Knowledge

Email spam

Source đź“ť

20: 1237:. This means that, unlike most ISPs, they will not terminate a customer for spamming. These hosting firms operate as clients of larger ISPs, and many have eventually been taken offline by these larger ISPs as a result of complaints regarding spam activity. Thus, while a firm may advertise bulletproof hosting, it is ultimately unable to deliver without the connivance of its upstream ISP. However, some spammers have managed to get what is called a 1073: 1193:
terms in the various iterations of misspelling. Other filters target the actual obfuscation methods, such as the non-standard use of punctuation or numerals into unusual places. Similarly, HTML-based email gives the spammer more tools to obfuscate text. Inserting HTML comments between letters can foil some filters. Another common ploy involves presenting the text as an image, which is either sent along or loaded from a remote server.
563: 983: 1250:, or software designed for spammers. Spamware varies widely, but may include the ability to import thousands of addresses, to generate random addresses, to insert fraudulent headers into messages, to use dozens or hundreds of mail servers simultaneously, and to make use of open relays. The sale of spamware is illegal in eight U.S. states. 2347:(2) STATE LAW NOT SPECIFIC TO ELECTRONIC ~ZL.--This Act shall not be construed to preempt the applicability of(A) State laws that are not specific to electronic mail, including State trespass, contract, or tot~ law; or (B) other State laws to the extent that those laws relate to acts of fraud or computer crime. 641:
was 2600 at the time though software limitations meant only slightly more than half of the intended recipients actually received it. As of August 2010, the number of spam messages sent per day was estimated to be around 200 billion. More than 97% of all emails sent over the Internet in 2008 were
1261:
purportedly containing lists of email addresses, for use in sending spam to these addresses. Such lists are also sold directly online, frequently with the false claim that the owners of the listed addresses have requested (or "opted in") to be included. Such lists often contain invalid addresses. In
681:
A 2004 survey estimated that lost productivity costs Internet users in the United States $ 21.58 billion annually, while another reported the cost at $ 17 billion, up from $ 11 billion in 2003. In 2004, the worldwide productivity cost of spam has been estimated to be $ 50 billion
444:
Bulk commercial email does not violate CAN-SPAM, provided that it meets certain criteria, such as a truthful subject line, no forged information in the headers. If it fails to comply with any of these requirements it is illegal. Those opposing spam greeted the new law with dismay and disappointment,
1192:
The principle of this method is to leave the word readable to humans (who can easily recognize the intended word for such misspellings), but not likely to be recognized by a computer program. This is only somewhat effective, because modern filter patterns have been designed to recognize blacklisted
646:
security report. MAAWG estimates that 85% of incoming mail is "abusive email", as of the second half of 2007. The sample size for the MAAWG's study was over 100 million mailboxes. In 2018 with growing affiliation networks & email frauds worldwide about 90% of global email traffic is spam as per
391:
member states shall take appropriate measures to ensure that unsolicited communications for the purposes of direct marketing are not allowed either without the consent of the subscribers concerned or in respect of subscribers who do not wish to receive these communications, the choice between these
197:
If a marketer has one database containing names, addresses, and telephone numbers of customers, they can pay to have their database matched against an external database containing email addresses. The company then has the means to send email to people who have not requested email, which may include
633:
The total volume of email spam has been consistently growing, but in 2011 the trend seemed to reverse. The amount of spam that users see in their mailboxes is only a portion of total spam sent, since spammers' lists often contain a large percentage of invalid addresses and many spam filters simply
448:
In practice, it had a little positive impact. In 2004, less than one percent of spam complied with CAN-SPAM, although a 2005 review by the Federal Trade Commission claimed that the amount of sexually explicit spam had significantly decreased since 2003 and the total volume had begun to level off.
319:
If the sender's address was forged, then the bounce may go to an innocent party. Since these messages were not solicited by the recipients, are substantially similar to each other, and are delivered in bulk quantities, they qualify as unsolicited bulk email or spam. As such, systems that generate
230:
Often, image spam contains nonsensical, computer-generated text which simply annoys the reader. However, new technology in some programs tries to read the images by attempting to find text in these images. These programs are not very accurate, and sometimes filter out innocent images of products,
1323:
refers to whether the people on a mailing list are given the option to be put in, or taken out, of the list. Confirmation (and "double", in marketing speak) refers to an email address transmitted e.g. through a web form being confirmed to actually request joining a mailing list, instead of being
1205:
has become popular as a spam-filtering technique, spammers have started using methods to weaken it. To a rough approximation, Bayesian filters rely on word probabilities. If a message contains many words that are used only in spam, and few that are never used in spam, it is likely to be spam. To
497:
Spoofing can have serious consequences for legitimate email users. Not only can their email inboxes get clogged up with "undeliverable" emails in addition to volumes of spam, but they can mistakenly be identified as a spammer. Not only may they receive irate email from spam victims, but (if spam
146:
report in 2014, there are an average of 54 billion spam messages sent every day. "Pharmaceutical products (Viagra and the like) jumped up 45% from last quarter’s analysis, leading this quarter’s spam pack. Emails purporting to offer jobs with fast, easy cash come in at number two, accounting for
624:
must be correctly set for the outgoing mail server and large swaths of IP addresses are blocked, sometimes pre-emptively, to prevent spam. These measures can pose problems for those wanting to run a small email server off an inexpensive domestic connection. Blacklisting of IP ranges due to spam
493:
chains (the 'Received' header), since the receiving mailserver records the actual connection from the last mailserver's IP address. To counter this, some spammers forge additional delivery headers to make it appear as if the email had previously traversed many legitimate servers.
270:
for gathering valid addresses from an email service provider. Since the goal in such an attack is to use the bounces to separate invalid addresses from the valid ones, spammers may dispense with most elements of the header and the entire message body, and still accomplish their
1273:(DNSBLs), including the MAPS RBL, Spamhaus SBL, SORBS and SPEWS, target the providers of spam-support services as well as spammers. DNSBLs blacklist IPs or ranges of IPs to persuade ISPs to terminate services with known customers who are spammers or resell to spammers. 548:
Brazil produced the most zombies in the first quarter of 2010. Brazil was the source of 20 percent of all zombies, which is down from 14 percent from the fourth quarter of 2009. India had 10 percent, with Vietnam at 8 percent, and the Russian Federation at 7 percent.
1210:. More broadly machine learning can be used to identify and filter spam. There is a game of escalation between spammers and anti-spam identification and filtering systems where spammers adjust to attempt to evade new identification and filtering techniques. 541:). In June 2006, an estimated 80 percent of email spam was sent by zombie PCs, an increase of 30 percent from the prior year. An estimated 55 billion email spam were sent each day in June 2006, an increase of 25 billion per day from June 2005. 887:
Because of the international nature of spam, the spammer, the hijacked spam-sending computer, the spamvertised server, and the user target of the spam are all often located in different countries. As much as 80% of spam received by Internet users in
1165:" in the subject line is spam, and instruct their mail program to automatically delete all such messages. To defeat such filters, the spammer may intentionally misspell commonly filtered words or insert other characters, often in a style similar to 1025:. Each method has strengths and weaknesses and each is controversial because of its weaknesses. For example, one company's offer to " some spamtrap and honeypot addresses" from email lists defeats the ability for those methods to identify spammers. 284:
Some spam may appear to be blank when in fact it is not. An example of this is the VBS.Davinia.B email worm which propagates through messages that have no subject line and appears blank, when in fact it uses HTML code to download other
441:, which was in many cases less restrictive. CAN-SPAM also preempted any further state legislation, but it left related laws not specific to e-mail intact. Courts have ruled that spam can constitute, for example, trespass to chattels. 461:
to send out their messages. Spammers often use false names, addresses, phone numbers, and other contact information to set up "disposable" accounts at various Internet service providers. They also often use falsified or stolen
1152:
is done without the consent (and sometimes against the expressed will) of the address owners. A single spam run may target tens of millions of possible addresses – many of which are invalid, malformed, or undeliverable.
619:
To combat the problems posed by botnets, open relays, and proxy servers, many email server administrators pre-emptively block dynamic IP ranges and impose stringent requirements on other servers wishing to deliver mail.
400:
In the United Kingdom, for example, unsolicited emails cannot be sent to an individual subscriber unless prior permission has been obtained or unless there is a pre-existing commercial relationship between the parties.
1222:: business services, other than the actual sending of spam itself, which permit the spammer to continue operating. Spam-support services can include processing orders for goods advertised in spam, hosting Web sites or 254:
Blank spam is spam lacking a payload advertisement. Often the message body is missing altogether, as well as the subject line. Still, it fits the definition of spam because of its nature as bulk and unsolicited email.
469:
Senders may go to great lengths to conceal the origin of their messages. Large companies may hire another firm to send their messages so that complaints or blocking of email falls on a third party. Others engage in
544:
For the first quarter of 2010, an estimated 305,000 newly activated zombie PCs were brought online each day for malicious activity. This number is slightly lower than the 312,000 of the fourth quarter of 2009.
102:
Spammers collect email addresses from chat rooms, websites, customer lists, newsgroups, and viruses that harvest users' address books. These collected email addresses are sometimes also sold to other spammers.
2319: 3035:
the date provided is for the original article; the date of revision for the republication is 8 June 2005; verification that content of the republication is the same as the original article is pending
1031:
combines many of the techniques to scan messages exiting out of a service provider's network, identify spam, and taking action such as blocking the message or shutting off the source of the message.
147:
approximately 15% of all spam email. And, rounding off at number three are spam emails about diet products (such as Garcinia gummi-gutta or Garcinia Cambogia), accounting for approximately 1%."
1291:
Spam promoting a commercial service or product. This is the most common type of spam, but it excludes spams that are hoaxes (e.g. virus warnings), political advocacy, religious messages, and
2563: 2211: 1334:
reference to naĂŻve developers who believe they have invented the perfect spam filter, which will stop all spam from reaching users' inboxes while deleting no legitimate email accidentally.
281:
or other may have contributed to this problem—from poorly written spam software to malfunctioning relay servers, or any problems that may truncate header lines from the message body.
2527: 2138: 482:) has no authentication by default, so the spammer can pretend to originate a message apparently from any email address. To prevent this, some ISPs and domains require the use of 223:
image and displayed in the email. This prevents text-based spam filters from detecting and blocking spam messages. Image spam was reportedly used in the mid-2000s to advertise "
1161:
Many spam-filtering techniques work by searching for patterns in the headers or bodies of messages. For instance, a user may decide that all email they receive with the word "
2369: 62:
is ubiquitous, unavoidable, and repetitive. Email spam has steadily grown since the early 1990s, and by 2014 was estimated to account for around 90% of total email traffic.
1262:
recent years, these have fallen almost entirely out of use due to the low quality email addresses available on them, and because some email lists exceed 20GB in size. The
2164: 1970: 2316: 1811: 2271: 76:
The legal definition and status of spam varies from one jurisdiction to another, but nowhere have laws and lawsuits been particularly successful in stemming spam.
2098: 130:
Spam is sent by both otherwise reputable organizations and lesser companies. When spam is sent by otherwise reputable companies it is sometimes referred to as
2072: 1305:
is a service contract offered by an ISP which offers bulk email service to spamming clients, in violation of that ISP's publicly posted acceptable use policy.
2021: 1058:
If a recipient periodically checks his spam folder, that will cost him time and if there is a lot of spam it is easy to overlook the few legitimate messages.
1705: 1682: 2724: 1218:
A number of other online activities and business practices are considered by anti-spam activists to be connected to spamming. These are sometimes termed
2963: 3077: 384: 3660: 2559: 1929:
Biggio, Battista; Fumera, Giorgio; Pillai, Ignazio; Roli, Fabio (2011). "A survey and experimental evaluation of image spam filtering techniques".
650:
A 2010 survey of US and European email users showed that 46% of the respondents had opened spam messages, although only 11% had clicked on a link.
637:
The first known spam email, advertising a DEC product presentation, was sent in 1978 by Gary Thuerk to 600 addresses, the total number of users on
466:
numbers to pay for these accounts. This allows them to move quickly from one account to the next as the host ISPs discover and shut down each one.
2295: 4260: 1599: 437:
In the United States, many states enacted anti-spam laws during the late 1990s and early 2000s. All of these were subsequently superseded by the
164:
users into entering personal information on fake Web sites using emails forged to look like they are from banks or other organizations, such as
1867: 2663: 2775: 2454: 1206:
weaken Bayesian filters, some spammers, alongside the sales pitch, now include lines of irrelevant, random words, in a technique known as
3590:
the link here is to an abstract of a white paper; registration with the authoring organization is required to obtain the full white paper
2533: 2130: 1144:
In order to send spam, spammers need to obtain the email addresses of the intended recipients. To this end, both spammers themselves and
2879: 2827: 2586:"Spammers Continue Innovation: IronPort Study Shows Image-based Spam, Hit & Run, and Increased Volumes Latest Threat to Your Inbox" 2474: 2638: 354:. A number of large civil settlements have been won in this way, although others have been mostly unsuccessful in collecting damages. 346:
If an individual or organisation can identify harm done to them by spam, and identify who sent it; then they may be able to sue for a
2050: 372:
Finally, in most countries specific legislation is in place to make certain forms of spamming a criminal offence, as outlined below:
1189:. This also allows for many different ways to express a given word, making identifying them all more difficult for filter software. 3820: 3556: 2393: 2360: 3631: 2507: 410: 3340: 2160: 1906: 2754: 1999: 1918:
Journal of Machine Learning Research (special issue on Machine Learning in Computer Security), vol. 7, pp. 2699-2720, 12/2006.
1621: 4034: 3710: 3401: 3375: 2996: 991: 3767: 3531: 2426: 1818: 3022: 2692: 2265: 2249: 957: 4074: 2185: 1966: 4049: 3862: 3122: 2054: 3685:
Dow, K; Serenko, A; Turel, O; Wong, J (2006), "Antecedents and consequences of user satisfaction with email systems",
3099: 2092: 498:
victims report the email address owner to the ISP, for example) a naĂŻve ISP may terminate their service for spamming.
79:
Most email spam messages are commercial in nature. Whether commercial or not, many are not only annoying as a form of
3814: 3505: 1120: 606: 341: 274:
Blank spam may also occur when a spammer forgets or otherwise fails to add the payload when they set up the spam run.
238:
image that does not contain clear text in its initial frame, or to contort the shapes of letters in the image (as in
2781:. Report No. 7 – Third and Fourth quarters 2007. Messaging Anti-Abuse Working Group. April 2008. Archived from 1102: 1028: 588: 3143: 2066: 1550: 2029: 1727: 666:
receives four million emails per year, most of them spam. This was originally incorrectly reported as "per day".
3602: 2714: 1789: 1758: 1675: 4235: 1098: 573: 3269: 3248: 3227: 3206: 3185: 3164: 2337: 1845: 174:. Targeted phishing, where known information about the recipient is used to create forged emails, is known as 119:
in 1978 to 600 people. He was reprimanded and told not to do it again. Now the ban on spam is enforced by the
4250: 3810: 3052: 2957:"2010 MAAWG Email Security Awareness and Usage Report, Messing Anti-Abuse Working Group/Ipsos Public Affairs" 2956: 2833:. Report No. 1 – 4th quarter 2005 Report. Messaging Anti-Abuse Working Group. March 2006. Archived from 1391: 1014: 621: 449:
Many other observers viewed it as having failed, although there have been several high-profile prosecutions.
243: 3311: 3073: 4029: 3911: 3290: 2229: 4255: 1871: 1094: 950:
ranks the top three as the United States, China, and Russia, followed by Japan, Canada, and South Korea.
514:. SMTP forwards mail from one server to another—mail servers that ISPs run commonly require some form of 3652: 3480: 4245: 4069: 3361: 2291: 1437: 1406: 3794: 3431: 1571: 2885:. Report No. 2 – 1st quarter 2006. Messaging Anti-Abuse Working Group. June 2006. Archived from 325: 316:
when rejecting or quarantining email (rather than simply rejecting the attempt to send the message).
3584: 2917: 2865: 2813: 4044: 3941: 3906: 2935: 1401: 1396: 1139: 1083: 1017:), checksumming systems to detect bulk email, and by putting some sort of cost on the sender via a 263: 4265: 2659: 1202: 1087: 584: 2782: 2025: 1846:"Only one in 28 emails legitimate, Sophos report reveals rising tide of spam in April–June 2008" 1148:
gather huge lists of potential email addresses. Since spam is, by definition, unsolicited, this
1052:
When legitimate messages are rejected, the sender needs to contact the recipient out of channel.
84: 3879: 3855: 2448: 1464: 3729: 2585: 3571: 2904: 2886: 2852: 2834: 2800: 2483: 1344: 124: 116: 1055:
When legitimate messages are relegated to a spam folder, the sender is not notified of this.
625:
emanating from them also causes problems for legitimate email servers in the same IP range.
215:, or image-based spam, is an obfuscation method by which text of the message is stored as a 4230: 4084: 4054: 4021: 3130: 1938: 1485: 1381: 1361: 1241:(see below) – a contract with the ISP that allows them to spam without being disconnected. 1034: 1018: 977: 647:
IPwarmup.com study, which also effects legitimate email senders to achieve inbox delivery.
486:, allowing positive identification of the specific account from which an email originates. 438: 361:
statutes is also common, particularly if they illegally accessed other computers to create
351: 3432:"Machine learning for email spam filtering: review, approaches and open research problems" 2634: 8: 4059: 3901: 2190: 1006: 961: 673:, owner of the domain name acme.com, was receiving over one million spam emails per day. 490: 475: 295: 55: 3829: 3800: 3552: 2401: 1942: 2501: 1223: 1207: 258:
Blank spam may be originated in different ways, either intentional or unintentionally:
3802:
Why Am I Getting All This Spam? Unsolicited Commercial Email Research Six Month Report
3627: 3402:"I-005c: E-Mail Spamming countermeasures: Detection and prevention of E-Mail spamming" 2560:"Los Angeles Man, First American Convicted Under Anti-Spam Law, Faces Years in Prison" 906:, the major sources of spam in the fourth quarter of 2008 (October to December) were: 277:
Often blank spam headers appear truncated, suggesting that computer glitches, such as
4225: 4039: 3982: 3848: 3706: 3355: 3332: 1991: 1894: 1591: 1448: 1443: 267: 3840: 3018: 2746: 580: 506:
Spammers frequently seek out and make use of vulnerable third-party systems such as
4180: 4127: 3749: 1946: 1655: 1625: 1583: 956:
As of 13 December 2021, the three networks hosting the most spammers are
947: 329: 301: 120: 96: 3776: 3409: 2988: 1453: 1295:
sent by a person to many other people. The term UCE may be most common in the USA.
1226:
records referenced in spam messages, or a number of specific services as follows:
70: 65:
Since the expense of the spam is borne mostly by the recipient, it is effectively
4192: 4162: 3896: 3700: 3524: 3520: 3379: 3126: 2547: 2422: 2323: 2118: 1950: 1526: 1426: 1356: 998: 526: 522: 507: 471: 313: 192: 80: 3553:"Spamware – Email Address Harvesting Tools and Anonymous Bulk Emailing Software" 3454: 2688: 4240: 4202: 4172: 4122: 4064: 3987: 3977: 3921: 2719: 2684: 1895:"Spam filtering based on the analysis of text information embedded into images" 1587: 1421: 1371: 515: 388: 381: 358: 309: 3021:. ACME Laboratories republication of article appearing in Detroit Free Press. 1572:"Detecting spamming activities in a campus network using incremental learning" 425:, which covers some types of email and phone spam. Penalties are up to 10,000 4219: 4137: 4102: 4002: 3936: 3686: 1595: 1458: 1311: 1302: 1238: 1045:
Measures to protect against spam can cause collateral damage. This includes:
910:
The United States (the origin of 19.8% of spam messages, up from 18.9% in Q3)
889: 670: 659: 426: 422: 305: 278: 224: 3119: 1544: 4185: 4142: 4112: 3962: 3806: 3541:; the referenced page is an auto-redirect target from the original location 1470: 1320: 1292: 1022: 511: 347: 134:. Mainsleaze makes up approximately 3% of the spam sent over the internet. 3501: 1049:
The measures may consume resources, both in the server and on the network.
4147: 3957: 2609: 1500: 1386: 463: 413:(which took effect in 2014) is Canadian legislation meant to fight spam. 66: 59: 1660: 1263: 4117: 4094: 3967: 3926: 3399: 1432: 1162: 663: 212: 207: 142:
Many spam emails contain URLs to a website or websites. According to a
1719: 19: 4152: 4132: 4007: 3606: 3605:. Coalition Against Unsolicited Bulk Email, Australia. Archived from 3291:"Eight times more malicious email attachments spammed out in Q3 2008" 3048: 2358: 2212:
Privacy and Electronic Communications (EC Directive) Regulations 2003
1781: 1750: 1505: 1166: 994:(CIAC) has provided specific countermeasures against email spamming. 643: 483: 157: 24: 3144:"Sophos reveals 'Dirty Dozen' spam producing countries, August 2004" 1072: 591:. Statements consisting only of original research should be removed. 4197: 4107: 3992: 3972: 3871: 3769:
Email Address Harvesting and the Effectiveness of Anti-SPAM Filters
3228:"Sophos reveals 'Dirty Dozen' spam producing countries for Q3 2007" 1955:
Volume 32, Issue 10, 15 July 2011, Pages 1436-1446, ISSN 0167-8655.
1495: 1490: 1416: 1246: 1010: 429:, or 2,000 penalty units for a person other than a body corporate. 366: 170: 151: 143: 88: 51: 3207:"Sophos reveals 'Dirty Dozen' spam producing countries, July 2007" 308:. It happens when email servers are misconfigured to send a bogus 127:(ToS/AUP) of internet service providers (ISPs) and peer pressure. 4079: 3997: 3931: 2294:. Sydney, AU: AustLII, Faculty of Law, University of Technology. 1480: 1475: 1411: 1037:
to prevent "From:" address spoofing became popular in the 2010s.
638: 362: 239: 112: 92: 3270:"Sophos details dirty dozen spam-relaying countries for Q1 2008" 3249:"Sophos details dirty dozen spam-relaying countries for Q4 2007" 2223: 3455:"A Survey of Learning-Based Techniques of Email Spam Filtering" 1366: 1258: 986:
Mozilla Thunderbird alerting a user that an email could be spam
965: 903: 893: 530: 165: 3797:
which contains legislation, analysis, and litigation histories
1646:
Rao, Justin M.; Reiley, David H. (2012), "Economics of Spam",
1001:
based on the content of the email, DNS-based blackhole lists (
4157: 3916: 3476: 1429:, the infamous Dave Rhodes chain letter that jumped to email. 1376: 1331: 1270: 1002: 997:
Some popular methods for filtering and refusing spam include
538: 521:
Increasingly, spammers use networks of malware-infected PCs (
458: 321: 47: 3805:
by Center for Democracy & Technology from the author of
2529:
Six years later, Can Spam act leaves spam problem unresolved
2362:"Trespass to Chattels" Finds New Life In Battle Against Spam 2292:"Commonwealth Consolidated Acts: Spam Act 2003 – Schedule 2" 1927:
Battista Biggio, Giorgio Fumera, Ignazio Pillai, Fabio Roli,
3406:
Computer Incident Advisory Capability Information Bulletins
3186:"Sophos research reveals dirty dozen spam-relaying nations" 2880:"Email Metrics Program: The Network Operators' Perspective" 2828:"Email Metrics Program: The Network Operators' Perspective" 2776:"Email Metrics Program: The Network Operators' Perspective" 2423:"United States set to Legalize Spamming on January 1, 2004" 479: 220: 198:
people who have deliberately withheld their email address.
161: 115:), sending of commercial email was prohibited. Gary Thuerk 3400:
Shawn Hernan; James R. Cutler; David Harris (1997-11-25).
3376:"The Spamhaus Project - the Top 10 Worst Botnet Countries" 2359:
Daniel J. Schwartz; Joseph F. Marinelli (September 2004),
2085: 2068:
Clinton Internet provider wins $ 11B suit against spammer
1868:"Getting it Wrong: Corporate America Spams the Afterlife" 235: 216: 3702:
Inside the spam cartel: trade secrets from the dark side
2931: 1921: 982: 691:
E-mail spam relayed by country in Q2 2007 (% of total)
3555:. MX Logic (abstract hosted by Bit Pipe). 2004-10-01. 3165:"Sophos reveals 'dirty dozen' spam relaying countries" 3100:"Sophos reveals "dirty dozen" spam-relaying countries" 1928: 1570:
Fu, JuiHsi; Lin, PoChing; Lee, SingLing (2014-08-01).
445:
almost immediately dubbing it the "You Can Spam" Act.
3870: 3705:, Elsevier/Syngress; 1st edition, November 27, 2004. 1885: 1327:
Final, Ultimate Solution for the Spam Problem (FUSSP)
320:
email backscatter can end up being listed on various
3628:"Vernon Schryver: You Might Be An Anti-Spam Kook If" 3408:. United States Department of Energy. Archived from 2924: 926:
When grouped by continents, spam comes mostly from:
3730:"Can the Spam: How Spam is Bad for the Environment" 3684: 3312:"Spammers defy Bill Gates's death-of-spam prophecy" 2267:
Canada's Anti-spam Bill C-28 is the Law of the Land
2131:"Bronx man, 'leader' of bank-fraud scam, convicted" 518:to ensure that the user is a customer of that ISP. 2317:Hypertouch v. ValueClick, Inc. et al., Cal.App.4th 653: 392:options to be determined by national legislation. 385:Directive on Privacy and Electronic Communications 234:A newer technique, however, is to use an animated 2476:Effectiveness and Enforcement of the CAN-SPAM Act 4217: 2715:"Email spam level bounces back after record low" 2339:PUBLIC LAW 108-187--DEC. 16, 2003 117 STAT. 2699 1817:(Press release). Sophos Cyberoam. Archived from 1321:Opt-in, confirmed opt-in, double opt-in, opt-out 1317:Opt-in, confirmed opt-in, double opt-in, opt-out 357:Criminal prosecution of spammers under fraud or 2677: 3795:The Electronic Frontier Foundation's spam page 3474: 2683: 1964: 1782:"Companies that spam, and ESPs that help them" 1156: 83:, but also dangerous because they may contain 3856: 3046: 3016: 2712: 2632: 2588:(Press release). IronPort Systems. 2006-06-28 1196: 1013:, enforcing technical requirements of email ( 3761:Government reports and industry white papers 3339:. dynamic report. The Spamhaus Project Ltd. 2604: 2602: 2186:"Top Spammer Sentenced to Nearly Four Years" 1773: 1619: 1576:Journal of Network and Computer Applications 300:Backscatter is a side-effect of email spam, 3468: 1891:Giorgio Fumera, Ignazio Pillai, Fabio Roli, 1257:are commonly advertised in spam. These are 1101:. Unsourced material may be challenged and 628: 16:Unsolicited electronic advertising by email 3863: 3849: 3494: 3325: 2635:"Spam Decreased 82.22% Over The Past Year" 2499: 1958: 1840: 1838: 1314:is advertising through the medium of spam. 896:can be traced to fewer than 200 spammers. 46:, is unsolicited messages sent in bulk by 3452: 2872: 2820: 2768: 2599: 2051:CompuServe Inc. v. Cyber Promotions, Inc. 1676:"Getting Started Computing at the AI Lab" 1659: 1645: 1613: 1133: 1121:Learn how and when to remove this message 607:Learn how and when to remove this message 69:advertising. Thus, it is an example of a 3688:International Journal of e-Collaboration 3304: 2578: 1865: 1804: 1667: 1569: 1537: 1213: 981: 335: 18: 3545: 3283: 3262: 3241: 3220: 3199: 3178: 3157: 3136: 2615:(Press release). Commtouch Software Ltd 2610:"Q1 2010 Internet Threats Trend Report" 2251:Fighting Internet and Wireless Spam Act 2002:from the original on September 23, 2015 1967:"Image spam paints a troubling picture" 1835: 1812:"Q1 2014 Internet Threats Trend Report" 1724:Internet and e-mail policy and practice 1324:added to the list without verification. 971: 533:(such zombifying malware is known as a 411:Fighting Internet and Wireless Spam Act 4261:Promotion and marketing communications 4218: 3462:University of Trento Technical Reports 2744: 2391: 2161:"'Spam King' pleads guilty in Detroit" 1892: 1717: 1229:Some Internet hosting firms advertise 1062: 939:South America (12.9%, down from 13.2%) 452: 111:At the beginning of the Internet (the 3844: 3822:Spam White Paper – Drowning in Sewage 3595: 3040: 3010: 2986: 2394:"The 'Yes, You Can Spam' Act of 2003" 1779: 1748: 1711: 1276: 992:Computer Incident Advisory Capability 474:of email addresses (much easier than 137: 3775:, United States: FTC, archived from 3504:. The Spamhaus Project. 2006-12-22. 3429: 3393: 3019:"Ballmer checks out my spam problem" 2566:from the original on 10 January 2019 2429:from the original on 12 January 2012 2368:, Association of Corporate Counsel, 1899:Journal of Machine Learning Research 1624:. The ClickZ Network. Archived from 1099:adding citations to reliable sources 1066: 1040: 933:North America (23.6%, up from 21.8%) 556: 231:such as a box that has words on it. 91:web sites or sites that are hosting 3699:Sjouwerman, Stu; Posluns, Jeffrey, 3502:"SBL Policy & Listing Criteria" 3314:(Press release). Sophos. 2009-01-22 3293:(Press release). Sophos. 2008-10-27 3272:(Press release). Sophos. 2008-04-14 3251:(Press release). Sophos. 2008-02-11 3230:(Press release). Sophos. 2007-10-24 3209:(Press release). Sophos. 2007-07-18 3188:(Press release). Sophos. 2007-04-11 3167:(Press release). Sophos. 2006-07-24 3146:(Press release). Sophos. 2004-08-24 2980: 1848:(Press release). Sophos. 2008-07-15 1506:SPIT (SPam over Internet Telephony) 944:In terms of number of IP addresses: 501: 289: 262:Blank spam can have been sent in a 13: 4050:Distributed Checksum Clearinghouse 3678: 3453:Blanzieri, Enrico (January 2008). 3097: 3017:Mike Wendland (December 2, 2004). 2989:"Bill Gates 'most spammed person'" 2706: 2689:"Reaction to the DEC Spam of 1978" 2532:, USA: SC Magazine, archived from 2326:(Google Scholar: January 18, 2011) 2055:School of Visual Arts v. Kuprewicz 1870:. Clueless Mailers. Archived from 1792:from the original on April 1, 2019 1761:from the original on April 1, 2019 1730:from the original on April 1, 2019 1288:Unsolicited commercial email (UCE) 457:Spammers may engage in deliberate 369:or other forms of criminal fraud. 181: 14: 4277: 4035:Challenge–response spam filtering 3872:Unsolicited digital communication 3717: 3337:Spamhaus Blocklist (SBL) database 3333:"Spamhaus Statistics: The Top 10" 3120:Register of Known Spam Operations 2713:Josh Halliday (10 January 2011). 2141:from the original on 8 March 2019 1718:Levine, John (October 18, 2011). 1673: 1622:"Make Spammers Pay Before You Do" 685: 634:delete or reject "obvious spam". 395: 375: 342:Email spam legislation by country 117:sent the first email spam message 27:folder filled with spam messages. 3464:(Technical Report # DIT-06-056). 2747:"Spam overwhelms email messages" 2392:Foster, Ed (November 24, 2003). 2336:"SEC. 8. EFFECT ON OTHER LAWS", 1648:Journal of Economic Perspectives 1169:, as in the following examples: 1071: 561: 489:Senders cannot completely spoof 432: 3751:Worldwide Email Threat Activity 3663:from the original on 2008-05-15 3645: 3634:from the original on 2012-10-14 3620: 3559:from the original on 2007-01-23 3534:from the original on 2004-10-10 3508:from the original on 2007-01-05 3483:from the original on 2014-08-11 3446: 3423: 3368: 3343:from the original on 2007-01-10 3113: 3091: 3080:from the original on 2007-09-04 3066: 3055:from the original on 2010-09-17 3025:from the original on 2010-09-17 2999:from the original on 2011-05-02 2969:from the original on 2013-03-08 2949: 2938:from the original on 2018-10-21 2757:from the original on 2012-12-02 2738: 2727:from the original on 2015-04-03 2695:from the original on 2013-07-30 2666:from the original on 2012-12-14 2652: 2641:from the original on 2012-12-13 2626: 2552: 2540: 2520: 2510:from the original on 2011-09-11 2493: 2467: 2457:from the original on 2008-03-15 2441: 2415: 2385: 2375:from the original on 2019-02-12 2352: 2329: 2309: 2298:from the original on 2011-05-18 2284: 2274:from the original on 2011-03-24 2258: 2242: 2232:from the original on 2014-01-16 2216: 2205: 2178: 2167:from the original on 2009-06-26 2153: 2123: 2111: 2101:from the original on 2012-08-06 2075:from the original on 2018-06-14 2059: 2043: 2014: 1984: 1973:from the original on 2007-02-24 1909:from the original on 2015-02-21 1859: 1688:from the original on 2019-03-23 1602:from the original on 2020-04-30 1553:from the original on 2014-09-26 936:Europe (23.4%, down from 23.9%) 676: 654:Highest amount of spam received 552: 387:(2002/58/EC) provides that the 3828:, Pegasus Mail, archived from 3430:Dada, Emmanuel Gbenga (2019). 1742: 1699: 1639: 1620:Rebecca Lieb (July 26, 2002). 1563: 1519: 990:The U.S. Department of Energy 1: 3811:Mercury Mail Transport System 3694:, vol. 2, pp. 46–64 3603:"Definitions of Words We Use" 3475:Sapient Fridge (2005-07-08). 2745:Waters, Darren (2009-04-08). 1965:Eric B. Parizo (2006-07-26). 1866:Bob West (January 19, 2008). 1512: 1392:Direct Marketing Associations 930:Asia (37.8%, down from 39.8%) 922:Turkey (4.4%, down from 8.2%) 916:Russia (6.4%, down from 8.3%) 622:Forward-confirmed reverse DNS 249: 244:optical character recognition 201: 3047:Jef Poskanzer (2006-05-15). 2662:(in Dutch). Symantec.cloud. 2633:Charlie White (2011-07-04). 2500:Ken Fisher (December 2005), 2450:Is the CAN-SPAM Law Working? 2071:, QC Times, 4 January 2006, 1951:10.1016/j.patrec.2011.03.022 1527:"Merriam Webster Dictionary" 1282:Unsolicited bulk email (UBE) 416: 186: 7: 1931:Pattern Recognition Letters 1349: 1157:Obfuscating message content 919:Brazil (6.3%, up from 4.5%) 900:In terms of volume of spam: 662:in 2004, Microsoft founder 587:the claims made and adding 529:networks are also known as 106: 95:or include malware as file 10: 4282: 4070:Naive Bayes spam filtering 2987:Staff (18 November 2004). 2503:US FTC says CAN-SPAM works 2482:, USA: FTC, archived from 2094:AOL gives up treasure hunt 1751:"What is Mainsleaze Spam?" 1588:10.1016/j.jnca.2014.03.010 1438:news.admin.net-abuse.email 1407:Gordon v. Virtumundo, Inc. 1342: 1338: 1266:is no longer substantial. 1264:amount you can fit on a CD 1197:Defeating Bayesian filters 1137: 975: 913:China (9.9%, up from 5.4%) 339: 326:internet service providers 293: 205: 190: 156:Spam is also a medium for 149: 4171: 4093: 4020: 3950: 3887: 3878: 3518:original location was at 2270:, Circle ID, 2010-12-15, 1992:"Dealing with blank spam" 1454:Pump-and-dump stock fraud 1285:A synonym for email spam. 871: 857: 843: 829: 815: 801: 787: 773: 759: 745: 731: 717: 703: 698: 695: 642:unwanted, according to a 404: 58:in which the name of the 54:). The name comes from a 4045:Disposable email address 3907:Directory harvest attack 1893:Fumera, Giorgio (2006). 1706:Opening Pandora's In-Box 1402:Email address harvesting 1397:Disposable email address 1244:A few companies produce 1140:Email address harvesting 1029:Outbound spam protection 629:Statistics and estimates 264:directory harvest attack 242:) to avoid detection by 60:canned pork product Spam 2562:. AP. 17 January 2007. 478:). The email protocol ( 350:, e.g. on the basis of 324:and be in violation of 3579:Cite journal requires 3477:"Spamware vendor list" 3360:: CS1 maint: others ( 2932:"IPWarmup.com - Study" 2912:Cite journal requires 2860:Cite journal requires 2808:Cite journal requires 1780:Jefferson, Catherine. 1749:Jefferson, Catherine. 1465:SPAMasterpiece Theater 1134:Gathering of addresses 987: 525:) to send their spam. 34:, also referred to as 28: 4236:Advertising by medium 3074:"Spam Costs Billions" 3051:. ACME Laboratories. 2398:The Gripe Line Weblog 1998:. September 2, 2009. 1720:"The Mainsleaze Blog" 1345:History of email spam 1220:spam-support services 1214:Spam-support services 985: 954:In terms of networks: 365:, or the emails were 336:Legal countermeasures 125:Acceptable Use Policy 22: 4251:Marketing techniques 4055:Email authentication 2137:. 26 February 2016. 1674:Stacy, Christopher. 1549:, M3AAWG, Nov 2014, 1546:Email metrics report 1382:CAN-SPAM Act of 2003 1362:Anti-spam techniques 1095:improve this section 1035:Email authentication 1019:proof-of-work system 978:Anti-spam techniques 972:Anti-spam techniques 732:China (+ Hong Kong) 439:CAN-SPAM Act of 2003 352:trespass to chattels 71:negative externality 3902:Bulk email software 3754:, Barracuda Central 2840:on December 8, 2006 2489:on January 10, 2006 2163:. UPI. 2009-06-23. 1969:. Search Security. 1943:2011PaReL..32.1436B 1824:on 24 February 2021 1786:The Mainsleaze Blog 1755:The Mainsleaze Blog 1661:10.1257/jep.26.3.87 1235:bulletproof hosting 1063:Methods of spammers 692: 476:IP address spoofing 453:Deception and fraud 296:Backscatter (email) 168:. This is known as 56:Monty Python sketch 4256:Online advertising 3125:2007-06-12 at the 2691:. Brad Templeton. 2322:2017-04-15 at the 1277:Related vocabulary 1208:Bayesian poisoning 1203:Bayesian filtering 1150:address harvesting 988: 690: 572:possibly contains 380:Article 13 of the 138:Spamvertised sites 29: 4246:Digital marketing 4213: 4212: 4040:Context filtering 4016: 4015: 3711:978-1-932266-86-3 2097:, Boston Herald, 1937:(10): 1436–1446. 1905:(98): 2699–2720. 1874:on April 14, 2013 1449:Project Honey Pot 1131: 1130: 1123: 1041:Collateral damage 885: 884: 669:At the same time 617: 616: 609: 574:original research 268:dictionary attack 4273: 4181:Advance-fee scam 4128:Keyword stuffing 3885: 3884: 3865: 3858: 3851: 3842: 3841: 3836: 3834: 3827: 3790: 3789: 3787: 3781: 3774: 3755: 3737: 3695: 3693: 3672: 3671: 3669: 3668: 3649: 3643: 3642: 3640: 3639: 3630:. Rhyolite.com. 3624: 3618: 3617: 3615: 3614: 3599: 3593: 3588: 3582: 3577: 3575: 3567: 3565: 3564: 3549: 3543: 3540: 3539: 3522: 3516: 3514: 3513: 3498: 3492: 3491: 3489: 3488: 3472: 3466: 3465: 3459: 3450: 3444: 3443: 3427: 3421: 3420: 3418: 3417: 3397: 3391: 3390: 3388: 3387: 3378:. Archived from 3372: 3366: 3365: 3359: 3351: 3349: 3348: 3329: 3323: 3322: 3320: 3319: 3308: 3302: 3301: 3299: 3298: 3287: 3281: 3280: 3278: 3277: 3266: 3260: 3259: 3257: 3256: 3245: 3239: 3238: 3236: 3235: 3224: 3218: 3217: 3215: 3214: 3203: 3197: 3196: 3194: 3193: 3182: 3176: 3175: 3173: 3172: 3161: 3155: 3154: 3152: 3151: 3140: 3134: 3117: 3111: 3110: 3108: 3107: 3095: 3089: 3088: 3086: 3085: 3070: 3064: 3063: 3061: 3060: 3049:"Mail Filtering" 3044: 3038: 3033: 3031: 3030: 3014: 3008: 3007: 3005: 3004: 2984: 2978: 2977: 2975: 2974: 2968: 2961: 2953: 2947: 2946: 2944: 2943: 2928: 2922: 2921: 2915: 2910: 2908: 2900: 2898: 2897: 2891: 2884: 2876: 2870: 2869: 2863: 2858: 2856: 2848: 2846: 2845: 2839: 2832: 2824: 2818: 2817: 2811: 2806: 2804: 2796: 2794: 2793: 2787: 2780: 2772: 2766: 2765: 2763: 2762: 2742: 2736: 2735: 2733: 2732: 2710: 2704: 2703: 2701: 2700: 2687:(8 March 2005). 2681: 2675: 2674: 2672: 2671: 2656: 2650: 2649: 2647: 2646: 2637:. Mashable.com. 2630: 2624: 2623: 2621: 2620: 2614: 2606: 2597: 2596: 2594: 2593: 2582: 2576: 2575: 2573: 2571: 2556: 2550: 2544: 2538: 2537: 2524: 2518: 2517: 2516: 2515: 2506:, Ars Technica, 2497: 2491: 2490: 2488: 2481: 2471: 2465: 2464: 2463: 2462: 2445: 2439: 2438: 2436: 2434: 2425:. Spamhaus.org. 2419: 2413: 2412: 2410: 2409: 2400:. Archived from 2389: 2383: 2382: 2381: 2380: 2374: 2367: 2356: 2350: 2349: 2344: 2333: 2327: 2313: 2307: 2306: 2304: 2303: 2288: 2282: 2281: 2280: 2279: 2262: 2256: 2255: 2246: 2240: 2239: 2238: 2237: 2220: 2214: 2209: 2203: 2202: 2200: 2199: 2182: 2176: 2175: 2173: 2172: 2157: 2151: 2150: 2148: 2146: 2127: 2121: 2115: 2109: 2108: 2107: 2106: 2089: 2083: 2082: 2081: 2080: 2063: 2057: 2047: 2041: 2040: 2038: 2037: 2028:. Archived from 2018: 2012: 2011: 2009: 2007: 1988: 1982: 1981: 1979: 1978: 1962: 1956: 1954: 1925: 1919: 1917: 1915: 1914: 1889: 1883: 1882: 1880: 1879: 1863: 1857: 1856: 1854: 1853: 1842: 1833: 1832: 1830: 1829: 1823: 1816: 1808: 1802: 1801: 1799: 1797: 1777: 1771: 1770: 1768: 1766: 1746: 1740: 1739: 1737: 1735: 1715: 1709: 1703: 1697: 1696: 1694: 1693: 1687: 1680: 1671: 1665: 1664: 1663: 1643: 1637: 1636: 1634: 1633: 1617: 1611: 1610: 1608: 1607: 1567: 1561: 1560: 1559: 1558: 1541: 1535: 1534: 1523: 1188: 1184: 1180: 1176: 1172: 1126: 1119: 1115: 1112: 1106: 1075: 1067: 948:Spamhaus Project 880: 879: 866: 865: 852: 851: 838: 837: 824: 823: 810: 809: 796: 795: 782: 781: 768: 767: 754: 753: 740: 739: 726: 725: 712: 711: 693: 689: 612: 605: 601: 598: 592: 589:inline citations 565: 564: 557: 508:open mail relays 502:Theft of service 330:Terms of Service 290:Backscatter spam 121:Terms of Service 4281: 4280: 4276: 4275: 4274: 4272: 4271: 4270: 4216: 4215: 4214: 4209: 4193:Make Money Fast 4167: 4163:URL redirection 4089: 4012: 3946: 3897:Address munging 3874: 3869: 3832: 3825: 3819: 3785: 3783: 3779: 3772: 3766: 3748: 3736:, June 15, 2009 3728: 3720: 3691: 3681: 3679:Further reading 3676: 3675: 3666: 3664: 3651: 3650: 3646: 3637: 3635: 3626: 3625: 3621: 3612: 3610: 3601: 3600: 3596: 3580: 3578: 3569: 3568: 3562: 3560: 3551: 3550: 3546: 3537: 3535: 3519: 3511: 3509: 3500: 3499: 3495: 3486: 3484: 3479:. Spam Sights. 3473: 3469: 3457: 3451: 3447: 3428: 3424: 3415: 3413: 3398: 3394: 3385: 3383: 3374: 3373: 3369: 3353: 3352: 3346: 3344: 3331: 3330: 3326: 3317: 3315: 3310: 3309: 3305: 3296: 3294: 3289: 3288: 3284: 3275: 3273: 3268: 3267: 3263: 3254: 3252: 3247: 3246: 3242: 3233: 3231: 3226: 3225: 3221: 3212: 3210: 3205: 3204: 3200: 3191: 3189: 3184: 3183: 3179: 3170: 3168: 3163: 3162: 3158: 3149: 3147: 3142: 3141: 3137: 3127:Wayback Machine 3118: 3114: 3105: 3103: 3102:(Press release) 3096: 3092: 3083: 3081: 3072: 3071: 3067: 3058: 3056: 3045: 3041: 3028: 3026: 3015: 3011: 3002: 3000: 2985: 2981: 2972: 2970: 2966: 2959: 2955: 2954: 2950: 2941: 2939: 2930: 2929: 2925: 2913: 2911: 2902: 2901: 2895: 2893: 2889: 2882: 2878: 2877: 2873: 2861: 2859: 2850: 2849: 2843: 2841: 2837: 2830: 2826: 2825: 2821: 2809: 2807: 2798: 2797: 2791: 2789: 2785: 2778: 2774: 2773: 2769: 2760: 2758: 2743: 2739: 2730: 2728: 2711: 2707: 2698: 2696: 2682: 2678: 2669: 2667: 2658: 2657: 2653: 2644: 2642: 2631: 2627: 2618: 2616: 2612: 2608: 2607: 2600: 2591: 2589: 2584: 2583: 2579: 2569: 2567: 2558: 2557: 2553: 2548:Oleg Nikolaenko 2545: 2541: 2526: 2525: 2521: 2513: 2511: 2498: 2494: 2486: 2479: 2473: 2472: 2468: 2460: 2458: 2447: 2446: 2442: 2432: 2430: 2421: 2420: 2416: 2407: 2405: 2390: 2386: 2378: 2376: 2372: 2365: 2357: 2353: 2342: 2335: 2334: 2330: 2324:Wayback Machine 2315:But see, e.g., 2314: 2310: 2301: 2299: 2290: 2289: 2285: 2277: 2275: 2264: 2263: 2259: 2248: 2247: 2243: 2235: 2233: 2222: 2221: 2217: 2210: 2206: 2197: 2195: 2184: 2183: 2179: 2170: 2168: 2159: 2158: 2154: 2144: 2142: 2129: 2128: 2124: 2119:Sanford Wallace 2116: 2112: 2104: 2102: 2091: 2090: 2086: 2078: 2076: 2065: 2064: 2060: 2048: 2044: 2035: 2033: 2020: 2019: 2015: 2005: 2003: 1990: 1989: 1985: 1976: 1974: 1963: 1959: 1926: 1922: 1912: 1910: 1890: 1886: 1877: 1875: 1864: 1860: 1851: 1849: 1844: 1843: 1836: 1827: 1825: 1821: 1814: 1810: 1809: 1805: 1795: 1793: 1778: 1774: 1764: 1762: 1747: 1743: 1733: 1731: 1716: 1712: 1704: 1700: 1691: 1689: 1685: 1678: 1672: 1668: 1644: 1640: 1631: 1629: 1618: 1614: 1605: 1603: 1568: 1564: 1556: 1554: 1543: 1542: 1538: 1531:Merriam-Webster 1525: 1524: 1520: 1515: 1510: 1427:Make money fast 1357:Address munging 1352: 1347: 1341: 1279: 1216: 1199: 1186: 1182: 1178: 1174: 1170: 1159: 1142: 1136: 1127: 1116: 1110: 1107: 1092: 1076: 1065: 1043: 999:email filtering 980: 974: 881: 877: 876: 867: 863: 862: 853: 849: 848: 844:United Kingdom 839: 835: 834: 825: 821: 820: 811: 807: 806: 797: 793: 792: 783: 779: 778: 769: 765: 764: 755: 751: 750: 741: 737: 736: 727: 723: 722: 713: 709: 708: 688: 679: 656: 631: 613: 602: 596: 593: 578: 566: 562: 555: 504: 455: 435: 419: 407: 398: 378: 344: 338: 314:envelope sender 298: 292: 252: 210: 204: 195: 193:Email appending 189: 184: 182:Spam techniques 154: 140: 109: 81:attention theft 17: 12: 11: 5: 4279: 4269: 4268: 4266:Internet fraud 4263: 4258: 4253: 4248: 4243: 4238: 4233: 4228: 4211: 4210: 4208: 4207: 4206: 4205: 4195: 4190: 4189: 4188: 4177: 4175: 4173:Internet fraud 4169: 4168: 4166: 4165: 4160: 4155: 4150: 4145: 4140: 4135: 4130: 4125: 4123:Google bombing 4120: 4115: 4110: 4105: 4099: 4097: 4091: 4090: 4088: 4087: 4082: 4077: 4072: 4067: 4065:List poisoning 4062: 4057: 4052: 4047: 4042: 4037: 4032: 4026: 4024: 4018: 4017: 4014: 4013: 4011: 4010: 4005: 4000: 3995: 3990: 3985: 3980: 3975: 3970: 3965: 3960: 3954: 3952: 3948: 3947: 3945: 3944: 3939: 3934: 3929: 3924: 3922:Email spoofing 3919: 3914: 3909: 3904: 3899: 3893: 3891: 3882: 3876: 3875: 3868: 3867: 3860: 3853: 3845: 3839: 3838: 3817: 3798: 3792: 3758: 3757: 3740: 3739: 3719: 3718:External links 3716: 3715: 3714: 3697: 3680: 3677: 3674: 3673: 3644: 3619: 3594: 3581:|journal= 3544: 3493: 3467: 3445: 3422: 3392: 3367: 3324: 3303: 3282: 3261: 3240: 3219: 3198: 3177: 3156: 3135: 3112: 3090: 3065: 3039: 3009: 2979: 2948: 2923: 2914:|journal= 2871: 2862:|journal= 2819: 2810:|journal= 2767: 2737: 2720:guardian.co.uk 2705: 2685:Brad Templeton 2676: 2651: 2625: 2598: 2577: 2551: 2539: 2519: 2492: 2466: 2440: 2414: 2384: 2351: 2328: 2308: 2283: 2257: 2241: 2215: 2204: 2177: 2152: 2122: 2110: 2084: 2058: 2042: 2013: 1983: 1957: 1920: 1884: 1858: 1834: 1803: 1772: 1741: 1710: 1698: 1666: 1638: 1612: 1562: 1536: 1517: 1516: 1514: 1511: 1509: 1508: 1503: 1498: 1493: 1488: 1483: 1478: 1473: 1468: 1461: 1456: 1451: 1446: 1441: 1435: 1430: 1424: 1422:List poisoning 1419: 1414: 1409: 1404: 1399: 1394: 1389: 1384: 1379: 1374: 1372:Boulder Pledge 1369: 1364: 1359: 1353: 1351: 1348: 1343:Main article: 1340: 1337: 1336: 1335: 1328: 1325: 1318: 1315: 1309: 1306: 1299: 1296: 1289: 1286: 1283: 1278: 1275: 1271:DNS blacklists 1215: 1212: 1198: 1195: 1158: 1155: 1146:list merchants 1138:Main article: 1135: 1132: 1129: 1128: 1079: 1077: 1070: 1064: 1061: 1060: 1059: 1056: 1053: 1050: 1042: 1039: 976:Main article: 973: 970: 941: 940: 937: 934: 931: 924: 923: 920: 917: 914: 911: 883: 882: 875: 873: 869: 868: 861: 859: 855: 854: 847: 845: 841: 840: 833: 831: 827: 826: 819: 817: 813: 812: 805: 803: 799: 798: 791: 789: 785: 784: 777: 775: 771: 770: 763: 761: 757: 756: 749: 747: 743: 742: 735: 733: 729: 728: 721: 719: 715: 714: 707: 705: 704:United States 701: 700: 697: 687: 686:Origin of spam 684: 678: 675: 655: 652: 630: 627: 615: 614: 569: 567: 560: 554: 551: 516:authentication 503: 500: 491:email delivery 454: 451: 434: 431: 418: 415: 406: 403: 397: 396:United Kingdom 394: 382:European Union 377: 376:European Union 374: 359:computer crime 337: 334: 310:bounce message 294:Main article: 291: 288: 287: 286: 282: 275: 272: 251: 248: 206:Main article: 203: 200: 191:Main article: 188: 185: 183: 180: 176:spear-phishing 150:Main article: 139: 136: 108: 105: 15: 9: 6: 4: 3: 2: 4278: 4267: 4264: 4262: 4259: 4257: 4254: 4252: 4249: 4247: 4244: 4242: 4239: 4237: 4234: 4232: 4229: 4227: 4224: 4223: 4221: 4204: 4201: 4200: 4199: 4196: 4194: 4191: 4187: 4184: 4183: 4182: 4179: 4178: 4176: 4174: 4170: 4164: 4161: 4159: 4156: 4154: 4151: 4149: 4146: 4144: 4141: 4139: 4138:Referrer spam 4136: 4134: 4131: 4129: 4126: 4124: 4121: 4119: 4116: 4114: 4111: 4109: 4106: 4104: 4101: 4100: 4098: 4096: 4092: 4086: 4083: 4081: 4078: 4076: 4073: 4071: 4068: 4066: 4063: 4061: 4058: 4056: 4053: 4051: 4048: 4046: 4043: 4041: 4038: 4036: 4033: 4031: 4028: 4027: 4025: 4023: 4019: 4009: 4006: 4004: 4003:Telemarketing 4001: 3999: 3996: 3994: 3991: 3989: 3986: 3984: 3981: 3979: 3976: 3974: 3971: 