INSIDE THIS ISSUE
Beware Of Ad Threat
Malvertisements Appear On Top Websites
Beware Of Phishing!
Two To View
A Couple Of Amazing Videos You Don't Want To Miss
This Month's FAQ
What's The Difference Between POP And IMAP?
Sites Of The Month
Great Sites To Check Out In December
How Do I Create A New Photo Album On Facebook?
Greetings from Polar's E-Connections Team
Happy Holidays! Our gift to you this season is a December issue filled with valuable ideas and information. As we've done throughout 2011, we start with a warning. This time it's about malvertising, or corrupted ads, appearing on some of today's top websites. Take a minute to read about this threat so you don't become a victim. We also encourage you to learn the difference between POP and IMAP when it comes to email, as well as how to create a new photo album on Facebook. Just for fun, check out the Two to View videos and Sites of the Month to get inspiration for the holidays and beyond.
The goal of each of our eNewsletters is to keep our subscribers informed regarding their Internet connection and to improve their Internet experience. We think you'll find this information interesting.
To see what's inside this issue, simply scroll down the eNewsletter or click on the links within the index to the left. Thanks for reading!
- The E-Connections Team
Malvertisements are online advertisements that are capable of infecting a PC with malware. Compromised computers can then be used to create powerful botnets to carry out identity theft, corporate espionage, or other nefarious activity. Malvertising is the current computer hijacking technique of choice for organized crime gangs.
According to research disclosed by security intelligence firm RiskIQ, the spread of malvertisements has spiked tenfold over the past year. It's a growing threat to consumers since the infected ads are appearing on some of the top 500 commercial websites including weather.com
You can help protect your PC from malvertisements by making sure the following are current:
Phishing is a way of attempting to acquire information such as usernames, passwords, and credit card details by masquerading as a trustworthy entity in an electronic communication. Communications purporting to be from popular social websites, auction sites, online payment processors or IT administrators are commonly used to lure the unsuspecting public. Phishing is typically carried out by email spoofing or instant messaging, and it often directs users to enter details at a fake website whose look and feel are almost identical to the legitimate one. Phishing is an example of social engineering techniques used to deceive users, and exploits the poor usability of current web security technologies.
To combat phishing schemes, we strongly encourage all customers to have strong passwords. Suggested strong passwords are those that cannot be easily guessed associated with the customers name or other personal information. Strong passwords contain letters and numbers and are at least 8 characters long. Changing your password quarterly or bi-annually will also help prevent hackers from getting into your personal information.
There have been several "phishing" emails going around recently, emails that are meant to look like a legitimate business asking for your personal information or information on your accounts. Please do not reply to these emails with your information! Polar does send out customer mass email notifications from time to time but we NEVER ask for personal information via email. Delete these "phishing" emails and contact Polar at 800.284.7222
Question: I've seen the acronyms POP and IMAP used with respect to email but I'm not clear on what they mean. Could you explain the difference between POP and IMAP?
Answer: We understand your confusion. There are so many acronyms that apply to technology, it can be difficult to stay on top of them all. In a nutshell, POP and IMAP are simply different protocols for handling email.
POP stands for Post Office Protocol. When using the POP protocol, the mail server receives email and stores it until you request it by opening your email client (such as Windows Live Mail or Thunderbird) and pressing the "Send/Receive" button. Your email client, in essence, uses the POP protocol to ask the mail server if there are any email messages waiting. If there are, it tells the mail server to send them to you. When the mail server receives your POP request, it sends the messages to your email client. Once you receive the messages, they're usually deleted from the mail server.
By contrast, IMAP stores a copy of the email messages. IMAP stands for Internet Message Access Protocol. IMAP allows you to download emails from the mail server to your email client in much the same way as POP does. However, the difference is that when you request your email from the mail server using IMAP, it sends a copy of each email message to your email client software and also stores a copy on the mail server.
For many people, the holiday season inspires more photo-taking sessions than any other time of year—from pajama-clad family members under the tree to smiles of delight as gifts are unwrapped. Once you capture the holiday memories, share them with your Facebook friends using the steps below:
We hope you found this newsletter to be informative. It's our way of keeping you posted on the happenings here. If, however, you'd prefer not to receive these bulletins, click here.
Thanks for your business!
The E-Connections Team
110 4th St E
Park River, ND 58270
Trademarks: All brand names and product names used in this eNewsletter are trade names, service marks, trademarks or registered trademarks of their respective owners.