Tags: inboxRemove, storm wormRemove

App makers target email overload 
Jul 2, 2013 | Comment Now 
Productivity push shifts to the inbox.
 
Windows Phone 7 coming for Christmas 
By Anthony Caruana | Aug 31, 2010 | Comment Now 
No Adobe Flash support or unified email inbox but props for new Domain app.
 
Malware writers begin to target Google's Chrome browser 
By Daniel Long | Apr 20, 2010 | Comment Now 
Just because you're using Chrome doesn't mean you're necessarily immune to malware. An unsolicited email is circulating which prompts Google Chrome users to install a fake ...
 
Storm spam floods inboxes again 
By Shaun Nichols | May 23, 2008 | Comment Now 
The infamous Storm botnet has been linked to a new spam run recorded earlier this week.
 
Xobni touts social network for the inbox 
By Clement James | May 7, 2008 | Comment Now 
US startup Xobni has launched an add-on software module for Microsoft Outlook which the firm claims can organise a user's inbox by 'relationships'..
 
Mega-D botnet stronger than Storm, promotes male sexual pills 
By Negar Salek | Feb 1, 2008 | Comment Now 
A new botnet spamming male sexual enhancement pill promotions has overtaken the notorious Storm worm botnet as the ‘largest single source of the world’s spam’, security vendor ...
 
Storm malware still blowing strong 
By Clement James | Jan 28, 2008 | Comment Now 
The 2007 Global Threat Report from Bratislava-based security firm ESET has highlighted the huge success of the Storm worm..
 
Halloween spam surges  
By Negar Salek | Oct 31, 2007 | Comment Now 
Spammers have coordinated a Halloween spam campaign using the Storm worm botnet with subject line ‘Halloween Storm'.
 
Safeguarding your inbox 
By Joseph C. | Jan 13, 2006 | Comment Now 
Jill Cherveny-Keough never lowers her defenses. When she receives unsolicited email from an unknown source, Cherveny-Keough assumes it contains a worm, virus or verbiage that ...
1
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
In which area is your IT shop hiring the most staff?




   |   View results
IT security and risk
  25%
 
Sourcing and strategy
  12%
 
IT infrastructure (servers, storage, networking)
  22%
 
End user computing (desktops, mobiles, apps)
  14%
 
Software development
  27%
TOTAL VOTES: 259

Vote
Would your InfoSec team be prepared to share threat data with the Australian Government?

   |   View results
Yes
  62%
 
No
  38%
TOTAL VOTES: 82

Vote