3969: 3966: 3964: 3961: 3959: 3956: 3955: 3953: 3949: 3943: 3940: 3938: 3937:Pink contract 3935: 3933: 3930: 3928: 3925: 3923: 3920: 3918: 3915: 3913: 3910: 3908: 3905: 3903: 3900: 3898: 3895: 3894: 3892: 3890: 3886: 3883: 3881: 3877: 3873: 3866: 3861: 3859: 3854: 3852: 3847: 3846: 3843: 3835:on 2007-11-28 3831: 3824: 3823: 3818: 3816: 3812: 3808: 3804: 3803: 3799: 3796: 3793: 3782:on 2007-11-28 3778: 3771: 3770: 3765: 3764: 3763: 3762: 3753: 3752: 3747: 3746: 3745: 3744: 3735: 3734:The Economist 3731: 3727: 3726: 3725: 3724: 3712: 3708: 3704: 3703: 3698: 3690: 3689: 3683: 3682: 3662: 3658: 3654: 3648: 3633: 3629: 3623: 3609:on 2007-01-06 3608: 3604: 3598: 3591: 3586: 3573: 3558: 3554: 3548: 3542: 3533: 3528: 3527: 3525:SBL rationale 3523: 3521: 3507: 3503: 3497: 3482: 3478: 3471: 3463: 3456: 3449: 3441: 3437: 3433: 3426: 3412:on 2007-01-04 3411: 3407: 3403: 3396: 3382:on 2021-10-22 3381: 3377: 3371: 3363: 3357: 3342: 3338: 3334: 3328: 3313: 3307: 3292: 3286: 3271: 3265: 3250: 3244: 3229: 3223: 3208: 3202: 3187: 3181: 3166: 3160: 3145: 3139: 3132: 3128: 3124: 3121: 3116: 3101: 3094: 3079: 3075: 3069: 3054: 3050: 3043: 3036: 3024: 3020: 3013: 2998: 2994: 2990: 2983: 2965: 2958: 2952: 2937: 2933: 2927: 2919: 2906: 2892:on 2006-09-24 2888: 2881: 2875: 2867: 2854: 2836: 2829: 2823: 2815: 2802: 2788:on 2008-07-24 2784: 2777: 2771: 2756: 2752: 2748: 2741: 2726: 2722: 2721: 2716: 2709: 2694: 2690: 2686: 2680: 2665: 2661: 2655: 2640: 2636: 2629: 2611: 2605: 2603: 2587: 2581: 2565: 2561: 2555: 2549: 2543: 2536:on 2010-09-03 2535: 2531: 2530: 2523: 2509: 2505: 2504: 2496: 2485: 2478: 2477: 2470: 2456: 2452: 2451: 2444: 2428: 2424: 2418: 2404:on 2007-04-06 2403: 2399: 2395: 2388: 2371: 2364: 2363: 2355: 2348: 2341: 2340: 2332: 2325: 2321: 2318: 2312: 2297: 2293: 2287: 2273: 2269: 2268: 2261: 2253: 2252: 2245: 2231: 2227: 2226: 2219: 2213: 2208: 2193: 2192: 2187: 2181: 2166: 2162: 2156: 2140: 2136: 2132: 2126: 2120: 2114: 2100: 2096: 2095: 2088: 2074: 2070: 2069: 2062: 2056: 2052: 2046: 2032:on 2012-11-20 2031: 2027: 2023: 2017: 2001: 1997: 1993: 1987: 1972: 1968: 1961: 1952: 1948: 1944: 1940: 1936: 1932: 1924: 1908: 1904: 1900: 1896: 1888: 1873: 1869: 1862: 1847: 1841: 1839: 1820: 1813: 1807: 1791: 1787: 1783: 1776: 1760: 1756: 1752: 1745: 1729: 1725: 1721: 1714: 1707: 1702: 1684: 1677: 1670: 1662: 1657: 1654:(3): 87–110, 1653: 1649: 1642: 1628:on 2007-08-07 1627: 1623: 1616: 1601: 1597: 1593: 1589: 1585: 1581: 1577: 1573: 1566: 1552: 1548: 1547: 1540: 1532: 1528: 1522: 1518: 1507: 1504: 1502: 1499: 1497: 1494: 1492: 1489: 1487: 1484: 1482: 1479: 1477: 1474: 1472: 1469: 1467: 1466: 1462: 1460: 1459:Shotgun email 1457: 1455: 1452: 1450: 1447: 1445: 1444:Nigerian spam 1442: 1439: 1436: 1434: 1431: 1428: 1425: 1423: 1420: 1418: 1415: 1413: 1410: 1408: 1405: 1403: 1400: 1398: 1395: 1393: 1390: 1388: 1385: 1383: 1380: 1378: 1375: 1373: 1370: 1368: 1365: 1363: 1360: 1358: 1355: 1354: 1346: 1333: 1329: 1326: 1322: 1319: 1316: 1313: 1312:Spamvertising 1310: 1308:Spamvertising 1307: 1304: 1303:pink contract 1300: 1298:Pink contract 1297: 1294: 1293:chain letters 1290: 1287: 1284: 1281: 1280: 1274: 1272: 1267: 1265: 1260: 1256: 1251: 1249: 1248: 1242: 1240: 1239:pink contract 1236: 1232: 1231:bulk-friendly 1227: 1225: 1221: 1211: 1209: 1204: 1194: 1190: 1168: 1164: 1154: 1151: 1147: 1141: 1125: 1122: 1114: 1111:November 2011 1104: 1100: 1096: 1090: 1089: 1085: 1080:This section 1078: 1074: 1069: 1068: 1057: 1054: 1051: 1048: 1047: 1046: 1038: 1036: 1032: 1030: 1026: 1024: 1020: 1016: 1012: 1008: 1004: 1000: 995: 993: 984: 979: 969: 967: 963: 959: 955: 951: 949: 945: 938: 935: 932: 929: 928: 927: 921: 918: 915: 912: 909: 908: 907: 905: 902:According to 901: 897: 895: 891: 890:North America 874: 870: 860: 856: 846: 842: 832: 828: 818: 814: 804: 800: 790: 786: 776: 772: 762: 758: 748: 744: 734: 730: 720: 716: 706: 702: 694: 683: 674: 672: 671:Jef Poskanzer 667: 665: 661: 660:Steve Ballmer 658:According to 651: 648: 645: 640: 635: 626: 623: 611: 608: 600: 590: 586: 582: 576: 575: 570:This article 568: 559: 558: 550: 546: 542: 540: 536: 532: 528: 524: 519: 517: 513: 512:proxy servers 509: 499: 495: 492: 487: 485: 481: 477: 473: 467: 465: 460: 450: 446: 442: 440: 433:United States 430: 428: 427:penalty units 424: 423:Spam Act 2003 414: 412: 402: 393: 390: 386: 383: 373: 370: 368: 364: 360: 355: 353: 349: 343: 333: 331: 327: 323: 317: 315: 311: 307: 303: 297: 283: 280: 279:software bugs 276: 273: 269: 265: 261: 260: 259: 256: 247: 245: 241: 237: 232: 228: 226: 225:pump and dump 222: 218: 214: 209: 199: 194: 179: 177: 173: 172: 167: 163: 159: 153: 148: 145: 135: 133: 128: 126: 122: 118: 114: 104: 100: 98: 94: 90: 87:that lead to 86: 82: 77: 74: 72: 68: 63: 61: 57: 53: 49: 45: 41: 37: 33: 26: 21: 4186:Lottery scam 4143:Scraper site 4113:Doorway page 3983:Mobile phone 3963:Cold calling 3888: 3830:the original 3821: 3815:David Harris 3807:Pegasus Mail 3801: 3784:, retrieved 3777:the original 3768: 3760: 3759: 3750: 3743:Spam reports 3742: 3741: 3733: 3722: 3721: 3701: 3687: 3665:. Retrieved 3656: 3653:"Richi'Blog" 3647: 3636:. Retrieved 3622: 3611:. Retrieved 3607:the original 3597: 3589: 3572:cite journal 3561:. Retrieved 3547: 3536:, retrieved 3529: 3526: 3517: 3510:. Retrieved 3496: 3485:. Retrieved 3470: 3461: 3448: 3439: 3435: 3425: 3414:. Retrieved 3410:the original 3405: 3395: 3384:. Retrieved 3380:the original 3370: 3345:. Retrieved 3336: 3327: 3316:. Retrieved 3306: 3295:. Retrieved 3285: 3274:. Retrieved 3264: 3253:. Retrieved 3243: 3232:. Retrieved 3222: 3211:. Retrieved 3201: 3190:. Retrieved 3180: 3169:. Retrieved 3159: 3148:. Retrieved 3138: 3115: 3104:. Retrieved 3093: 3082:. Retrieved 3068: 3057:. Retrieved 3042: 3034: 3027:. Retrieved 3012: 3001:. Retrieved 2992: 2982: 2971:. Retrieved 2951: 2940:. Retrieved 2926: 2905:cite journal 2894:. Retrieved 2887:the original 2874: 2853:cite journal 2842:. Retrieved 2835:the original 2822: 2801:cite journal 2790:. Retrieved 2783:the original 2770: 2759:. Retrieved 2750: 2740: 2729:. Retrieved 2718: 2708: 2697:. Retrieved 2679: 2668:. Retrieved 2654: 2643:. Retrieved 2628: 2617:. Retrieved 2590:. Retrieved 2580: 2568:. Retrieved 2554: 2542: 2534:the original 2528: 2522: 2512:, retrieved 2502: 2495: 2484:the original 2475: 2469: 2459:, retrieved 2453:, PC World, 2449: 2443: 2431:. Retrieved 2417: 2406:. Retrieved 2402:the original 2397: 2387: 2377:, retrieved 2361: 2354: 2346: 2338: 2331: 2311: 2300:. Retrieved 2286: 2276:, retrieved 2266: 2260: 2250: 2244: 2234:, retrieved 2224: 2218: 2207: 2196:. Retrieved 2194:. 2008-07-22 2189: 2180: 2169:. Retrieved 2155: 2143:. Retrieved 2134: 2125: 2113: 2103:, retrieved 2093: 2087: 2077:, retrieved 2067: 2061: 2045: 2034:. Retrieved 2030:the original 2016: 2004:. Retrieved 1995: 1986: 1975:. Retrieved 1960: 1934: 1930: 1923: 1911:. Retrieved 1902: 1898: 1887: 1876:. Retrieved 1872:the original 1861: 1850:. Retrieved 1826:. Retrieved 1819:the original 1806: 1794:. Retrieved 1785: 1775: 1763:. Retrieved 1754: 1744: 1732:. Retrieved 1723: 1713: 1701: 1690:. Retrieved 1669: 1651: 1647: 1641: 1630:. Retrieved 1626:the original 1615: 1604:. Retrieved 1579: 1575: 1565: 1555:, retrieved 1545: 1539: 1530: 1521: 1471:Spamusement! 