DKIM is a common email authentication method designed to reduce the opportunities for phishing attacks and email spam.

DKIM Oversigning to Help Avoid Replay Attacks

May. 9, 2022 / By Harold Vass

SparkPost Cloud now performs DKIM Oversigning by default to eliminate an attack vector for the billion+ emails our platform enables each day.  DKIM (DomainKeys Identified Mail) is a common email authentication method designed to reduce the opportunities for phishing attacks and email spam. Combined with other common authentication mechanisms, the chances that your sending domains

Read more
spam traps

Spam Traps: Break it Down

Aug. 16, 2019 / By Avi Goldman

Find and fix issues faster with our breakdown of spam traps now available as part of our Spam Trap Monitoring feature inside of SparkPost Signals.

Read more
spam complaints owls

Spam Complaints: What You Need To Know

Dec. 14, 2016 / By Clea Moore

Spam complaints tell ISPs how to treat your mail and can indicate the health of your overall mail program. Here’s how to use them to optimize your programs.

Read more
spam traps

Spam Traps Part 1 – What Are They?

Jan. 6, 2016 / By Clea Moore

What are spam traps and why should care about them? In this part 1 of 3 part blog series we'll answer those questions and how it can impact your email program and how you can avoid sending to them.

Read more
Top 10 CASL MYTHS

Top 10 CASL Myths: Sending Email to Canada Legally

Jan. 4, 2016 / By Sparky

Developers and marketers responsible for sending email are expected to understand and comply with anti-spam legislation like Canada’s Anti-Spam Law (CASL). This can be particularly difficult when myths and misconceptions abound. In an effort to eliminate confusion, we dispelled the top 10 CASL myths regarding CASL compliance.

Read more
Malware Email Attachments

How To Avoid Looking Like A Malware Sender

Jul. 22, 2015 / By Tonya Gordon

I recently was catching up on my email, and I was struck that there wasn’t a single marketing message with an attachment in my inbox. The only notes with attachments were transactional in nature: a receipt from a store I made a purchase from and a voicemail notification from my company’s phone system. Those transactional messages didn’t have any images, nor were they long with a bunch of offers. Sure, there were a few links to their website where I could find marketing offers, but no big call to action beyond the essential transactional purpose of the message.

Read more

The History of Spam

Mar. 12, 2015 / By Sparky

Call Gary-T-Webit Spam or Unsolicited Commercial Email (UCE), it’s still the same thing: a confounding problem that has plagued our inboxes, and the world, starting with the first piece of spam in 1978 by Gary Thuerk.

Read more

Shock & Awe In The Inbox

Jan. 29, 2015 / By Sparky

Some years back I wrote a blog post entitled “What I Learned From Nigerian Spammers.” The inspiration for the post came from a piece of spam I received while working for Unica, and attending the Marketing Innovation Summit (the last as we were just acquired by IBM).

Read more