Spam Bombing

What is Spam Bombing?

Spam bombing is when hundreds or thousands of unwanted emails are delivered to your inbox. The emails are usually advertisements or fake messages and make it difficult for you to sift through and find the important emails you need.

How Does Spam Bombing Happen?

  1. Email Leaks: Sometimes, companies or websites where you use your email address for login or registration, get hacked. The hackers send spam to the compromised email addresses.
    • Bad Websites: Some websites share sell your email address to known spam factories.
  2. Personal Attacks: Sometimes you just piss off the wrong person. They use bots to register your email address with hundreds of mail lists and services.

Why do hackers Spam Bomb?

  1. Hiding Important Emails: By flooding your inbox with spam, hackers can hide important emails, like security alerts, password reset messages, or unauthorized purchases.
  2. Phishing: emails sent and designed to trick you into giving away personal information, (bank details or passwords) is called phishing. If you fall for these tricks, hackers can steal your money or personal information.
  3. Spreading Malware: Hackers use spam emails to spread malware, (harmful software that can damage your computer or steal personal information).
  4. Causing Frustration: Sometimes, hackers spam bomb just because. They want to frustrate and overwhelm you because they can.

Consequences of Spam Bombing?

  1. Missing Important Emails: With so much spam in your inbox, you might miss important emails from friends, family, or work.
  2. Wasting Time: Sorting through hundreds of spam emails can take a lot of time and be very frustrating.
  3. Financial Hacking: Phishing emails could allow hackers to steal your money or personal information.
  4. Overloaded Email Account: Too many emails can completely fill up your email storage, which prevents you from receiving new emails until you clear some space.

How to minimize an active Spam Bombing?

It’s not easy, there is no magic button to stop a spam bomb campaign!

  1. Use Spam Filters: Most email services, like Gmail or Yahoo, have spam filters. Make sure your spam filter is turned on.
  2. Unsubscribe Carefully: If you start getting spam emails, look for an “unsubscribe” link at the bottom of the email. Clicking this can stop more emails from that sender. But be careful—sometimes clicking “unsubscribe” can confirm your email is active, which leads to more spam.
  3. Report Spam: Most email services let you report spam. When you mark an email as spam, it helps the email service learn which emails are unwanted and block them in the future.
  4. Use a Secondary Email: For things like signing up for newsletters or entering contests, use a secondary email address. Keep your primary email address for important contacts only.

How can i Prevent Spam Bombing?

Spam bombs are typically indicative of an already compromised email account and credentials.

  1. Be Careful Where You Share Your Email: Don’t share your email address on public websites or forums where it can be easily found.
  2. Use Strong Passwords: Use strong, unique passwords for your email accounts.
  3. Enable Two-Factor Authentication: This adds an extra layer of security to your email account.
  4. Keep Software Updated: Make sure your computer’s software and antivirus programs are up-to-date to protect against hackers.

Security Best Practices

8 Essential Cybersecurity Tips to Stay Safe Online

In today’s increasingly digital world, safeguarding your online information is critical. From social media accounts to financial data, we expose sensitive, personal information on the internet. By adopting a few key cybersecurity habits, you can significantly increase the odds to keep your data safe.

  • Use Strong, Unique Passwords: Ditch predictable passwords. Use a combination of uppercase and lowercase letters, numbers, and symbols to create strong passwords. Avoid using the same password for multiple accounts.
  • Enable Two-Factor Authentication: Two-factor authentication (2FA) requires a second verification step beyond your password, (often your phone), significantly reducing the risk of unauthorized access.
  • Stay Vigilant Against Phishing Attacks: Be aware of suspicious emails, messages, or websites. Phishing attempts lure users into clicking malicious links or attachments that steal personal information. If something seems off, it probably is – avoid clicking and delete the email.
  • Keep Anti-Virus Software Up-to-Date: Anti-virus software is your digital shield, constantly evolving to combat emerging threats. Regularly updating your anti-virus ensures it has the latest defenses to protect you from the newest malware and cyberattacks.
  • Apply Operating System and Application Patches Regularly: Software updates (patches) often address critical security vulnerabilities that malicious actors exploit. Don’t postpone these updates! Set your system to update and restart automatically to streamline the process.
  • Encrypt Sensitive Data: Encryption scrambles your data, rendering it unreadable in the event of a security breach. Encrypting sensitive information like financial documents or personal records adds an extra layer of protection. Bitlocker, (Windows), and FileVault, (Mac), are free built-in tools that can encrypt your hard drive(s).
  • Secure Public Wi-Fi Connections with a VPN: Public Wi-Fi networks are breeding grounds for cyberattacks. Use a Virtual Private Network (VPN) to encrypt your internet traffic and safeguard your data.
  • Simplify Password Management with a Password Manager: Remembering complex, unique passwords can be a challenge. Password managers help you generate, store, and manage strong passwords for all your online accounts, simplifying security without sacrificing strength.

By incorporating these simple yet effective cybersecurity, you will significantly reduce the risk of falling victim to cyberattacks.

    2024 Expo Update

    CBC Showcases Affordable, Reliable Backup Solutions

    Reliable backup solutions provide a safety net for the preservation of computer data during hurricane season. At the recent Sun Media Hurricane Expo, held at the Charlotte Harbor Event and Conference Center, CBC educated both home users and small businesses on affordable options to ensure budget limitations don’t compromise data protection.

    For home users, CBC showcased user-friendly, easily configurable cloud storage and external hard drives for safeguarding personal data, documents, and photos.

    CBC also introduced small businesses to additional options, including off-site backup services and network-attached storage devices for the preservation of mission-critical files such as customer information and financial records.

    CBC’s primary goal was to help Expo attendees make informed decisions by sharing best practices and criteria to select affordable and reliable backup solutions. While hurricanes pose serious risks to data, a well-designed backup solution will protect your valuable information.

    CBC booth at Hurricane Expo

    2024 Hurricane Expo

    2024 Sun Media Hurricane Expo
    Open to the Public
    Charlotte Harbor Event and Conference Center
    CBC Technologies Booth #35
    May 18, 2024, 10 AM –3 PM

    CBC Technologies is excited to announce our participation in the 2024 Sun Media Hurricane Expo, taking place at the Charlotte Harbor Event and Conference Center on May 18, 2024.

    CBC experts will be available to provide valuable insights on computer data and equipment protection during severe weather conditions and unexpected power outages. We will share best practices, storm preparation techniques, and recovery procedures to minimize / prevent data loss and equipment damage.

    Attendees from Port Charlotte, Punta Gorda, and North Port can schedule a complimentary onsite computer assessment and tune-up, valued at $99. At the conclusion of the Expo, we will conduct a raffle for additional prizes and services.

    This is not a hypothetical!

    About Yelp Reviews

    We recently received an unsolicited online Yelp review from a client. (See our online review policy) Stated in its entirety:

    “Had them virus check and clean 5 items on a rush order. They came and picked them up and delivered them the next day. Highly recommend them, very accommodating.”

    In our minds, an innocuous, uncontroversial review??? Yelp thought differently and rejected the review for publication. We followed up for additional detail and received the following:


    From: Yelp HQ <>
    Sent: Sunday, March 31, 2024 10:29:00 PM
    To: Don Fernandes <>
    Subject: Automated software concerns 14381068

    Hi don,

    We love hearing from our users, and we appreciate you taking the time to send us your feedback.

    We use automated software to evaluate every review based on hundreds of signals of quality, reliability, and user activity on Yelp, with the goal of highlighting the most helpful and reliable reviews for our Yelp community.

    The reviews that are recommended for any business can change over time as Yelp’s software learns more about the reviewer and the business. Sometimes, a review appears in the “not recommended” section simply because the software doesn’t know enough about the reviewer to recommend it.

    That said, the recommendation software is entirely automated. It applies the same objective rules to every business and treats reviews of advertisers and non-advertisers exactly the same. This also means we can’t manually override the results for any single business or review based on individual feedback we receive.

    For additional information, we’d like to refer you to our Trust and Safety website

    -Yelp’s Trust and Safety Team