If you use email, you’ll have encountered spam. But do you know where the term comes from, and why it’s used to refer to unwanted email? This section provides more details.
Phishing attacks are commonly used by cybercriminals. This section contains examples of phishing attacks, and advice on how to protect yourself and your data against this type of threat.
Spam comes in many different varieties, ranging from advertizing of legitimate goods and services to political propaganda to Internet scams. Read on to find out more about the most common types of spam.
Spam isn’t only a nuisance, but can pose a threat to your computer or your data. This section provides simple, practical guidelines on how you can reduce the amount of spam you receive.
Feb 27 2014
January saw spammers switch their attention from Christmas and New Year to St. Valentine’s Day. English- and Russian-language mass mailings offering video surveillance systems were yet another popular trend in January.
Jan 30 2014
Millions of people worldwide prefer to buy goods and services on credit, agreeing to pay considerable sums in interest to various money lenders.
Jan 23 2014
Spam is changing and as traditional advertising declines we see far more fraud, malware and phishing.
Jan 23 2014
In December, spammers continued to honor the traditions of the season and tried to attract potential customers with a variety of original gift and winter vacation offers, taking advantage of the approaching holidays.
Dec 19 2013
In November we saw a large number of spam messages offering seasonal and full-time jobs. This comes as a surprise for this time of the year: the labor market is experiencing a “low season” as the end of the fiscal year approaches.
Nov 25 2013
The trusted environment concept combines the advantages of protection provided by Default Deny solutions and the flexibility of antivirus solutions.
06 Mar, 12:20 GMT
05 Mar, 13:57 GMT
05 Mar, 09:14 GMT
26 Feb, 10:18 GMT
26 Feb, 10:15 GMT
20 Feb, 14:05 GMT
20 Feb, 12:45 GMT