Although many anti-spam organizations don't have spies in spam organizations, there is anectdotal evidence that shows some of the methods that spammers use to gather e-mail addresses for their mailings.
In day three of this series of articles, I discussed several methods that spammers use to gather e-mail addresses for their mailing lists, also known as e-mail address harvesting. Today, I'm going to cover countermeasures for most of these methods.
"What is the purpose of spam?" This is often the first question asked in any discussion about unwanted e-mails. This article is going to briefly discuss what fuels the continuing onslaught of unsolicited commercial e-mail.
There has been a lot of press lately about different organizations, including many universities having spear phishing attacks. Today, Iâ€™m going to cover the origin of the word â€œphishingâ€ and cover basic theory of social engineering attacks.
In this multi-part series, I'm going to be covering the steps to take to isolate your e-mail problem so that you know which vendor to call. I will be focusing on companies that don't have their own information technology team, but rather a coordinator that simply calls the appropriate vendor to resolve an issue. However, if you have your own e-mail server administrator, this information should also prove useful.