AntiSpam

4K

Solutions

5

Articles & Videos

6K

Contributors

Various techniques are used to prevent email spam (unsolicited bulk email). No technique is a complete solution to the spam problem, and each has trade-offs between incorrectly rejecting legitimate email (false positives) vs. not rejecting all spam (false negatives) - and the associated costs in time and effort. Anti-spam techniques can be broken into four broad categories: those that require actions by individuals, those that can be automated by email administrators, those that can be automated by email senders and those employed by researchers and law enforcement officials.

Share tech news, updates, or what's on your mind.

Sign up to Post

ScamAlert
An introduction to the wonderful sport of Scam Baiting. Learn how to help fight scammers by beating them at their own game. This great pass time helps the world, while providing an endless source of entertainment. Enjoy!
9
 

Expert Comment

by:Timothy Harrison
Comment Utility
Andrew. I am a Nigerian. The situation you highlighted is truly deep. The average street boys over here (14yrs and above)  especially in my area search for money through these means. They even have clicks to receive scamming training.

In my experience, I would advise guys over there not to be greedy (especially when they receive juicy invitations to make ridiculously huge  money you didn't earn). I truly wish people would wise up and not fall for such scams. Because the success of some scammers deceives the younger ones into choosing to become scammers. (I already have over 7 on my street alone.
2
 
LVL 10

Author Comment

by:Andrew Leniart
Comment Utility
Andrew. I am a Nigerian. The situation you highlighted is truly deep.
Hi Timothy, whilst it's true that a lot of the scams I'm talking about originate from Nigeria, hence the "419" reference, which I understand was derived from the Nigerian Criminal Code Act-Part VI and are prolific there, it's not only Nigerians that partake in this sort of criminal practice.

Indeed, many scams are conducted from countries from all over the world.. USA, Great Britain, Australia, pretty much anywhere. It's not just 419 scams either - scammers have turned to every imaginable way to try and trick people out of their hard earned cash.

You have your Love Scams, where scammers target the lonely. Tech Scams (found to be prolific in Indian regions) where they try and pretend to be Microsoft Technicians. Just about every subject matter from every country imaginable!

The Race of a scammer doesn't come into it for me - just because someone may be Nigerian or Indian or whatever, it doesn't mean they're dishonest. Thieves come from all walks of life.
In my experience, I would advise guys over there not to be greedy (especially when they receive juicy invitations to make ridiculously huge  money you didn't earn). I truly wish people would wise up and not fall for such scams.
You make an excellent point there Timothy.  Not all victims are blameless and there is undoubtably greed involved on some of those that fall prey to many of these schemes. Each case should therefore be viewed on its own individual merits. It is also a reason why many victims prefer to suffer in silence rather than report their losses to the authorities.

Thank you for your contribution to this topic. Always great to hear and explore other points of view.
1
2017 Webroot Threat Report
2017 Webroot Threat Report

MSPs: Get the facts you need to protect your clients.
The 2017 Webroot Threat Report provides a uniquely insightful global view into the analysis and discoveries made by the Webroot® Threat Intelligence Platform to provide insights on key trends and risks as seen by our users.

Email Encryption

Encryption for Business



Encryption ensures the safety of our data when sending emails. In most cases, to read an encrypted email you must enter a secret key that will enable you to decrypt the email. The information passed between companies and clients needs to be encrypted as the contents are mostly confidential. Any business owner should know that the primary attack method to compromise sensitive company data is through email. Email is the chink in every organisation's armor and hackers will target that vulnerability. Encryption is necessary for companies as cyber criminals prey on emails that include attachments with private data, links, bank details and any other forms of crucial information.

With email encryption, a company can protect its sensitive information from cyber criminals by only allowing certain users access to the emails you send. Consider this, if you are away on vacation and want to send a pictured postcard to a friend, would the contents of your postcard include highly confidential information, for instance, bank details or the home alarm code? Of course not. Just like a picture postcard, a non-encrypted email can be exposed for all to see.

Businesses use email encryption to have more control and protection over sensitive information that they may share over email. The NSA and AT&T’s Spying Pact is a perfect example of…
0
Ransomware
Ransomware continues to be a growing problem for both personal and business users alike and Antivirus companies are still struggling to find a reliable way to protect you from this dangerous threat.
3
 
LVL 37

Expert Comment

by:Mahesh
Comment Utility
Hi
If you could please post / incorporate some examples as well how Ransomware encrypt our data and further ask for payments to decrypt data..it will be really helpful.
Unless we come to know what exactly it can target, we would not realize its impact and importance
Article looks well and can give good start

Mahesh.
0
Operating system developers such as Microsoft and Apple have made incredible strides in virus protection over the past decade. Operating systems come packaged with built in defensive tools such as virus protection and a firewall. Is this built in protection enough to keep threats at bay?
 
Many people do not realize modern day virus threats come in many forms. The viruses themselves haven't changed much, but the methods by which they infect computers are constantly evolving. Virus developers spend most of their time discovering new ways to infect computers with viruses rather than developing new types of viruses.
 

So what is a computer virus?

computerVirus-TrueIT.jpgA virus is essentially a self replicating file stored on a computer system that was not authorized by the user to be there. The behavior of the file may have varying characteristics. It may be used to collect, destroy or manipulate user data without their consent.
 
Fairly often the news discusses some new hacking attempt on a major computer system. Hackers can often break into these systems by planting viruses on machines that are connected to them. These viruses can collect data or give them access to files necessary to get deeper into the systems.
 

Are these threats real?


Companies such as Kaspersky, Norton and McAfee regularly publish virus infections as they are discovered. Norton actually has a threat security…
3
 
LVL 1

Author Comment

by:Tom Price
Comment Utility
Hello there Jim,

I've tried uploading the article before with links and 1 of the editors did not approved it...should i put back the links?

I will add some headers and ad an image.

Please let me know when the article was approved and "went live" ok?

Many thanks!
Tom.
0
 

Expert Comment

by:Jame Griffin
Comment Utility
Some computer viruses are programmed to harm your computer by damaging programs, deleting files, or reformatting the hard drive. Others simply replicate themselves or flood a network with traffic, making it impossible to perform any internet activity. Even less harmful computer viruses can significantly disrupt your system’s performance, sapping computer memory and causing frequent computer crashes.
0
Forget those services on TV trying to sell you software – that’s step one.  Almost all of the software you need should be available for free.  The tricky part is doing the work.  If you are not comfortable performing these steps yourself, contact a professional (Like us!) to do it for you.  We are not responsible for anything that happens to your computer by following or not following these directions.  This information is for educational purposes only.  Your mileage may vary.

Now that that is out of the way – where to start?  The first step is knowing what to look for.  A lot of software updates install what I call “JunkWare” with their standard updates, because they get some sort of financial incentive for doing so.  Java Updates are a classic example, shown here circled in red:

Taskbar Pic
When you click on it, and go to install the update, it generally tries to sneak a toolbar in to the installation, usually the Ask! toolbar.  In my case, it’s trying to install McAfee Security Scan:

Security Scan
Just uncheck it and choose next.  What happens though, is that the average home user has 2 or 3 years worth of these “free” applications on their computer.  Typically what we see are lots of extra toolbars, animated cursors, free coupon printers, and free computer tuneup and virus scanning applications.  What YOU see are lots of popups, ads for things, and clutter all over your web browser, and extreme slowness.

But there’s good news!  We’re …
3
 
LVL 28

Expert Comment

by:Thomas Zucker-Scharff
Comment Utility
Great article.  I like all your suggestions and use most of them already.  I would include running Tigzy's Roguekiller, not rebooting then running MBAM.
0

AntiSpam

4K

Solutions

5

Articles & Videos

6K

Contributors

Various techniques are used to prevent email spam (unsolicited bulk email). No technique is a complete solution to the spam problem, and each has trade-offs between incorrectly rejecting legitimate email (false positives) vs. not rejecting all spam (false negatives) - and the associated costs in time and effort. Anti-spam techniques can be broken into four broad categories: those that require actions by individuals, those that can be automated by email administrators, those that can be automated by email senders and those employed by researchers and law enforcement officials.