Phishing for an Identity

Phishing is rapidly becoming on the largest threats to your personal, financial, and emotional wellbeing. No I am not talking about Saturday afternoons out on the boat with your grandfather, listening to stories that being with "When I was your age?"-now while these probably conjure up horrific childhood memories of... Read More

20 Words That Kill - At Least When It Comes to Spam Filters

Spam, spam, spam. It's terrible not only for those of us on the receiving end, but for those of us who SEND e-mail. This deluge of irritating junk has unfortunately interfered with legitimate e-zine publishers, because we're caught in the anti-spam crossfire. If you publish any type of e-mail publication,... Read More

The Great Spam Scam: Five Strategies To Stop Brand and Revenue Robbery

Marketers usually think of anti-spam tactics as 'how to prevent' readers from perceiving their e-communications as spam. There is another, more sinister, consequence that may affect you. Spam is not just an inconvenience. For legitimate businesses, it steals productivity, erode your brand, and rob you of revenue. Many companies... Read More

Lockspam Free 3.0 Released!

6 August, 2004: Polesoft Inc., home of Professional anti spam software, announced today that Lockspam Free 3.0 (see also Lockspam Pro 3.0 in the end) is now available.Some features of Lockspam Free 3.0 antispam software:1. Function with Most POP3 Mail Clients Lockspam Free 3.0 can work with mail clients like... Read More

Getting Back To Basics.

While we all agree that there`s way too much spamming/junk-mailing going on in our email boxes, there are a couple of things we can do to reduce the amount of mails we actually have to sift through, without having to resort to paying for expensive software that can be a... Read More

Winning the War On Spam

For years I didn't worry much about spam.But lately it's got out of control. Over half of my email is now spam, and it was growing by the week - until I took action.This article shows you some strategies for winning the war on spam.------------------------------------------------How Do They Get Your Address?------------------------------------------------In... Read More

How To Analyze A Rip-Off Scheme

This review is taken DIRECTLY from a piece of "junk mail." It is or the program that starts out with the heading: "Before You Decide To Throw This Away, Please Read The Enclosed At Least Once - Then Decide. This is Not a Chain Letter! I Threw The Program in... Read More

Anti Trackback and Comment Spam Methods

What is spam ? spam is text or URL, in one or several exemplars, neither being waited nor wished, not having, neither directly nor from its shipper, no relationship neither with the recipient nor with a possible resource related to the... Read More

Beware of the Newest Activity Online: Phishing

No. I'm not talking here about the outdoor activity enjoyed by many. And no again; I did not misspell it. Phishing is the name given to the latest online scam where millions of unwary Americans are getting their identities stolen.This fraudulent activity is considered the fastest growing crime of modern... Read More

Spam Filters Explained

What do they do? How do they work? Which one is right for me? By Alan HearnshawSpam is a very real problem that many people have to deal with on a daily basis. For those that have decided to do something about it and start to investigate the options available... Read More

In The News:

Kurt the CyberGuy walks through steps he recommends immediately taking after getting new electronics — like phones or TVs — as gifts this holiday season.
When speaking becomes physically challenging, you can preserve your unique voice using Apple's Personal Voice and Live Speech technology.
Google Maps is deleting location history soon. Tech expert Kurt “CyberGuy" Knutsson shows you how to back it up before it's gone.
iOS 18.2 lets AirTag owners securely share item locations with trusted individuals. Tech expert Kurt “CyberGuy" Knutsson examines the powerful new feature.
The FBI is warning timeshare owners of a telemarketing scam tied to a Mexican drug cartel. Tech expert Kurt “CyberGuy" Knutsson provides steps to stay safe.
Protecting your home network includes securing your router, just like your phone or laptop. Kurt “CyberGuy" Knutsson reveals six ways to protect your Wi-Fi router from hackers.
Kurt “CyberGuy" Knutsson: ConnectOnCall breach leaks sensitive data of 910,000+ patients.
Rising elder scams: How to recognize them and protect yourself and your loved ones. Tech expert Kurt “CyberGuy" Knutsson helps you outsmart the scammers.
There are common habits and oversights that could leave your financial information vulnerable to cybercriminals, according to Kurt the CyberGuy.
Counting calories just got easier with The Drop, the world's first automated nutrition tracker using advanced computer vision and artificial intelligence.
A virtual private network can help ensure your information remains security and your privacy remains intact. Kurt the CyberGuy explains.
Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future.
Artificial intelligence-based cameras are giving air defense operators unprecedented capabilities in monitoring and protecting airspace.
Apple's iOS 18.1 Inactivity Reboot automatically reboots your iPhone if it hasn't been used or unlocked for more than three days, providing better data protection.
An inventor designed rooftop solar panels for a Tesla that draws solar energy while the car is parked, adding travel mileage without plugging in.
There are currently no laws governing what artificial intelligence can and cannot do with the information it gathers; here are 10 things to avoid telling AI chatbots to keep yourself safe.
A credit union with over 240,000 members recently revealed it was targeted by cybercriminals, resulting in a data breach that was part of a two-month attack by hackers.
Scammers have become skilled at creating convincing fake websites that can easily fool unsuspecting users. The CyberGuy offers tips to protect yourself.
Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future.
CAPTCHAs, which are used by websites to confirm whether users are people or bots, are harmless, but hackers are using them to infect PCs with malware.
Hackers recently leaked personal information of about 500,000 Americans and stole patient medical records that included lab results and insurance details.
The holiday season sees a rise in mobile shopping scams. Tech expert Kurt “CyberGuy" Knutsson helps you learn how to stay safe.
Tech expert Kurt “CyberGuy" Knutsson says a VPN enhances online banking security by encrypting data and protecting privacy.
Beware of these six sneaky holiday scams. Tech expert Kurt “CyberGuy" Knutsson gives you tips to avoid falling victim.
Tech expert Kurt “CyberGuy" Knutsson reveals how to securely back up and factory reset your Android to protect your privacy and data.
Showing 1 - 10 of 119 Articles
« Previous
1 2 3 4 5 6 7 8 9 10 11 12
Next »

Dealing With SPAM - An E-mail Address Strategy

With SPAM being such a problem it might seem the... Read More

How to Fight Back BEFORE Youre Falsely Accused of Spam

A friend of mine received a chilling email message from... Read More

BUSTED: Anti Spam Forces Bankrupt Super-Spammer Scott Richter

Microsoft scores one for the good guysScott Richter, the self-proclaimed... Read More

Email Chain Letters - Harmless Fun or Not?

I'm sure I'm not the only person on the planet... Read More

Internet Tip of the Week: Cease and Desist

While we all admit that unsolicited commercial email is a... Read More

How You Can Avoid The New Dangers Of Spam

Until recently, spam has been an annoyance, a definite load... Read More

Corporate Email Policies Lower Unnecessary Legal and Security Risks

What comes to your mind when you think about your... Read More

Invasion of the Email Snatchers

They're sneaky. And stealthy. They're quiet and mostly unobtrusive, but... Read More

Stop Intrusive Pop-up Ads and Regain Control of Your Online Experience!

Stop intrusive pop-up ads and regain control of your online... Read More

Lockspam Free 3.0 Released!

6 August, 2004: Polesoft Inc., home of Professional anti spam... Read More

Is There A National Do Not Spam List?

You may have already received a do not spam list... Read More

Challenge Response Spam Filters Explained

As the flood of spam increases end users are looking... Read More

20 Words That Kill - At Least When It Comes to Spam Filters

Spam, spam, spam. It's terrible not only for those of... Read More

Spam: The Tasteless Internet Meat of Criminals

Spam. You've all heard of the crazy pink meat in... Read More

A Practical Approach to Eliminate Spam

Spam is out of control! I guess that would be... Read More

Do You Know Whats in Your Trash?

A hearty welcome to all the spam fighting filters and... Read More

Spasms & Spamocidal Mania

Below is a letter I wrote to the following organizations:S.H.U.... Read More

Why Your ISP Takes Bribes From Spammers

The lifeblood of the spammer is email. They need to... Read More

Pst... Pass It On... I Found Out Its a Hoax

When you receive an email telling you about a virus,... Read More

How to Write a Privacy Policy

A Privacy Policy can be defined as the policy under... Read More

A War on SPAM: Attacking The Evil

As most small, medium and large businesses in this country... Read More

Are You A Spam Zombie?

Over the past few years you've all become familiar with... Read More

Spammer in the Slammer: Jeremy Jaynes Sentenced to Nine Years

Will other spammers take heed? Don't count on it.Jeremy Jaynes... Read More

Beware Of Spam Withdrawals

Q: I am so sick of all the spam that... Read More

How Spammers Fool Spam Blacklists - And How to Stop Them

Effectively stopping spam over the long-term requires much more than... Read More