IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >  

Spam

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: UCE, Unsolicited Bulk e-Mail, Email Spam, Spamming, Unsolicited Commercial e-Mail, Spams, UBE, Junk Email, e-Mail Spam
DEFINITION: Spam is unsolicited e-mail on the Internet. (E-mail that is wanted is sometimes referred to as ham.) From the sender's point-of-view, spam is a form of bulk mail, often sent to a list obtained from a spambot or to a list obtained by companies that specialize in creating e-mail distribution lists. To the receiver, it usually seems like junk e-mail. Spam is roughly equivalent to unsolicited telephone  … 
Definition continues below.
SpamReports
76 - 80 of 80 Matches Previous Page  |  Next Page
Anti-Phishing: Best Practices for Institutions and Consumer
sponsored by McAfee, Inc.
WHITE PAPER: Phishing has become the most malicious form of spam, leaving both organizations and consumers vulnerable to financial losses and stolen information. Read this white paper to learn about best practices for protecting your company from phishing attacks.
Posted: 27 Mar 2007 | Published: 01 Nov 2005

McAfee, Inc.

Proofpoint Messaging Security Gateway Virtual Edition
sponsored by Proofpoint, Inc.
TRIAL SOFTWARE: VMware virtualization products require alternative messaging security solutions than those that support physical server software. This free trial download provides best-in-class messaging security designed specifically to support VMware products.
Posted: 17 Nov 2006 | Premiered: 17 Nov 2006

Proofpoint, Inc.

Protecting the Windows Environment: A Blueprint for Small and Mid-sized Organizations
sponsored by Symantec Corporation
WHITE PAPER: Many companies rely on a Microsoft® Windows® environment. But many fail to recognize the vulnerabilities in Windows based systems. Explore the challenges and learn about a strategy for mitigating risk without adding cost and complexity.
Posted: 25 Oct 2006 | Published: 01 Oct 2006

Symantec Corporation

Why Bayesian Filtering Is the Most Effective Anti-spam Technology
sponsored by GFI Software
PRODUCT LITERATURE: This white paper describes how Bayesian filtering works and explains why it is the best way to combat spam.
Posted: 02 May 2006 | Published: 01 May 2006

GFI Software

J.E. Dunn Construction Eliminates Spam and Increases Productivity Using Proofpointâ„¢
sponsored by Proofpoint, Inc.
CASE STUDY: J.E. Dunn Construction received an increasing volume of unsolicited and often-offensive inbound emails, which hampered employee productivity and constrained IT resources. Disgruntled employees reported spending one to two hours per day deleting spam.
Posted: 15 Apr 2004 | Published: 01 Jan 2004

Proofpoint, Inc.
76 - 80 of 80 Matches Previous Page    2 3 4    Next Page
 
SPAM DEFINITION (continued): …  marketing calls except that the user pays for part of the message since everyone shares the cost of maintaining the Internet. Spammers typically send a piece of e-mail to a distribution list in the millions, expecting that only a tiny number of readers will respond to their offer. It has become a major problem for all Internet users. The term spam is said to derive from a famous Monty Python sketch ("Well, we have Spam, tomato & Spam, egg & Spam, Egg, bacon & Spam...") that was current when spam first began arriving on the Internet. SPAM is a trademarked Hormel meat product that … 
Spam definition sponsored by SearchMobileComputing.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement