TITLE

Filling Inboxes: Viruses, Spam, Phishing Scams

AUTHOR(S)
Trombly, Maria
PUB. DATE
February 2004
SOURCE
Securities Industry News;2/2/2004, Vol. 16 Issue 4, p15
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
Reports on the e-mail problems facing brokerages in the U.S. in 2004. Problems concerning spam e-mails; Reason behind the escalation of phishing problems; Result of a survey conducted by NetIQ Corp. on how much spam costs an average business in a year.
ACCESSION #
12164844

 

Related Articles

  • Sally Army spends £10,000 to beat spam. Goodwin, Bill // Computer Weekly;12/2/2003, p6 

    This article focuses on the Salvation Army in Great Britain which has invested £ 10,000 in anti-spam software to protect 2,000 users worldwide against a barrage of offensive e-mail. The charity has cut the volume of e-mails flooding its network by a quarter, equivalent to 25,000 fewer e-mails...

  • Fighting Spam.  // OfficePro;Apr2004, Vol. 64 Issue 3, p6 

    Presents information on the problem of spam electronic mail in the U.S. Effect of spam on U.S. firms; Number of spam messages which corporations received as of 2004; Details on the Can-Spam bill that took effect in January 2004.

  • Shielding E-mail. Moore, Cathleen // InfoWorld;7/19/2004, Vol. 26 Issue 29, p18 

    NetIQ Corp. and Ciphertrust Inc. for the week of July 19, 2004 are rolling out new messaging security products designed to shield networks from spam and help enforce regulatory compliance efforts. NetIQ updated its Marshal Content Security line of products for e-mail and web protection....

  • Is spam a threat and how can I block it?  // Computer Weekly;9/16/2003, p62 

    Spam is the biggest consumer of unnecessary bandwidth on the Internet. There is a risk that users receiving huge amounts of unsolicited e-mail may become even more complacent than they are at the moment. Social engineers thrive on end-user complacency and worm outbreaks such as "I Love You" and...

  • Squash the Creepy Web Crawlers. Pelletier, Sue // Insurance Conference Planner;Nov/Dec2003, Vol. 39 Issue 6, p26 

    Presents suggestions from Corbin Ball of Corbin Ball Associates on protecting personal computers and e-mail. Tips on dealing with spam; Information on how spammers send spams to several e-mail adresses; Computer viruses that affect computers.

  • E-mail Authentication Aims to Kill Spam. Emerson, Jim // Direct;9/15/2004, Vol. 16 Issue 12, p38 

    Discuses the compliance of several e-mail security service companies with the Sender ID e-mail authentification specifications of Microsoft Corp. as of September 2004. Functions of Sender ID; Factors needed to solve the epidemic of unsolicited electronic mail messages.

  • CAUGHT IN THE CROSSFIRE. Neuborne, Ellen // Inc.;Aug2003, Vol. 25 Issue 8, p37 

    Reports that several legitimate e-mail marketing messages have been blocked by anti-spam filters in the U.S., as of 2003. Percentage of legitimate, permission-based e-mail which have been blocked by spam filters; Impact of the block on small companies which rely on e-mail marketing; Decision of...

  • Spam Patterns in 2006 and Predictions for '07. Margolis, Daniel // Certification Magazine;May2007, Vol. 9 Issue 5, p8 

    The article provides an overview of the results of an annual intelligence report on spam activity in the U.S. in 2006, released by MessageLabs. According to the author, the report revealed that the average spam level for the year accounted to 86.2 percent of electronic mail, or e-mail traffic....

  • Sender Policy Framework.  // Network Dictionary;2007, p431 

    A definition of the term "Sender Policy Framework" (SPF) is presented. It refers to an anti-spam approach in which the Internet domain of an e-mail sender can be authenticated for that sender, thereby, discouraging spam mailers from practicing e-mail spoofing. SPF and other anti-spoofing...

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics