As we know, it is possible to spoof an email sender’s name, so now the question of how to authenticate the sender has become even more important, since email has been used to send sensitive information. In the recent case of Gov. Sarah Palin’s email, her email account got hacked and the hacker posted the […]