17 results on '"Electronic mail systems -- Usage -- Safety and security measures"'
Search Results
2. As image spam declines, PDF spam ready to take its place; New spam technique attaches PDFs that filters can't read
3. Eliminate spam
4. Ternary sorting aims to stop false positives
5. The problems presented by image-based spam; * About 7% of spam is imaged-based
6. E-mail security is an ongoing battle; IT managers should resolve to deciding how much threat to their e-mail systems is manageable, e-mail experts say
7. Researchers warn of 'Spam Zombies from Outer Space'; Uninvited messages could look like they come from friends
8. How some spammers bypass spam filters; * Are spammers smart?
9. A Toe in Legit Waters: The Latest Shift in Spammer Technique
10. When you're falsely accused of spamming; * What to do when you're in the business of sending legitimate mass e-mails?
11. Save the Mails
12. How to bust the amateur spammers
13. Image spam doubles spam file size
14. New blends of email threats. (Security)
15. Spam evolves
16. Spammers exploit Pope's funeral
17. Electronic retailers hurt by spam flood; mailings that customers opt to receive are being blocked or going unread
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.