IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >  

Spam

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: UCE, Unsolicited Bulk e-Mail, Email Spam, Spamming, Unsolicited Commercial e-Mail, Spams, UBE, Junk Email, e-Mail Spam
DEFINITION: 1) A spam trap is the inclusion of an option in an online form that is preselected by default with the expectation that the user will fail to notice the option. If the form is submitted with the option selected, the user has given the company permission to send what will be junk e-mail or spam from the user's point-of-view. Spam trappers assume that some users do not read all of the form and will  … 
Definition continues below.
Spam White Papers (View All Report Types)
51 - 55 of 55 Matches Previous Page  |  Next Page
Email Security Eguide
sponsored by Sunbelt Software
WHITE PAPER: Email security and spam only get more difficult to control as spammers get more sophisticated. Read this eGuide from SearchWindowsSecurity.com contributors to get a better understanding of just how big a threat spam is and what to do about it.
Posted: 01 Jun 2007 | Published: 01 Jun 2007

Sunbelt Software

Symantec Mail Security for SMTP 5.0
sponsored by Symantec Corporation
WHITE PAPER: This white paper examines the filtering capabilities, threat protection, and message management capabilities available in Symantec Mail Security for SMTP 5.0. Learn how to prevent rapid email virus outbreaks and respond to evolving email securi...
Posted: 15 May 2007 | Published: 01 Jan 2006

Symantec Corporation

Symantec Internet Security Threat Report
sponsored by Symantec Corporation
WHITE PAPER: This Internet Security Threat Report details the issues related to online fraud and examines current trends in the internet security landscape. Read this paper today and learn about the future of internet attacks and what to expect in the coming years.
Posted: 30 Mar 2007 | Published: 01 Mar 2007

Symantec Corporation

Anti-Phishing: Best Practices for Institutions and Consumer
sponsored by McAfee, Inc.
WHITE PAPER: Phishing has become the most malicious form of spam, leaving both organizations and consumers vulnerable to financial losses and stolen information. Read this white paper to learn about best practices for protecting your company from phishing attacks.
Posted: 27 Mar 2007 | Published: 01 Nov 2005

McAfee, Inc.

Protecting the Windows Environment: A Blueprint for Small and Mid-sized Organizations
sponsored by Symantec Corporation
WHITE PAPER: Many companies rely on a Microsoft® Windows® environment. But many fail to recognize the vulnerabilities in Windows based systems. Explore the challenges and learn about a strategy for mitigating risk without adding cost and complexity.
Posted: 25 Oct 2006 | Published: 01 Oct 2006

Symantec Corporation
51 - 55 of 55 Matches Previous Page    1 2 3    Next Page
 
SPAM DEFINITION (continued): …  miss the spam trap. A spam trap is sometimes located toward the bottom of a form in smaller print. To avoid spam traps, make a habit of reading the entire form with special awareness of boxes that may need to be unchecked. Some advisors suggest having a separate e-mail account for online forms.2) A quite different meaning for this term is the use of a software filter to block e-mail addresses that are known to send spam. Some Internet serviceproviders (ISPs) use filters to prevent spam from reaching their customers. E-mail programs such as Outlook Express and Eudora allow the recipient to specify … 
Spam definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement