Aol Mail Down Again Mar 30 2018

Unsolicited electronic advertizing by e-mail

An email box folder filled with spam messages.

Email spam, also referred to equally junk e-mail or simply spam, is unsolicited messages sent in bulk by email (spamming).

The name comes from a Monty Python sketch in which the name of the canned pork production Spam is ubiquitous, unavoidable, and repetitive.[i] Electronic mail spam has steadily grown since the early 1990s, and past 2022 was estimated to business relationship for around 90% of full electronic mail traffic.[2]

Since the expense of the spam is borne more often than not by the recipient,[3] it is effectively postage due advert. This makes it an fantabulous example of a negative externality.[4]

The legal definition and condition of spam varies from one jurisdiction to another, merely nowhere accept laws and lawsuits been particularly successful in stemming spam.

Most email spam messages are commercial in nature. Whether commercial or not, many are not simply annoying as a course of attention theft, merely as well dangerous considering they may contain links that atomic number 82 to phishing spider web sites or sites that are hosting malware or include malware as file attachments.

Spammers collect email addresses from chat rooms, websites, customer lists, newsgroups, and viruses that harvest users' address books. These collected email addresses are sometimes also sold to other spammers.

Overview [edit]

At the starting time of the Internet (the ARPANET), sending of commercial electronic mail was prohibited.[5] Gary Thuerk sent the first email spam message in 1978 to 600 people. He was reprimanded and told non to do it once again.[6] Now the ban on spam is enforced by the Terms of Service/Adequate Utilise Policy (ToS/AUP) of internet service providers (ISPs) and peer pressure.

Spam is sent by both otherwise reputable organizations and bottom companies. When spam is sent by otherwise reputable companies it is sometimes referred to every bit Mainsleaze.[seven] [8] Mainsleaze makes up approximately 3% of the spam sent over the internet.[nine]

Spamvertised sites [edit]

Many spam emails contain URLs to a website or websites. According to a Cyberoam report in 2014, there are an average of 54 billion spam messages sent every day. "Pharmaceutical products (Viagra and the like) jumped up 45% from concluding quarter's analysis, leading this quarter's spam pack. Emails purporting to offering jobs with fast, easy cash come in at number two, accounting for approximately 15% of all spam email. And, rounding off at number three are spam emails well-nigh diet products (such as Garcinia gummi-gutta or Garcinia Cambogia), bookkeeping for approximately one%."[ten]

Spam is also a medium for fraudsters to scam users into entering personal information on fake Spider web sites using emails forged to look like they are from banks or other organizations, such as PayPal. This is known as phishing. Targeted phishing, where known information nigh the recipient is used to create forged emails, is known as spear-phishing.[11]

Spam techniques [edit]

Appending [edit]

If a marketer has 1 database containing names, addresses, and telephone numbers of customers, they can pay to take their database matched against an external database containing email addresses. The company then has the means to send email to people who have not requested e-mail, which may include people who have deliberately withheld their email address.[12]

Image spam [edit]

Image spam, or image-based spam,[13] [14] is an obfuscation method by which text of the message is stored as a GIF or JPEG image and displayed in the email. This prevents text-based spam filters from detecting and blocking spam messages. Image spam was reportedly used in the mid-2000s to advertise "pump and dump" stocks.[15]

Ofttimes, image spam contains nonsensical, computer-generated text which just annoys the reader. However, new technology in some programs tries to read the images by attempting to find text in these images. These programs are not very accurate, and sometimes filter out innocent images of products, such as a box that has words on it.

A newer technique, even so, is to use an animated GIF image that does not comprise articulate text in its initial frame, or to contort the shapes of letters in the image (as in CAPTCHA) to avoid detection past optical character recognition tools.

Blank spam [edit]

Blank spam is spam lacking a payload advertisement. Often the message body is missing altogether, equally well equally the discipline line. Still, it fits the definition of spam considering of its nature as majority and unsolicited email.[16]

Bare spam may be originated in unlike ways, either intentional or unintentionally:

  1. Bare spam tin accept been sent in a directory harvest assail, a form of dictionary assault for gathering valid addresses from an email service provider. Since the goal in such an attack is to use the bounces to separate invalid addresses from the valid ones, spammers may dispense with most elements of the header and the entire message body, and still accomplish their goals.
  2. Blank spam may also occur when a spammer forgets or otherwise fails to add the payload when he or she sets up the spam run.
  3. Often blank spam headers appear truncated, suggesting that computer glitches, such as software bugs or other may have contributed to this problem—from poorly written spam software to malfunctioning relay servers, or whatsoever problems that may truncate header lines from the message body.
  4. Some spam may announced to exist bare when in fact information technology is not. An example of this is the VBS.Davinia.B email worm[17] which propagates through messages that have no subject line and appears blank, when in fact it uses HTML code to download other files.

Backscatter spam [edit]

Backscatter is a side-effect of e-mail spam, viruses, and worms. Information technology happens when email servers are misconfigured to ship a bogus bounce bulletin to the envelope sender when rejecting or quarantining electronic mail (rather than simply rejecting the attempt to send the message).

If the sender's accost was forged, and so the bounce may get to an innocent party. Since these messages were not solicited by the recipients, are essentially similar to each other, and are delivered in bulk quantities, they qualify every bit unsolicited bulk email or spam. As such, systems that generate email backscatter can terminate upward existence listed on various DNSBLs and exist in violation of net service providers' Terms of Service.

Legal countermeasures [edit]

If an private or organisation can identify impairment done to them by spam, and identify who sent information technology; then they may exist able to sue for a legal remedy, e.1000. on the ground of trespass to chattels. A number of large civil settlements have been won in this way,[18] although others have been mostly unsuccessful in collecting damages.[19] [20]

Criminal prosecution of spammers under fraud or reckoner criminal offence statutes is also common, peculiarly if they illegally accessed other computers to create botnets, or the emails were phishing or other forms of criminal fraud.[21] [22] [23] [24]

Finally, in most countries specific legislation is in identify to brand certain forms of spamming a criminal offence, as outlined beneath:

European Union [edit]

Article 13 of the European Marriage Directive on Privacy and Electronic Communications (2002/58/EC) provides that the Eu member states shall take appropriate measures to ensure that unsolicited communications for the purposes of direct marketing are not immune either without the consent of the subscribers concerned or in respect of subscribers who do not wish to receive these communications, the option between these options to be determined by national legislation.

United Kingdom [edit]

In the United Kingdom, for example, unsolicited emails cannot be sent to an individual subscriber unless prior permission has been obtained or unless in that location is a pre-existing commercial relationship betwixt the parties.[25] [26]

Canada [edit]

The Fighting Internet and Wireless Spam Act[27] is Canadian legislation meant to fight spam.[28]

Commonwealth of australia [edit]

The Spam Human activity 2003, which covers some types of email and telephone spam.[29] Penalties are up to ten,000 penalty units, or 2,000 penalty units for a person other than a body corporate.

United States [edit]

In the United States, many states enacted anti-spam laws during the belatedly 1990s and early 2000s. All of these were later on superseded by the CAN-SPAM Act of 2003,[30] which was in many cases less restrictive; and whatsoever further potential land laws preempted. However, CAN-SPAM leaves intact[31] laws non specific to electronic mail. Courts take ruled that spam can constitute, for example, trespass to chattels.[32]

Bulk commercial email does not violate CAN-SPAM, provided that it meets certain criteria, such equally a truthful subject line, no forged information in the headers. If it fails to comply with any of these requirements it is illegal. Those opposing spam greeted the new law with dismay and disappointment, almost immediately dubbing it the "You lot Can Spam" Act.[33] [34]

In practice, it had a niggling positive bear on. In 2004, less than ane percent of spam complied with CAN-SPAM,[35] although a 2005 review by the Federal Merchandise Commission claimed that the amount of sexually explicit spam had significantly decreased since 2003 and the total book had begun to level off.[36] Many other observers viewed it as having failed,[37] [38] although there have been several high-profile prosecutions.[39] [40]

Deception and fraud [edit]

Spammers may engage in deliberate fraud to send out their messages. Spammers frequently use false names, addresses, telephone numbers, and other contact data to set up up "disposable" accounts at various Cyberspace service providers. They as well frequently utilise falsified or stolen credit card numbers to pay for these accounts. This allows them to move rapidly from one account to the side by side as the host ISPs discover and shut downwards each i.

Senders may go to keen lengths to conceal the origin of their letters. Large companies may hire another house to send their messages then that complaints or blocking of email falls on a third party. Others engage in spoofing of email addresses (much easier than IP address spoofing). The email protocol (SMTP) has no authentication by default, so the spammer can pretend to originate a message apparently from whatever email accost. To preclude this, some ISPs and domains crave the use of SMTP-AUTH, allowing positive identification of the specific account from which an email originates.

Senders cannot completely spoof email delivery chains (the 'Received' header), since the receiving mailserver records the actual connection from the final mailserver's IP accost. To counter this, some spammers forge boosted delivery headers to brand it appear as if the email had previously traversed many legitimate servers.

Spoofing can have serious consequences for legitimate email users. Not just can their email inboxes get clogged up with "undeliverable" emails in improver to volumes of spam, but they can mistakenly be identified as a spammer. Not only may they receive irate electronic mail from spam victims, simply (if spam victims report the electronic mail address owner to the Isp, for case) a naïve Internet service provider may end their service for spamming.

Theft of service [edit]

Spammers ofttimes seek out and brand use of vulnerable 3rd-party systems such as open up post relays and open proxy servers. SMTP forwards mail service from one server to another—mail servers that ISPs run commonly require some form of authentication to ensure that the user is a client of that Internet access provider.

Increasingly, spammers use networks of malware-infected PCs (zombies) to send their spam. Zombie networks are as well known as botnets (such zombifying malware is known as a bot, brusque for robot). In June 2006, an estimated 80 percent of email spam was sent past zombie PCs, an increase of 30 percent from the prior year. An estimated 55 billion email spam were sent each mean solar day in June 2006, an increase of 25 billion per day from June 2005.[41]

For the first quarter of 2010, an estimated 305,000 newly activated zombie PCs were brought online each solar day for malicious activity. This number is slightly lower than the 312,000 of the fourth quarter of 2009.[42]

Brazil produced the most zombies in the first quarter of 2010. Brazil was the source of 20 percent of all zombies, which is downwardly from xiv percent from the fourth quarter of 2009. India had 10 percentage, with Vietnam at 8 per centum, and the Russian Federation at vii percent.[42]

Side furnishings [edit]

To combat the problems posed past botnets, open relays, and proxy servers, many e-mail server administrators pre-emptively cake dynamic IP ranges and impose stringent requirements on other servers wishing to deliver mail. Forward-confirmed reverse DNS must be correctly set for the outgoing mail server and large swaths of IP addresses are blocked, sometimes pre-emptively, to forbid spam. These measures can pose issues for those wanting to run a small email server off an cheap domestic connection. Blacklisting of IP ranges due to spam emanating from them too causes problems for legitimate electronic mail servers in the same IP range.

Statistics and estimates [edit]

The total book of electronic mail spam has been consistently growing, but in 2011 the trend seemed to reverse.[43] [44] The amount of spam that users see in their mailboxes is only a portion of total spam sent, since spammers' lists often incorporate a large per centum of invalid addresses and many spam filters but delete or reject "obvious spam".

The first known spam email, advertising a December product presentation, was sent in 1978 by Gary Thuerk to 600 addresses, the total number of users on ARPANET was 2600 at the time though software limitations meant only slightly more than than half of the intended recipients actually received it.[45] Equally of August 2010, the number of spam letters sent per day was estimated to exist effectually 200 billion.[46] More than than 97% of all emails sent over the Internet in 2008 were unwanted, according to a Microsoft security written report.[47] MAAWG estimates that 85% of incoming post is "abusive electronic mail", as of the 2d half of 2007. The sample size for the MAAWG'south report was over 100 one thousand thousand mailboxes.[48] [49] [50] In 2022 with growing affiliation networks & email frauds worldwide near xc% of global email traffic is spam equally per IPwarmup.com study, which also effects legitimate e-mail senders to achieve inbox delivery.[51]

A 2010 survey of US and European electronic mail users showed that 46% of the respondents had opened spam messages, although only eleven% had clicked on a link.[52]

Highest corporeality of spam received [edit]

Co-ordinate to Steve Ballmer in 2004, Microsoft founder Bill Gates receives four one thousand thousand emails per year, virtually of them spam.[53] This was originally incorrectly reported every bit "per twenty-four hour period".[54]

At the aforementioned time Jef Poskanzer, owner of the domain proper name height.com, was receiving over one million spam emails per 24-hour interval.[55]

Cost of spam [edit]

A 2004 survey estimated that lost productivity costs Cyberspace users in the U.s.a. $21.58 billion annually, while some other reported the cost at $17 billion, upwardly from $11 billion in 2003. In 2004, the worldwide productivity cost of spam has been estimated to be $fifty billion in 2005.[56]

Origin of spam [edit]

Email spam relayed by land in Q2 2007 (% of total)[57]
Land Percentage
United States

xix.half-dozen

Eu (Top 5)

17.9

China (+ Hong Kong)

8.iv

Republic of korea

6.v

Poland

iv.8

Frg

4.2

Brazil

4.i

France

three.3

Russian federation

3.one

Turkey

2.9

United kingdom of great britain and northern ireland

2.8

Italy

ii.viii

India

ii.5

Because of the international nature of spam, the spammer, the hijacked spam-sending calculator, the spamvertised server, and the user target of the spam are all ofttimes located in unlike countries. As much every bit 80% of spam received by Net users in N America and Europe can be traced to fewer than 200 spammers.[58]

In terms of volume of spam: According to Sophos, the major sources of spam in the fourth quarter of 2008 (October to December) were:[ unreliable source? ] [eleven] [59] [60] [61] [62] [63] [64] [65] [66] [67]

  • The United States (the origin of 19.viii% of spam letters, up from 18.9% in Q3)
  • China (9.ix%, up from 5.iv%)
  • Russia (vi.4%, down from eight.3%)
  • Brazil (6.3%, up from 4.five%)
  • Turkey (four.4%, downwards from eight.two%)

When grouped past continents, spam comes by and large from:

  • Asia (37.8%, downwardly from 39.eight%)
  • North America (23.half dozen%, upwards from 21.8%)
  • Europe (23.4%, down from 23.9%)
  • South America (12.9%, downwards from 13.2%)

In terms of number of IP addresses: the Spamhaus Project ranks the top three as the United States, China, and Russian federation,[68] followed by Japan, Canada, and South Korea.

In terms of networks: As of 13 December 2021[update], the three networks hosting the most spammers are ChinaNet, Amazon, and Airtel India.[69]

Anti-spam techniques [edit]

The U.Southward. Department of Energy Reckoner Incident Advisory Capability (CIAC) has provided specific countermeasures confronting electronic mail spamming.[70]

Some popular methods for filtering and refusing spam include email filtering based on the content of the e-mail, DNS-based blackhole lists (DNSBL), greylisting, spamtraps, enforcing technical requirements of e-mail (SMTP), checksumming systems to discover bulk electronic mail, and by putting some sort of cost on the sender via a proof-of-work system or a micropayment. Each method has strengths and weaknesses and each is controversial because of its weaknesses. For example, 1 company'due south offer to "[remove] some spamtrap and honeypot addresses" from e-mail lists defeats the ability for those methods to identify spammers.

Outbound spam protection combines many of the techniques to scan letters exiting out of a service provider'southward network, place spam, and taking action such as blocking the bulletin or shutting off the source of the message.

E-mail authentication to forestall "From:" accost spoofing became popular in the 2010s.

Collateral damage [edit]

Measures to protect against spam tin can cause collateral damage. This includes:

  • The measures may consume resources, both in the server and on the network.
  • When legitimate messages are rejected, the sender needs to contact the recipient out of channel.
  • When legitimate messages are relegated to a spam folder, the sender is not notified of this.
  • If a recipient periodically checks his spam folder, that will toll him fourth dimension and if at that place is a lot of spam it is like shooting fish in a barrel to overlook the few legitimate messages.

Methods of spammers [edit]

Gathering of addresses [edit]

In club to transport spam, spammers demand to obtain the email addresses of the intended recipients. To this terminate, both spammers themselves and list merchants gather huge lists of potential email addresses. Since spam is, by definition, unsolicited, this address harvesting is washed without the consent (and sometimes against the expressed will) of the address owners. A single spam run may target tens of millions of possible addresses – many of which are invalid, malformed, or undeliverable.

Obfuscating bulletin content [edit]

Many spam-filtering techniques piece of work by searching for patterns in the headers or bodies of messages. For instance, a user may decide that all email they receive with the word "Viagra" in the bailiwick line is spam, and instruct their mail program to automatically delete all such messages. To defeat such filters, the spammer may intentionally misspell unremarkably filtered words or insert other characters, often in a style like to leetspeak, every bit in the following examples: V1agra, Via'gra, Half-dozen@graa, half-dozen*gra, \/iagra. This besides allows for many different means to express a given word, making identifying them all more difficult for filter software.

The principle of this method is to go out the word readable to humans (who can easily recognize the intended give-and-take for such misspellings), only not likely to be recognized by a figurer program. This is only somewhat effective, because mod filter patterns accept been designed to recognize blacklisted terms in the various iterations of misspelling. Other filters target the actual obfuscation methods, such as the not-standard utilise of punctuation or numerals into unusual places. Similarly, HTML-based email gives the spammer more than tools to obfuscate text. Inserting HTML comments between letters can foil some filters. Some other common ploy involves presenting the text every bit an epitome, which is either sent along or loaded from a remote server.

Defeating Bayesian filters [edit]

Every bit Bayesian filtering has become popular every bit a spam-filtering technique, spammers have started using methods to weaken it. To a rough approximation, Bayesian filters rely on discussion probabilities. If a message contains many words that are used only in spam, and few that are never used in spam, it is likely to be spam. To weaken Bayesian filters, some spammers, alongside the sales pitch, now include lines of irrelevant, random words, in a technique known as Bayesian poisoning.

Spam-support services [edit]

A number of other online activities and business practices are considered by anti-spam activists to exist connected to spamming. These are sometimes termed spam-support services: concern services, other than the actual sending of spam itself, which permit the spammer to continue operating. Spam-back up services can include processing orders for goods advertised in spam, hosting Web sites or DNS records referenced in spam messages, or a number of specific services equally follows:

Some Internet hosting firms advertise bulk-friendly or bulletproof hosting. This means that, unlike most ISPs, they volition not cease a customer for spamming. These hosting firms operate as clients of larger ISPs, and many have eventually been taken offline by these larger ISPs equally a upshot of complaints regarding spam activity. Thus, while a firm may annunciate bulletproof hosting, it is ultimately unable to evangelize without the connivance of its upstream ISP. However, some spammers have managed to get what is called a pink contract (see beneath) – a contract with the ISP that allows them to spam without being disconnected.

A few companies produce spamware, or software designed for spammers. Spamware varies widely, only may include the power to import thousands of addresses, to generate random addresses, to insert fraudulent headers into letters, to use dozens or hundreds of mail servers simultaneously, and to brand use of open relays. The sale of spamware is illegal in eight U.S. states.[71] [72] [73]

So-called millions CDs are commonly advertised in spam. These are CD-ROMs purportedly containing lists of e-mail addresses, for use in sending spam to these addresses. Such lists are too sold directly online, frequently with the faux claim that the owners of the listed addresses have requested (or "opted in") to exist included. Such lists frequently incorporate invalid addresses. In recent years, these accept fallen near entirely out of apply due to the low quality email addresses bachelor on them, and because some email lists exceed 20GB in size. The amount you can fit on a CD is no longer substantial.

A number of DNS blacklists (DNSBLs), including the MAPS RBL, Spamhaus SBL, SORBS and SPEWS, target the providers of spam-support services as well as spammers. DNSBLs blacklist IPs or ranges of IPs to persuade ISPs to terminate services with known customers who are spammers or resell to spammers.

[edit]

Unsolicited bulk e-mail (UBE)
A synonym for email spam.
Unsolicited commercial email (UCE)
Spam promoting a commercial service or production. This is the well-nigh common blazon of spam, but it excludes spams that are hoaxes (e.g. virus warnings), political advocacy, religious letters, and chain letters sent by a person to many other people. The term UCE may exist most common in the USA.[74]
Pinkish contract
A pink contract is a service contract offered by an Internet service provider which offers bulk email service to spamming clients, in violation of that Internet service provider'south publicly posted adequate use policy.
Spamvertising
Spamvertising is advertizing through the medium of spam.
Opt-in, confirmed opt-in, double opt-in, opt-out
Opt-in, confirmed opt-in, double opt-in, opt-out refers to whether the people on a mailing list are given the option to be put in, or taken out, of the list. Confirmation (and "double", in marketing speak) refers to an email address transmitted eastward.g. through a spider web form being confirmed to really request joining a mailing listing, instead of existence added to the list without verification.
Final, Ultimate Solution for the Spam Trouble (FUSSP)
An ironic reference to naïve developers who believe they have invented the perfect spam filter, which will finish all spam from reaching users' inboxes while deleting no legitimate email accidentally.[75] [76]

History [edit]

See also [edit]

  • Accost munging
  • Anti-spam techniques
  • Botnet
  • Boulder Pledge
  • CAUCE
  • Tin-SPAM Act of 2003
  • Concatenation e-mail
  • Direct Marketing Associations
  • Disposable email address
  • Email accost harvesting
  • Gordon v. Virtumundo, Inc.
  • Happy99
  • Junk fax
  • List poisoning
  • Make money fast, the infamous Dave Rhodes chain letter of the alphabet that jumped to email.
  • Netiquette
  • news.admin.net-abuse.email newsgroup
  • Nigerian spam
  • Project Honey Pot
  • Pump-and-dump stock fraud
  • Shotgun email
  • SPAMasterpiece Theater
  • Spamusement!
  • Spambot
  • SpamCop
  • Spamhaus
  • Spamtrap
  • Spamware
  • Spider trap
  • SPIT (SPam over Cyberspace Telephony)

References [edit]

  1. ^ "Merriam Webster Dictionary". Merriam-Webster.
  2. ^ Electronic mail metrics report, M3AAWG, Nov 2014
  3. ^ Rebecca Lieb (July 26, 2002). "Make Spammers Pay Earlier You Do". The ClickZ Network. Archived from the original on 2007-08-07. Retrieved 2010-09-23 .
  4. ^ Rao, Justin Thou.; Reiley, David H. (2012), "Economic science of Spam", Journal of Economic Perspectives, 26 (3): 87–110, doi:10.1257/jep.26.3.87
  5. ^ Stacy, Christopher. "Getting Started Computing at the AI Lab" (PDF). MIT. Retrieved 2018-x-15 .
  6. ^ Opening Pandora's In-Box.
  7. ^ Levine, John (October 18, 2011). "The Mainsleaze Blog". Internet and e-mail policy and exercise . Retrieved April ane, 2019.
  8. ^ Jefferson, Catherine. "What is Mainsleaze Spam?". The Mainsleaze Blog . Retrieved April 1, 2019.
  9. ^ Jefferson, Catherine. "Companies that spam, and ESPs that help them". The Mainsleaze Blog . Retrieved April one, 2019.
  10. ^ "Q1 2022 Internet Threats Tendency Study" (PDF) (Printing release). Sophos Cyberoam. Retrieved 2015-11-01 .
  11. ^ a b "Only one in 28 emails legitimate, Sophos report reveals rising tide of spam in April–June 2008" (Press release). Sophos. 2008-07-xv. Retrieved 2008-ten-12 .
  12. ^ Bob Due west (January 19, 2008). "Getting it Incorrect: Corporate America Spams the Afterlife". Clueless Mailers. Archived from the original on April 14, 2013. Retrieved 2010-09-23 .
  13. ^ Giorgio Fumera, Ignazio Pillai, Fabio Roli,Fumera, Giorgio (2006). "Spam filtering based on the analysis of text information embedded into images". Journal of Machine Learning Research. 7 (98): 2699–2720. Journal of Machine Learning Inquiry (special upshot on Machine Learning in Figurer Security), vol. seven, pp. 2699-2720, 12/2006.
  14. ^ Battista Biggio, Giorgio Fumera, Ignazio Pillai, Fabio Roli,Biggio, Battista; Fumera, Giorgio; Pillai, Ignazio; Roli, Fabio (2011). "A survey and experimental evaluation of image spam filtering techniques". Pattern Recognition Letters. 32 (10): 1436–1446. Bibcode:2011PaReL..32.1436B. doi:10.1016/j.patrec.2011.03.022. Volume 32, Issue 10, 15 July 2011, Pages 1436-1446, ISSN 0167-8655.
  15. ^ Eric B. Parizo (2006-07-26). "Prototype spam paints a troubling moving-picture show". Search Security. Retrieved 2007-01-06 .
  16. ^ "Dealing with blank spam". CNET. September two, 2009. Retrieved Baronial 17, 2015.
  17. ^ "symantec.com". symantec.com. Retrieved 2012-12-ten .
  18. ^ east.g. CompuServe Inc. five. Cyber Promotions, Inc., Schoolhouse of Visual Arts five. Kuprewicz
  19. ^ Clinton Net provider wins $11B arrange confronting spammer, QC Times
  20. ^ AOL gives upwards treasure hunt, Boston Herald
  21. ^ e.one thousand. Sanford Wallace
  22. ^ "Bronx man, 'leader' of bank-fraud scam, bedevilled". Iohud. 26 Feb 2016. Retrieved 11 Jan 2019.
  23. ^ "'Spam Male monarch' pleads guilty in Detroit". UPI. 2009-06-23. Retrieved 2009-06-23 .
  24. ^ "Acme Spammer Sentenced to Near Iv Years". PC World. 2008-07-22. Retrieved 2010-ten-24 .
  25. ^ Privacy and Electronic Communications (EC Directive) Regulations 2003
  26. ^ Enforcement, ICO
  27. ^ Fighting Internet and Wireless Spam Act, CA: GC
  28. ^ Canada's Anti-spam Bill C-28 is the Law of the Land, Circle ID, 2010-12-15
  29. ^ "Commonwealth Consolidated Acts: Spam Act 2003 – Schedule 2". Sydney, AU: AustLII, Faculty of Constabulary, Academy of Technology. Retrieved 2010-09-23 .
  30. ^ But see, east.m., Hypertouch v. ValueClick, Inc. et al., Cal.App.quaternary (Google Scholar: Jan 18, 2011)
  31. ^ "SEC. 8. EFFECT ON OTHER LAWS", PUBLIC LAW 108-187--Dec. 16, 2003 117 STAT. 2699 (PDF), FTC, (2) Country Police NOT SPECIFIC TO ELECTRONIC ~ZL.--This Human activity shall not exist construed to preempt the applicability of(A) State laws that are not specific to electronic mail, including State trespass, contract, or tot~ constabulary; or (B) other Country laws to the extent that those laws relate to acts of fraud or computer crime.
  32. ^ Daniel J. Schwartz; Joseph F. Marinelli (September 2004), "Trespass to Chattels" Finds New Life In Boxing Against Spam (PDF), Association of Corporate Counsel
  33. ^ Foster, Ed (November 24, 2003). "The 'Yes, You Tin can Spam' Act of 2003". The Gripe Line Web log. Archived from the original on 2007-04-06. Retrieved 2007-03-09 .
  34. ^ "United states of america set to Legalize Spamming on January ane, 2004". Spamhaus.org. Retrieved 7 January 2015.
  35. ^ Is the Tin can-SPAM Police force Working?, PC World
  36. ^ Effectiveness and Enforcement of the Tin-SPAM Deed (PDF), U.s.: FTC, archived from the original (PDF) on January 10, 2006
  37. ^ Ken Fisher (December 2005), U.s.a. FTC says Tin can-SPAM works, Ars Technica
  38. ^ Six years later, Can Spam human action leaves spam problem unresolved, The states: SC Magazine, archived from the original on 2010-09-03
  39. ^ eastward.grand. Oleg Nikolaenko
  40. ^ "Los Angeles Man, First American Convicted Nether Anti-Spam Law, Faces Years in Prison". AP. 17 Jan 2007. Retrieved 9 Jan 2019.
  41. ^ "Spammers Continue Innovation: IronPort Study Shows Prototype-based Spam, Striking & Run, and Increased Volumes Latest Threat to Your Inbox" (Printing release). IronPort Systems. 2006-06-28. Retrieved 2007-01-05 .
