1. Computing

Secure Your Email and Protect Your PC From Phishing and Spam

News, articles and information to help you use email more securely and protect yourself from phishing attacks, email hoax scams and intrusive spam.

The Dangers of Out-of-Office Auto-Reply Messages
Think twice before you set your out-of-office auto reply, you might reveal information that is useful to scammers and spammers.

Why You Need a Disposable Email Account
Are you tired of SPAM. You should consider getting yourself a disposable email account. Let's look at some uses for disposable email accounts.

How to Secure Your Gmail Account
Are you worried about your Gmail account getting hacked. Follow theser simple steps to prevent your Gmail account from becoming compromised.

Spam Mail – Anti-Spam Mail Headquarters
Your one stop show for resources for blocking, filtering, and ridding your e-mail box of spam mail

'Microsoft has released an update for Microsoft Outlook' Spam
Spam / phishing attack email titled 'Microsoft has released an update for Microsoft Outlook' allegedly from Microsoft Customer Support claiming to link to a Critical security update for Outlook and Outlook Express

Protect Yourself From SMiShing (SMS Phishing) Attacks
You won't LOL if you fall for a SMiShing attack, but the bad guys will ROFL.

'Statement Request' Spam
Spam / phishing attack email titled 'Statement Request' with link that runs rep_7330.exe, an executable program

Swine Flu Spam and Phishing Attacks
Spam and phishing attacks may start to prey on Swine Flu fears. Swine Flu related domains are being snatched up and may be used to target the spike in interest and fears of a global pandemic related to the Swine Flu outbreak.

Protect Yourself From Phishing Scams
Phishing scams have spiked recently and have become more of a concern. This article talks about what phishing scams are and illustrates five steps users and companies can take to keep from being victimized by phishing scams.

Protect Your Business From Phishing Scams
Phishing scams have spiked recently and have become more of a concern. This article talks about what phishing scams are and illustrates five steps users and companies can take to keep from being victimized by phishing scams.

Free Spam-Blocking Software
According to MessageLabs spam accounts for more than 60% of all email traffic. These free tools and utilities can help you to reduce and eliminate unsolicited spam email from your computer system.

Phishing Attacks: The Next Generation
Phishing attacks originally relied almost exclusively on users being naive or ignorant enough to click on a link in an email that directed them to a spoofed web site. This new wave of attacks rewrites the victim computers Hosts file so that users are redirected to fraudulent web sites without any intervention or participation on their part.

Gone Phishing!

Why You Should Encrypt Your Email
A brief article discussing the reasons you should encrypt your email communications and a few tips on how to do it.

Solving The Spam Epidemic
Spam is an dilemma which seems to threaten the very effectiveness of email as a form of communication. This article addresses recent legislation and discusses methods for bringing this epidemic under control.

Virus Hoaxes and Chain Letters
Users fall victim frequently to virus hoaxes and spam chain letters imploring them to share the information with everyone they know as quickly as possible. This article illustrates why you shouldn't fall for these ridiculous claims.

Assume Mail from Unknown Senders is Spam
Information to help you avoid spam email from the About.com Guide for Email, Heinz Tschabitscher.

Don't Believe Spammers When They Say
A brief article from About.com's Guide for Email, Heinz Tschabitscher, about why you shouldn't believe claims that "you requested" such and such.

Don't Use Your Primary Email Address to Sign Up for Anything
Helpful information from Heinz Tschabitscher, About.com Guide for Email, illustrating why you should not use your main email address when signing up for anything on the Web.

Obscure Your Email Address When You Post it to the Net
Ways to hide your email address to protect it from being "harvested" by spammers from the About.com Guide for Email, Heinz Tschabitscher.

Different Methods of Stopping Spam
There are many ways to fight spam. Which works best? So far the best single solution is probably Bayesian filtering. But you don't have to choose just one. Many of the following solutions could be used in combination.

