ASUS Strix GeForce GTX 970
MSI GE60 2PE
Transcend StoreJet 35U3
How Microsoft Azure leapfrogs backup with cloud snapshots
Here are 5 ways to get a OnePlus One invite In India
First Impressions: Xiaomi Redmi Note
How offline retailers can make a comeback
Preview: Digit December 2014 Collector’s Edition
How tech is taking football to the next level
Classic FPS games are a dying breed
Slowly gathering steam...
The obsession within
Carmick Shift: Can John Carmack and Oculus Rift change the world?
Mobile videos becoming mainstream among mobile Internet users: Vuclip
Wickedleak Wammy One octa-core phone launched at Rs. 7990
RCom launches Pro 3 data network, promises speeds up to 17Mbps
Meizu MX4 with Ubuntu to launch next year
Google introduces smart spoon to prevent spilling
HP EliteBook 1040 G1
Obi Alligator S454
Intex Aqua V4
Huawei Ascend P7
Micromax Bolt AD4500
Case Study: Building an award winning multi-touch enabled music app
Case Study: Developing a Health App for Windows 8
Case Study: Developing an augmented reality app for Intel based devices
Use Spotify, Netflix in India on your PC, Android smartphone
Overview: Implementing fast real-time GPU-based image blur algorithms
A close look at Apple iPhone 6 Plus
Android 5.0 Lollipop Update
Nokia Lumia 730 Review
How to upgrade your laptop or ultrabook's hard drive to an mSATA or M.2 SSD
Jolla Smartphone Review
Top Black Friday deals for those with U.S. connections
17 must have apps for any Android device (plus alternatives)
The 10 best compact, easy to use smartphones that you can buy today
Hands On: Microsoft Lumia 535 slideshow
The Batmobile: The 7 best variants over 70 years
Intel Developer Zone
Intel Windows Developer Zone
Dsk International Campus Zone
Acer Aspire E5Intel Core i7 Processor, Windows 8.1 , 12 GB RAM, 1TB Hard Disk Space, 2GB GraphicsClick to know more
How to Develop 3D Games for WindowsHow to develop a soccer penalties shootout game with Microsoft Visual Studio 3D Starter Kit
Click to know more
Twitter has announced it is using a new technology called Domain-based Message Authentication, Reporting and Conformance (DMARC) in order to ward off e-mail phishing from its social networking service. According to Twitter, DMARC technology will make it “extremely unlikely” for anyone to send e-mail pretending to be from a Twitter.com address.
“Without getting too technical,” writes Twitter’s ‘Postmaster’ Josh Aberant, “DMARC solves a couple of long-standing operational, deployment, and reporting issues related to email authentication protocols. It builds on established authentication protocols (DKIM and SPF) to give email providers a way to block email from forged domains popping up in inboxes.”
Aberant reveals even as the protocol is young, it is already being used by the four major e-mail service providers – AOL, Gmail, Outlook and Yahoo! Mail. “We hope to see it gain more coverage for our users as even more email providers adopt it, and that it gives you more peace of mind when you get an email from us,” he added.
Twitter's announcement with regard to use of the DMARC technology comes shortly after a few of its high-profile accounts, such Jeep and Burger King, suffered malicious attacks.
DMARC allows a sender to mark in their e-mails whether they are protected by SPF and/or DKIM, and notifies the receiver what to do if neither of those authentication methods passes such as send to junk or reject the mail. Technical details with regard to DMARC are available here.