1463: 1269:A number of 1268: 1255:millions CDs 1254: 1252: 1245: 1243: 1234: 1230: 1228: 1219: 1217: 1200: 1191: 1160: 1149: 1145: 1143: 1117: 1108: 1093:Please help 1081: 1044: 1033: 1027: 1023:micropayment 996: 989: 966:Airtel India 953: 952: 943: 942: 925: 899: 898: 886: 746:South Korea 680: 677:Cost of spam 668: 657: 649: 636: 632: 618: 603: 597:October 2015 594: 571: 553:Side effects 547: 543: 537:, short for 534: 520: 505: 496: 488: 468: 456: 447: 443: 436: 420: 408: 399: 379: 371: 356: 348:legal remedy 345: 318: 299: 266:, a form of 257: 253: 233: 229: 211: 196: 175: 169: 155: 141: 131: 129: 110: 101: 78: 75: 64: 43: 42:, or simply 39: 35: 31: 30: 4231:Advertising 4148:Social spam 4060:Greylisting 4030:Client-side 3958:Auto dialer 3657:richi.co.uk 2225:Enforcement 1501:Spider trap 1387:Chain email 1007:greylisting 718:EU (Top 5) 699:Percentage 464:credit card 97:attachments 67:postage due 4220:Categories 4153:Spam blogs 4118:Forum spam 4095:Spamdexing 3968:Flyposting 3927:Image spam 3889:Email spam 3667:2008-03-17 3638:2012-12-10 3613:2007-01-06 3563:2007-01-06 3538:2004-10-12 3512:2007-01-06 3487:2007-01-06 3416:2007-01-06 3386:2021-12-13 3347:2007-01-06 3318:2009-01-22 3297:2008-11-02 3276:2008-06-07 3255:2008-02-12 3234:2007-11-09 3213:2007-07-24 3192:2007-06-15 3171:2007-01-06 3150:2007-01-06 3106:2020-04-13 3084:2008-01-18 3059:2010-09-23 3029:2010-09-23 3003:2010-09-23 2973:2012-12-10 2942:2018-10-21 2896:2007-01-06 2844:2007-01-06 2792:2008-05-08 2761:2012-12-10 2731:2011-01-11 2699:2007-01-21 2670:2012-12-10 2645:2012-12-10 2619:2010-09-23 2592:2007-01-05 2514:2017-06-14 2461:2008-03-21 2408:2007-03-09 2379:2019-02-11 2302:2010-09-23 2278:2011-03-14 2236:2014-01-16 2198:2010-10-24 2171:2009-06-23 2145:11 January 2105:2008-01-18 2079:2010-12-03 2036:2012-12-10 2022:"Symantec" 2006:August 17, 1977:2007-01-06 1913:2013-03-19 1878:2010-09-23 1852:2008-10-12 1828:2015-11-01 1692:2018-10-15 1632:2010-09-23 1606:2022-10-30 1557:2010-12-17 1513:References 1433:Netiquette 1253:So-called 664:Bill Gates 581:improve it 340:See also: 250:Blank spam 227:" stocks. 213:Image spam 208:Image spam 202:Image spam 158:fraudsters 132:Mainsleaze 36:junk email 32:Email spam 4133:Link farm 4103:Blog spam 4022:Anti-spam 3988:Newsgroup 3978:Messaging 3880:Protocols 3723:Spam info 2570:9 January 2433:7 January 1596:1084-8045 1582:: 56–65. 1440:newsgroup 1167:leetspeak 1082:does not 1011:spamtraps 682:in 2005. 644:Microsoft 585:verifying 510:and open 484:SMTP-AUTH 417:Australia 409:The 2010 187:Appending 40:spam mail 25:email box 4226:Spamming 4198:Phishing 4108:Cloaking 4085:Spamhaus 3993:Robocall 3973:Junk fax 3661:Archived 3632:Archived 3557:Archived 3532:archived 3506:Archived 3481:Archived 3356:cite web 3341:Archived 3123:Archived 3098:Sophos. 3078:Archived 3053:Archived 3023:Archived 2997:Archived 2993:BBC News 2964:Archived 2936:Archived 2755:Archived 2751:BBC News 2725:Archived 2693:Archived 2664:Archived 2639:Archived 2564:Archived 2508:archived 2455:archived 2427:Archived 2370:archived 2320:Archived 2296:Archived 2272:archived 2254:, CA: GC 2230:archived 2191:PC World 2165:Archived 2139:Archived 2099:archived 2073:archived 2026:Symantec 2000:Archived 1971:Archived 1907:Archived 1796:April 1, 1790:Archived 1765:April 1, 1759:Archived 1734:April 1, 1728:Archived 1683:Archived 1600:Archived 1551:archived 1496:Spamware 1491:Spamtrap 1486:Spamhaus 1417:Junk fax 1350:See also 1247:spamware 958:ChinaNet 774:Germany 696:Country 472:spoofing 367:phishing 171:phishing 152:Phishing 144:Cyberoam 107:Overview 89:phishing 52:spamming 4080:SpamCop 3998:Spambot 3942:Spambot 3932:Joe job 3436:Heliyon 2345:, FTC, 2228:, ICO, 1939:Bibcode 1681:. MIT. 1481:SpamCop 1476:Spambot 1412:Happy99 1339:History 1259:CD-ROMs 1187:\/iagra 1179:Vi@graa 1175:Via'gra 1103:removed 1088:sources 830:Turkey 816:Russia 802:France 788:Brazil 760:Poland 639:ARPANET 579:Please 531:botnets 523:zombies 363:botnets 312:to the 302:viruses 246:tools. 240:CAPTCHA 113:ARPANET 93:malware 3786:13 Oct 3709:  2660:"Spam" 1594:  1367:Botnet 1332:ironic 1183:vi*gra 1171:V1agra 1163:Viagra 964:, and 962:Amazon 904:Sophos 894:Europe 872:India 858:Italy 527:Zombie 405:Canada 322:DNSBLs 304:, and 285:files. 271:goals. 166:PayPal 4241:Email 4203:Voice 4158:Sping 4075:SORBS 3951:Other 3917:DNSWL 3912:DNSBL 3833:(PDF) 3826:(PDF) 3780:(PDF) 3773:(PDF) 3692:(PDF) 3458:(PDF) 3131:ROKSO 2967:(PDF) 2960:(PDF) 2890:(PDF) 2883:(PDF) 2838:(PDF) 2831:(PDF) 2786:(PDF) 2779:(PDF) 2613:(PDF) 2546:e.g. 2487:(PDF) 2480:(PDF) 2373:(PDF) 2366:(PDF) 2343:(PDF) 2135:Iohud 2117:e.g. 2049:e.g. 1822:(PDF) 1815:(PDF) 1686:(PDF) 1679:(PDF) 1377:CAUCE 1021:or a 1003:DNSBL 539:robot 459:fraud 306:worms 85:links 48:email 4008:VoIP 3809:and 3788:2007 3707:ISBN 3585:help 3442:(6). 3362:link 2918:help 2866:help 2814:help 2572:2019 2435:2015 2147:2019 2008:2015 1996:CNET 1798:2019 1767:2019 1736:2019 1592:ISSN 1086:any 1084:cite 1015:SMTP 946:the 892:and 724:17.9 710:19.6 480:SMTP 421:The 221:JPEG 162:scam 44:spam 1947:doi 1656:doi 1584:doi 1330:An 1233:or 1224:DNS 1201:As 1097:by 1005:), 878:2.5 864:2.8 850:2.8 836:2.9 822:3.1 808:3.3 794:4.1 780:4.2 766:4.8 752:6.5 738:8.4 583:by 535:bot 236:GIF 219:or 217:GIF 160:to 23:An 4222:: 3813:– 3732:, 3659:. 3655:. 3576:: 3574:}} 3570:{{ 3530:, 3460:. 3438:. 3434:. 3404:. 3358:}} 3354:{{ 3335:. 3133:). 3076:. 2995:. 2991:. 2962:. 2934:. 2909:: 2907:}} 2903:{{ 2857:: 2855:}} 2851:{{ 2805:: 2803:}} 2799:{{ 2753:. 2749:. 2723:. 2717:. 2601:^ 2396:. 2188:. 2133:. 2053:, 2024:. 1994:. 1945:. 1935:32 1933:. 1901:. 1897:. 1837:^ 1788:. 1784:. 1757:. 1753:. 1726:. 1722:. 1652:26 1650:, 1598:. 1590:. 1580:43 1578:. 1574:. 1529:. 1301:A 1185:, 1181:, 1177:, 1173:, 1009:, 968:. 960:, 389:EU 332:. 328:' 178:. 99:. 73:. 38:, 3864:e 3857:t 3850:v 3837:. 3791:. 3756:. 3738:. 3713:. 3696:. 3670:. 3641:. 3616:. 3592:. 3587:) 3583:( 3566:. 3515:. 3490:. 3440:5 3419:. 3389:. 3364:) 3350:. 3321:. 3300:. 3279:. 3258:. 3237:. 3216:. 3195:. 3174:. 3153:. 3129:( 3109:. 3087:. 3062:. 3037:. 3032:. 3006:. 2976:. 2945:. 2920:) 2916:( 2899:. 2868:) 2864:( 2847:. 2816:) 2812:( 2795:. 2764:. 2734:. 2702:. 2673:. 2648:. 2622:. 2595:. 2574:. 2437:. 2411:. 2305:. 2201:. 2174:. 2149:. 2039:. 2010:. 1980:. 1953:. 1949:: 1941:: 1916:. 1903:7 1881:. 1855:. 1831:. 1800:. 1769:. 1738:. 1708:. 1695:. 1658:: 1635:. 1609:. 1586:: 1533:. 1124:) 1118:( 1113:) 1109:( 1105:. 1091:. 610:) 604:( 599:) 595:( 577:. 123:/ 50:(

Index


email box
email
spamming
Monty Python sketch
canned pork product Spam
postage due
negative externality
attention theft
links
phishing
malware
attachments
ARPANET
sent the first email spam message
Terms of Service
Acceptable Use Policy
Cyberoam
Phishing
fraudsters
scam
PayPal
phishing
Email appending
Image spam
Image spam
GIF
JPEG
pump and dump
GIF

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.

↑