Email Security
This white paper provides useful background information on email security issues. It will help you examine the security threats facing your corporate email system and determine what kind of email security solution your company needs.

MSExchange.org Server Based Antispam Comparison
With the multitude of antispam solutions for Exchange, choosing the one that's suited to your network's present and future needs is no simple task. That's why we have prepared this feature comparison in which five of the leading vendors of antispam solutions have participated. By comparing the features of these solutions side by side...

Blocking over 98% of spam using Bayesian filtering technology
This white paper describes how Bayesian mathematics can be applied to the spam problem, resulting in an adaptive, ‘statistical intelligence’ technique that is much harder to circumvent by spammers. It also explains why the Bayesian approach is the best way to tackle spam once and for all...

Email Compliance
As if the business needs surrounding email aren’t enough for organizations to manage, there has been a recent surge of government regulations that affect this form of communication. These laws, which affect large and small companies alike in practically every industry, include protecting confidential customer information, corporate governance...

Reducing Corporate Liability With Filtering and Policy Tools
The overwhelming majority of corporate email addresses today receive unsolicited commercial email, or spam. For a growing number of recipients, this includes spam with adult content or pornography known as unsolicited pornographic email (UPE). UPE poses serious legal risks to corporations, wastes valuable corporate computing resources, and reduces employee productivity.

Fighting Spam
Spam is costing $8.9 billion to U.S. corporations, $2.5 billion for European businesses and another $500 million for U.S. and European service providers. Figuring it takes 4.4 seconds on average to deal with a message, the messages add up to $4 billion in lost productivity for U.S. businesses each year.

Four Popular Anti Spam Filters for Exchange Reviewed
Your only true defense against spam mail using Microsoft Exchange is to install third-party solutions. With this article, we are going to compare and evaluate four products, each of them somewhat differentiated by its mode of operation and email filtering techniques.

The Nigerian Spam Scam Exposed
Ever wondered what would happen if you ever responded to one of the many Nigerian spam scams? Zone-H have done just that and have chronicled every step in this paper, from the first email exchange to the final phone call where they agreed to meet the scammers in Nigeria.

Dealing Effectively with Spam
This paper gives information on spam - what it is, its cost, and how to deal with it. Analyses a server based approach versus a client based approach to handling spam.

Combating SPAM Problems in a Corporate Environment
Perhaps no problem plagues the Internet as deeply as that of unsolicited junk E-mail, or SPAM. While there’s no doubt that SPAM can be annoying to the end users, SPAM can cause problems for both the network administrators and for those who own or manage a company. The reason for this is that SPAM robs your company of productivity and of system resources.

Email Harvesting Techniques FAQ
The main purpose of this FAQ is to make people aware of spammers' harvesting techniques as a first step toward protecting themselves.

Spam Fighting Overview FAQ
The Spamfighting Overview offers a taste of the many techniques people use to fight spam. The objective isn't to teach you how to fight spam (there are many far superior documents that do just this), but rather to introduce some of the techniques you can use and refer you to some more detailed works.

Spam
This document is intended to help you understand how to stop spam email with or without the use of an email spam filter or DNS blacklist. We are presenting this information in a Q&A (Questions and Answers) format that we hope will be useful. Our knowledge of this subject relates to Internet connectivity in general, and stems from our own TCP/IP networking technology and experience.

Data Protection In The European Union
Information relating to individuals, called ‘personal data’, is collected and used in many aspects of everyday life. Advancement in computer technology along with new telecommunications networks is allowing personal data to travel across borders with greater ease.. As a result, data concerning the citizens of one Member State are sometimes processed in other Member States of the EU.

Stop Spam Now!
Junk e-mail or spam is a growing problem for Internet users, whether you are an individual or a large corporation. According to varying studies, the cost of spam ranges from millions to billions of dollars worldwide. John Buckman, developer of the MailShield anti-spam/antirelay program discusses the impact of spam, and describes 5 strategies for stopping spammers in their tracks.

©2014 About.com. All rights reserved.