Subscribe To Our Blog

Your email:

SpamTitan & WebTitan News

Awards & Certifications

antispam, anti malware, anti phishing
anti spam, anti virus, anti phishing
WN Gold 120x701179739751459
vmware2
anti-spam, spam filter, business spam filter, anti malware

Web & SpamTitan Blog

Current Articles | RSS Feed RSS Feed

Phishing attacks work because human instinctive behaviours are easily manipulated!

  
  
  
anti phishing, anti spam, anti malware

The word “phishing” comes from the slight variant of “fishing” and is pronounced in the same way. It is the act of pretending or impersonating a person or organization with the intention of tricking someone into giving out confidential information. Both use the same technique: to lure a person or a fish to danger by offering something that entices. My dad went fishing for marlin and mackerel almost every day of his life and won many amateur tournaments.  When he went fishing, he actually caught fish.  Often when people go “fishing,” they drop their line in the water and hope they catch something with low expectations of that.  My dad always caught something, so he was fishing in the traditional sense.

Underground Stores: Still Moving Millions of Stolen Credit Cards | Network Security

  
  
  
email security, anti spam, network security

Obviously it’s very profitable for criminals to steal millions of credit card numbers, but why? What can they do with them? How do they sell them? Actually, the underground market is vast and often as easy to navigate as any legitimate shopping channel. The first stop for stolen card numbers is a broker who buys cards in bulk. The broker sells the cards to a card shop, and this is where things get interesting.

Do hackers ever suffer the consequences for their cybercrimes?

  
  
  
email security, anti spam

Every time there’s a new revelation about hacker successes, it seems that the number of compromised accounts is more unbelievable. The announcement that a Russian hacker group has a billion stolen Internet passwords is certainly the most dramatic theft yet.  The number of compromised records isn’t the only unbelievable thing about this latest theft. According to a recent New York Times article, the hackers are in their twenties and live in south central Russia. When so much is known about the hackers, can’t something be done to stop them? Do hackers ever suffer consequences for their crimes?

Email is Technology's Cockroach! Will your Company ever dump it?

  
  
  
network security, anti malware

You hear it all the time from IT Pros, when it comes to email, 'there has to be a better way'! There are several problems with email, including:

Warning! Fake Job Offers Lead to ID Theft | anti phishing

  
  
  
anti spam, network security, anti phishing

Did you realize that finding a new job could be so risky? When you’re job hunting, the last thing you should have to worry about is someone trying to steal your identity.  But unfortunately that's exactly what's happening.  Criminals are targeting people looking for new jobs, and most often people will not realize that they're being scammed until it's too late.  

Infection by Malware - All about Computer Viruses!

  
  
  
email security, anti spam

In today’s world, virus attacks are very common news. Malicious software, worms, Trojans and computer viruses are on the increase as hackers and spammers seek new ways to steal information that can be used to empty bank accounts or spread electronic mayhem. Computer viruses, trojans, and worms are collectively called malware.   There is not much difference between viruses and worms: both are designed to spread from one computer to another.

What can 'The Ransom of Red Chief’ teach us about Ransomware in 2014?

  
  
  
anti spam, email security, anti phishing

"The Ransom of Red Chief" is a short story by O. Henry first  published in 1907. It follows two kidnappers, Bill and Sam, who capture Johnny,  the son of a wealthy man with a plan to raise a large ransom ($1500 was lot of money in 1907). The boy is spoiled, talks non-stop, plays constant jokes on them and demands they play games with him - this drives the kidnappers crazy. They decide to reduce the ransom but on hearing this and knowing his son, the boys father rejects the reduced ransom and instead offers to take the boy off their hands only if they pay him. The kidnappers ultimately end up having to pay the boy's father to take him back.

Top Reasons why Keeping Email Secure is Easier in the Cloud | Email Security

  
  
  
anti spam, anti phishing, anti malware

In the not too distant past, before there was so much criminal hacking and fraud, managing email was not so complicated.  Now it has become a complex beast that demands constant attention, time, and money. Spam is a headache for both users and administrators, plus it exposes the business to the security risks associated with phishing. Outsourcing the filtering portion of your email architecture frees you from doing that and improves security for your organization.

Following the Target and Changs hack, which is Safer - Shopping Online or Offline?

  
  
  
anti spam, email security, web proxy

It’s widely believed  that shopping online can be a bit risky, not like going to your good old dependable neighborhood brick-and-mortar store. But look what’s been making the headlines. Data breaches at Target, Neiman Marcus, P. F. Changs. Is it safe to patronize your local businesses at all anymore?  Should we all do all of our shopping online?

Top 10 Things to Know About Canada's New Anti-Spam Law

  
  
  
ANTI SPAM, EMAIL SECURITY, ANTI PHISHING

The new Canadian anti-spam laws is striking fear into the hearts of businesses who do business with Canada, and for good reason. The law is pretty complicated, and most small business owners are unprepared—or maybe it’s more accurate to say that businesses in general are unprepared. It’s not surprising: Slate recently ran an article headlined “Canada’s New Anti-Spam Law Is Both Horrifying and Stupid” and there are many questions about how the law is actually going to work.

All Posts