• The true stories behind tech's strangest terms

    Posted March 14, 2013 - 8:15 am

    You use words like "Bluetooth," "wiki" and "Wi-Fi" all the time, but do you know how those things actually got their names? You might be surprised to find out.
  • As the Internet evolves, is there a place for spam?

    Posted June 30, 2011 - 10:30 am

    In the late 1990s Robert Soloway made $20,000 a day as a spammer. He drove fancy cars. He wore Armani clothes. He was, by all accounts, one of the most successful spammers on the planet. But if he were starting out today, he'd find some other line of work.
  • Five-year plan: 8 problems IT must solve

    Posted September 28, 2010 - 4:29 pm

    You can't march into the future dragging old problems that should already have a solution. Here's what must be done.
  • 'The Internet is down.' What does that really mean?

    Posted April 29, 2009 - 9:44 am

    A multiplicity of factors can interrupt service, from temporary annoyances to long-term problems. We tend to summarize all these events with a simple phrase, like "The Internet is down." The Internet is still there; we just can't get to it. But why?
  • APWG Introduces New eCrime Incident Reporting

    Posted March 30, 2009 - 6:12 am

    The Anti-Phishing Working Group (APWG) is at the top of their game, where ecrime is concerned. APWG is a consortium that tracks Internet fraud and scams. This organization recently submitted a plan to automate submissions of phishing and other ecrime related incident reports.
  • Computer attacks really are big business

    Posted March 27, 2009 - 11:17 am

    We’ve seen reports that imply that spammers, cybercriminals and other assorted bad guys don’t really make that much money, and at the same time, we’ve seen reports that put staggering dollar amounts on the total losses suffered by companies each year.
  • New Spam Uses Bomb Hoax and Location Lookup to Spread Malware

    Posted March 25, 2009 - 7:55 am

    A new wave of spam combines a new technique with an old one in its efforts to spread malware. Spam messages containing a fake news alert claiming a bombing has taken place in the recipient's local are hitting inboxes across the net.
  • Canada lacks anti-spam legislation, plays catch-up

    Posted March 10, 2009 - 7:30 am

    Canada, France, Germany, Italy, Japan, Russia, the United Kingdom and the United States. Which of these G8 countries is the odd one out? Well, I suppose that each of them is in some way, but Canada is unique among the G8 nations for not having any form of anti-spam legislation. Surprising, eh?
  • Belated 2009 Spam Predictions

    Posted January 30, 2009 - 10:15 am

    The world economic crisis has set the stage for hackers, spammers and phishers to have a field day. They can just about steal city hall, if people don’t pay attention. According to security experts, this crisis alone will increase attacks in 2009.
  • In-session phishing holds new potential for attack

    Posted January 14, 2009 - 12:32 pm

    Spam filtering software has gotten quite good at catching and eliminating many email-based phishing attacks. Traditionally, these emails disguise themselves so that they appear to be from a legitimate source, and trick the recipient into providing login details or account numbers.
  • Is Google a spam-enabler?

    Posted January 9, 2009 - 5:04 am

    According to the most recent statistics from Spamhaus, Google ranks as number three in the ten worst spam service ISPs. Spamhaus keeps a running list of the world’s worst spam problem networks.
  • Is Canada a Spam Haven?

    Posted December 11, 2008 - 10:46 am

    The spammer that Facebook won a landmark $873 million settlement against last month operated out of Canada, leading to criticism of the country’s lax anti-spam regulations. They did attempt to address the problem of spam in 2004 when they formed the National Task Force on Spam.
  • How well do you know your spam?

    Posted December 11, 2008 - 10:43 am

    Here are some tidbits to share as ongoing education for your email user community.
  • Bayesian Spam Filtering

    Posted November 27, 2008 - 4:46 am

    Bayesian filtering is one of the most effective and intelligent solutions to combat spam email nowadays. Spam is a problem faced by all email users and it shows no sign of slowing down anytime soon; in fact, the number of spam emails is increasing daily.
  • Quiz: This week in quotes

    Posted November 26, 2008 - 12:48 pm

    This week we learned (among other things) that Indonesia plans to tackle AIDS with RFID chips; that Spam is just like any other business; and that Apple discussion forums are a gateway to divorce court. Can you match the quote to the quoted? Go on, give it a whirl.
  • Spam is silenced, but where are the feds?

    Posted November 25, 2008 - 10:42 pm

    Two weeks after McColo was dropped by its network providers, the company's data center remains untouched. That frustrates some security researchers who say that the servers used to control these operations could provide a treasure trove of evidence about cybercriminals.
  • How do email addresses end up on spam lists?

    Posted October 27, 2008 - 6:48 am

    Every day, millions of people receive dozens of unsolicited commercial emails, known popularly as “spam.” Some users see spam as a minor annoyance, while others are so overwhelmed with spam that they are forced to switch email addresses.
  • Spammer Hiding Techniques

    Posted October 23, 2008 - 4:18 am

    Escaping: This technique uses legal URL formatting to hide the address. Escaping encodes the URL with a percent sign followed by a hexidecimal code. An escaped URL can look like “http://%2E%2E%2E%48%20%18%32%2F%48…”. You can easily decode this by copying it into the location bar of your browser and hitting return.
  • Continuing Spam Legislation

    Posted October 22, 2008 - 4:20 am

    One of the main issues with the original development of email is that it was never designed to be secure. The focus of email was mainly to be functional and easy to use. Today these core functions, which made the invention of email successful, are now the root cause of the problem. Spammers can send millions of messages for a minimal cost.
  • Spam Goes Down To The Letter

    Posted October 13, 2008 - 7:51 am

    A new study by a University of Cambridge computer scientist revealed that the first letter of your email address makes a difference in how much spam you get. It found that addresses that start with “A” “M” or “S” get more than 40% spam while those starting with Q or Z get only about 20% spam.
  • An Educated Email User is a Spammer’s Nightmare

    Posted October 13, 2008 - 7:02 am

    So you have taken the time to research, select and install a world class anti spam solution, such as GFI MailEssentials. And 80,000 satisfied customers say it’s the best. To enhance this solution consider implementing a continuous “anti spam” education program in your company.
  • Political Votes Increase Spam

    Posted October 13, 2008 - 6:55 am

    In the United States the John McCain and Barack Obama presidential campaigns are not the only events cranking up into full swing. With vice presidential running mates now selected, there are recent warnings about political email and blog spam increasing.
  • Anatomy of a Spam Virus

    Posted October 13, 2008 - 6:47 am

    A botnet created by a trojan virus is sometimes referred to as SpamThru. According to the Don’t Bounce Spam organization, spammers have become very sophisticated in the way they manage their botnets , and the SpamThru Trojan is the leading example. In at least one case the botnet consisted of over 73,000 computers.
  • Virtual vs. Physical Appliances: 4 Compelling Reasons for Change

    Posted October 10, 2008 - 12:26 pm

    Virtual v’s Physical Appliances – 4 compelling reasons for change Executive Summary
  • Phishing Emails Exploit Browser Weaknesses

    Posted October 7, 2008 - 8:59 am

    Most web browsers are supposed to protect people by implementing security zones. These safe zones use different security settings of a web browser, which can vary based on the location of the web page being viewed. Phishing emails can lure users to a malicious code web site.
Join us:






Join today!

See more content
Ask a Question