TITLE

Spam Wars: The Battle of the Formbots

AUTHOR(S)
Breeding, Marshall
PUB. DATE
January 2007
SOURCE
Computers in Libraries;Jan2007, Vol. 27 Issue 1, p32
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
The article discusses threats to Internet security, as well as guidelines for protecting computer systems from such threats. Spams have become a tool for phishing and identity theft, causing economic and personal damage to its victims. Advanced strategies used by spammers for fraudulent activities are discussed. Eliminating open mail relays and shutting down unauthorized activity on port 25, the network socket that delivers most electronic mails, will prevent security problems arising from spams.
ACCESSION #
23657208

 

Related Articles

  • CipherTrust service protects against nefarious net traffic. Garretson, Cara // Network World;2/6/2006, Vol. 23 Issue 5, p45 

    The article reports that e-mail security technology vendor CipherTrust is prepared to introduce the Real-time Anti-fraud Data and Resource (RADAR) service to prevent customers' brands from being stolen in a phishing attack, and to prevent their computers from being utilized by spam senders. The...

  • E-Mail: How Did We Survive Without It? Imsdahl, Shane // Supply House Times;Oct2005, Vol. 48 Issue 8, p62 

    Discusses how small businesses can protect their e-mail system as a valuable business tool. Best practice for avoiding e-mail viruses; Use of spam filters to catch legitimate e-mails; Best defense against phishing.

  • Deceptive spam puts banks on the defensive. Solnik, Claude // Long Island Business News (7/1993 to 5/2009);1/27/2006, Vol. 53 Issue 4, p3B 

    The article describes strategies used by banks in the United States to protect online banking customers from identity theft, fraud and phishing. Bank of America has added an extra guard to its password system. Corillian Corp. provides access signature control systems. The Federal Deposit...

  • Scared of identity thieves? Quinn, Jane Bryant // Good Housekeeping;Feb2006, Vol. 242 Issue 2, p92 

    The article offers information on how to prevent identity theft. It advises to rip financial records before disposing them and destroy the blank checks that come with solicitations for loans and credit cards. It is also important to take everything in the wallet that has the number printed on it...

  • Kaspersky Lab Anti-Phishing Module.  // Database & Network Journal;Oct2007, Vol. 37 Issue 5, p25 

    The article reflects on Kaspersky Lab's anti-phising module. According to the report, Kaspersky Lab announces that anti-phising databases provided by the Phish Tank service have been incorporated into the Anti-Phishing module of Kaspersky Internet Security 7.0. The system offers a consolidated...

  • LinkedIn Letting Sharks Into Corporate Waters.  // OfficePro;Jul2012, Vol. 72 Issue 4, p4 

    The article offers helpful tips to avoid spear phishing attacks in the social networking site LinkedIn. These include using common sense and available tools to avoid being victimized by hackers and connecting only with personally known persons. It also notes avoiding sharing confidential...

  • Avoid Identity Theft; Learn How to Recognize Phishing Scam.  // Employee Plans News;2016, Issue 13, p1 

    The article offers tips from the U.S. Internal Revenue Service (IRS) how to prevent or avoid identity theft. It states that the agency introduced the public awareness campaign called Taxes. Security, Together, as part of its Security Summit effort. Tips to determine and avoid a phishing e-mail...

  • PAYING BILLS ONLINE--SAFELY.  // Consumer Reports;Jul2007, Vol. 72 Issue 7, p7 

    The article offers advice on how to safely pay bills online. The article recommends that consumers pay through their bank rather than a third-party bill-paying service or the biller's web site. Consumers should create a fraud resistant password for online banking and bill-paying. Consumers...

  • Anti-Phishing.  // Network Dictionary;2007, p36 

    A definition of the term "Anti-Phishing" is presented. It refers to a process that identifies phishing contents like websites and electronic mails, usually through the use of software applications. Oftentimes, it is integrated with web browsers and email clients as a toolbar, displaying the real...

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics