spam

Results 1 - 25 of 209Sort Results By: Published Date | Title | Company Name
By: Oracle     Published Date: Sep 26, 2019
As marketers chase after the same people with the same tactics, traditional marketing has become less worth the time—and the money. Email outreach worked until spam clogged up inboxes. Content marketing worked until everybody started to put out sub-standard material. And search engine marketing worked until it became inundated with new players clamoring for attention. Even inbound tactics aren’t delivering the results they once did. And as the need for performance continues to climb, so does the status of account-based marketing (ABM). In the B2B sphere it’s on the tip of everyone’s tongue. Download this whitepaper to learn more about ABM, a potent approach that puts sales and marketing together.
Tags : 
     Oracle
By: StrongMail     Published Date: Jun 08, 2008
The growing trend towards insourcing marketing and transactional email is being driven by businesses that are looking for ways to improve their email programs, increase data security and lower costs. When evaluating whether it makes more sense to leverage an on-premise or outsourced solution, it's important to understand how the traditional arguments have changed.
Tags : strongmail, social media, email marketing, on-premise advantage, transactional email, insourcing, bounce management, spam trappers, emarketing, roi, networks, social networking
     StrongMail
By: Adobe     Published Date: Mar 26, 2018
At 12:33 EDT on May 3, 1978, Gary Thuerk sent an email that later earned him the title “Father of Spam” (although understandably, he prefers to be called the “Father of E-marketing”). Thuerk, then a marketing manager for computer company Digital Equipment Corporation, sent a mass email inviting recipients to one of two West Coast product demos for a new line of computers.1
Tags : 
     Adobe
By: Rohde & Schwarz Cybersecurity     Published Date: Nov 30, 2017
Advanced persistent threats (APTs) are stealthier and more spiteful than ever. Sophisticated techniques are used to quietly breach organizations and deploy customized malware, which potentially remains undetected for months. Such attacks are caused by cybercriminals who target individual users with highly evasive tools. Legacy security approaches are bypassed to steal sensitive data from credit card details to intellectual property or government secrets. Traditional cybersecurity solutions, such as email spam filters, anti-virus software or firewalls are ineffective against advanced persistent threats. APTs can bypass such solutions and gain hold within a network to make organizations vulnerable to data breaches.
Tags : it security, vendor, malware, analysis, service, malicious attacks, network, traffic
     Rohde & Schwarz Cybersecurity
By: MalwareBytes EMEA     Published Date: May 10, 2019
Enterprises, beware. Threat actors are continuing to eye businesses for high returns on investment in Q1 2019, breaching infrastructure, exfiltrating or holding data hostage, and abusing weak credentials for continued, targeted monitoring. From a steadfast increase of pervasive Trojans, such as Emotet, to a resurgence of ransomware lodged against corporate targets, cybercriminals are going after organizations with a vengeance. Yet every cloud has a silver lining, and for all the additional effort thrown at businesses, consumer threats are now on the decline. Ransomware against consumers has slowed down to a trickle and cryptomining, at a fever pitch against consumers this time last year, has all but died. Interestingly, this has resulted in an overall decline in the volume of malware detections from Q4 2018 to Q1 2019. While threat actors made themselves busy with challenging new victims, they ensnared targets in the old ways, using tried-and-true malspam and social engineering tactic
Tags : 
     MalwareBytes EMEA
By: Adobe     Published Date: Mar 21, 2017
Am 3. Mai 1978 um 12.33 Uhr New Yorker Ortszeit verschickte Gary Thuerk eine „Massen-E-Mail“, die ihn später als „Vater des Spam“ berühmt machen sollte – aus verständlichen Gründen bevorzugt er selbst eine Würdigung als „Vater des E-Marketing“.
Tags : 
     Adobe
By: Adobe     Published Date: Mar 21, 2017
On 3 May 1978, Gary Thuerk sent an e-mail that later earned him the title “Father of Spam” (although understandably, he prefers to be called the “Father of E-marketing”). Thuerk, then a marketing manager for computer company Digital Equipment Corporation, sent a mass e-mail inviting recipients to one of two West Coast product demos for a new line of computers.
Tags : 
     Adobe
By: Mimecast     Published Date: Oct 17, 2013
Macmillan Cancer Support has relied on Mimecast for robust email security backed by a 100% anti-virus and 99% antispam SLA for a number of years. Mimecast’s Email Security solution has solved a spam issue that was seriously affecting Macmillan’s email system performance and creating a significant management burden for the charity’s IT department.
Tags : mimecast, macmillan cancer support, email security solution, banish spam, case study, email system performance, it departments, spam problems, management and support burden, reliable email system, protected email system, safeguarding, email environment, high value activities, better email service, security
     Mimecast
By: F5 Networks Singapore Pte Ltd     Published Date: Sep 19, 2019
"Every kind of online interaction—website visits, API calls to mobile apps, and others—is being attacked by bots. Whether it's fraud, scraping, spam, DDoS, espionage, shilling, or simply altering your SEO ranking, bots are wreaking havoc on websites as well as mobile and business applications. But that’s not all: they’re also messing with your business intelligence (BI). They can skew audience metrics, customer journeys and even ad buys, making business decisions questionable and costly. According to Forrester, ad fraud alone was set to exceed $3.3 billion in 2018. Not all bots are bad. In fact, your business depends on them. Search engine bots, for example, give your web presence visibility and authority online. Other good bots help you deliver better customer experiences—perhaps a chatbot provides instant customer assistance on your site. What’s important is enabling the good bots and blocking the bad ones."
Tags : 
     F5 Networks Singapore Pte Ltd
By: Symantec     Published Date: Jul 30, 2014
This paper analyses the emerging trends, malicious code activity, phishing and spam to help present essential information to help you secure your systems.
Tags : website security threat report, emerging security trends, malicious activity, essential security, security
     Symantec
By: Symantec     Published Date: Jul 30, 2014
This paper analyses the emerging trends, malicious code activity, phishing and spam to help present essential information to help you secure your systems.
Tags : website security threat report, emerging security trends, malicious activity, essential security, security, research
     Symantec
By: Symantec     Published Date: Jul 30, 2014
This paper analyses the emerging trends, malicious code activity, phishing and spam to help present essential information to help you secure your systems.
Tags : website security threat report, emerging security trends, malicious activity, essential security, security, research
     Symantec
By: Symantec     Published Date: Jul 30, 2014
This paper analyses the emerging trends, malicious code activity, phishing and spam to help present essential information to help you secure your systems.
Tags : website security threat report, emerging security trends, malicious activity, essential security, security, research
     Symantec
By: Symantec     Published Date: Jul 30, 2014
This paper analyses the emerging trends, malicious code activity, phishing and spam to help present essential information to help you secure your systems.
Tags : website security threat report, emerging security trends, malicious activity, essential security, security, research
     Symantec
By: F5 Networks Inc     Published Date: Aug 16, 2018
As signaling and scrubbing technology evolve (and as your solutions become more and more adaptable), DDoS attacks will become less effective and less attractive to would-be adversaries. The time will soon come when a 1 Tb attack from an IoT botnet will seem like a mere annoyance, rather than a catastrophic event—if you even notice it at all. So how do you get there faster? Plan ahead by designing a defense in-depth DDoS strategy and partner with a trusted security provider to handle the large attacks. Upfront preparation will pay off when the threat of DDoS attacks no longer keeps you up at night.
Tags : strategy, ddos, spam, technology, solutions
     F5 Networks Inc
By: Symantec     Published Date: Jul 30, 2014
This paper analyses the emerging trends, malicious code activity, phishing and spam to help present essential information to help you secure your systems.
Tags : website security threat report, emerging security trends, malicious activity, essential security, security, research
     Symantec
By: Mimecast     Published Date: May 31, 2018
Not all email security systems perform the same. Lots of false negatives get through. That’s what Mimecast found in its new email security risk assessment (ESRA), an inspection of email security systems to uncover the number, type and severity of threats getting into organizations. - TOTAL CAUGHT SPAM: 14,277,163 - TOTAL CAUGHT DANGEROUS FILE TYPES: 9,992 - TOTAL CAUGHT MALWARE ATTACHMENTS: 12,502 Download our report of ESRA tests to see the threats that Mimecast catches and other email security systems miss.
