If you use email, you’ll have encountered spam. But do you know where the term comes from, and why it’s used to refer to unwanted email? This section provides more details.
Phishing attacks are commonly used by cybercriminals. This section contains examples of phishing attacks, and advice on how to protect yourself and your data against this type of threat.
Spam comes in many different varieties, ranging from advertizing of legitimate goods and services to political propaganda to Internet scams. Read on to find out more about the most common types of spam.
Spam isn’t only a nuisance, but can pose a threat to your computer or your data. This section provides simple, practical guidelines on how you can reduce the amount of spam you receive.
Nov 25 2013
The trusted environment concept combines the advantages of protection provided by Default Deny solutions and the flexibility of antivirus solutions.
Nov 21 2013
In October, spammers continued to actively use the names of well-known companies to spread malicious ZIP files. We registered several mass mailings offering rather unusual, if not to say exotic, services...
Nov 05 2013
The percentage of spam in total email traffic decreased by 2.4% from the second quarter of 2013 and came to 68.3%.
Oct 29 2013
In September, the proportion of world spam in mail traffic continued to decline and reached 66%. As always the spammers focused on advertising seasonal goods and services.
Sep 23 2013
The percentage of spam in email traffic in August was down 3.6 percentage points and averaged 67.6%.
Sep 12 2013
The more popular online banking becomes, the more determined cybercriminals are to steal users’ money. How is money stolen with the help of malicious programs? How can you protect yourself from virtual robbery?
04 Dec, 10:00 GMT
04 Dec, 08:16 GMT
03 Dec, 11:03 GMT
18 Nov, 15:25 GMT
14 Nov, 16:55 GMT
12 Nov, 18:04 GMT
06 Nov, 16:17 GMT