We often meet with clients, network and friends. When the dialogue falls on work, then we often get asked the same few questions. Therefore we decided to write a short FAQ that answers these questions!
I hope you find it useful 🙂

People I don’t know say they are receiving SPAM mails from my email address
It is a well known problem through years.
It is properly not coming from you, but your email address can have been picked up somewhere public like a message board or hacked from a company where you have once registered.
There is little you can do and it will soon blow over again. Make sure that your have your Anti-virus installed and updated!

My customers and contacts are receiving SPAM from my email address
This is also a well known problem. This is a little worse, but it may not be your computer. One in your network of contacts may have had a virus that send them the whole contact list and now you are on it. For a while, you will properly see emails sent to or from you along with people you know. Make sure you have your Anti-Virus installed and updated

If you are in a company and you have network of computers and suspect that SPAM are being sent from in-house, please check the following below:
If you have double checked your own Anti-Spam product on your server and eliminated that possibility, please see the below tips that will properly solve your issue.

Configure your firewall
Ensure that only authorized users can send emails via your internal network. This is accomplished by creating a rule in your firewall to drop all outbound traffic on TCP port 25 (SMTP).

If you are hosting your mail server inside your internal network, ensure that you make an exception to the above rule to ensure that the mail server can still deliver on your behalf.

It is advisable to log dropped packets, so that you can identify any rogue computers on the network attempting to deliver mails directly.

Enable SMTP Authentication
Now that emails can only be delivered through your mail server, you must ensure that it will only rely emails on behalf of authenticated users.

Failure to do so will leave you exposed to abuse of the server, so it is important to get the configuration of the mail server right.

Protect your domain
Let everybody know who are trusted sender of emails for your domain. This can be accomplished using Sender Policy Framework (SPF):

You should create a SPF record stating that your mail server (and possibly any 3rd parties) are the only trusted senders for your domain.

Don’t hesitate to call us if you have any questions about Anti-Spam or Anti-Virus products for your Business or Personal clients.

On behalf of the SPAMfighter team

Jan Christiansen
CMO – SPAMfighter.com

Posted in Anti-spam, Tips and Tricks |

With the uptick in cybercrime in recent years, it is critical that we don’t lose sight of the simplest precaution we must take to protect ourselves – using strong passwords. We might think it’ll never happen to us, but the latest security breach at LinkedIn is a reminder that a strong password is our last line of defense when it comes to protecting our personal information from hackers.


Posted in Tips and Tricks | Tagged |

Credit Card PhishingFor over 4 years now, I’ve operated a popular message board about credit cards.

But during that entire time, I’ve never seen more complaints posted about credit card phishing scams than I have during the past year. Criminals are getting more crafty (and more bold) in how they attempt to steal your credit card information. What follows are five of the most common scams I hear about and how you can protect yourself against them.

Posted in Phishing | Tagged , , , , , , |

SLOW-PCfighter 2 logo

We recently released the new version of our registry cleaner SLOW-PCfighter with a discounted launch for some of our existing customers. We’re proud to say it went beyond our imagination.

Posted in Software |

320px-Junction_5_svgFor some years we have been covering IT security news and have been writing about spam, spyware, hacking and many other online nuisances. Usually in January we try to look ahead on what might dominate IT security the upcoming year. At the same time we look back at the recently passed year and the stories that grabbed the most traffic to our site. It is normally a good way to see what has concerned Internet users most.

Posted in General | Tagged , , , , |