Search

Advanced Search
Screen Reader users press Enter to Limit by product.  Limit by product
Screen Reader users press Enter to Limit by category.  Limit by category
Search Tips
Search filters applied

Search Results

Other Suggested Searches
Did you mean:
No results found.

Suggestions:
  • Make sure all words are spelled correctly
  • Use different words that mean the same thing
Results 1 - 10 of 38
Recommended Links
  1. Received an email but not sure if it's really from BT? Read more about "phishing" emails
    If you receive an email that appears to have been sent by BT with the either of following subject fields:   IMPORTANT: Alert about your BT Internet billing information on file or British...
    Date Updated: 18/05/2009
  2. 22/07/09: BT and Vodafone Agreement
    Consumers and small businesses in Ireland will benefit from greater competition and choice, following a strategic partnership agreed between BT and Vodafone.  The landmark contract will...
    Date Updated: 22/07/2009
  3. Q&A's regarding the BT and Vodafone Agreement
      Click here to read the full statement about the agreement between Vodafone and BT   What BT customers will transfer to Vodafone as part of this agreement?   This agreement involves...
    Date Updated: 22/10/2009
  4. Peer-to-Peer File Sharing and Copyright Infringements
      What is Copyright? Copyright is a property right, essentially giving the copyright owner the exclusive rights to produce copies, control or perform an original literary, musical, dramatic or...
    Date Updated: 07/03/2008
  5. Knowing if an Online Transaction is Secure
      Firstly, what is a secure connection? A secure connection is an encrypted exchange of information between the website you are visiting and Internet Explorer. Encryption is provided through a...
    Date Updated: 23/04/2008
  6. Protecting your identity online, part 1
      What is identity theft?   Identity theft is when your identity is stolen by a criminal who then impersonates you and uses your personal details for fraudulent purposes. By assuming your identity...
    Date Updated: 23/04/2008
  7. Spyware, Adware and Malware
    Spyware (also known as adware and malware) can install on your computer using a variety of methods, for instance if you view a web page that has malicious code, or through a virus which has infected...
    Date Updated: 23/04/2008
  8. Think Before You Click: The Top Five Internet Scams
    Internet scams are by no means a recent phenomenon, but certain scams come back again and again. Here are five popular Internet scams that you should be on the lookout for.  1. Auction fraud...
    Date Updated: 04/02/2009
  9. Warning Fraudulent Email Alert for IOL Users
    Delete the Email and do NOT respond!   If you recently received an email similar to the one printed below you should delete it without responding. If you are ever suspicious of the authenticity...
    Date Updated: 13/10/2009
  10. Spyware - Detection, Removal and Prevention
    What is spyware, adware and malware? Spyware (also known as adware and malware) can install on your computer using a variety of methods, for instance if you view a web page that has malicious code...
    Date Updated: 23/04/2008