Tags : 
     Mimecast
By: TIBCO Software     Published Date: Aug 14, 2018
Increasing your non-interest revenues without increasing customer fees that ultimately drive customers away can be a challenge. The digital economy is opening up new ways to drive additional revenue from existing customers. The same technical innovations are also opening up new ways to communicate with customers about both digital and traditional offerings. But that results in customers becoming overwhelmed with advertising and marketing messages. They are forced to decide upfront who is providing relevant information and who to completely ignore. Ultimately, it comes down to trust. Customers consider generic messages to be spam and learn to filter them out, even if they come from a known vendor. Over the long run, these types of marketing campaigns not only see diminishing returns, they can even damage your long-term relationship with customers and decrease revenues. Micro-marketing overcomes the noise that traditional spam-marketing creates and establishes news levels of trust betwee
Tags : 
     TIBCO Software
By: MessageLabs     Published Date: May 28, 2008
So-called "redirector" or "search engine" spam emerged in late 2007 and has now grown into a significant threat to businesses. In this new MessageLabs whitepaper, learn about the latest spammer ploy to get dangerous links past traditional defenses, and how MessageLabs delivers a proven, cost-effective solution.
Tags : spam, anti-spam, anti spam, email security, trojan, hacker, messagelabs, message labs
     MessageLabs
By: MessageLabs     Published Date: Sep 25, 2008
A close look at the data provides a clear picture of how spammers vary their tactics to overwhelm traditional corporate email defenses, through changes in duration, frequency and intensity among others. This whitepaper will help you understand these threats to your business, and how MessageLabs provides a unique solution.
Tags : messagelabs, spam, data analyst, traffic, trends, anti-spam, security, data management
     MessageLabs
By: MessageLabs     Published Date: Sep 25, 2008
Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin:0in; mso-para-margin-bottom:.0001pt; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin; mso-bidi-font-family:"Times New Roman"; mso-bidi-theme-font:minor-bidi;} The "pump 'n' dump" stock scam has been around a long time. Learn how Internet criminals are perfecting it, and how MessageLabs offers superior protection.
Tags : messagelabs, stock, spam, pump ‘n’ dump, fraud, dul blocklist protection, security
     MessageLabs
By: MessageLabs     Published Date: Sep 25, 2008
In the underground digital economy, thousands of criminals conduct business in excess of $100 billion. In this whitepaper you’ll learn more about this highly specialized marketplace, and how it generates powerful tools to steal victims’ identities. You’ll also see why MessageLabs unique proprietary technology helps to disrupt this activity.
Tags : messagelabs, malware, trojans, spyware, viruses, dot.com, fraud, botnet, spammers, security
     MessageLabs
By: MessageLabs     Published Date: Sep 25, 2008
The Internet has proven to be a vital communications medium for worldwide commerce, but as an open and unprotected global network it can also present a wide range of threats that can cripple any business organization. Several years ago, most Internet threats were relatively benign examples of a young adolescent’s technical expertise but over time they have evolved into increasingly sophisticated domestic and foreign attacks that are designed to capture financial, personal, or strategic business information. Threats now come in the form of deliberately malicious acts, and exploitative opportunities for hackers and/or organized crime. The impact is serious, and the landscape of victims is getting broader every day. In response, no organization can afford to have its networks remain unprotected.
Tags : messagelabs, online threats, security, small & medium businesses, email spam, viruses, trojan horses, worms, phishing attacks, spyware, adware, honeypots, sandboxing, the wildlist
     MessageLabs
By: Clearswift     Published Date: Jun 09, 2008
Every enterprise has to find a balance between security and the ability to carry on conducting business freely. This short guide is about finding that balance. By following some basic principles, there's no reason you can't let legitimate business email move into, out of and within your enterprise while stopping the things that cause damage: viruses, spam, spyware, trojans, phishing, Denial of Service attacks, the loss of sensitive data and the collection of illegal, immoral and just plain offensive material.
Tags : e-mail security, guide, clearswift, clearswift
     Clearswift
By: Clearswift     Published Date: Jun 09, 2008
This white paper provides a comprehensive look at spam; from its early days to where we are today in terms of managing the daily threats.  With a strong policy, education and policy enforcement, and a multi-layer content security solution, organizations can address every kind of threat to its networks and its business; regardless of whether the threats are inbound or outbound.
Tags : clearswift, network security, internet security, web security
     Clearswift
Start   Previous   1 2 3 4 5 6 7 8 9    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the Energy Efficiency Markets White Paper Library contact: Kevin@EnergyEfficiencyMarkets.com