Other Attacks
1. DomainKeys Identified Mail (DKIM) Spoofing
DKIM is a method of associating a domain name to an e-mail message, thereby allowing a person or organization to claim responsibility for a message.
Authentication with 384 bit keys could be factored in 24 hours “on [his] laptop,” and 512-bit keys could be factored in 72 hours with cloud computing resources.