IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >  


RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: UCE, Unsolicited Bulk e-Mail, Email Spam, Spamming, Unsolicited Commercial e-Mail, Spams, UBE, Junk Email, e-Mail Spam
DEFINITION: 1) A spam trap is the inclusion of an option in an online form that is preselected by default with the expectation that the user will fail to notice the option. If the form is submitted with the option selected, the user has given the company permission to send what will be junk e-mail or spam from the user's point-of-view. Spam trappers assume that some users do not read all of the form and will  … 
Definition continues below.
Spam Reports
76 - 81 of 81 Matches Previous Page  |  Next Page
Symantec Mail Security for SMTP 5.0
sponsored by Symantec Corporation
WHITE PAPER: This white paper examines the filtering capabilities, threat protection, and message management capabilities available in Symantec Mail Security for SMTP 5.0. Learn how to prevent rapid email virus outbreaks and respond to evolving email securi...
Posted: 15 May 2007 | Published: 01 Jan 2006

Symantec Corporation

Symantec Mail Security for SMTP
sponsored by Symantec Corporation
TRIAL SOFTWARE: Try this download and see how Symantec's Mail Security for SMTP can help your company defend against viruses, spam, and other unwanted content. It also provides high-performance, integrated protection against threats at the Internet email gateway.
Posted: 14 May 2007 | Premiered: 14 May 2007

Symantec Corporation

Symantec Internet Security Threat Report
sponsored by Symantec Corporation
WHITE PAPER: This Internet Security Threat Report details the issues related to online fraud and examines current trends in the internet security landscape. Read this paper today and learn about the future of internet attacks and what to expect in the coming years.
Posted: 30 Mar 2007 | Published: 01 Mar 2007

Symantec Corporation

Anti-Phishing: Best Practices for Institutions and Consumer
sponsored by Intel Security
WHITE PAPER: Phishing has become the most malicious form of spam, leaving both organizations and consumers vulnerable to financial losses and stolen information. Read this white paper to learn about best practices for protecting your company from phishing attacks.
Posted: 27 Mar 2007 | Published: 01 Nov 2005

Intel Security

Protecting the Windows Environment: A Blueprint for Small and Mid-sized Organizations
sponsored by Symantec Corporation
WHITE PAPER: Many companies rely on a Microsoft® Windows® environment. But many fail to recognize the vulnerabilities in Windows based systems. Explore the challenges and learn about a strategy for mitigating risk without adding cost and complexity.
Posted: 25 Oct 2006 | Published: 01 Oct 2006

Symantec Corporation

Why Bayesian Filtering Is the Most Effective Anti-spam Technology
sponsored by GFI Software
PRODUCT LITERATURE: This white paper describes how Bayesian filtering works and explains why it is the best way to combat spam.
Posted: 02 May 2006 | Published: 01 May 2006

GFI Software
76 - 81 of 81 Matches Previous Page    2 3 4    Next Page
SPAM DEFINITION (continued): …  miss the spam trap. A spam trap is sometimes located toward the bottom of a form in smaller print. To avoid spam traps, make a habit of reading the entire form with special awareness of boxes that may need to be unchecked. Some advisors suggest having a separate e-mail account for online forms.2) A quite different meaning for this term is the use of a software filter to block e-mail addresses that are known to send spam. Some Internet serviceproviders (ISPs) use filters to prevent spam from reaching their customers. E-mail programs such as Outlook Express and Eudora allow the recipient to specify … 
Spam definition sponsored by, powered by an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement