Similar Articles |
|
InternetNews June 14, 2005 Tim Gray |
Trend Micro Acquires Kelkea Antivirus vendor Trend Micro hopes to tackle more Internet security issues, such as spam, phishing, and pharming. |
InternetNews January 15, 2009 Richard Adhikari |
The Web's Latest Threat: Smarter 'Zombies' Hacker-controlled PCs are outwitting security software - and are growing in number. |
InternetNews November 14, 2005 Jim Wagner |
Postini And The On-Again, Off-Again Spam List Postini briefly found itself on the Spamhaus Project's block list after a recent e-mail campaign, resurrecting the debate over DNS-based Blackhole Lists. |
InternetNews July 30, 2007 Andy Patrizio |
Trend Micro Readies Security SaaS Antivirus developer Trend Micro said it's ready to take on some big names with its new SecureCloud Software-as-a-Service security platform for businesses. |
InternetNews January 27, 2004 Janis Mara |
Brightmail Bows Reputation Service Anti-spam software company Brightmail has launched the Brightmail Reputation Service, which identifies prime sources of spam and blocks the bad stuff while (hopefully) ensuring delivery of the good. |
T.H.E. Journal April 2004 Jim Myers |
Security Software Enriches Troy City Schools Educational Experience by Providing Safe E-Mail To address the requirement of schools to block and monitor all e-mail originating both internally and externally, anti-spam technology has emerged as a vital tool. |
InternetNews November 16, 2004 Susan Kuchinskas |
IronPort: Time To Turn Tables on Zombies ISPs use reputation filtering to stop outbound spam. |
Entrepreneur March 2006 Amanda C. Kooser |
Hacker's Paradise Vincent Weafer, senior director of Symantec security response, talks about what internet security threats are shaping up. |
InternetNews March 23, 2005 Tim Gray |
Symantec Hosts Security Program The computer security software vendor launched Hosted Mail Security, a comprehensive set of services designed to protect businesses against spam and viruses. |
InternetNews August 16, 2004 Jim Wagner |
Postini Beefs Up Perimeter Defenses The managed e-mail security firm adds features that free administrators of much of the hassle in dealing with spam while giving individual users more control over their settings. |
InternetNews January 23, 2006 |
IronPort's Web Reputation Security Can a 'credit check' for your e-mail eliminate phishing and virus threats? |
InternetNews May 10, 2005 Tim Gray |
Trend Micro Acquires InterMute Trend Micro's acquisition of InterMute brings more spyware protection into the company's fold. |
InternetNews July 13, 2004 Ryan Naraine |
Symantec to Turn Tide on Spam Security specialist beefs up its enterprise offerings with $28M acquisition of an anti-spam technology firm TurnTide. |
InternetNews May 26, 2009 Alex Goldman |
Spam Now More Than 90% of All E-Mail Spammers are increasingly directing users to compromised social networks while botnets' influence grows, according to MessageLabs. |
InternetNews May 25, 2007 Andy Patrizio |
Standards Group OKs E-Mail Validation Spec The Internet Engineering Task Force has adopted a vendor-developed specification designed to detect e-mail with bogus header information. The technology could help reduce spam and phishing attacks that clog Internet traffic. |
InternetNews January 27, 2005 Jim Wagner |
Postini: Spam Building Muscle Trends in e-mail security threats in 2004 point to more difficulties in 2005. |
PC Magazine November 16, 2006 Neil J. Rubenking |
Buying Guide: Security Suites Security suites are adding a few new features that are shifting the goals and methodology used to protect your computer. |
CRM September 2012 Judith Aquino |
Avoid the Spam Folder How marketers can save outbound emails from the dreaded fate. |
Wall Street & Technology July 26, 2004 Kerry Massaro |
Fast Facts From Radicati Group Learn some statistics about instant messaging, e-mail and spam, and voice over internet protocol. |
InternetNews May 26, 2006 Tim Scannell |
Jamie de Guerre, Director, Partner Programs, Cloudmark Spam isn't going anywhere, and Jamie de Guerre's company is tracking its trails through our inboxes. |
PC Magazine January 12, 2005 Sebastian Rupley |
The Virus Wars--In Your Palm Build a big user base and the malicious-code writers will come. That's the logic that analysts and security software companies alike are following as they warn that smartphones and other mobile devices will become significant targets for security threats in 2005. |
InternetNews April 27, 2007 Andy Patrizio |
Spammers Are Due For A Surprise Unspam knows where you are. Here comes the lawsuit. |
Inc. June 2007 Michael Fitzgerald |
The Best Spam Fighters Six ways to protect your E-mail. |
InternetNews November 17, 2010 |
Stuxnet, Mobile Threats Top 3Q Malware Report Security software vendor McAfee's 3Q Threats Report takes note of some older malware scams from the past and some new and discouraging new ones. |
PC World February 20, 2008 Erik Larkin |
Services Are Tapping People Power to Spot Malware Companies are turning to the wisdom of crowds to fight increasingly sophisticated phishing, spam, and nefarious sites. |
InternetNews February 2, 2011 |
Rustock, Phishing Scams Boost Spam in January A flurry of new malicious spam campaigns and the return of the Rustock botnet elevated spam activity in latter half of January. |
