Hotmail hack shows risks of Web e-mail

Marsan, Carolyn Duffy
September 1999
Network World;09/06/99, Vol. 16 Issue 36, p1
Trade Publication
Reports on corporate policies in the United States designed to prevent exposure to electronic mail security breaches. Blocking of end users from forwarding messages to World Wide Web-based e-mail services; Filtration of e-mail messages headed to Web-based e-mail services; Hackers' exploitation of a design flaw in the Microsoft's Hotmail e-mail service; Popularity of Hotmail among executives. INSET: Tips for blocking Web-based e-mail..


Related Articles

  • Personal privacy. Van Horn, Royal // Phi Delta Kappan;Sep98, Vol. 80 Issue 1, p92 

    Examines how some electronic devices can intrude upon personal privacy. Telephone redial; Extra telephone features; Answering machines; Cellular phones; Computer passwords and e-mail; Computer operating systems; Encrypted e-mail.

  • Send emails that self-destruct.  // Computer Act!ve;8/19/2015, Issue 456, p42 

    The article offers step-by-step instructions for using Dmail, the free Chrome extension which prevents someone from reading an email.

  • RISK MANAGEMENT OF EMAIL AND INTERNET USE IN THE WORKPLACE. Ruhnka, John; Loopesko, Windham E. // Journal of Digital Forensics, Security & Law;2013, Vol. 8 Issue 3, p7 

    The article surveys the changing risk environment for corporations from their employees' electronic communications. It identifies the types of liabilities that corporations can incur from such employee communications. It discusses the objectives of corporate internet use policies and the types...

  • Hong Kong spam rates higher than global number.  // ComputerWorld Hong Kong;10/10/2008, Vol. 25 Issue 9, p26 

    The article discusses the results of the MessageLabs report as of October 2008. According to this report, the spam rate in Hong Kong, China surged to 87 percent from September 2007 to September 2008. It notes that Hong Kong's spam rate is higher than the global spam rate at 78 percent and China...

  • Dealing with Difficult E-mail Situations.  // Bloomsbury Business Library - Actionlists & Checklists;2007, p94 

    The article discusses different ways of dealing with difficulties related to e-mails. It is stated that the immediacy with which e-mail allows one to communicate with others has many advantages, but many problems are caused when people feel under pressure to reply to e-mails as soon as they...

  • What are the odds of defeating spam? Davies, Hugh // Building Design;11/20/2009, Issue 1893, p21 

    The article focuses on how to eliminate computer spam. It says that anti-spam software does a lot of method to filter spam messages including keyword filtering, whitelists and Bayesian filtering. It notes that whitelist accepts messages from legitimate contacts, keyword filtering depends on the...

  • New Breed of Spam. Arellano, Jonah // Rural Telecommunications;Mar/Apr2007, Vol. 26 Issue 2, p9 

    The article describes a new breed of spam that evades filters. Traditional spam is blocked by mail servers based on key attributes such as words and phrases usually contained in unsolicited e-mail. Newer spam utilize an image containing the spammer's message which is embedded in the body of the...

  • Publish and be damned! Goodbye ethics. Gibbs, Mark // Network World;7/27/2009, Vol. 26 Issue 24, p34 

    The article discusses the author's view regarding the issue of publishing a received electronic mail message which was meant for someone else. He stresses that such behavior of reading and publishing a misdirected document due to a huge migration to electronic communications is unethical. He...

  • DLP Prevention is Better than a Cure. Bakthavatsalu, Bhaskar // Siliconindia;Oct2010, Vol. 13 Issue 10, p36 

    The article focuses on data loss prevention (DLP) solution and how it works. It states that the solution increases user awareness by alerting users before they send suspicious e-mail. It says that the solution aims to increase the responsibility of users, encourage the review of message before...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics