Questions? Feedback? powered by Olark live chat software
+1 650 627 7667 Contact Us


My Experience as a Summer Intern at Agari

As with all great internships, I started this summer at Agari being delightfully bombarded with various acronyms and different technologies to learn. But though there was such a wealth of new information, within weeks, I found myself making real contributions to the product and essentially being treated as a full-time engineer. I came into this […]

Read More

Why are my Google Calendar Invites Blocked by DMARC?

Are you sending Google Calendar invites and not getting replies, or maybe your invitees tell you they tried to reply and it was blocked? Or maybe you are trying reply to Google Calendar invites and being blocked saying the mail is not accepted due to your domain’s DMARC policy? This is an issue I have […]

Read More

Real Estate Email Scams – Don’t Get Tricked!

Every year, more than 5 million homes are bought and sold in the U.S. Given this volume, it should come as no surprise that the real estate industry is a prime target for email-based crimes. Cyber criminals are spoofing (and in some cases taking over) the email accounts of real estate agents, title companies, and […]

Read More

Productivity & Security with Office 365 + Agari

Companies are flocking to Office 365 as the leading choice of cloud-based email. But while it’s a great productivity enhancer and provides simplicity and cost savings over on-premises solutions, it raises serious security challenges. Threat actors typically target email accounts with identity deception.  And with Office 365 being ubiquitous and publicly-discoverable, the risks become even […]

Read More

Russian Spear Phishing Threatens U.S. Voting Systems, Neutralizes Second-Factor Authentication

spear phishing

About 15 years ago, cryptographers began to worry that electronic voting technology could expose society to great political risks, including altering election outcomes or suppressing voting. Yesterday, a leak published by The Intercept showed that the feared scenario may have come to fruition. Compounding the danger, the attackers also neutralized the second-factor authentication that many […]

Read More