Power BI Fundamentals - Create visualizations and dashboards from scratch
AI, Data Science & Cloud Certificates from Google, IBM & Meta
Overview
Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Explore a 12-minute conference presentation from USENIX Security '24 that reveals critical vulnerabilities in email systems' delegation mechanisms. Learn how researchers from the University of Science and Technology of China, University of Kansas, and Fordham University uncovered security flaws allowing attackers to bypass DKIM and DMARC protections through spoofed Sender fields. Discover findings from their 50-participant study showing that half of users are vulnerable to deceptive delegate information, and examine the impact of novel email spoofing attacks tested across 16 service providers and 20 email clients. Understand their proposed validation scheme and security enhancement recommendations for protecting against delegation mechanism exploitation in email systems.
Syllabus
USENIX Security '24 - FakeBehalf: Imperceptible Email Spoofing Attacks against the Delegation...
Taught by
USENIX