Subscribe To Our Blog

Your email:

Awards & Certifications

antispam, anti malware, anti phishing
anti spam, anti virus, anti phishing
WN Gold 120x701179739751459
vmware2
anti-spam, spam filter, business spam filter, anti malware

Web & SpamTitan Blog

Current Articles | RSS Feed RSS Feed

Home Depot, Target—What Are the Consequences of These Cyber Attacks?

  
  
  
ANTI SPAM, NETWORK SECURITY, ANTI MALWARE

It’s almost impossible to believe, but the Home Depot breach appears to be even larger than the massive Target breach. The estimated number of credit cards involved in the latest data compromise varies, but it seems to be around 65 million, meaning that yet again records have been broken.  It was just months ago that the Target breach was the biggest ever, but it’s already been surpassed.

Step by Step Guide to Protecting your Exchange Server from Spam |anti-spam.

  
  
  
anti spam, anti phishing, email security

Often IT administrators aren’t sure exactly what to look for when considering replacing an existing anti-spam solution or indeed implementing one for the first time. Here we show you the important points to consider so you get a robust anti-spam solution that eliminates the support burden  and security risk of spam with layers of powerful spam-fighting techniques.

Two Banking Phishing Scams SMBs need to be aware of!

  
  
  
anti phishing,hosted spam filter,exchange spam protection

If you own a business, you may think you’re protected from fraudulent activity at your bank, but, well, it’s complicated. For instance, a few years ago Choice Escrow lost $440,000 when fraudsters stole username and password information and used the information to raid the company’s BancorpSouth account. The money was transferred via wire to Cyprus. Choice said the bank failed to institute reasonable security measures. BancorpSouth said they weren’t responsible because the theft was carried out using legitimate login credentials. The bank had also asked Choice to adopt more stringent security measures, including requiring two people to sign off on wire transfer requests. Choice hadn’t followed the recommendation, and this was one of the reasons the court ruled against them. 

Advice on Defending Your Organisation Against Top Malware Threats|Network Security

  
  
  
anti spam, anti phishing, network security

Here are some of the top malware threat vectors by which viruses and other malware bypasses  network security systems causing damage to your organization. This list is based on our own experience and research.  System administrators can draw on this list to shore up their defences. 

Porn in the Workplace – This Network Security Risk is More Common Than We Think

  
  
  
PORN AT WORK

In May, an investigative unit at the EPA revealed that one of its employees had over 7,000 pornographic pictures on a government computer and spent two to six hours per day watching porn. The unidentified employee was even watching porn when a special agent showed up to interview him about whether he was watching porn at work. According to the Huffington Post, the employee was not terminated and makes about $120,000 per year.

Celebrity Nude Picture Scandal : Two-Factor Authentication is the only winner in this tawdry mess!

  
  
  
network security, anti spam, web filtering

The Hollywood nude picture hacking scandal is reported to be the work of underground trading ring. The FBI are investigating the recent hacks  where celebrity nude images, including that of actress Jennifer Lawrence, were stolen by hackers who then traded the pictures. Dozens of sexually explicit private photos of stars like Jennifer Lawrence and Kate Upton have been published. Official investigations are ongoing and social networks like Facebook and Twitter have announced they will ban anyone found sharing the photos.

For Universities, Compared to the Hassle of a Data Breach, Network Security is Simple—and Cheap!

  
  
  
web filtering, network security, anti malware

When we think of malware infiltrating a computer network, stealing information, turning  infected computers into an army of slaves, we usually think of business or home computers, but computers are particularly open to attack at educational institutions. It’s in the very nature of universities to foster international academic exchanges and encourage the free flow of information. This increased use of more collaborative social networking tools such as blogging, wiki and online learning sites that have clear educational benefits is placing schools under more and more pressure to reappraise their network security policies.

LinkedIn Users Targeted with Fake "Contact Requests" used to fuel phishing attacks!

  
  
  
web security

As one of the most popular professional online networks, LinkedIn is being used by scammers to amass data for future phishing and identity theft type attacks. The scammers then either infect your computer with malicious software or steal your personal information. One common scam is an email inviting you to connect with another LinkedIn member where their account is in fact fake. 

Phishing attacks work because human instinctive behaviours are easily manipulated!

  
  
  
anti phishing, anti spam, anti malware

The word “phishing” comes from the slight variant of “fishing” and is pronounced in the same way. It is the act of pretending or impersonating a person or organization with the intention of tricking someone into giving out confidential information. Both use the same technique: to lure a person or a fish to danger by offering something that entices. My dad went fishing for marlin and mackerel almost every day of his life and won many amateur tournaments.  When he went fishing, he actually caught fish.  Often when people go “fishing,” they drop their line in the water and hope they catch something with low expectations of that.  My dad always caught something, so he was fishing in the traditional sense.

Underground Stores: Still Moving Millions of Stolen Credit Cards | Network Security

  
  
  
email security, anti spam, network security

Obviously it’s very profitable for criminals to steal millions of credit card numbers, but why? What can they do with them? How do they sell them? Actually, the underground market is vast and often as easy to navigate as any legitimate shopping channel. The first stop for stolen card numbers is a broker who buys cards in bulk. The broker sells the cards to a card shop, and this is where things get interesting.

All Posts