Inc. October 2005 John Fried |
How to Avoid Scammers, Spammer and the Rest of the Bad E-guys Before anything else, you need to know who the on-line scammers are and how to keep them out. |
InternetNews April 1, 2004 Susan Kuchinskas |
The Red, White and Blue of Spam Nothing has changed since the Federal Can-Spam Act became law except that more of it seems to becoming from the U.S., according to one industry player's report. |
InternetNews December 22, 2009 Andy Patrizio |
Malware Writers Get Bold, Rent Datacenters Not content with infecting individual PCs, the criminals who run botnets are now setting up shop in legitimate data centers. How? |
Information Today June 2005 Phillip Britt |
No Phishing Allowed Today, the biggest threats for companies and consumers are the new crimes with funny-looking names: phishing, pharming, and spim. |
InternetNews August 18, 2009 |
Smartphone Users Surf Sans Security Despite being aware of the potential risks of mobile Internet use, smartphone owners don't take security seriously. |
InternetNews April 1, 2008 Judy Mottl |
Mobile Spam Threat Worth Keeping a Watchful Eye Right now carriers are doing the anti-spam lifting but things could change. |
InternetNews March 16, 2009 Alex Goldman |
Report Says Spam Arms Race Escalating The bad guys are recovering from the loss of McColo and learning how to prevent being taken down so easily again. |
PC World June 2006 Andrew Brandt |
New Devices Promise Protection in a Box These security gateways claim to stop threats before they reach your network. Netgear WGT624SC Super G Wireless Router... the Spam Cube... TrustEli Eli Security Appliance... |
Wall Street & Technology March 2, 2004 Jim Middlemiss |
IT Challenge: Spam The Challenge: Junk e-mail is becoming a big problem, as spammers clog inboxes with dubious offerings from weight-loss remedies to cheap Viagra. How to filter the spam without filtering important e-mails is a problem. |
Bank Systems & Technology March 7, 2005 Cynthia Ramsaran |
Canning Spam Something as simple as spam can slow a bank's operations. For Providence-based Bank of Rhode Island, the volume of spam clogging employees' e-mail in-boxes became a drag on productivity. |
InternetNews October 30, 2008 Richard Adhikari |
Spammers Hit MobileMe, Google Blogspots With new automated tools to help them, spammers are getting better at cracking CAPTCHA - a program that protects Web sites by generating and grading tests that humans can pass but computers cannot |
InternetNews February 4, 2005 Jim Wagner |
Spamhaus Accuses MCI of Hosting Spam Gangs Spamhaus Project blasts ISP over hosting policy. MCI counters that it's not in the business of censoring Internet content. |
PC Magazine August 2, 2006 Matthew D. Sarrel |
Win the War on Spam You're outnumbered and surrounded, but the fight is not over yet. Here's how to battle the spam armada. |
InternetNews January 8, 2008 Andy Patrizio |
Move Over Storm, There's a New Botnet in Town Nugache, a once-minor botnet, gets an extreme makeover and may be rivaling Storm in terms of size and scale of nuisance. |
PC World August 28, 2002 Daniel Tynan |
Poetry and Puppies Join Battle Against Spam Creative anti-spam products arm users with fuzzy filters and strategic haiku to fight automated e-mail. |
InternetNews June 11, 2009 Alex Goldman |
Malware Keeps Creeping Onto Mac OS X The Apple Mac is still seeing far fewer attacks than Windows experiences, but researchers say there's a disturbing trend at work. |
AskMen.com Ross Bonander |
4 Steps: Eliminate Spam Before your inbox gets hit one more time, read up on our four steps to eliminate spam. |
InternetNews September 30, 2010 |
'Here You Have' Worm Takes Toll In September The new version of an old malware trick was the single largest security threat to enterprise IT departments last month. |
PC Magazine September 24, 2008 Neil J. Rubenking |
Trend Micro Internet Security Pro v2 Trend Micro Internet Security v2 offers good to very good protection in all areas, along with truly useful bonus features. |
InternetNews May 5, 2004 Jim Wagner |
Microsoft Joins IronPort Whitelist Anti-spam software and hardware maker IronPort won a major victory for its whitelist service with the announcement Wednesday that Microsoft was joining its ranks. |
CIO August 1, 2005 Grant Gross |
VoIP Security Debate Heats Up Voice over IP (VoIP) telephony and malicious software for mobile devices are among the most-hyped IT security threats, according to Gartner. |
Bank Technology News December 2010 Michael Sisk |
Endgame Systems Finds Botnets in the Cloud Security software provider Endgame Systems raised $29 million in the fall and simultaneously launched ipTrust, a product meant to detect and manage the harm caused by malware and botnets in cloud computing environments |
InternetNews October 19, 2007 Andy Patrizio |
Resistance Is Futile. Buy This Stock Spammers try using MP3s to pitch a pump and dump stock. It might work if the speaker didn't scare the daylights out of you. |
PC World July 23, 2007 Lincoln Spector |
Proper ID for a Zombie PC If you can't tell by its ravenous appetite, glassy-eyed stare, and leprous casing, how do you know whether your system has become one of the living dead? |