  42. ^ a b "Q1 2010 Internet Threats Trend Written report" (PDF) (Press release). Commtouch Software Ltd. Retrieved 2010-09-23 .
  43. ^ Charlie White (2011-07-04). "Spam Decreased 82.22% Over The Past Twelvemonth". Mashable.com. Retrieved 2012-12-ten .
  44. ^ "Spam" (in Dutch). Symantec.cloud. Retrieved 2012-12-10 .
  45. ^ Brad Templeton (8 March 2005). "Reaction to the Dec Spam of 1978". Brad Templeton. Retrieved 2007-01-21 .
  46. ^ Josh Halliday (10 January 2011). "Email spam level bounces back after record low". guardian.co.uk . Retrieved 2011-01-11 .
  47. ^ Waters, Darren (2009-04-08). "Spam overwhelms e-mail messages". BBC News . Retrieved 2012-12-10 .
  48. ^ "E-mail Metrics Program: The Network Operators' Perspective" (PDF). Report No. 7 – Tertiary and Fourth quarters 2007. Messaging Anti-Abuse Working Group. April 2008. Archived from the original (PDF) on 2008-07-24. Retrieved 2008-05-08 .
  49. ^ "Email Metrics Programme: The Network Operators' Perspective" (PDF). Report No. 1 – 4th quarter 2005 Report. Messaging Anti-Abuse Working Group. March 2006. Archived from the original (PDF) on Dec 8, 2006. Retrieved 2007-01-06 .
  50. ^ "Email Metrics Program: The Network Operators' Perspective" (PDF). Report No. 2 – 1st quarter 2006. Messaging Anti-Abuse Working Group. June 2006. Archived from the original (PDF) on 2006-09-24. Retrieved 2007-01-06 .
  51. ^ "IPWarmup.com - Written report".
  52. ^ "2010 MAAWG Electronic mail Security Awareness and Usage Report, Messing Anti-Corruption Working Group/Ipsos Public Diplomacy" (PDF) . Retrieved 2012-12-10 .
  53. ^ Staff (eighteen November 2004). "Pecker Gates 'most spammed person'". BBC News . Retrieved 2010-09-23 .
  54. ^ Mike Wendland (December 2, 2004). "Ballmer checks out my spam problem". Tiptop Laboratories republication of article appearing in Detroit Gratis Press. Retrieved 2010-09-23 . the date provided is for the original article; the appointment of revision for the republication is eight June 2005; verification that content of the republication is the same every bit the original article is pending.
  55. ^ Jef Poskanzer (2006-05-fifteen). "Mail Filtering". Acme Laboratories. Retrieved 2010-09-23 .
  56. ^ Spam Costs Billions
  57. ^ Sophos. "Sophos reveals "dirty dozen" spam-relaying countries" (Press release). Retrieved 2020-04-xiii .
  58. ^ Register of Known Spam Operations (ROKSO).
  59. ^ "Sophos reveals 'Dirty Dozen' spam producing countries, August 2004" (Printing release). Sophos. 2004-08-24. Retrieved 2007-01-06 .
  60. ^ "Sophos reveals 'dirty dozen' spam relaying countries" (Press release). Sophos. 2006-07-24. Retrieved 2007-01-06 .
  61. ^ "Sophos research reveals muddy dozen spam-relaying nations" (Printing release). Sophos. 2007-04-11. Retrieved 2007-06-xv .
  62. ^ "Sophos reveals 'Dirty Dozen' spam producing countries, July 2007" (Press release). Sophos. 2007-07-18. Retrieved 2007-07-24 .
  63. ^ "Sophos reveals 'Dirty Dozen' spam producing countries for Q3 2007" (Press release). Sophos. 2007-ten-24. Retrieved 2007-11-09 .
  64. ^ "Sophos details dirty dozen spam-relaying countries for Q4 2007" (Press release). Sophos. 2008-02-eleven. Retrieved 2008-02-12 .
  65. ^ "Sophos details dirty dozen spam-relaying countries for Q1 2008" (Press release). Sophos. 2008-04-14. Retrieved 2008-06-07 .
  66. ^ "Viii times more malicious email attachments spammed out in Q3 2008" (Press release). Sophos. 2008-10-27. Retrieved 2008-eleven-02 .
  67. ^ "Spammers defy Nib Gates'southward death-of-spam prophecy" (Printing release). Sophos. 2009-01-22. Retrieved 2009-01-22 .
  68. ^ "Spamhaus Statistics: The Summit 10". Spamhaus Blocklist (SBL) database. dynamic written report. The Spamhaus Projection Ltd. Retrieved 2007-01-06 . {{cite web}}: CS1 maint: others (link)
  69. ^ https://www.spamhaus.org/statistics/botnet-isp [ expressionless link ]
  70. ^ Shawn Hernan; James R. Cutler; David Harris (1997-eleven-25). "I-005c: E-Mail Spamming countermeasures: Detection and prevention of E-Mail spamming". Computer Incident Advisory Capability Information Bulletins. U.s. Section of Energy. Archived from the original on 2007-01-04. Retrieved 2007-01-06 .
  71. ^ Sapient Fridge (2005-07-08). "Spamware vendor listing". Spam Sights. Retrieved 2007-01-06 .
  72. ^ "SBL Policy & Listing Criteria". The Spamhaus Projection. 2006-12-22. Retrieved 2007-01-06 . original location was at SBL rationale ; the referenced page is an auto-redirect target from the original location
  73. ^ "Spamware – Email Address Harvesting Tools and Anonymous Bulk Emailing Software". MX Logic (abstract hosted by Bit Pipe). 2004-10-01. Retrieved 2007-01-06 . the link here is to an abstract of a white newspaper; registration with the authoring organization is required to obtain the total white paper.
  74. ^ "Definitions of Words We Utilise". Coalition Against Unsolicited Majority E-mail, Commonwealth of australia. Archived from the original on 2007-01-06. Retrieved 2007-01-06 .
  75. ^ "Vernon Schryver: You Might Be An Anti-Spam Kook If". Rhyolite.com. Retrieved 2012-12-10 .
  76. ^ "Richi'Blog". richi.co.uk.

