threats:
  • content/en-us/images/repository/isc/2017-images/spam-img-02.jpg

    Support for Spammers

    Trojan proxy-servers – and multipurpose Trojan viruses that function as proxy servers – can attack and infect multiple computers, in order to establish a ‘zombie network’. The cybercriminal then has control over every computer within the zombie network and can use their combined computing power for the mass distribution of spam email...

    Read More >
  • content/en-us/images/repository/isc/2017-images/threats-img-03.jpg

    Protect yourself from online banking theft

    With the growth in popularity of online banking services, the theft of banking information has become one of the most common types of criminal activity on the Internet...

    Read More >
  • content/en-us/images/repository/isc/2017-images/spam-img-01.jpg

    What is Spam and a Phishing Scam? - Definition

    Spam is the electronic equivalent of the ‘junk mail’ that arrives on your doormat or in your postbox. However, spam is more than just annoying. It can be dangerous – especially if it’s part of a phishing scam.

    Read More >