Internet Privacy Enhanced Mail
Communications of the ACM - Special issue on internetworking
LCN '97 Proceedings of the 22nd Annual IEEE Conference on Local Computer Networks
Certified mail: the next challenge for secure messaging
Communications of the ACM - Interactive immersion in 3D graphics
A Differentiated Message Delivery Architecture to Control Spam
ICPADS '05 Proceedings of the 11th International Conference on Parallel and Distributed Systems - Workshops - Volume 02
Spam Filtering with Cryptographic Ad-hoc E-mail Addresses
SAINT-W '05 Proceedings of the 2005 Symposium on Applications and the Internet Workshops
Phishing and Countermeasures: Understanding the Increasing Problem of Electronic Identity Theft
Phishing and Countermeasures: Understanding the Increasing Problem of Electronic Identity Theft
Why Johnny can't encrypt: a usability evaluation of PGP 5.0
SSYM'99 Proceedings of the 8th conference on USENIX Security Symposium - Volume 8
Reliability of e-mail delivery in the era of spam
DEPCOS-RELCOMEX '07 Proceedings of the 2nd International Conference on Dependability of Computer Systems
A Case (Study) For Usability in Secure Email Communication
IEEE Security and Privacy
Privacy Recovery with Disposable Email Addresses
IEEE Security and Privacy
A New Secure E-mail Scheme Based on Elliptic Curve Cryptography Combined Public Key
NPC '08 Proceedings of the 2008 IFIP International Conference on Network and Parallel Computing
Hi-index | 0.00 |
Spammers and phishers constantly keep on changing spam structure to circumvent anti-spam procedures and target maximum recipients. Of late, it has been observed that spammers spoof date header of their spam e-mails to keep them on top in the recipient's mailbox with an aim to maximize the chances of immediate attention of recipients. This form of spoofing can cause confusion to recipients, create problems in time bound transactions, increase chances of opening spam, worsen the problem of false positive, result in loss of work productivity, render date header field insignificant and would spawn a host of legal issues. This paper reports date-spoofing, analyzes implications of date-spoofed e-mails on some commercial and corporate e-mail servers and surveys e-mail user behavior. It further discusses detection of date-spoofed e-mails to enable forensic examinations of date forged e-mails and presents possible technical solutions to stop date-spoofing.