Farther reading [edit]

  • Dow, Grand; Serenko, A; Turel, O; Wong, J (2006), "Antecedents and consequences of user satisfaction with electronic mail systems", International Periodical of e-Collaboration (PDF), vol. 2, pp. 46–64 .
  • Sjouwerman, Stu; Posluns, Jeffrey, Within the spam cartel: merchandise secrets from the dark side, Elsevier/Syngress; 1st edition, November 27, 2004. ISBN 978-1-932266-86-iii.

External links [edit]

Spam info

  • "Tin the Spam: How Spam is Bad for the Environment", The Economist, June 15, 2009 .

Spam reports

  • Worldwide Email Threat Activity, Barracuda Central .

Authorities reports and industry white papers

  • E-mail Accost Harvesting and the Effectiveness of Anti-SPAM Filters (PDF), United States: FTC, archived from the original (PDF) on 2007-eleven-28, retrieved 13 October 2007 .
  • The Electronic Frontier Foundation's spam page which contains legislation, analysis, and litigation histories
  • Why Am I Getting All This Spam? Unsolicited Commercial Email Research Six Month Report by Center for Democracy & Technology from the author of Pegasus Post and Mercury Mail Ship System – David Harris
  • Spam White Paper – Drowning in Sewage (PDF), Pegasus Mail service, archived from the original (PDF) on 2007-11-28 .

westharoven.blogspot.com

Source: https://en.wikipedia.org/wiki/Email_spam

0 Response to "Aol Mail Down Again Mar 30 2018"

Post a Comment

Iklan Atas Artikel

Iklan Tengah Artikel 1

Iklan Tengah Artikel 2

Iklan Bawah Artikel