Subscribe To Our Blog

Your email:

SpamTitan & WebTitan News

Awards & Certifications

antispam, anti malware, anti phishing
anti spam, anti virus, anti phishing
WN Gold 120x701179739751459
anti-spam, spam filter, business spam filter, anti malware

Web & SpamTitan Blog

Current Articles | RSS Feed RSS Feed

For Universities, Compared to the Hassle of a Data Breach, Network Security is Simple—and Cheap!

web filtering, network security, anti malware

When we think of malware infiltrating a computer network, stealing information, turning  infected computers into an army of slaves, we usually think of business or home computers, but computers are particularly open to attack at educational institutions. It’s in the very nature of universities to foster international academic exchanges and encourage the free flow of information. This increased use of more collaborative social networking tools such as blogging, wiki and online learning sites that have clear educational benefits is placing schools under more and more pressure to reappraise their network security policies.

LinkedIn Users Targeted with Fake "Contact Requests" used to fuel phishing attacks!

web security

As one of the most popular professional online networks, LinkedIn is being used by scammers to amass data for future phishing and identity theft type attacks. The scammers then either infect your computer with malicious software or steal your personal information. One common scam is an email inviting you to connect with another LinkedIn member where their account is in fact fake. 

Phishing attacks work because human instinctive behaviours are easily manipulated!

anti phishing, anti spam, anti malware

The word “phishing” comes from the slight variant of “fishing” and is pronounced in the same way. It is the act of pretending or impersonating a person or organization with the intention of tricking someone into giving out confidential information. Both use the same technique: to lure a person or a fish to danger by offering something that entices. My dad went fishing for marlin and mackerel almost every day of his life and won many amateur tournaments.  When he went fishing, he actually caught fish.  Often when people go “fishing,” they drop their line in the water and hope they catch something with low expectations of that.  My dad always caught something, so he was fishing in the traditional sense.

Underground Stores: Still Moving Millions of Stolen Credit Cards | Network Security

email security, anti spam, network security

Obviously it’s very profitable for criminals to steal millions of credit card numbers, but why? What can they do with them? How do they sell them? Actually, the underground market is vast and often as easy to navigate as any legitimate shopping channel. The first stop for stolen card numbers is a broker who buys cards in bulk. The broker sells the cards to a card shop, and this is where things get interesting.

Do hackers ever suffer the consequences for their cybercrimes?

email security, anti spam

Every time there’s a new revelation about hacker successes, it seems that the number of compromised accounts is more unbelievable. The announcement that a Russian hacker group has a billion stolen Internet passwords is certainly the most dramatic theft yet.  The number of compromised records isn’t the only unbelievable thing about this latest theft. According to a recent New York Times article, the hackers are in their twenties and live in south central Russia. When so much is known about the hackers, can’t something be done to stop them? Do hackers ever suffer consequences for their crimes?

Email is Technology's Cockroach! Will your Company ever dump it?

network security, anti malware

You hear it all the time from IT Pros, when it comes to email, 'there has to be a better way'! There are several problems with email, including:

Warning! Fake Job Offers Lead to ID Theft | anti phishing

anti spam, network security, anti phishing

Did you realize that finding a new job could be so risky? When you’re job hunting, the last thing you should have to worry about is someone trying to steal your identity.  But unfortunately that's exactly what's happening.  Criminals are targeting people looking for new jobs, and most often people will not realize that they're being scammed until it's too late.  

Infection by Malware - All about Computer Viruses!

email security, anti spam

In today’s world, virus attacks are very common news. Malicious software, worms, Trojans and computer viruses are on the increase as hackers and spammers seek new ways to steal information that can be used to empty bank accounts or spread electronic mayhem. Computer viruses, trojans, and worms are collectively called malware.   There is not much difference between viruses and worms: both are designed to spread from one computer to another.

What can 'The Ransom of Red Chief’ teach us about Ransomware in 2014?

anti spam, email security, anti phishing

"The Ransom of Red Chief" is a short story by O. Henry first  published in 1907. It follows two kidnappers, Bill and Sam, who capture Johnny,  the son of a wealthy man with a plan to raise a large ransom ($1500 was lot of money in 1907). The boy is spoiled, talks non-stop, plays constant jokes on them and demands they play games with him - this drives the kidnappers crazy. They decide to reduce the ransom but on hearing this and knowing his son, the boys father rejects the reduced ransom and instead offers to take the boy off their hands only if they pay him. The kidnappers ultimately end up having to pay the boy's father to take him back.

Top Reasons why Keeping Email Secure is Easier in the Cloud | Email Security

anti spam, anti phishing, anti malware

In the not too distant past, before there was so much criminal hacking and fraud, managing email was not so complicated.  Now it has become a complex beast that demands constant attention, time, and money. Spam is a headache for both users and administrators, plus it exposes the business to the security risks associated with phishing. Outsourcing the filtering portion of your email architecture frees you from doing that and improves security for your organization.

All Posts