Knowledge

Spamming

Source 📝

982:
over just eight percent or fewer of the total available hosting registrars and autonomous systems, with 80 percent of spam programs overall being distributed over just 20 percent of all registrars and autonomous systems; 2) of the 76 purchases for which the researchers received transaction information, there were only 13 distinct banks acting as credit card acquirers and only three banks provided the payment servicing for 95 percent of the spam-advertised goods in the study; and, 3) a "financial blacklist" of banking entities that do business with spammers would dramatically reduce monetization of unwanted e-mails. Moreover, this blacklist could be updated far more rapidly than spammers could acquire new banking resources, an asymmetry favoring anti-spam efforts.
148: 838:'s Internal Market Commission estimated in 2001 that "junk email" cost Internet users €10 billion per year worldwide. The California legislature found that spam cost United States organizations alone more than $ 13 billion in 2007, including lost productivity and the additional equipment, software, and manpower needed to combat the problem. Spam's direct effects include the consumption of computer and network resources, and the cost in human time and attention of dismissing unwanted messages. Large companies who are frequent spam targets utilize numerous techniques to detect and prevent spam. 1271: 623:. This is nearly identical to telemarketing calls over traditional phone lines. When the user chooses to receive the spam call, a pre-recorded spam message or advertisement is usually played back. This is generally easier for the spammer as VoIP services are cheap and easy to anonymize over the Internet, and there are many options for sending mass number of calls from a single location. Accounts or IP addresses being used for VoIP spam can usually be identified by a large number of outgoing calls, low call completion and short call length. 203:, who would repeat "Spam" a huge number of times to scroll other users' text off the screen. In early chat-room services like PeopleLink and the early days of Online America (later known as America Online or AOL), they actually flooded the screen with quotes from the Monty Python sketch. This was used as a tactic by insiders of a group that wanted to drive newcomers out of the room so the usual conversation could continue. It was also used to prevent members of rival groups from chatting—for instance, 858:
a sufficient conversion rate to keep the spamming alive. Furthermore, even though spam appears not to be economically viable as a way for a reputable company to do business, it suffices for professional spammers to convince a tiny proportion of gullible advertisers that it is viable for those spammers to stay in business. Finally, new spammers go into business every day, and the low costs allow a single spammer to do a lot of harm before finally realizing that the business is not profitable.
541: 380:
exponentially over the following years, and by 2007 it constituted about 80% to 85% of all e-mail, by a conservative estimate. Pressure to make email spam illegal has resulted in legislation in some jurisdictions, but less so in others. The efforts taken by governing bodies, security systems and email service providers seem to be helping to reduce the volume of email spam. According to "2014 Internet Security Threat Report, Volume 19" published by
3870: 42: 486:
that account owner follows the spammer back, it legitimizes the spammer. Twitter has studied what interest structures allow their users to receive interesting tweets and avoid spam, despite the site using the broadcast model, in which all tweets from a user are broadcast to all followers of the user. Spammers, out of malicious intent, post either unwanted (or irrelevant) information or spread misinformation on social media platforms.
574:, offensive, or simply on-screen text of a link to the site being promoted. In some cases, the link in question may lead to an online survey site, a password-protected archive file with instructions leading to the aforementioned survey (though the survey, and the archive file itself, is worthless and does not contain the file in question at all), or in extreme cases, 467:. This can be especially irritating to customers not only for the inconvenience, but also because of the fee they may be charged per text message received in some markets. To comply with CAN-SPAM regulations in the US, SMS messages now must provide options of HELP and STOP, the latter to end communication with the advertiser via SMS altogether. 1173:, Nigeria, the previous November. Fiedler shipped out $ 609,000 fake check and money orders when arrested and prepared to send additional $ 1.1 million counterfeit materials. Also, the U.S. Postal Service recently intercepted counterfeit checks, lottery tickets and eBay overpayment schemes with a value of $ 2.1 billion. 1220:
that it may be responsible for sending billions of illegal spam messages. The US District Court froze the defendants' assets to preserve them for consumer redress pending trial. U.S. co-defendant Jody Smith forfeited more than $ 800,000 and faces up to five years in prison for charges to which he pleaded guilty.
1042:
Earthlink won a $ 25 million judgment against one of the most notorious and active "spammers" Khan C. Smith in 2001 for his role in founding the modern spam industry which dealt billions in economic damage and established thousands of spammers into the industry. His email efforts were said to make up
857:
to the entire email system, as operated in the past. Since email is so cheap to send, a tiny number of spammers can saturate the Internet with junk mail. Although only a tiny percentage of their targets are motivated to purchase their products (or fall victim to their scams), the low cost may provide
1201:
In January 2007, a Sheriff Court in Scotland awarded Mr. Gordon Dick £750 (the then maximum sum that could be awarded in a Small Claim action) plus expenses of £618.66, a total of £1368.66 against Transcom Internet Services Ltd. for breaching anti-spam laws. Transcom had been legally represented at
981:
In an attempt to assess potential legal and technical strategies for stopping illegal spam, a study cataloged three months of online spam data and researched website naming and hosting infrastructures. The study concluded that: 1) half of all spam programs have their domains and servers distributed
470:
Despite the high number of phone users, there has not been so much phone spam, because there is a charge for sending SMS. Recently, there are also observations of mobile phone spam delivered via browser push notifications. These can be a result of allowing websites which are malicious or delivering
436:
Newsgroup spam is a type of spam where the targets are Usenet newsgroups. Spamming of Usenet newsgroups actually pre-dates e-mail spam. Usenet convention defines spamming as excessive multiple posting, that is, the repeated posting of a message (or substantially similar messages). The prevalence of
1219:
and courier Roland Smits, after raids in Christchurch. This marked the first prosecution since the Unsolicited Electronic Messages Act (UEMA) was passed in September 2007. The FTC said it had received more than three million complaints about spam messages connected to this operation, and estimated
352:
Within a few years, the focus of spamming (and anti-spam efforts) moved chiefly to email, where it remains today. By 1999, Khan C. Smith, a well known hacker at the time, had begun to commercialize the bulk email industry and rallied thousands into the business by building more friendly bulk email
485:
Facebook and Twitter are not immune to messages containing spam links. Spammers hack into accounts and send false links under the guise of a user's trusted contacts such as friends and family. As for Twitter, spammers gain credibility by following verified accounts such as that of Lady Gaga; when
1232:
is the first and only country to legalize it. According to the Bulgarian E-Commerce act (Чл.5,6) anyone can send spam to mailboxes published as owned by a company or organization as long as there is a "clear and straight indication that the message is unsolicited commercial e-mail" ("да осигури
845:
is significant: "The secondary consequence of spamming is that search engine indexes are inundated with useless pages, increasing the cost of each processed query". The costs of spam also include the collateral costs of the struggle between spammers and the administrators and users of the media
662:
Spamming in mobile app stores include (i) apps that were automatically generated and as a result do not have any specific functionality or a meaningful description; (ii) multiple instances of the same app being published to obtain increased visibility in the app market; and (iii) apps that make
127:
Spamming remains economically viable because advertisers have no operating costs beyond the management of their mailing lists, servers, infrastructures, IP ranges, and domain names, and it is difficult to hold senders accountable for their mass mailings. The costs, such as lost productivity and
379:
Email spam, also known as unsolicited bulk email (UBE), or junk mail, is the practice of sending unwanted email messages, frequently with commercial content, in large quantities. Spam in email started to become a problem when the Internet was opened for commercial use in the mid-1990s. It grew
1236:
This made lawsuits against Bulgarian ISP's and public e-mail providers with antispam policy possible, as they are obstructing legal commerce activity and thus violate Bulgarian antitrust acts. While there are no such lawsuits until now, several cases of spam obstruction are currently awaiting
1214:
In October 2008, an international internet spam operation run from New Zealand was cited by American authorities as one of the world's largest, and for a time responsible for up to a third of all unwanted e-mails. In a statement the US Federal Trade Commission (FTC) named Christchurch's Lance
1022:
to successfully sue Eric Head who settled the lawsuit for several thousand U.S. dollars in June 2004. But the law is criticized by many for not being effective enough. Indeed, the law was supported by some spammers and organizations that support spamming, and opposed by many in the anti-spam
444:
Forum spam is the creation of advertising messages on Internet forums. It is generally done by automated spambots. Most forum spam consists of links to external sites, with the dual goals of increasing search engine visibility in highly competitive areas such as weight loss, pharmaceuticals,
1205:
Despite the statutory tort that is created by the Regulations implementing the EC Directive, few other people have followed their example. As the Courts engage in active case management, such cases would probably now be expected to be settled by mediation and payment of nominal damages.
391:
is dedicated to collecting email addresses and selling compiled databases. Some of these address-harvesting approaches rely on users not reading the fine print of agreements, resulting in their agreeing to send messages indiscriminately to their contacts. This is a common approach in
494:
Spreading beyond the centrally managed social networking platforms, user-generated content increasingly appears on business, government, and nonprofit websites worldwide. Fake accounts and comments planted by computers programmed to issue social spam can infiltrate these websites.
548:
claiming that the film in question has been deleted from the site, and can only be accessed on the link posted by the spambot in the video description. If the video were actually removed by YouTube, the description would be inaccessible and the deletion notification would look
998:
has to do with so-called "stealth blocking", a term for ISPs employing aggressive spam blocking without their users' knowledge. These groups' concern is that ISPs or technicians seeking to reduce spam-related costs may select tools that (either through error or design) also
226:
to mean excessive multiple posting—the repeated posting of the same message. The unwanted message would appear in many, if not all newsgroups, just as Spam appeared in all the menu items in the Monty Python sketch. One of the earliest people to use "spam" in this sense was
284:
on May 3, 1978. Rather than send a separate message to each person, which was the standard practice at the time, he had an assistant, Carl Gartley, write a single mass email. Reaction from the net community was fiercely negative, but the spam did generate some sales.
1182:, 575 F.3d 1040, the Ninth Circuit assessed the standing requirements necessary for a private plaintiff to bring a civil cause of action against spam senders under the CAN-SPAM Act of 2003, as well as the scope of the CAN-SPAM Act's federal preemption clause. 1615:
Proceedings of the First International Workshop on Adversarial Information Retrieval on the Web (AIRWeb), 2005 in The 14th International World Wide Web Conference (WWW 2005) May 10, (Tue) – 14 (Sat), 2005, Nippon Convention Center (Makuhari Messe), Chiba,
267:
allowed telegraphic messages on its network to be sent to multiple destinations. The first recorded instance of a mass unsolicited commercial telegram is from May 1864, when some British politicians received an unsolicited telegram advertising a dentist.
922:
is the total expected profit from spam, which may include any combination of the commercial and non-commercial reasons listed above. It is normally linear, based on the incremental benefit of reaching each additional spam recipient, combined with the
445:
gambling, pornography, real estate or loans, and generating more traffic for these commercial websites. Some of these links contain code to track the spambot's identity; if a sale goes through, the spammer behind the spambot earns a commission.
239:, which had previously only defined "spam" in relation to the trademarked food product, added a second definition to its entry for "spam": "Irrelevant or inappropriate messages sent on the Internet to a large number of newsgroups or users." 853:: spammers use resources (both physical and human), without bearing the entire cost of those resources. In fact, spammers commonly do not bear the cost at all. This raises the costs for everyone. In some ways spam is even a potential 1240:
The law contains other dubious provisions — for example, the creation of a nationwide public electronic register of e-mail addresses that do not want to receive spam. It is usually abused as the perfect source for
1202:
earlier hearings, but were not represented at the proof, so Gordon Dick got his decree by default. It is the largest amount awarded in compensation in the United Kingdom since Roberts v Media Logistics case in 2005.
1080:
lost a case in a federal court against the operator of a small Oklahoma-based Internet service provider who accused him of spamming. U.S. Judge Ralph G. Thompson granted a motion by plaintiff Robert Braver for a
553:
In actual video spam, the uploaded video is given a name and description with a popular figure or event that is likely to draw attention, or within the video a certain image is timed to come up as the video's
2677: 2535: 1150:, and a $ 1.1 million penalty if spamming were to continue, the $ 50,000 was not paid, or the financial statements provided were found to be inaccurate. The spamming operation was successfully shut down. 654:
are not capable of identifying spam attacks. The researchers manipulated the citation counts of articles, and managed to make Google Scholar index complete fake articles, some containing advertising.
3113: 1049:
and Cyber Promotions were the target of a string of lawsuits, many of which were settled out of court, up through a 1998 Earthlink settlement that put Cyber Promotions out of business. Attorney
1003:
non-spam e-mail from sites seen as "spam-friendly". Few object to the existence of these tools; it is their use in filtering the mail of users who are not informed of their use that draws fire.
3287: 3261: 2137: 970:, was arrested by US authorities on May 31, 2007. Described as one of the top ten spammers in the world, Soloway was charged with 35 criminal counts, including mail fraud, wire fraud, 826:
luncheon meat, does not object to the Internet use of the term "spamming". However, they did ask that the capitalized word "Spam" be reserved to refer to their product and trademark.
311:
spam", after the subject line of the postings. Defiant in the face of widespread condemnation, the attorneys claimed their detractors were hypocrites or "zealots", claimed they had a
1092:
In June 2007, two men were convicted of eight counts stemming from sending millions of e-mail spam messages that included hardcore pornographic images. Jeffrey A. Kilbride, 41, of
978:
to distribute spam during 2003. This is the first case in which US prosecutors used identity theft laws to prosecute a spammer for taking over someone else's Internet domain name.
2256: 1215:
Atkinson as one of the principals of the operation. New Zealand's Internal Affairs announced it had lodged a $ 200,000 claim in the High Court against Atkinson and his brother
2279: 3317: 2203: 1987: 1341: 418:
systems. Although less prevalent than its e-mail counterpart, according to a report from Ferris Research, 500 million spam IMs were sent in 2003, twice the level of 2002.
887:
Overhead: The costs and overhead of electronic spamming include bandwidth, developing or acquiring an email/blog spam tool, taking over or acquiring a host/zombie, etc.
2925: 1165:
in an Internet $ 1 million "Nigerian check scam." She conspired to commit bank, wire and mail fraud, against US citizens, specifically using Internet by having had an
959:). Some spam attempts to capitalize on human greed, while some attempts to take advantage of the victims' inexperience with computer technology to trick them (e.g., 2673: 2416: 2532: 2631: 188:, has a waitress reading out a menu where every item but one includes the Spam canned luncheon meat. As the waitress recites the Spam-filled menu, a chorus of 2499: 3660:
Brown, Bruce Cameron "How to stop e-mail spam, spyware, malware, computer viruses, and hackers from ruining your computer" Atlantic Publishing Group, 2011.
3444: 2954: 2066:
Ahmad, Adnan; Azhar, Anique; Naqvi, Sajid; Nawaz, Asif; Arshad, Samia; Zeshan, Furkh; Yousif, Mohammed; Salih, Ali O. M. (2020-03-04). Farouk, Ahmed (ed.).
2531:
Joeran Beel and Bela Gipp. Academic search engine spam and google scholar's resilience against it. Journal of Electronic Publishing, 13(3), December 2010.
2760: 2230: 3133:
U.S. v Jason Smathers and Sean Dunaway, amended complaint, US District Court for the Southern District of New York (2003). Retrieved 7 March 2007, from
1599: 931:-generated spam has recently been measured to be around one in 12,000,000 for pharmaceutical spam and one in 200,000 for infection sites as used by the 3670:
Dunne, Robert "Computers and the law: an introduction to basic legal principles and their application in cyberspace" Cambridge University Press, 2009.
3105: 2652: 935:. The authors of the study calculating those conversion rates noted, "After 26 days, and almost 350 million e-mail messages, only 28 sales resulted." 893:: The incremental cost of contacting each additional recipient once a method of spamming is constructed, multiplied by the number of recipients (see 1896: 2485: 1722: 231:. This use had also become established—to "spam" Usenet was to flood newsgroups with junk messages. The word was also attributed to the flood of " 3617: 3244: 315:
right to send unwanted commercial messages, and labeled their opponents "anti-commerce radicals". The couple wrote a controversial book entitled
3291: 3265: 3764: 3083: 683:
E-mail and other forms of spamming have been used for purposes other than advertisements. Many early Usenet spams were religious or political.
532:, both of which accept user contributions. Another possible form of spam in blogs is the spamming of a certain tag on websites such as Tumblr. 2144: 1237:
decision in the Bulgarian Antitrust Commission (Комисия за защита на конкуренцията) and can end with serious fines for the ISPs in question.
631: 558:
image to mislead the viewer, such as a still image from a feature film, purporting to be a part-by-part piece of a movie being pirated, e.g.
3714: 1809: 2298: 520:
by repeatedly placing comments to various blog posts that provided nothing more than a link to the spammer's commercial web site. Similar
3165: 2018: 1926: 2440: 2252: 2113: 1128:. The specific law that prosecutors used under the CAN-Spam Act was designed to crack down on the transmission of pornography in spam. 3218: 276:
The earliest documented spam (although the term had not yet been coined) was a message advertising the availability of a new model of
4308: 1104:, and ordered to forfeit more than $ 1.1 million, the amount of illegal proceeds from their spamming operation. The charges included 1073:. In 2003, he sold a list of approximately 93 million AOL subscriber e-mail addresses to Sean Dunaway who sold the list to spammers. 3737: 3139: 2276: 3393: 2195: 2043: 1979: 1867: 695:
and e-mail media with preaching messages. A growing number of criminals are also using spam to perpetrate various sorts of fraud.
3313: 3024: 2849: 2829: 1835: 647: 132:, which have added extra capacity to cope with the volume. Spamming has been the subject of legislation in many jurisdictions. 2781: 4526: 4285: 3675: 3665: 3655: 3010: 2935: 2363: 2322: 1776: 1623: 1546: 308: 2727: 2460: 3699: 1952: 1629: 1750: 159:" sketch, from where the term is derived. Spam is included in almost every dish to the annoyance and dismay of a customer. 4752: 4566: 4316: 3501: 3214: 2067: 1517: 1358: 1125: 1006:
Even though it is possible in some jurisdictions to treat some spam as unlawful merely by applying existing laws against
2552: 1654: 4541: 4354: 3757: 2408: 1032: 643: 3475: 3056: 4248: 2628: 1575: 296: 17: 2702: 68:), or simply repeatedly sending the same message to the same user. While the most widely recognized form of spam is 4044: 3555: 3530: 3419: 1100:, was sentenced to 63 months. In addition, the two were fined $ 100,000, ordered to pay $ 77,500 in restitution to 861:
Some companies and groups "rank" spammers; spammers who make the news are sometimes referred to by these rankings.
246:
to too many newsgroups at once, as opposed to those that were posted too frequently, were called "velveeta" (after
236: 192:
patrons drown out all conversations with a song, repeating "Spam, Spam, Spam, Spam… Lovely Spam! Wonderful Spam!".
2507: 4298: 3440: 3189: 2950: 180: 2903: 2752: 1697: 2226: 995: 991: 2465:
and Marcos Gonçalves (July 2009). "Detecting Spammers and Content Promoters in Online Video Social Networks".
869:
In all cases listed above, including both commercial and non-commercial, "spam happens" because of a positive
4742: 4732: 4111: 3750: 1142:
for violating the Florida Electronic Mail Communications Act. The two spammers were required to pay $ 50,000
277: 30:
This article is about unsolicited or undesirable electronic messages. For information specific to email, see
3239: 2648: 1245:, because publishing invalid or incorrect information in such a register is a criminal offense in Bulgaria. 295:
The first major commercial spam incident started on March 5, 1994, when a husband and wife team of lawyers,
4521: 4403: 586:, though the promoted product or service is of dubious quality and would likely not pass the scrutiny of a 124:
about a restaurant that has Spam in almost every dish in which Vikings annoyingly sing "Spam" repeatedly.
4303: 4224: 4024: 3576: 3370: 1888: 620: 2871: 346: 4561: 4280: 4238: 3894: 3607: 3364: 1718: 1454: 1255: 1178: 1089:
against him. The judgment includes a statutory damages award of about $ 10 million under Oklahoma law.
353:
software and providing internet access illegally hacked from major ISPs such as Earthlink and Botnets.
121: 2466: 4747: 4141: 3859: 2173: 1603: 1242: 870: 129: 3079: 2993: 2393: 1233:ясното и недвусмислено разпознаване на търговското съобщение като непоискано") in the message body. 974:, aggravated identity theft, and money laundering. Prosecutors allege that Soloway used millions of 516:. In 2003, this type of spam took advantage of the open nature of comments in the blogging software 147: 4737: 4536: 4433: 4398: 4126: 4004: 3899: 2674:"Data protection: "Junk" email costs internet users 10 billion a year worldwide – Commission study" 2479: 1136: 1097: 948: 819: 388: 3159:
Ex-AOL employee pleads guilty in spam case. (2005, February 4). CNN. Retrieved 7 March 2007, from
2870:
Kanich, C.; C. Kreibich; K. Levchenko; B. Enright; G. Voelker; V. Paxson; S. Savage (2008-10-28).
4214: 4166: 3829: 2591: 1801: 1682:"RFC 2635 - DON\x27T SPEW A Set of Guidelines for Mass Unsolicited Mailings and Postings (spam*)" 1054: 587: 2295: 4371: 4347: 2988: 850: 393: 323: 93: 2346:
Gupta, Arushi; Kaushal, Rishabh (2015). "Improving spam detection in Online Social Networks".
