How To Deploy Junk E-mail Settings Using Group Policy

Using Group Policy Objects (GPO) is the preferred method for configuring clients in a Microsoft Windows Active Directory environment. When an administrator uses GPOs, they can centrally configure clients, ensure consistent settings across all clients, ensure that new machines added …

spam-image-2_2269274b
   

Celebrities Continue To Be Expoited by Spammers

Celebrities are always popular targets for spammers to exploit, and security researchers say the trend is only increasing. According to security researchers, Jennifer Aniston is one of the most exploited celebrities, followed by Miley Cyrus, Selena Gomez, the Kardashians and …

Spam2_2
   

Google Adds New Anti-Spam Feature

Google has announced a new feature designed to make its Gmail service even better at blocking spam. The company says that they have begun locally caching images inserted into emails. They say this makes the service faster and protects the …

gmail
   

Evolution of Spam

As technology evolves and grows more sophisticated, so has spam over the years. The first spam messages were known as unsolicited bulk email or unsolicited commercial email because legitimate companies followed the lead of Lauence Canter and Martha Siegel who …

sophistication
   

New Spam Campaign Exploits WhatsApp

WhatsApp has become a very popular messaging service, especially among the younger crowd, and spammers are taking full advantage of it.  A new spam campaign has been detected, masquerading as notifications from the service. The messages pretend to be notifying …

trojan
   

December Spam Roundup

2013 is coming to a close but spam is still going strong. Phishing attacks and malicious spam levels continue to be high and that doesn’t look like it will change anytime soon. Let’s take a look at the top spam …

News
   

As difficult as it is to believe, 2013 is almost a distant dream while 2014 is gearing up to be another interesting year in the ongoing war on all things security. It might be easy to assume that the New …

2013-2014-featured-570x270
   

How to Configure Junk Email Setting in Outlook 2013

Last time, we discussed the Spam Confidence Level (SCL) Threshold and how the Content Filter and other spam protections leverage this to filter out junk email. We also mentioned that Outlook uses the SCL to either deliver email to the …

outlook-junkmail
   

Exchange 2013 Anti-Spam Technologies-Understanding the Spam Confidence Level Threshold

In our last post, we talked about The Content Filter Agent. We mentioned that the Content Filter Agent will assign a Spam Confidence Level (SCL) to a message that it analyzes, which is used to determine the final outcome of …

email-back-lots-of-email
   

And just like that, Christmas is nearly upon us. Those of you who reside in the shimmering world of technology may be taking a moment to sigh relief, as you made it through another year without a total meltdown. Others, …

Christmas Mall