Author Archives: Carl E. Reid

About Carl E. Reid

Developing his career from the mail room to the board room, Carl E. Reid has achieved success by skillfully blending 40 years of technology and business intelligence experience with his passion for helping companies succeed. Carl is founder and CEO of NetTECH Systems Reid & Associates, Inc., an emerging technology consulting company located in the New York City area. One of his specialties is 15 years as a collaboration and email infrastructure consultant. He has implemented and supported Lotus Notes/Domino and other types of SMTP gateway/network configurations in small to large global companies up to 33,000 employees. Some of his clients have included IBM, Citi, JPMChase, Oxygen, LVMH - Moet Hennessy, MeadWestvaco, non-profits and professional organizations. Carl is a Savvy Business Owner, Public Speaker and Author. His articles have appeared in Network World, Computer Monthly magazines and hundreds of web sites. Combining business technology consulting with professional blogging, Carl specializes in advising clients how to best leverage the Internet as a tool for high impact visibility. Carl's speaking style combines humor with expertise, and his advice is always down-to-earth and practical. He personally publishes Library of Congress recognized newsletter blog, http://www.SavvyIntrapreneur.com and http://www.iTechSpeak.com. Carl wrote the original "Professional Blogger Job Description", being used as standard document within companies. As a business career coach, Carl teaches professionals how to run their career as a profitable business.

Fake Greeting Card Emails Resurface

Over the last few months I’ve noticed a resurgence of e-card spam scam from our unfriendly neighborhood spammers. According to security expert Bill Mullins, in the last year, email inboxes have being swamped with similar scamming emails from fraudulent sites …

Fake Greeting Card Emails Resurface
   

Educate your email users about phishing

Last week one of my clients received the resurfaced American Express phishing email. And yesterday an associate told me a dastardly story about being fleeced out of $2,700 from his Citibank account.  This was the result of responding to a phishing …

Educate your email users about phishing
   

MillerSmiles.co.uk Provides Latest Anti-Phishing Updates

 MillerSmiles.co.uk is one of the internet’s leading anti-phishing sites, maintaining a massive archive of phishing and identity theft email scams.  This organizations provides the latest information on phishing scams.  MillerSmiles.co.uk actually keeps its phishing database updated from contributions from people around …

MillerSmiles.co.uk Provides Latest Anti-Phishing Updates
   

How do email addresses end up on spam lists?

Every day, millions of people receive dozens of unsolicited commercial emails, known popularly as “spam.” Some users see spam as a minor annoyance, while others are so overwhelmed with spam that they are forced to switch email addresses. This leads …

How do email addresses end up on spam lists?
   

Virus Cracks Open Email Scam

This story is near and dear to me.  One day I went into a frenzy, because a good friend sent me an email that she was stranded in Ghana and needed me to send her some money.  She never mentioned …

Virus Cracks Open Email Scam
   

Spammer Hiding Techniques

Escaping: This technique uses legal URL formatting to hide the address.  Escaping encodes the URL with a percent sign followed by a hexidecimal code. An escaped URL can look like “http://%2E%2E%2E%48%20%18%32%2F%48…”. You can easily decode this by copying it into …

Spammer Hiding Techniques
   

Continuing Spam Legislation

One of the main issues with the original development of email is that it was never designed to be secure. The focus of email was mainly to be functional and easy to use. Today these core functions, which made the invention …

Continuing Spam Legislation
   

U. S. Presidential Candidates’ State Spam Legislation

Some or all provisions of some individual state laws may be preempted by the United States federal CAN-SPAM Act of 2003, including provisions regarding a private right of action.  Although not part of any platforms with the upcoming United States …

U. S. Presidential Candidates’ State Spam Legislation
   

FBI Ran a Forum for Phishers, Spammers and Hackers.

While criminals thought it was based in Eastern Europe, the Internet’s top English-speaking cybercrime forum was secretly run by the FBI from this building on the banks of the Monongahela River in Pittsburgh.  Photo: John Monroe Butler/ Wired.com Kevin Poulsen …

FBI Ran a Forum for Phishers, Spammers and Hackers.
   

Phishing Emails Exploit Browser Weaknesses

Most web browsers are supposed to protect people by implementing security zones. These safe zones use different security settings of a web browser, which can vary based on the location of the web page being viewed. Phishing emails can lure …

Phishing Emails Exploit Browser Weaknesses