2010: 1918: 1014:, some laws specifically targeting spam have been proposed. In 2004, United States passed the 242:
There was also an effort to differentiate between types of newsgroup spam. Messages that were
4255: 3989: 3161: 2437: 2040: 196: 35: 3577:"Регистър на юридическите лица, които не желаят да получават непоискани търговски съобщения" 3210: 2170:"FileOn List Builder-Extract URL, MetaTags, Email, Phone, Fax from www-Optimized Webcrawler" 2120: 4576: 4546: 4513: 4275: 4187: 4136: 4081: 3949: 3922: 3904: 3802: 3773: 3726: 2748: 1459: 1374: 1297: 1121: 1070: 1015: 639: 570:, or something similar. The actual content of the video ends up being totally unrelated, a 3869: 3498:"Court Orders Australia-based Leader of International Spam Network to Pay $ 15.15 Million" 1161:
court and was sentenced to two years imprisonment and five years of supervised release or
8: 4727: 4722: 4551: 4393: 4059: 3834: 3792: 1154: 967: 635: 168: 156: 3135: 1120:
materials. The trial, which began on June 5, was the first to include charges under the
4243: 4171: 4076: 3383: 3016: 2977: 2611: 2572: 2462: 2381: 2369: 2095: 1857: 1158: 1105: 1093: 591: 521: 360:; spammers began using automatic translation services to send spam in other languages. 289: 200: 707:. They provided a report that shows spam volume originating from countries worldwide. 4717: 4531: 4474: 4340: 4291: 4049: 3984: 3934: 3881: 3839: 3787: 3671: 3661: 3651: 3338: 3006: 2359: 2348:
2015 International Conference on Cognitive Computing and Information Processing(CCIP)
2099: 2087: 1619: 1486: 956: 854: 842: 454: 415: 97: 4332: 3694: 3020: 2845: 2826: 2615: 2373: 1831: 1270: 4672: 4619: 4260: 4200: 3964: 3954: 3849: 3497: 2998: 2807: 2603: 2576: 2564: 2351: 2315: 2079: 1689: 1409: 1330: 1324: 1315: 1291: 1198:
won £270 against Media Logistics UK who sent junk e-mails to his personal account.
1113: 1082: 1011: 1000: 905: 890: 357: 195:
In the 1980s the term was adopted to describe certain abusive users who frequented
1772: 663:
excessive use of unrelated keywords to attract users through unintended searches.
4684: 4654: 4388: 4151: 4131: 4029: 3854: 3844: 3647: 3193: 2930: 2833: 2635: 2539: 2444: 2302: 2283: 1538: 1442: 1436: 1285: 1276: 1195: 1058: 1050: 1046: 975: 924: 911:
Damage: Impact on the community and/or communication channels being spammed (see
438: 232: 3720: 2723: 1948: 1607: 687:, for instance, spammed Usenet with historical revisionist screeds. A number of 4694: 4664: 4614: 4556: 4479: 4469: 4413: 4321: 4219: 4069: 4019: 3994: 3959: 3939: 3819: 3807: 3612: 1746: 1509: 1427: 1414: 1303: 1216: 1132: 1077: 1066: 1062: 952: 944: 912: 835: 651: 460: 427: 409: 381: 185: 77: 73: 2607: 2355: 1660: 675:-enabled devices, is another form of spam that has developed in recent years. 4711: 4629: 4594: 4494: 4428: 4231: 4192: 4161: 4156: 4009: 3999: 3969: 3248: 2253:"Is this website allowed to send you notifications? NO! - caution is advised" 2091: 2047: 1406: – Posting a flood of articles to a Usenet group, with falsified headers 1191: 1139: 704: 595: 504: 264: 171: 85: 61: 3415: 3211:"Two Men Sentenced for Running International Pornographic Spamming Business" 4677: 4634: 4604: 4454: 4265: 4121: 3824: 3643:(MIT Press; 2013) 304 pages; $ 27.95). A cultural and technological history 3465: 3048: 971: 932: 684: 517: 464: 243: 152: 1567: 540: 4639: 4449: 4205: 4039: 4014: 3979: 3814: 3470: 3339:"Woman Gets Two Years for Aiding Nigerian Internet Check Scam (PC World)" 2756: 2698: 1861: 1380: 1352: 1288: – Privacy technique to cloak e-mail addresses (avoidance technique) 1043:
more than a third of all Internet email being sent from 1999 until 2002.
874: 823: 583: 579: 480: 342: 338: 326: 312: 304: 117: 113: 109: 57: 3551: 3522: 2812: 2553:"Spam Mobile Apps: Characteristics, Detection, and in the Wild Analysis" 2083: 4609: 4586: 4459: 4418: 4380: 4270: 4086: 4034: 3917: 3797: 3742: 3002: 2879:
Proceedings of Conference on Computer and Communications Security (CCS)
2869: 1309: 1166: 1086: 900:
Risks: Chance and severity of legal and/or public reactions, including
688: 650:
demonstrated that most (web-based) academic search engines, especially
567: 431: 374: 235:" messages that clogged many newsgroups during the 1990s. In 1998, the 101: 81: 69: 52:
is the use of messaging systems to send multiple unsolicited messages (
31: 3186: 2296:
Understanding and Combating Link Farming in the Twitter Social Network
1510:"Developer Policy Center – Intellectual Property, Deception, and Spam" 41: 4644: 4624: 4499: 4146: 4101: 4096: 3944: 3912: 1693: 1681: 1385: 1162: 1117: 672: 612: 607: 555: 529: 509: 292:
games, to fill their rivals' accounts with unwanted electronic junk.
228: 211: 205: 89: 3710:
Federal Trade Commission page with spam reduction tips and reporting
3704: 2592:"'Spam, spam, spam, spam … Lovely spam!' Why is Bluespam different?" 2568: 1327: – Distribution of advertising by direct mail or letterbox drop 1096:
was sentenced to six years in prison, and James R. Schaffer, 41, of
341:. However, as it was a violation of their terms of service, the ISP 4689: 4599: 4484: 4464: 4064: 3927: 3388: 1403: 1346: 1229: 1007: 960: 571: 247: 105: 65: 3731: 3198:
U.S. District Court - Western District of Oklahoma (Oklahoma City)
4571: 4489: 4423: 4116: 4091: 4054: 2978:"Click Trajectories: End-to-End Analysis of the Spam Value Chain" 2872:"Spamalytics: An Empirical Analysis of Spam Marketing Conversion" 1394: 1368: 1335: 1147: 901: 894: 582:-like format selling their product which feature actors and paid 575: 545: 397: 281: 3106:"On the dark side of the planet temperatures average 110amp160K" 337:
attempting to raise funds to rescue children at risk during the
3974: 3889: 1057:
in 1997 for sending prodigious amounts of spam advertising his
1019: 1018:
that provided ISPs with tools to combat spam. This act allowed
928: 692: 563: 330: 300: 223: 189: 56:) to large numbers of recipients for the purpose of commercial 3684:, 2014-15 (including 2008–2013) over 35,000 spam emails listed 3580: 3288:"Crist: Judgment Ends Duo's Illegal Spam, Internet Operations" 2798:
Rao, Justin M.; Reiley, David H. (2012), "Economics of Spam",
356:
By 2009 the majority of spam sent around the World was in the
4649: 4408: 2052: 1170: 1109: 3709: 2277:"Marketers need to build trust as spam hits social networks" 2041:
Spammers go multilingual, use automatic translation services
1417:, also known as vishing – Phishing attack via telephony 1228:
While most countries either outlaw or at least ignore spam,
1169:
who shipped counterfeit checks and money orders to her from
215:
chat rooms, filling the space with blocks of text until the
3681: 616: 525: 513: 3723:
Overview and text of the first known internet e-mail spam.
3717:
BitDefender's weekly report on spam trends and techniques.
3648:"Inside the spam cartel: trade secrets from the dark side" 2169: 1365:) – List of e-mail servers suspected of enabling spam 288:
Spamming had been practiced as a prank by participants in
27:
Unsolicited electronic messages, especially advertisements
3734:: a peer-reviewed spam information and analysis resource. 1388: – bulk unsolicited automatic phone calls using VoIP 1143: 1101: 334: 175: 45:
An email inbox containing a large amount of spam messages
3290:. Office of the Florida Attorney General. Archived from 3264:. Office of the Florida Attorney General. Archived from 3262:"Crist Announces First Case Under Florida Anti-Spam Law" 2461:
Fabrício Benevenuto, Tiago Rodrigues, Virgílio Almeida,
345:
deleted all of the bulk posts from Usenet, only missing
72:, the term is applied to similar abuses in other media: 3187:
Braver v. Newport Internet Marketing Corporation et al.
2724:"Spam Cost Calculator: Calculate enterprise spam cost?" 2596:
International Review of Law, Computers & Technology
1399:
Pages displaying short descriptions of redirect targets
1397: – Poetic verse composed from spam e-mail contents 1320:
Pages displaying short descriptions of redirect targets
1294: – Type of confidence trick fraud (Nigerian spam) 4362: 3650:, Elsevier/Syngress; 1st edition, November 27, 2004. 2316:"On the Precision of Social and Information Networks" 1069:
employee, pleaded guilty to charges of violating the
638:
and are used to obtain citation data for calculating
535: 441:
as an objective measure of a message's "spamminess".
396:
such as that generated by the social networking site
317:
How to Make a Fortune on the Information Superhighway
2065: 1598: 1447:
Pages displaying wikidata descriptions as a fallback
1432:
Pages displaying wikidata descriptions as a fallback
1390:
Pages displaying wikidata descriptions as a fallback
1266: 1146:
to cover the costs of investigation by the state of
990:
An ongoing concern expressed by parties such as the
873:
result; if the cost to recipients is excluded as an
307:
law services. The incident was commonly termed the "
1131:In 2005, Scott J. Filary and Donald E. Townsend of 384:, spam volume dropped to 66% of all email traffic. 280:computers sent by Gary Thuerk to 393 recipients on 3682:"Spam Archive list of spam from traceable sources" 3458: 2651:. Harvard University. 73 F.3d 497 (2d Cir. 1996). 2286:, Grace Bello, Direct Marketing News, June 1, 2012 1450:Pages displaying short descriptions with no spaces 951:or other malicious software. The objective may be 2975: 2897: 2895: 2196:"Social network launches worldwide spam campaign" 2138:"2014 Internet Security Threat Report, Volume 19" 2068:"A methodology for sender-oriented anti-spamming" 1306: – Deliberate use of someone else's identity 4709: 2948: 2942: 1741: 1739: 333:also occurred in 1994 on behalf of CitiHope, an 2926:"'Spam King' Robert Alan Soloway Pleads Guilty" 560:Big Buck Bunny Full Movie Online - Part 1/10 HD 2892: 2224: 2218: 2056:. July 28, 2009. Retrieved on August 31, 2009. 1679: 1377: – Organization targetting email spammers 4348: 3758: 3416:"Gordon Dick v Transcom Internet Service Ltd" 2747: 1829: 1770: 1747:"Origin of the term "spam" to mean net abuse" 1736: 1673: 1462: – Policy of blocking and deleting posts 897:as a method of increasing transaction costs). 703:In 2011 the origins of spam were analyzed by 3700:Anti-Spam Consumer Resources and Information 3162:"Ex-AOL employee pleads guilty in spam case" 2484:: CS1 maint: multiple names: authors list ( 2345: 1881: 1652: 1318: – Attempt to defraud a person or group 498: 471:malicious ads to send a user notifications. 2985:2011 IEEE Symposium on Security and Privacy 2904:"Alleged 'Seattle Spammer' arrested - CNET" 2550: 966:One of the world's most prolific spammers, 671:Bluespam, or the action of sending spam to 578:. Others may upload videos presented in an 4355: 4341: 3765: 3751: 3705:Cybertelecom:: Federal spam law and policy 3695:1 December 2009: arrest of a major spammer 2699:"California business and professions code" 2072:Journal of Intelligent & Fuzzy Systems 1355: – Spam on social networking services 1190:In the first successful case of its kind, 437:Usenet spam led to the development of the 4309:Security information and event management 3466:"Kiwi spam network was 'World's biggest'" 3241:Two Men Convicted Of Spamming Pornography 2992: 2811: 2797: 2527: 2525: 2409:"Social spam is taking over the Internet" 2406: 1980:"A very unhappy birthday to spam, age 30" 1594: 1592: 474: 116:and file sharing spam. It is named after 3772: 2649:"Hormel Foods Corp. v. Jim Henson Prods" 2305:, Max Planck Centre for Computer Science 1157:, on June 25, 2008, pleaded guilty in a 829: 539: 146: 64:, or any prohibited purpose (especially 40: 3605: 3441:"Article 13-Unsolicited communications" 3356: 3314:"Woman gets prison for 'Nigerian' scam" 2976:Levchenko, Kirill; et al. (2011). 2492: 2193: 1764: 1656:Spam - Monty Python's The Flying Circus 758: 698: 14: 4710: 3641:Spam: A Shadow History of the Internet 2951:"Spam Kingpin Robert Soloway Arrested" 2522: 2143:. Symantec Corporation. Archived from 1973: 1971: 1969: 1916: 1799: 1795: 1793: 1589: 678: 421: 151:Menu from a 2014 stage performance of 135:A person who creates spam is called a 128:fraud, are borne by the public and by 4336: 4286:Host-based intrusion detection system 3746: 2957:from the original on 17 December 2018 2589: 2438:The (Evil) Genius of Comment Spammers 2233:from the original on 17 December 2018 2206:from the original on October 23, 2011 1977: 1545:(definition & more). 2012-08-31. 1300: – Methods to prevent email spam 459:Mobile phone spam is directed at the 363: 3396:from the original on 29 October 2011 3203: 3086:from the original on August 15, 2002 3082:. BizJournals.com. BizJournals.com. 2949:SPAMfighter News (6 November 2007). 2901: 2763:from the original on 28 January 2011 2194:Hansell, Saul (September 13, 2007), 1838:from the original on 31 January 2009 1371: – Email spam reporting service 414:Instant messaging spam makes use of 403: 4317:Runtime application self-protection 3738:Why am I getting all this spam? CDT 3646:Sjouwerman, Stu; Posluns, Jeffrey, 3384:"Businessman wins e-mail spam case" 3215:United States Department of Justice 3168:from the original on 28 August 2010 3077: 2021:from the original on April 17, 2014 1966: 1929:from the original on 11 August 2016 1790: 1359:Spam and Open Relay Blocking System 985: 814: 617:VoIP (Voice over Internet Protocol) 24: 4542:Distributed Checksum Clearinghouse 3868: 3727:Slamming Spamming Resource on Spam 3633: 3478:from the original on 10 March 2014 2753:"Using data to help prevent fraud" 2629:Cisco 2011 Annual Security Report 2008: 1949:"Reaction to the DEC Spam of 1978" 1349: – Form of social engineering 1124:, according to a release from the 1033:E-mail spam legislation by country 644:University of California, Berkeley 626: 536:Spam targeting video sharing sites 250:), but this term did not persist. 25: 4764: 4527:Challenge–response spam filtering 4364:Unsolicited digital communication 4249:Security-focused operating system 3688: 3138:. thesmokinggun.com. 2010-07-14. 3059:from the original on 22 June 2020 2551:Seneviratne, Suranga (Apr 2017). 2419:from the original on 1 March 2013 2227:"Spim, Like Spam, Is On The Rise" 1990:from the original on May 19, 2023 1832:"Spam blights e-mail 15 years on" 1680:Hambridge, S.; Lunde, A. (1999). 1646: 1185: 621:SIP (Session Initiation Protocol) 297:Laurence Canter and Martha Siegel 4045:Insecure direct object reference 3721:Reaction to the DEC Spam of 1978 3715:Malware City - The Spam Omelette 3552:"Закон За Електронната Търговия" 3136:"Pair Nabbed In AOL Spam Scheme" 2800:Journal of Economic Perspectives 2500:"Toy Story 3 movie scam warning" 2225:Thomas Claburn (30 March 2004). 1802:"At 30, Spam Going Nowhere Soon" 1269: 1037: 864: 544:Screenshot from a spam video on 237:New Oxford Dictionary of English 178:sketch comedy television series 4299:Information security management 3620:from the original on 2007-09-05 3606:Specter, Michael (2007-08-06). 3569: 3558:from the original on 2013-07-24 3544: 3533:from the original on 2021-06-18 3515: 3504:from the original on 2013-06-26 3490: 3447:from the original on 2008-06-06 3433: 3422:from the original on 2014-06-05 3408: 3376: 3331: 3320:from the original on 2017-12-26 3306: 3280: 3254: 3232: 3221:from the original on 2007-10-15 3180: 3153: 3142:from the original on 2009-12-01 3127: 3116:from the original on 2018-04-13 3098: 3071: 3041: 3030:from the original on 2016-01-20 2969: 2917: 2863: 2852:from the original on 2012-01-12 2838: 2819: 2791: 2775: 2741: 2730:from the original on 2013-07-24 2716: 2705:from the original on 2013-08-28 2691: 2680:from the original on 2009-01-15 2666: 2655:from the original on 2014-10-28 2641: 2622: 2583: 2544: 2454: 2431: 2400: 2339: 2328:from the original on 2021-03-08 2308: 2289: 2270: 2259:from the original on 2019-03-23 2245: 2187: 2176:from the original on 2013-09-27 2162: 2130: 2106: 2059: 2033: 2002: 1955:from the original on 2013-07-30 1941: 1919:"Ideas & Trends; Spamology" 1910: 1899:from the original on 2011-06-05 1870:from the original on 2014-10-17 1850: 1830:Darren Waters (31 March 2008). 1823: 1812:from the original on 2019-04-21 1779:from the original on 2014-07-19 1753:from the original on 2012-07-16 1725:from the original on 2019-12-16 1719:"The Origin of the word 'Spam'" 1700:from the original on 2010-08-01 1635:from the original on 2020-02-15 1578:from the original on 2012-02-24 1549:from the original on 2019-03-23 1520:from the original on 2016-05-14 1479: 1439: – Electronic chain letter 448: 258: 120:, a luncheon meat, by way of a 112:, spam mobile apps, television 3251:InformationWeek, June 26, 2007 2934:. Mar 17, 2008. Archived from 1889:"Getting the message, at last" 1711: 1560: 1531: 1502: 1430: – American email spammer 1209: 1026: 996:American Civil Liberties Union 992:Electronic Frontier Foundation 877:the spammer can avoid paying. 