Skip to main content

Glossary

A B C D E F H I K M O P R S T U V W X All

Email spoofing is a technique in which an attacker fakes the sender's email address to make the message appear to come from a trusted source. This method is often used in an attempt to steal personal information or distribute malware. To detect and avoid these types of attacks, it is important to check suspicious emails carefully..

The internal structure of an email consists of three main parts: the headers, the body and the attachments. The headers include the sender, the recipient, the subject and the timestamp, among others. Examining the headers can be important for spam filtering and phishing protection, as they help to determine whether the message is genuine. Most email clients provide the option to view the full header, which can be a useful tool in fraud prevention.

End-to-end encryption (E2EE) is an encryption method that ensures that messages can only be read by the parties involved in the communication. The messages are encrypted from the moment they are sent and are decrypted only on the recipient's device, so that even service providers cannot access their contents.

Ethical hacking, also known as white hat hacking, is a practice where experts (ethical hackers) deliberately try to find vulnerabilities in a system to fix them before they can be exploited by malicious attackers. Ethical hackers are licensed and work to improve the security of systems.