Nobody likes spam, and in some cases it can lead to scams and phishing attempts to steal login credentials or install ransomware. The quickest way to report spam to Shaw is through Webmail, but you can also forward spam to Shaw from a 3rd party email app.
When you use this method to report spam, your email headers will be submitted to Shaw automatically.
If you would prefer to report spam to Shaw through your 3rd party email app:
Fraudulent email messages are typically sent to obtain personal and private financial information. They ask for confidential information, such as your account username, account number, and password. See our article Identifying Fraudulent Emails "Phishing" for more information about identifying fraudulent emails.
Phishing is when cybercriminals attempt to gain access to your personal information by:
Fraudulent messages and phishing attempts often include false messages related to:
Be wary of emails that:
You can hover your cursor over links in the email to view the URLs they go to, but be careful to not actually click the links if you don't trust them.
Malware is malicious software created to cause damage or disrupt your computer system and potentially provide unauthorized access to your computer, server or network. It can be delivered over email via a link or attached file, instant messaging, internet browsing and social media. Some of the most common types of malware are viruses, worms, spyware, Trojans and ransomware.
Security researchers have discovered a new COVID-19-themed malware. For example, there are COVID-19 tracking maps that imitate legitimate sites but actually rewrite computer operating systems and then post a message that the machine has been infected with ransomware.
Ransomware is malicious software that infects your computer and makes your data inaccessible. The attacker will demand a ransom in return for access to your data.
Ransomware criminals stepped up their attacks amid the COVID-19 pandemic. They have targeted the networks of aid organizations, medical billing companies, manufacturing, transport and government institutions, and educational software providers. New ransomware is constantly developed and launched.
We rely on our devices to stay connected, which makes it critical to take proper measures to protect the personal data we have stored, such as credit card, banking and tax information, medical records, photos and even confidential work information.
It’s easy for laptops, tablets and smartphones to get lost or stolen. And your personal data can even be stolen when connecting to public networks, which requires further awareness on your part. Without strong passwords and network awareness, it is easy for unauthorized users to access your data.
With so much information about you residing in the cloud, passwords are often the only defense between cybercriminals and your online life.
The hacker uses a list of short, common words with number combinations to get through weak and oversimplified passwords.
A program is used to generate passwords and random character sets, starting with commonly used, weak passwords like Password123.
The cybercriminal uses software to monitor network traffic and capture passwords as they’re entered. Similar to tapping a phone line, the software captures your information.
A program monitors information exchanges and inserts itself in the middle of the interaction by impersonating a website or app. This tactic captures the user’s credentials and other sensitive information.
A cybercriminal installs malware that tracks the user’s keystrokes. This allows the gathering of credentials for specific accounts and websites.
With the Internet of Things growing in popularity due to the increase in smart home devices, it is essential to keep your router secure. It controls access to your home Wi-Fi network and is the barrier between cybercriminals and all your connected devices.
Inbound attacks occur if your home network is breached via the Internet through connected devices such as desktop computers, tablets, smart TVs, and game consoles.
Outbound attacks refer to instances when hackers access a home device through the Internet and then use that device to remotely launch malware and obtain sensitive information or attack other networks.
There has been a surge of video conferencing platforms and technologies. With this, the number of criminals trying to take advantage of new and untrained users also increases.
The aim of many cybercrimes is to steal one’s personal identity or financial resources and information.
Available to all customers with the BlueCurve Gateway XB6 modem, Protected Browsing is an opt-in service that you can use to help safeguard your home network against malicious content. In order to use the feature - which we offer at no additional cost - you must enable it using the BlueCurve Home app or website by going to the Network section and selecting Protected Browsing. You can turn it off at any time.
When enabled, Protected Browsing can reduce the risk of accessing known sources of malware, spyware, and phishing for all devices connected to your home network.
The feature is powered by Zvelo, a leading provider of filtering technology that is used by many organizations including Internet and security providers. Zvelo maintains and updates the list of filtered sites. If a device connected to your home network attempts to access a website known to host malicious content, a block page will be displayed. In the case of secure websites (https) or mobile applications, the block page may not be displayed, but access is still prevented.
Browser not supported. For a better experience using this site, please update your browser.