657: 489: 13: 1: 3164:. CNN.com. February 5, 2005. 2846:"The 10 Worst ROKSO Spammers" 2255:. lotsofways.de. 2018-10-18. 1467: 1248: 278:Digital Equipment Corporation 1495: 666: 601: 524:are often performed against 271: 222:It later came to be used on 181:Monty Python's Flying Circus 142: 7: 4304:Information risk management 4225:Multi-factor authentication 3781:Related security categories 3680:The Spam Archive | Spamdex 2557:ACM Transactions on the Web 1917:Zeller, Tom (1 June 2003). 1653:Monty Python (2009-01-13), 1618:. New York, NY: ACM Press. 1342:Network Abuse Clearinghouse 1262: 1223: 943:Spam can be used to spread 938: 807: 801: 796: 790: 785: 779: 774: 766: 753: 747: 742: 736: 731: 725: 634:enable researchers to find 98:mobile phone messaging spam 10: 4769: 4753:Online advertising methods 4562:Naive Bayes spam filtering 4281:Intrusion detection system 4239:Computer security software 3895:Advanced persistent threat 3598: 3365:Gordon v. Virtumundo, Inc. 2827:"TOP 10 spam service ISPs" 2407:Dan Tynan (3 April 2012). 1978:Abate, Tom (May 3, 2008). 1800:Thuerk, Gary; Furr, Joel, 1543:Merriam-Webster Dictionary 1338: – Malicious software 1312: – Type of email spam 1256:news.admin.net-abuse.email 1179:Gordon v. Virtumundo, Inc. 1030: 927:. The conversion rate for 605: 566:, trainer, ISO file for a 502: 478: 452: 425: 407: 372: 263:In the late 19th century, 253: 130:Internet service providers 29: 4663: 4585: 4512: 4442: 4379: 4370: 4180: 3880: 3866: 3860:Digital rights management 3780: 3373: (9th Cir. 2009). 2608:10.1080/13600860902742513 2356:10.1109/CCIP.2015.7100738 1243:e-mail address harvesting 849:Email spam exemplifies a 841:The cost to providers of 499:Blog, wiki, and guestbook 167:is derived from the 1970 4537:Disposable email address 4399:Directory harvest attack 4005:Denial-of-service attack 3900:Arbitrary code execution 3579:. Kzp.bg. Archived from 1866:(4.4.7 ed.), CatB, 1568:"The Definition of Spam" 1472: 1137:Florida Attorney General 1116:, and transportation of 1098:Paradise Valley, Arizona 846:threatened by spamming. 820:Hormel Foods Corporation 389:email address harvesting 368: 4215:Computer access control 4167:Rogue security software 3830:Electromagnetic warfare 3500:. Ftc.gov. 2011-06-24. 3110:www.brechtweigelhaus.de 2119:. MAAWG. Archived from 1984:San Francisco Chronicle 1055:Tennessee Supreme Court 883:is the combination of: 642:. Researchers from the 632:Academic search engines 588:standards and practices 562:, a link to a supposed 184:. The sketch, set in a 4261:Obfuscation (software) 3990:Browser Helper Objects 3874: 3554:. Lex.bg. 2011-08-14. 2350:. IEEE. pp. 1–6. 2114:"Email Metrics Report" 2011:"Twenty Years of Spam" 851:tragedy of the commons 550: 475:Social networking spam 394:social networking spam 160: 106:junk fax transmissions 82:Web search engine spam 74:instant messaging spam 46: 34:. For other uses, see 4256:Data-centric security 4137:Remote access trojans 3872: 3732:Spamtrackers SpamWiki 3443:. Eur-lex.europa.eu. 3371:575 F.3d 1040 2881:. Alexandria, VA, USA 2749:Ghosemajumder, Shuman 2590:Kosta, Eleni (2009). 1773:"The Origins of Spam" 1604:Garcia-Molina, Hector 1126:Department of Justice 1053:was disbarred by the 871:cost–benefit analysis 830:Cost–benefit analyses 543: 303:posting to advertise 150: 94:online classified ads 78:Usenet newsgroup spam 44: 36:Spam (disambiguation) 4743:Internet terminology 4733:History of computing 4547:Email authentication 4188:Application security 4082:Privilege escalation 3950:Cross-site scripting 3803:Cybersex trafficking 3774:Information security 3418:. Scotchspam.co.uk. 3392:. 27 December 2005. 3217:. October 12, 2007. 3055:. 11 February 2008. 2987:. pp. 431–446. 2468:ACM SIGIR Conference 1572:The Spamhaus Project 1460:Usenet Death Penalty 1375:The Spamhaus Project 1298:Anti-spam techniques 1122:CAN-SPAM Act of 2003 1016:CAN-SPAM Act of 2003 699:Geographical origins 640:author-level metrics 619:spam, usually using 382:Symantec Corporation 322:An early example of 4394:Bulk email software 3835:Information warfare 3793:Automotive security 3474:. 16 October 2008. 2902:Lombardi, Candace. 2813:10.1257/jep.26.3.87 2084:10.3233/JIFS-179562 1808:(interviews), NPR, 1771:Goldberg, Myshele. 1608:"Web spam taxonomy" 1176:In a 2009 opinion, 1155:Olympia, Washington 1061:practice. In 2005, 968:Robert Alan Soloway 679:Noncommercial forms 636:academic literature 422:Newsgroup and forum 299:, began using bulk 209:fans often invaded 122:Monty Python sketch 102:Internet forum spam 4244:Antivirus software 4112:Social engineering 4077:Polymorphic engine 4030:Fraudulent dialers 3935:Hardware backdoors 3875: 3294:on 15 January 2009 3268:on 15 January 2009 3192:2007-01-23 at the 3053:www.anti-abuse.org 3003:10.1109/SP.2011.24 2832:2005-12-04 at the 2782:Thank the Spammers 2634:2012-02-03 at the 2538:2011-07-28 at the 2443:2012-10-21 at the 2301:2012-09-20 at the 2282:2012-07-05 at the 2200:The New York Times 2039:Danchev, Dancho. " 1923:The New York Times 1834:. news.bbc.co.uk. 1749:. Templetons.com. 1094:Venice, California 976:"zombie" computers 955:, or worse (e.g., 592:television station 551: 364:In different media 290:multi-user dungeon 161: 47: 4705: 4704: 4532:Context filtering 4508: 4507: 4330: 4329: 4292:Anomaly detection 4197:Secure by default 4050:Keystroke loggers 3985:Drive-by download 3873:vectorial version 3840:Internet security 3788:Computer security 3676:978-0-521886-50-5 3666:978-1-601383-03-7 3656:978-1-932266-86-3 3012:978-0-7695-4402-1 2751:(18 March 2008). 2504:Web User magazine 2365:978-1-4799-7171-8 1625:978-1-59593-046-0 1487:Advance fee fraud 957:advance fee fraud 812: 811: 455:Mobile phone spam 416:instant messaging 404:Instant messaging 329:bulk posting via 60:, non-commercial 18:Spam (electronic) 16:(Redirected from 4760: 4748:Internet culture 4673:Advance-fee scam 4620:Keyword stuffing 4377: 4376: 4357: 4350: 4343: 4334: 4333: 4201:Secure by design 4132:Hardware Trojans 3965:History sniffing 3955:Cross-site leaks 3850:Network security 3767: 3760: 3753: 3744: 3743: 3628: 3626: 3625: 3592: 3591: 3589: 3588: 3573: 3567: 3566: 3564: 3563: 3548: 3542: 3541: 3539: 3538: 3519: 3513: 3512: 3510: 3509: 3494: 3488: 3487: 3485: 3483: 3462: 3456: 3455: 3453: 3452: 3437: 3431: 3430: 3428: 3427: 3412: 3406: 3405: 3403: 3401: 3380: 3374: 3368: 3360: 3354: 3353: 3351: 3350: 3335: 3329: 3328: 3326: 3325: 3310: 3304: 3303: 3301: 3299: 3284: 3278: 3277: 3275: 3273: 3258: 3252: 3238:Gaudin, Sharon, 3236: 3230: 3229: 3227: 3226: 3207: 3201: 3184: 3178: 3177: 3175: 3173: 3157: 3151: 3150: 3148: 3147: 3131: 3125: 3124: 3122: 3121: 3102: 3096: 3095: 3093: 3091: 3075: 3069: 3068: 3066: 3064: 3045: 3039: 3038: 3036: 3035: 3029: 2996: 2982: 2973: 2967: 2966: 2964: 2962: 2946: 2940: 2939: 2921: 2915: 2914: 2912: 2911: 2899: 2890: 2889: 2887: 2886: 2876: 2867: 2861: 2860: 2858: 2857: 2842: 2836: 2823: 2817: 2816: 2815: 2795: 2789: 2786:William R. James 2779: 2773: 2772: 2770: 2768: 2745: 2739: 2738: 2736: 2735: 2720: 2714: 2713: 2711: 2710: 2695: 2689: 2688: 2686: 2685: 2670: 2664: 2663: 2661: 2660: 2645: 2639: 2626: 2620: 2619: 2587: 2581: 2580: 2548: 2542: 2529: 2520: 2519: 2517: 2515: 2506:. Archived from 2496: 2490: 2489: 2483: 2475: 2473: 2458: 2452: 2435: 2429: 2428: 2426: 2424: 2404: 2398: 2397: 2391: 2387: 2385: 2377: 2343: 2337: 2336: 2334: 2333: 2327: 2320: 2312: 2306: 2293: 2287: 2274: 2268: 2267: 2265: 2264: 2249: 2243: 2242: 2240: 2238: 2222: 2216: 2214: 2213: 2211: 2191: 2185: 2184: 2182: 2181: 2166: 2160: 2159: 2157: 2155: 2149: 2142: 2134: 2128: 2127: 2125: 2118: 2110: 2104: 2103: 2078:(3): 2765–2776. 2063: 2057: 2037: 2031: 2030: 2028: 2026: 2009:Conway, Andrew. 2006: 2000: 1999: 1997: 1995: 1975: 1964: 1963: 1961: 1960: 1945: 1939: 1938: 1936: 1934: 1914: 1908: 1907: 1905: 1904: 1885: 1879: 1877: 1876: 1875: 1854: 1848: 1847: 1845: 1843: 1827: 1821: 1819: 1818: 1817: 1797: 1788: 1787: 1785: 1784: 1768: 1762: 1761: 1759: 1758: 1743: 1734: 1733: 1731: 1730: 1715: 1709: 1708: 1706: 1705: 1694:10.17487/RFC2635 1686:Ietf Datatracker 1677: 1671: 1670: 1669: 1668: 1659:, archived from 1650: 1644: 1643: 1641: 1640: 1634: 1612: 1596: 1587: 1586: 1584: 1583: 1564: 1558: 1557: 1555: 1554: 1535: 1529: 1528: 1526: 1525: 1506: 1489: 1483: 1451: 1448: 1433: 1410:Suppression list 1400: 1391: 1364: 1331:List of spammers 1321: 1316:Confidence trick 1292:Advance-fee scam 1279: 1274: 1273: 1153:Edna Fiedler of 1114:money laundering 1083:default judgment 986:Political issues 945:computer viruses 906:punitive damages 891:Transaction cost 815:Trademark issues 710: 709: 590:department at a 358:English language 248:a cheese product 21: 4768: 4767: 4763: 4762: 4761: 4759: 4758: 4757: 4738:Internet ethics 4708: 4707: 4706: 4701: 4685:Make Money Fast 4659: 4655:URL redirection 4581: 4504: 4438: 4389:Address munging 4366: 4361: 4331: 4326: 4176: 3876: 3864: 3855:Copy protection 3845:Mobile security 3776: 3771: 3691: 3639:Brunton, Finn. 3636: 3634:Further reading 3631: 3623: 3621: 3601: 3596: 3595: 3586: 3584: 3575: 3574: 3570: 3561: 3559: 3550: 3549: 3545: 3536: 3534: 3521: 3520: 3516: 3507: 3505: 3496: 3495: 3491: 3481: 3479: 3464: 3463: 3459: 3450: 3448: 3439: 3438: 3434: 3425: 3423: 3414: 3413: 3409: 3399: 3397: 3382: 3381: 3377: 3362: 3361: 3357: 3348: 3346: 3337: 3336: 3332: 3323: 3321: 3312: 3311: 3307: 3297: 3295: 3286: 3285: 3281: 3271: 3269: 3260: 3259: 3255: 3237: 3233: 3224: 3222: 3209: 3208: 3204: 3194:Wayback Machine 3185: 3181: 3171: 3169: 3160: 3158: 3154: 3145: 3143: 3134: 3132: 3128: 3119: 3117: 3104: 3103: 3099: 3089: 3087: 3078:Credeur, Mary. 3076: 3072: 3062: 3060: 3049:"RBL criticism" 3047: 3046: 3042: 3033: 3031: 3027: 3013: 2994:10.1.1.706.1497 2980: 2974: 2970: 2960: 2958: 2947: 2943: 2931:InformationWeek 2924: 2923:Thomas Claburn. 2922: 2918: 2909: 2907: 2900: 2893: 2884: 2882: 2874: 2868: 2864: 2855: 2853: 2844: 2843: 2839: 2834:Wayback Machine 2824: 2820: 2796: 2792: 2780: 2776: 2766: 2764: 2746: 2742: 2733: 2731: 2722: 2721: 2717: 2708: 2706: 2697: 2696: 2692: 2683: 2681: 2672: 2671: 2667: 2658: 2656: 2647: 2646: 2642: 2636:Wayback Machine 2627: 2623: 2588: 2584: 2569:10.1145/3007901 2549: 2545: 2540:Wayback Machine 2530: 2523: 2513: 2511: 2498: 2497: 2493: 2480:cite conference 2477: 2476: 2471: 2463:Jussara Almeida 2459: 2455: 2445:Wayback Machine 2436: 2432: 2422: 2420: 2405: 2401: 2389: 2388: 2379: 2378: 2366: 2344: 2340: 2331: 2329: 2325: 2318: 2314: 2313: 2309: 2303:Wayback Machine 2294: 2290: 2284:Wayback Machine 2275: 2271: 2262: 2260: 2251: 2250: 2246: 2236: 2234: 2223: 2219: 2209: 2207: 2192: 2188: 2179: 2177: 2168: 2167: 2163: 2153: 2151: 2147: 2140: 2136: 2135: 2131: 2123: 2116: 2112: 2111: 2107: 2064: 2060: 2038: 2034: 2024: 2022: 2007: 2003: 1993: 1991: 1976: 1967: 1958: 1956: 1947: 1946: 1942: 1932: 1930: 1915: 1911: 1902: 1900: 1887: 1886: 1882: 1873: 1871: 1863:The Jargon File 1856: 1855: 1851: 1841: 1839: 1828: 1824: 1815: 1813: 1798: 1791: 1782: 1780: 1769: 1765: 1756: 1754: 1745: 1744: 1737: 1728: 1726: 1717: 1716: 1712: 1703: 1701: 1678: 1674: 1666: 1664: 1651: 1647: 1638: 1636: 1632: 1626: 1610: 1600:Gyöngyi, Zoltan 1597: 1590: 1581: 1579: 1566: 1565: 1561: 1552: 1550: 1537: 1536: 1532: 1523: 1521: 1514:play.google.com 1508: 1507: 1503: 1498: 1493: 1492: 1484: 1480: 1475: 1470: 1465: 1449: 1446: 1445: – spammer 1443:Sanford Wallace 1437:Make Money Fast 1431: 1398: 1389: 1362: 1319: 1286:Address munging 1277:Internet portal 1275: 1268: 1265: 1251: 1226: 1212: 1196:Channel Islands 1188: 1059:immigration law 1051:Laurence Canter 1047:Sanford Wallace 1040: 1035: 1029: 988: 941: 925:conversion rate 867: 832: 822:, the maker of 817: 760: 720: 701: 681: 669: 660: 629: 627:Academic search 610: 604: 538: 512:is spamming on 507: 501: 492: 483: 477: 457: 451: 439:Breidbart Index 434: 426:Main articles: 424: 412: 406: 387:An industry of 377: 371: 366: 274: 261: 256: 233:Make Money Fast 145: 39: 28: 23: 22: 15: 12: 11: 5: 4766: 4756: 4755: 4750: 4745: 4740: 4735: 4730: 4725: 4720: 4703: 4702: 4700: 4699: 4698: 4697: 4687: 4682: 4681: 4680: 4669: 4667: 4665:Internet fraud 4661: 4660: 4658: 4657: 4652: 4647: 4642: 4637: 4632: 4627: 4622: 4617: 4615:Google bombing 4612: 4607: 4602: 4597: 4591: 4589: 4583: 4582: 4580: 4579: 4574: 4569: 4564: 4559: 4557:List poisoning 4554: 4549: 4544: 4539: 4534: 4529: 4524: 4518: 4516: 4510: 4509: 4506: 4505: 4503: 4502: 4497: 4492: 4487: 4482: 4477: 4472: 4467: 4462: 4457: 4452: 4446: 4444: 4440: 4439: 4437: 4436: 4431: 4426: 4421: 4416: 4414:Email spoofing 4411: 4406: 4401: 4396: 4391: 4385: 4383: 4374: 4368: 4367: 4360: 4359: 4352: 4345: 4337: 4328: 4327: 4325: 4324: 4322:Site isolation 4319: 4314: 4313: 4312: 4306: 4296: 4295: 4294: 4289: 4278: 4273: 4268: 4263: 4258: 4253: 4252: 4251: 4246: 4236: 4235: 4234: 4229: 4228: 4227: 4220:Authentication 4212: 4211: 4210: 4209: 4208: 4198: 4195: 4184: 4182: 4178: 4177: 4175: 4174: 4169: 4164: 4159: 4154: 4149: 4144: 4139: 4134: 4129: 4124: 4119: 4114: 4109: 4104: 4099: 4094: 4089: 4084: 4079: 4074: 4073: 4072: 4062: 4057: 4052: 4047: 4042: 4037: 4032: 4027: 4022: 4020:Email spoofing 4017: 4012: 4007: 4002: 3997: 3992: 3987: 3982: 3977: 3972: 3967: 3962: 3960:DOM clobbering 3957: 3952: 3947: 3942: 3940:Code injection 3937: 3932: 3931: 3930: 3925: 3920: 3915: 3907: 3902: 3897: 3892: 3886: 3884: 3878: 3877: 3867: 3865: 3863: 3862: 3857: 3852: 3847: 3842: 3837: 3832: 3827: 3822: 3820:Cyberterrorism 3817: 3812: 3811: 3810: 3808:Computer fraud 3805: 3795: 3790: 3784: 3782: 3778: 3777: 3770: 3769: 3762: 3755: 3747: 3741: 3740: 3735: 3729: 3724: 3718: 3712: 3707: 3702: 3697: 3690: 3689:External links 3687: 3686: 3685: 3678: 3668: 3658: 3644: 3635: 3632: 3630: 3629: 3613:The New Yorker 3602: 3600: 3597: 3594: 3593: 3568: 3543: 3514: 3489: 3457: 3432: 3407: 3375: 3355: 3330: 3305: 3279: 3253: 3247:2013-01-03 at 3231: 3202: 3179: 3152: 3126: 3097: 3080:"Staff Writer" 3070: 3040: 3011: 2968: 2941: 2938:on 2015-02-09. 2916: 2891: 2862: 2837: 2818: 2790: 2774: 2740: 2715: 2690: 2665: 2640: 2621: 2602:(1–2): 89–97. 2582: 2543: 2521: 2510:on 11 May 2012 2491: 2453: 2449:Wired Magazine 2430: 2399: 2390:|website= 2364: 2338: 2307: 2288: 2269: 2244: 2217: 2186: 2161: 2150:on 13 May 2014 2129: 2126:on 2007-12-03. 2105: 2058: 2046:2012-07-08 at 2032: 2001: 1965: 1951:. Templetons. 1940: 1909: 1895:. 2007-12-14. 1880: 1849: 1822: 1789: 1763: 1735: 1710: 1672: 1645: 1624: 1588: 1559: 1530: 1500: 1499: 1497: 1494: 1491: 1490: 1477: 1476: 1474: 1471: 1469: 1466: 1464: 1463: 1457: 1452: 1440: 1434: 1428:Howard Carmack 1424: 1423: 1419: 1418: 1415:Voice phishing 1412: 1407: 1401: 1392: 1383: 1378: 1372: 1366: 1356: 1350: 1344: 1339: 1333: 1328: 1322: 1313: 1307: 1304:Identity theft 1301: 1295: 1289: 1282: 1281: 1280: 1264: 1261: 1260: 1259: 1250: 1247: 1225: 1222: 1217:Shane Atkinson 1211: 1208: 1187: 1186:United Kingdom 1184: 1133:Tampa, Florida 1085:and permanent 1078:Robert Soloway 1067:America Online 1063:Jason Smathers 1039: 1036: 1028: 1025: 987: 984: 953:identity theft 940: 937: 917: 916: 913:Newsgroup spam 909: 898: 888: 866: 863: 843:search engines 836:European Union 831: 828: 816: 813: 810: 809: 806: 805:United States 803: 799: 798: 795: 792: 788: 787: 784: 781: 777: 776: 773: 769: 768: 765: 762: 756: 755: 752: 749: 745: 744: 741: 738: 734: 733: 730: 727: 723: 722: 717: 714: 700: 697: 680: 677: 668: 665: 659: 656: 652:Google Scholar 628: 625: 606:Main article: 603: 600: 537: 534: 503:Main article: 500: 497: 491: 488: 479:Main article: 476: 473: 461:text messaging 453:Main article: 450: 447: 428:Newsgroup spam 423: 420: 410:Messaging spam 408:Main article: 405: 402: 373:Main article: 370: 367: 365: 362: 273: 270: 260: 257: 255: 252: 144: 141: 26: 9: 6: 4: 3: 2: 4765: 4754: 4751: 4749: 4746: 4744: 4741: 4739: 4736: 4734: 4731: 4729: 4726: 4724: 4721: 4719: 4716: 4715: 4713: 4696: 4693: 4692: 4691: 4688: 4686: 4683: 4679: 4676: 4675: 4674: 4671: 4670: 4668: 4666: 4662: 4656: 4653: 4651: 4648: 4646: 4643: 4641: 4638: 4636: 4633: 4631: 4630:Referrer spam 4628: 4626: 4623: 4621: 4618: 4616: 4613: 4611: 4608: 