered":"
Spammers – As they want to avoid receiving non-delivery notifications (bounces)<\/em> to their real addresses. Spammers – As they want to avoid receiving non-delivery notifications (bounces) to their real addresses. Fraudsters – As they want to cover […]<\/p>\n","protected":false},"author":8,"featured_media":463,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6,41],"tags":[],"class_list":["post-62","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-dmarc","category-email-spam"],"_links":{"self":[{"href":"https:\/\/www.tikaj.com\/wp-json\/wp\/v2\/posts\/62","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.tikaj.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.tikaj.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.tikaj.com\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/www.tikaj.com\/wp-json\/wp\/v2\/comments?post=62"}],"version-history":[{"count":2,"href":"https:\/\/www.tikaj.com\/wp-json\/wp\/v2\/posts\/62\/revisions"}],"predecessor-version":[{"id":2720,"href":"https:\/\/www.tikaj.com\/wp-json\/wp\/v2\/posts\/62\/revisions\/2720"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.tikaj.com\/wp-json\/wp\/v2\/media\/463"}],"wp:attachment":[{"href":"https:\/\/www.tikaj.com\/wp-json\/wp\/v2\/media?parent=62"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.tikaj.com\/wp-json\/wp\/v2\/categories?post=62"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.tikaj.com\/wp-json\/wp\/v2\/tags?post=62"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}
\nFraudsters – As they want to cover their tracks and remain anonymous.
\nComputer worms – Worms want to cause confusion or just don\u2019t care about which sender addresses they use.
\nPhishers (password fishers) want to impersonate well-known, trusted identities in order to steal passwords from users.<\/p>\n","protected":false},"excerpt":{"rendered":"