Spam

Newsletter KPIs: indicators in e-mail marketing
Click rate & opening rate – newsletter KPIs in e-mail marketing
  • E-mail marketing

In e-mail marketing, KPIs (Key Performance Indicators) are extremely important for analyzing campaigns. Various indicators can help you to determine the final success rate of your marketing activities. But how exactly can you measure metrics like a newsletter’s conversion rate, opening rate, and click-through rate? And which other KPIs are important?

Click rate & opening rate – newsletter KPIs in e-mail marketing
Online identity theft protection
Online identity theft protection
  • Website creation

Many only know internet identity theft and similar crimes from movies or television. But stories of online fraudsters are not just mere phantasies of screenwriters; for many the experience is all too real. Online identity theft has become more and more of a problem over the past few years, and everyone is a potential victim. We have compiled some preventative steps than can help you stay out of...

Online identity theft protection
Outlook spam filter
Outlook spam filter: setting and customizing the junk filter
  • E-Mail security

The Outlook spam filter automatically moves unwanted and potentially fraudulent emails to the junk folder. Even junk mail that doesn’t meet the typical spam criteria can be kept out of your Outlook inbox with the right settings. In case of errors, the Outlook junk filter can be easily adjusted manually.

Outlook spam filter: setting and customizing the junk filter
What is a botnet?
Botnets: definition and protection tips
  • Security

Botnets are tricky to spot, but they’re all over the internet and they cause all kinds of damage every day. They lurk inconspicuously in the background and use millions of private computers for malicious purposes. This guide explains how botnets work, how to keep them away, and how you can avoid falling victim to an illegal network.

Botnets: definition and protection tips
What is greylisting?
What is greylisting?
  • E-Mail security

Greylisting is an effective method for preventing mass spam emails from being sent out. Since this process happens in the background, most users are unaware that their inbox is being protected by greylisting. Here you will learn exactly how this method works on a technical level.

What is greylisting?
Captcha | codes and images for spam protection
Captcha: codes, images and puzzles for spam protection
  • Online sales

For years, the captcha has been a necessary evil for securing interactive web applications (e.g. online forms) against spam. The fully-automatic public Turing test distinguishes between computers and humans. The test exposes which automatic queries are performed by spam robots, which then minimizes the administrative effort needed for interactive websites. We present the most common types of...

Captcha: codes, images and puzzles for spam protection
How to protect your website from malware
Malware on the server: consequences and countermeasures
  • Technical matters

A website operator is responsible for the security of a web project as well as the content. Neglecting security may lead to hackers easily infiltrating the system through security gaps. If a malware-infected website goes unnoticed, it could cause serious damage. It is therefore important to make sure your site is fully protected.

Malware on the server: consequences and countermeasures
What Is Pharming?
Pharming: Protecting against Redirections to Fraudulent Websites
  • E-Mail security

The internet is not only a vast marketplace for companies, but also a gold mine for criminals. They attempt to steal user data and redirect financial transactions by constantly developing new methods. One popular technique is called pharming. But how does pharming work and how can internet users protect themselves?

Pharming: Protecting against Redirections to Fraudulent Websites
How to recognize spam e-mails and prevent them
The right way to deal with spam
  • E-Mail security

Billions of spam e-mails are sent daily. These annoying messages cost time and get on your nerves, especially when malware finds its way onto your computer or private data falls into the wrong hands. Just a few small tricks and a bit of caution when dealing with e-mails can remedy the situation.

The right way to deal with spam
How to identify phishing e-mails and protect your data
Identifying phishing e-mails: the telltale signs at a glance
  • E-Mail security

Scammers send out dubious e-mails attempting to obtain sensitive data from internet users every day. This is known as phishing and isn’t just annoying; fraudulent e-mails cost millions each year as internet users fall victim to them. We reveal how to identify phishing e-mails and how to render your inbox harmless.

Identifying phishing e-mails: the telltale signs at a glance