4606: 4603: 4601: 4598: 4596: 4593: 4592: 4590: 4588: 4584: 4578: 4575: 4573: 4570: 4568: 4565: 4563: 4560: 4558: 4555: 4553: 4550: 4548: 4545: 4543: 4540: 4538: 4535: 4533: 4530: 4528: 4525: 4523: 4520: 4519: 4517: 4515: 4511: 4501: 4498: 4496: 4495:Telemarketing 4493: 4491: 4488: 4486: 4483: 4481: 4478: 4476: 4473: 4471: 4468: 4466: 4463: 4461: 4458: 4456: 4453: 4451: 4448: 4447: 4445: 4441: 4435: 4432: 4430: 4429:Pink contract 4427: 4425: 4422: 4420: 4417: 4415: 4412: 4410: 4407: 4405: 4402: 4400: 4397: 4395: 4392: 4390: 4387: 4386: 4384: 4382: 4378: 4375: 4373: 4369: 4365: 4358: 4353: 4351: 4346: 4344: 4339: 4338: 4335: 4323: 4320: 4318: 4315: 4310: 4307: 4305: 4302: 4301: 4300: 4297: 4293: 4290: 4287: 4284: 4283: 4282: 4279: 4277: 4274: 4272: 4269: 4267: 4264: 4262: 4259: 4257: 4254: 4250: 4247: 4245: 4242: 4241: 4240: 4237: 4233: 4232:Authorization 4230: 4226: 4223: 4222: 4221: 4218: 4217: 4216: 4213: 4207: 4204: 4203: 4202: 4199: 4196: 4194: 4193:Secure coding 4191: 4190: 4189: 4186: 4185: 4183: 4179: 4173: 4170: 4168: 4165: 4163: 4162:SQL injection 4160: 4158: 4155: 4153: 4150: 4148: 4145: 4143: 4142:Vulnerability 4140: 4138: 4135: 4133: 4130: 4128: 4127:Trojan horses 4125: 4123: 4122:Software bugs 4120: 4118: 4115: 4113: 4110: 4108: 4105: 4103: 4100: 4098: 4095: 4093: 4090: 4088: 4085: 4083: 4080: 4078: 4075: 4071: 4068: 4067: 4066: 4063: 4061: 4058: 4056: 4053: 4051: 4048: 4046: 4043: 4041: 4038: 4036: 4033: 4031: 4028: 4026: 4023: 4021: 4018: 4016: 4013: 4011: 4010:Eavesdropping 4008: 4006: 4003: 4001: 4000:Data scraping 3998: 3996: 3993: 3991: 3988: 3986: 3983: 3981: 3978: 3976: 3973: 3971: 3970:Cryptojacking 3968: 3966: 3963: 3961: 3958: 3956: 3953: 3951: 3948: 3946: 3943: 3941: 3938: 3936: 3933: 3929: 3926: 3924: 3921: 3919: 3916: 3914: 3911: 3910: 3908: 3906: 3903: 3901: 3898: 3896: 3893: 3891: 3888: 3887: 3885: 3883: 3879: 3871: 3861: 3858: 3856: 3853: 3851: 3848: 3846: 3843: 3841: 3838: 3836: 3833: 3831: 3828: 3826: 3823: 3821: 3818: 3816: 3813: 3809: 3806: 3804: 3801: 3800: 3799: 3796: 3794: 3791: 3789: 3786: 3785: 3783: 3779: 3775: 3768: 3763: 3761: 3756: 3754: 3749: 3748: 3745: 3739: 3736: 3733: 3730: 3728: 3725: 3722: 3719: 3716: 3713: 3711: 3708: 3706: 3703: 3701: 3698: 3696: 3693: 3692: 3683: 3679: 3677: 3673: 3669: 3667: 3663: 3659: 3657: 3653: 3649: 3645: 3642: 3638: 3637: 3619: 3615: 3614: 3609: 3604: 3603: 3583:on 2010-09-27 3582: 3578: 3572: 3557: 3553: 3547: 3532: 3528: 3524: 3518: 3503: 3499: 3493: 3477: 3473: 3472: 3467: 3461: 3446: 3442: 3436: 3421: 3417: 3411: 3395: 3391: 3390: 3385: 3379: 3372: 3367: 3366: 3359: 3344: 3340: 3334: 3319: 3315: 3309: 3293: 3289: 3283: 3267: 3263: 3257: 3250: 3249:archive.today 3246: 3243: 3242: 3235: 3220: 3216: 3212: 3206: 3199: 3195: 3191: 3188: 3183: 3167: 3163: 3156: 3141: 3137: 3130: 3115: 3111: 3107: 3101: 3085: 3081: 3074: 3058: 3054: 3050: 3044: 3026: 3022: 3018: 3014: 3008: 3004: 3000: 2995: 2990: 2986: 2979: 2972: 2956: 2952: 2945: 2937: 2933: 2932: 2927: 2920: 2905: 2898: 2896: 2880: 2873: 2866: 2851: 2847: 2841: 2835: 2831: 2828: 2822: 2814: 2809: 2806:(3): 87–110, 2805: 2801: 2794: 2787: 2783: 2778: 2762: 2758: 2754: 2750: 2744: 2729: 2726:. Commtouch. 2725: 2719: 2704: 2700: 2694: 2679: 2675: 2669: 2654: 2650: 2644: 2637: 2633: 2630: 2625: 2617: 2613: 2609: 2605: 2601: 2597: 2593: 2586: 2578: 2574: 2570: 2566: 2562: 2558: 2554: 2547: 2541: 2537: 2534: 2528: 2526: 2509: 2505: 2501: 2495: 2487: 2481: 2470: 2469: 2464: 2457: 2450: 2446: 2442: 2439: 2434: 2418: 2414: 2410: 2403: 2395: 2383: 2375: 2371: 2367: 2361: 2357: 2353: 2349: 2342: 2324: 2317: 2311: 2304: 2300: 2297: 2292: 2285: 2281: 2278: 2273: 2258: 2254: 2248: 2232: 2228: 2221: 2205: 2201: 2197: 2190: 2175: 2171: 2165: 2146: 2139: 2133: 2122: 2115: 2109: 2101: 2097: 2093: 2089: 2085: 2081: 2077: 2073: 2069: 2062: 2055: 2054: 2049: 2048:archive.today 2045: 2042: 2036: 2020: 2016: 2012: 2005: 1989: 1985: 1981: 1974: 1972: 1970: 1954: 1950: 1944: 1928: 1924: 1920: 1913: 1898: 1894: 1893:The Economist 1890: 1884: 1869: 1865: 1864: 1859: 1853: 1837: 1833: 1826: 1811: 1807: 1803: 1796: 1794: 1778: 1774: 1767: 1752: 1748: 1742: 1740: 1724: 1720: 1714: 1699: 1695: 1691: 1687: 1683: 1676: 1663:on 2010-05-22 1662: 1658: 1657: 1649: 1631: 1627: 1621: 1617: 1609: 1605: 1601: 1595: 1593: 1577: 1573: 1569: 1563: 1548: 1544: 1540: 1534: 1519: 1515: 1511: 1505: 1501: 1488: 1482: 1478: 1461: 1458: 1456: 1453: 1444: 1441: 1438: 1435: 1429: 1426: 1425: 1421: 1420: 1416: 1413: 1411: 1408: 1405: 1402: 1396: 1393: 1387: 1384: 1382: 1379: 1376: 1373: 1370: 1367: 1360: 1357: 1354: 1351: 1348: 1345: 1343: 1340: 1337: 1334: 1332: 1329: 1326: 1323: 1317: 1314: 1311: 1308: 1305: 1302: 1299: 1296: 1293: 1290: 1287: 1284: 1283: 1278: 1272: 1267: 1258: 1257: 1253: 1252: 1246: 1244: 1238: 1234: 1231: 1221: 1218: 1207: 1203: 1199: 1197: 1193: 1192:Nigel Roberts 1183: 1181: 1180: 1174: 1172: 1168: 1164: 1160: 1156: 1151: 1149: 1145: 1141: 1140:Charlie Crist 1138: 1135:were sued by 1134: 1129: 1127: 1123: 1119: 1115: 1111: 1107: 1103: 1099: 1095: 1090: 1088: 1084: 1079: 1074: 1072: 1068: 1064: 1060: 1056: 1052: 1048: 1044: 1038:United States 1034: 1024: 1021: 1017: 1013: 1009: 1004: 1002: 997: 993: 983: 979: 977: 973: 969: 964: 962: 958: 954: 950: 949:trojan horses 946: 936: 934: 930: 926: 921: 914: 910: 907: 903: 899: 896: 892: 889: 886: 885: 884: 882: 878: 876: 872: 865:General costs 862: 859: 856: 852: 847: 844: 839: 837: 827: 825: 821: 804: 800: 793: 789: 782: 778: 771: 770: 763: 757: 750: 746: 739: 735: 728: 724: 718: 715: 712: 711: 708: 706: 705:Cisco Systems 696: 694: 691:have spammed 690: 686: 676: 674: 664: 655: 653: 649: 645: 641: 637: 633: 624: 622: 618: 614: 609: 599: 597: 596:cable network 593: 589: 585: 581: 577: 573: 569: 565: 561: 557: 547: 542: 533: 531: 527: 523: 519: 515: 511: 506: 505:Spam in blogs 496: 487: 482: 472: 468: 466: 463:service of a 462: 456: 446: 442: 440: 433: 429: 419: 417: 411: 401: 399: 395: 390: 385: 383: 376: 361: 359: 354: 350: 348: 344: 340: 336: 332: 328: 325: 320: 318: 314: 310: 306: 302: 298: 293: 291: 286: 283: 279: 269: 266: 265:Western Union 251: 249: 245: 240: 238: 234: 230: 225: 220: 218: 214: 213: 208: 207: 202: 198: 193: 191: 187: 183: 182: 177: 173: 170: 166: 158: 154: 149: 140: 138: 133: 131: 125: 123: 119: 115: 111: 107: 103: 99: 95: 91: 87: 86:spam in blogs 83: 79: 75: 71: 67: 63: 62:proselytizing 59: 55: 51: 43: 37: 33: 19: 4678:Lottery scam 4635:Scraper site 4605:Doorway page 4475:Mobile phone 4455:Cold calling 4363: 4266:Data masking 4106: 3825:Cyberwarfare 3640: 3622:. Retrieved 3611: 3585:. Retrieved 3581:the original 3571: 3560:. Retrieved 3546: 3535:. Retrieved 3526: 3517: 3506:. Retrieved 3492: 3480:. Retrieved 3469: 3460: 3449:. Retrieved 3435: 3424:. Retrieved 3410: 3398:. Retrieved 3387: 3378: 3363: 3358: 3347:. Retrieved 3345:. 2008-06-25 3342: 3333: 3322:. Retrieved 3308: 3296:. Retrieved 3292:the original 3282: 3270:. Retrieved 3266:the original 3256: 3240: 3234: 3223:. Retrieved 3205: 3200:, 2005-02-22 3197: 3182: 3170:. Retrieved 3155: 3144:. Retrieved 3129: 3118:. Retrieved 3109: 3100: 3088:. Retrieved 3073: 3061:. Retrieved 3052: 3043: 3032:. Retrieved 2984: 2971: 2959:. Retrieved 2944: 2936:the original 2929: 2919: 2908:. Retrieved 2883:. Retrieved 2878: 2865: 2854:. Retrieved 2848:. Spamhaus. 2840: 2821: 2803: 2799: 2793: 2785: 2777: 2765:. Retrieved 2743: 2732:. Retrieved 2718: 2707:. Retrieved 2701:. Spamlaws. 