“Pfishing”, sometimes spelled “Phishing”, is a word that’s used to describe amethod of identity theft where con men use fake e-mail that looks like it comesfrom legitimate sources. This e-mail is designed to hoodwink you into givingout personal and financial information. Once the scammers receive yourinformation they use it to either clone your identity or […]
Category: Archive
How Spammers Fool Spam Blacklists – And How to Stop Them
Effectively stopping spam over the long-term requires much more than blocking individual IP addresses and creating rules based on keywords that spammers typically use. The increasing sophistication of spam tools coupled with the increasing number of spammers in the wild has created a hyper-evolution in the variety and volume of spam. The old ways of […]
How Spammers Fool Whitelists – And How to Stop Them
Effectively stopping spam over the long-term requires much more than blocking individual IP addresses and creating rules based on keywords that spammers typically use. The increasing sophistication of spam tools coupled with the increasing number of spammers in the wild has created a hyper-evolution in the variety and volume of spam. The old ways of […]
How Spammers Fool Rule-based and Signature-Based Spam Filters
Effectively stopping spam over the long-term requires much more than blocking individual IP addresses and creating rules based on keywords that spammers typically use. The increasing sophistication of spam tools coupled with the increasing number of spammers in the wild has created a hyper-evolution in the variety and volume of spam. The old ways of […]