2693: 2682:. Retrieved 2668: 2657:. Retrieved 2643: 2624: 2599: 2595: 2585: 2560: 2556: 2546: 2512:. Retrieved 2508:the original 2503: 2494: 2467: 2456: 2451:, March 2004 2448: 2433: 2421:. Retrieved 2412: 2402: 2347: 2341: 2330:. Retrieved 2310: 2291: 2272: 2261:. Retrieved 2247: 2235:. Retrieved 2220: 2208:, retrieved 2199: 2189: 2178:. Retrieved 2172:. List DNA. 2164: 2152:. Retrieved 2145:the original 2132: 2121:the original 2108: 2075: 2071: 2061: 2051: 2035: 2023:. Retrieved 2014: 2004: 1992:. Retrieved 1983: 1957:. Retrieved 1943: 1931:. Retrieved 1922: 1912: 1901:. Retrieved 1892: 1883: 1872:, retrieved 1862: 1852: 1840:. Retrieved 1825: 1814:, retrieved 1805: 1781:. Retrieved 1766: 1755:. Retrieved 1727:. Retrieved 1713: 1702:. Retrieved 1685: 1675: 1665:, retrieved 1661:the original 1655: 1648: 1637:. Retrieved 1614: 1580:. Retrieved 1571: 1562: 1551:. Retrieved 1542: 1533: 1522:. Retrieved 1513: 1504: 1481: 1254: 1239: 1235: 1227: 1213: 1204: 1200: 1189: 1177: 1175: 1152: 1130: 1091: 1075: 1071:CAN-SPAM Act 1045: 1041: 1005: 989: 980: 972:e-mail fraud 965: 942: 933:Storm botnet 919: 918: 880: 879: 868: 860: 848: 840: 833: 818: 764:South Korea 702: 685:Serdar Argic 682: 670: 661: 630: 611: 584:testimonials 559: 552: 518:Movable Type 508: 493: 484: 469: 465:mobile phone 458: 449:Mobile phone 443: 435: 413: 386: 378: 355: 351: 347:three copies 321: 316: 294: 287: 275: 262: 259:Pre-Internet 241: 221: 216: 210: 204: 194: 179: 164: 162: 153:Monty Python 136: 134: 126: 53: 49: 48: 4640:Social spam 4552:Greylisting 4522:Client-side 4450:Auto dialer 4206:Misuse case 4040:Infostealer 4015:Email fraud 3980:Data breach 3815:Cybergeddon 3608:"Damn Spam" 3482:13 November 3471:Stuff.co.nz 3400:13 November 3316:. upi.com. 3298:21 December 3272:21 December 2961:17 December 2757:Google Blog 2237:17 December 2210:December 9, 1933:20 February 1381:Spamigation 1353:Social spam 1210:New Zealand 1065:, a former 1027:Court cases 1023:community. 875:externality 689:evangelists 658:Mobile apps 580:infomercial 490:Social spam 481:Social spam 339:Bosnian War 327:fundraising 313:free speech 305:immigration 244:crossposted 219:fans left. 114:advertising 110:social spam 58:advertising 4728:E-commerce 4723:Cybercrime 4712:Categories 4645:Spam blogs 4610:Forum spam 4587:Spamdexing 4460:Flyposting 4419:Image spam 4381:Email spam 4271:Encryption 4147:Web shells 4087:Ransomware 4035:Hacktivism 3798:Cybercrime 3624:2007-08-02 3587:2013-09-03 3562:2013-09-03 3537:2021-02-18 3508:2013-09-03 3451:2013-09-03 3426:2013-09-03 3349:2014-01-30 3324:2008-06-27 3225:2007-10-25 3146:2007-03-07 3120:2018-04-12 3034:2015-10-29 2910:2013-09-03 2906:. News.com 2885:2008-11-05 2856:2013-09-03 2825:Spamhaus' 2788:2003-03-10 2734:2013-09-03 2709:2013-09-03 2684:2013-09-03 2676:. Europa. 2659:2015-02-12 2514:23 January 2332:2020-08-12 2263:2018-10-29 2180:2013-09-03 1959:2013-09-03 1903:2007-12-14 1874:2014-05-03 1858:"velveeta" 1816:2018-04-06 1783:2014-07-15 1757:2013-09-03 1729:2010-09-20 1704:2010-09-29 1667:2017-01-11 1639:2007-10-05 1582:2013-09-03 1553:2013-07-05 1524:2016-05-01 1468:References 1310:Image spam 1249:Newsgroups 1167:accomplice 1106:conspiracy 1087:injunction 1031:See also: 1012:conversion 772:Indonesia 721:volume(%) 568:video game 549:different. 530:guestbooks 432:Forum spam 375:Email spam 309:Green Card 70:email spam 32:Email spam 4625:Link farm 4595:Blog spam 4514:Anti-spam 4480:Newsgroup 4470:Messaging 4372:Protocols 4102:Shellcode 4097:Scareware 3945:Crimeware 3905:Backdoors 3527:prezi.com 3172:27 August 2989:CiteSeerX 2767:12 August 2392:ignored ( 2382:cite book 2100:213636917 2092:1064-1246 2025:April 11, 2015:Cloudmark 1842:26 August 1496:Citations 1455:Spam King 1386:VoIP spam 1325:Junk mail 1194:from the 1163:probation 1076:In 2007, 673:Bluetooth 667:Bluetooth 613:VoIP spam 608:VoIP spam 602:VoIP Spam 556:thumbnail 510:Blog spam 324:nonprofit 229:Joel Furr 217:Star Trek 212:Star Trek 206:Star Wars 163:The term 155:'s 1970 " 143:Etymology 90:wiki spam 4718:Spamming 4690:Phishing 4600:Cloaking 4577:Spamhaus 4485:Robocall 4465:Junk fax 4276:Firewall 4181:Defenses 4107:Spamming 4092:Rootkits 4065:Phishing 4025:Exploits 3618:Archived 3556:Archived 3531:Archived 3502:Archived 3476:Archived 3445:Archived 3420:Archived 3394:Archived 3389:BBC News 3343:PC World 3318:Archived 3245:Archived 3219:Archived 3190:Archived 3166:Archived 3140:Archived 3114:Archived 3090:July 22, 3084:Archived 3063:31 March 3057:Archived 3025:Archived 3021:16146219 2955:Archived 2850:Archived 2830:Archived 2761:Archived 2728:Archived 2703:Archived 2678:Archived 2653:Archived 2632:Archived 2616:62693275 2536:Archived 2441:Archived 2417:Archived 2374:18207001 2323:Archived 2299:Archived 2280:Archived 2257:Archived 2231:Archived 2204:archived 2174:Archived 2044:Archived 2019:Archived 1988:Archived 1953:Archived 1927:Archived 1897:Archived 1868:archived 1836:Archived 1810:archived 1777:Archived 1751:Archived 1723:Archived 1698:Archived 1630:Archived 1606:(2005). 1576:Archived 1547:Archived 1518:Archived 1404:Sporgery 1347:Phishing 1263:See also 1230:Bulgaria 1224:Bulgaria 1008:trespass 994:and the 961:phishing 939:In crime 751:Vietnam 716:Country 572:Rickroll 66:phishing 50:Spamming 4572:SpamCop 4490:Spambot 4434:Spambot 4424:Joe job 4117:Spyware 4060:Payload 4055:Malware 3995:Viruses 3975:Botnets 3882:Threats 3599:Sources 3523:"Spams" 2577:1944093 2413:ITworld 1994:May 19, 1806:NPR.org 1422:History 1395:Spoetry 1369:SpamCop 1336:Malware 1148:Florida 1118:obscene 920:Benefit 902:damages 895:CAPTCHA 794:Brazil 740:Russia 576:malware 546:YouTube 522:attacks 514:weblogs 398:Quechup 282:ARPANET 272:History 254:History 174:of the 137:spammer 4311:(SIEM) 4288:(HIDS) 4172:Zombie 3909:Bombs 3890:Adware 3674:  3664:  3654:  3369:, 3019:  3009:  2991:  2614:  2575:  2423:1 June 2372:  2362:  2098:  2090:  1622:  1539:"Spam" 1159:Tacoma 1020:Yahoo! 929:botnet 855:threat 783:China 761:(tie) 729:India 693:Usenet 564:keygen 331:Usenet 301:Usenet 224:Usenet 190:Viking 172:sketch 169:"Spam" 96:spam, 4695:Voice 4650:Sping 4567:SORBS 4443:Other 4409:DNSWL 4404:DNSBL 4157:Worms 4152:Wiper 4070:Voice 3918:Logic 3028:(PDF) 3017:S2CID 2981:(PDF) 2875:(PDF) 2638:(PDF) 2612:S2CID 2573:S2CID 2563:(1). 2472:(PDF) 2370:S2CID 2326:(PDF) 2319:(PDF) 2154:7 May 2148:(PDF) 2141:(PDF) 2124:(PDF) 2117:(PDF) 2096:S2CID 2053:ZDNet 1633:(PDF) 1616:Japan 1611:(PDF) 1485:See: 1473:Notes 1363:SORBS 1171:Lagos 1110:fraud 1001:block 732:13.7 713:Rank 526:wikis 369:Email 343:Panix 4500:VoIP 3923:Time 3913:Fork 3672:ISBN 3662:ISBN 3652:ISBN 3484:2011 3402:2011 3300:2014 3274:2014 3174:2010 3092:2002 3065:2020 3007:ISBN 2963:2018 2769:2011 2516:2012 2486:link 2425:2013 2394:help 2360:ISBN 2239:2018 2212:2008 2156:2014 2088:ISSN 2027:2014 1996:2023 1935:2017 1844:2010 1620:ISBN 1010:and 904:and 881:Cost 834:The 824:SPAM 808:3.2 797:4.5 786:4.7 775:6.0 767:6.0 754:7.9 743:9.0 719:Spam 648:OvGU 646:and 528:and 430:and 201:MUDs 199:and 197:BBSs 186:cafe 165:spam 157:Spam 118:Spam 54:spam 3928:Zip 2999:doi 2808:doi 2604:doi 2565:doi 2533:PDF 2352:doi 2080:doi 2050:." 1690:doi 1144:USD 1102:AOL 963:). 615:is 594:or 335:NGO 176:BBC 4714:: 3616:. 3610:. 3529:. 3525:. 3468:. 3386:. 3341:. 3213:. 3112:. 3108:. 3051:. 3023:. 3015:. 3005:. 2997:. 2983:. 2953:. 2928:. 2894:^ 2877:. 2804:26 2802:, 2784:- 2759:. 2755:. 2610:. 2600:23 2598:. 2594:. 2571:. 2561:11 2559:. 2555:. 2524:^ 2502:. 2482:}} 2478:{{ 2447:- 2415:. 2411:. 2386:: 2384:}} 2380:{{ 2368:. 2358:. 2321:. 2229:. 2202:, 2198:, 2094:. 2086:. 2076:38 2074:. 2070:. 2017:. 2013:. 1986:. 1982:. 1968:^ 1925:. 1921:. 1891:. 1860:, 1804:, 1792:^ 1775:. 1738:^ 1721:. 1696:. 1688:. 1684:. 1628:. 1613:. 1602:; 1591:^ 1574:. 1570:. 1541:. 1516:. 1512:. 1112:, 1108:, 947:, 915:). 802:8 791:7 780:6 748:3 737:2 726:1 598:. 400:. 349:. 319:. 139:. 108:, 104:, 100:, 92:, 88:, 84:, 80:, 76:, 4356:e 4349:t 4342:v 3766:e 3759:t 3752:v 3627:. 3590:. 3565:. 3540:. 3511:. 3486:. 3454:. 3429:. 3404:. 3352:. 3327:. 3302:. 3276:. 3228:. 3196:- 3176:. 3149:. 3123:. 3094:. 3067:. 3037:. 3001:: 2965:. 2913:. 2888:. 2859:. 2810:: 2771:. 2737:. 2712:. 2687:. 2662:. 2618:. 2606:: 2579:. 2567:: 2518:. 2488:) 2474:. 2427:. 2396:) 2376:. 2354:: 2335:. 2266:. 2241:. 2215:. 2183:. 2158:. 2102:. 2082:: 2029:. 1998:. 1962:. 1937:. 1906:. 1878:. 1846:. 1820:. 1786:. 1760:. 1732:. 1707:. 1692:: 1642:. 1585:. 1556:. 1527:. 1361:( 908:. 759:4 38:. 20:)

Index

Spam (electronic)
Email spam
Spam (disambiguation)

advertising
proselytizing
phishing
email spam
instant messaging spam
Usenet newsgroup spam
Web search engine spam
spam in blogs
wiki spam
online classified ads
mobile phone messaging spam
Internet forum spam
junk fax transmissions
social spam
advertising
Spam
Monty Python sketch
Internet service providers

Monty Python
Spam
"Spam"
sketch
BBC
Monty Python's Flying Circus
cafe

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.